Post Job Free
Sign in

Information Technology Security Officer

Location:
Cibolo, TX
Posted:
August 21, 2023

Contact this candidate

Resume:

NATISHA BAILEY

210-***-****

**************@*****.***

TECHNOLOGY PROFILE

CERTIFIED IN:

CompTIA - CASP CE, Security + CE, A + CE, Network + CE

EC-Council - CEH, ECSA

EXIN - ITIL v4

Microsoft - MCP, MCSA, MCITP: EA

Bachelor of Science degree in Computer Science, Minor in Mathematics from Texas State University

Master of Science degree in Cybersecurity from Webster University

Clearance Level: Active Top Secret/Sensitive Compartmental Information (TS/SCI)

DHS DOMino, KForce Dulles, VA

Security Lead/Cybersecurity Engineer September 2019-Present

-Serves as the Security Lead for CMIES value stream supporting CD by delivering security threat detection and incident response services leveraging automation, orchestration, and artificial intelligent solutions.

-Responsible for implementing security engineering technical expertise to ensure CD cybersecurity solutions are integrated systems of people, processes, and technology designed to protect and defend IT from threats.

-Manage six CMIES sections to include assigning security staff to provide technical expertise, ensure A&A packages are prepared, monitor A&A progress, adjust resources and priorities to support NCPS objectives.

-Manage tool sets for cyber logging, endpoint, and boundary protection to secure the NCPS environment for the MOE.

-Perform security engineering tasked for DSO since 2019, responsible for updating A&A documentation (ConOps, SAG, SDD, and SSP), develop POA&Ms, identify and analyze vulnerability/compliance findings within the environment.

-Oversees the preparation of CISA A&A package to include developing a POA&M, and author security documentation, such as Systems Security Plan (SSP).

-Provides weekly status reports and monthly FISMA scorecard of each CMIES system and application to include status of POA&M, waivers, and risk acceptance requests.

-Liaison between System Owners, Information System Security Manager, and Information System Security Officer to coordinate and perform complex security data analysis and test on development systems

-Responsible for identifying, analyzing, triaging, reporting, and remediating security findings to maintain a secure security posture.

-Reviews security authorization documentation and support development and updates of security design, architecture and workflow diagrams and artifacts.

-Performs vulnerability remediation and mitigation continuously with agile teams and other stakeholders; providing artifacts as evidence for false positives.

-Provides technical assistance and support for incoming queries and issues related to CSD/CD cybersecurity solutions and applications.

-Responsible for the installation of software upgrades for cybersecurity tools for Cloud-based services.

-Provide application security guidance to application development teams and advise on remediation of vulnerabilities to deployment teams with respect to application security best practices, security automation within the System Engineering Life Cycle (SELC,) and the use of application security tools and services.

-Manages and conducts cybersecurity compliance, risk, vulnerability analysis, and assessments at the network, system, and application level in accordance with DHS and NIST policies and regulations.

The DHS DOMino program is the predecessor program to ACTS and is similar in size, scope, complexity, and workload. DOMino is a large program valued at approximately $1.4 billion, employing over 560 FTEs who support the same DHS CISA CD customer as the ACTS effort. DOMino includes beginning to end lifecycle activities for continuous integration and continuous delivery of cybersecurity solutions at similar scope, scale, and complexity to ACTS. The program staff performs these activities across multiple Task Orders, including Analysis and Design (TO1/8), Development and Implementation (TO2/9) and Operations & Maintenance (TO3/10), and Procurement (TO4/11).

SENS3 Program, ASRC FEDERAL Lorton, VA

Vulnerability Analysis Management Lead/Cybersecurity Engineer January 2018-September 2019

-Served as the Vulnerability Analysis Management Lead supporting DHS Intelligence & Analysis (I&A) Authority to Operate (ATO) packages, ISVM, and Patch management services to protect the U.S. Intelligence Community and other mission partners cybersecurity efforts.

-Ensured capability development and implementation align to DHS policies, security requirements guides, and security best practices

-Guided a team through the execution of vulnerability analysis, patch management, and information assurance audits using tools such as SCCM, LanDesk, Nessus, SCAP, and RSA Archer

-Managed and conducted cybersecurity compliance, risk and vulnerability assessments at the network, system and application level, in accordance with DHS National Security Systems Policy and DHS Sensitive Compartmented Information Policy

-Managed the performance of vulnerability assessments, compliance testing, analyzed security requirements and recommended mitigation strategies to address security risks for DHS sites and information systems

-Identified root cause, scope, severity of each vulnerability and compliance findings into monthly, quarterly, and annual analytical reports to included, but not limited to DHS Scorecards, Federal Information Security Management Act (FISMA) Reporting, Continuous Monitoring Reporting.

-Author system security vulnerability reports identifying patterns and trends to determine the security posture of the IT infrastructure

-Reviewed, tracked, and managed the status of plans of action and milestones (POA&Ms) to remediate security weaknesses in response to identified vulnerabilities

-Oversaw and recommended security solution in support of maintaining ATO; authored A&A package documentation

-Collaborated with I&A security team to achieve and maintain the ATO for systems and services to include resolution of Plan of Actions & Milestones (POA&M)

The Secure Enterprise Network Systems, Services, and Support Program is an $876 million contract for an integrated network infrastructure, continued operations, and maintenance for Homeland Secure Data Network and the Classified Local Area Network.

Joint Service Provider (JSP), ASD/CSRA Arlington, VA

Cybersecurity Engineer April 2016-April 2018

-Served as a Cybersecurity Engineer/Analyst for Joint Chief of Staff Integrated Network Support Services and Joint Service Providers (JSP).

-Enforced computer network defense (CND) activities including, vulnerability management, incident triage, PII loss reporting, classified spillage reporting and wireless scanning.

-Worked with agile teams to manage and execute secure solutions across lifecycle strategy, design, implementation, and operations.

-Monitored, performed health check, installed/upgraded, and troubleshot Proxy, Proxy Anti-Virus (ProxyAV), Reporter and Blue Coat Authentication and Authorization Agent (BCAAA).

-Conducted forensic investigations on all aspects of digital evidence including data spillage, full packet captures, security event analysis, and malware analysis on data from endpoints.

-Collaborated with JSP ISSM and ISSOs to achieve and maintain ATOs for systems and services, to include resolution of POA&M and remediation of vulnerabilities.

The JSP is an organization established to consolidate information technology services provided to more than 38,000 customers in the Pentagon and National Capital Region.

Joint Service Providers (JSP), L-3 COMMUNICATIONS/CACI Arlington, VA

Information Systems Security Officer (ISSO) March 2015-April 2016

-Served as an Information Systems Security Officer on the Assessment and Accreditation team for HQ Department of the Army and JSP within the Cybersecurity Center.

-Disseminated Cybersecurity and Information Systems Security policies and procedures to include, transitioning systems and applications from DIACAP approved processes to Risk Management Framework (RMF) for A&A packages.

-Identified risks, recommended corrective action for security violations; reviewed Security Plans and tracked POA&M until security deficiencies were closed.

-Conducted security assessments to ensure DoD entities were compliant in accordance with NIST and Federal Government security policies and regulations.

-Project Similarity: The JSP is an organization established to consolidate information technology services provided to more than 38,000 customers in the Pentagon and National Capital Region.

EOR SECURITY (MCNOSC) Quantico, Virginia

Senior IT Specialist/Senior Cybersecurity Technology Consultant September 2014-January 2016

-Served as a Cybersecurity Technology Consultant and Information Technology Specialist for the Marine Corps Network Operations and Security Center (MCNOSC) to protect the Marine Corps Enterprise Network (MCEN)

-Operated and managed all aspects of Information Systems (IS), data availability, integrity, authentication, confidentiality and non-repudiation

-Performed daily system checks, reviewed and responded to events reflected in various management tools, to include but not limited to performing patch management

-Monitored Microsoft Threat Management Gateway (TMG) server activity and performance using alerts, logging, reporting and real-time monitoring

-Supervised the installation, operation, and maintenance of the Automated Message Handling System (AMHS)

-Assisted MCNOSC DCOS Defensive Cybersecurity Operations Section (DCOS) clients (e.g., Red Team and Mitigation Action Team) in defined their business requirements and provided business case justification for technical investment decisions

TRIBALCO/INNOV8TIVE SOLUTIONS, LLCTM - DSCI FOB Lindsey/Kandahar Air Field, Afghanistan

Deputy Project Manager/ System Administrator January 2013-September 2014

-Orchestrated the initiation of services and ensure all tasks are completed within Statement of Work (SOW)

-Responsible for all aspects of development and implementation of assigned projects and serves as the point of contact for those projects, interfacing with all areas affected by the project including end users, computer services, and client services

-Managed the integration of vendor tasks and reviewed vendor deliverables; defined project scope and objectives

-Maintained the security of SIPR, NIPR and CENTRIXS networks at Regional South Headquarters (RC-S HQ) and all Task Forces assigned in the Regional Command South (RC-S)

-Configured, tested, installed and maintained Voice over Internet Protocol (VOIP) systems on NIPR, SIPR, and CENTRIXS networks via Cisco Unified Call Manager Console

-Implemented 802.1x solutions to authenticate and authorize devices on network

-Performed vulnerability scans on all networks for malware, unauthorized devices and software

-Performed troubleshooting analysis on network connectivity and computer issues, routed incidents via Remedy IT Service Management, as needed

-Trained deployed users on the proper use of hardware, software, peripherals, etc. to avoid violations, including but, not limited to Cross Domain Violations (CDVs), Non-Classified Data Violations (NCDV), Negligent Discharge of Classified Information as detailed in the USFOR-A Cyber Directive

ITT EXELIS Bagram Air Field, Afghanistan

Automation Data Processing Equipment Technician August 2011-January 2013

-Maintained the security of SIPR, NIPR and CENTRIXS networks for Regional Command East (RC-E)

-Installed, configured, and maintained network connectivity, software updates, and applied approved patches for computer systems

-Performed system patching for desktop systems locally and in remote locations utilizing various software tools

-Performed troubleshooting analysis on network connectivity and computer issues, routed incidents via BMC Remedy Trouble Ticketing System, as needed

-Provided client support for SIPR, NIPR, and CENTRIXS computer systems, including but not limited to, troubleshooting, repairing and imaging systems for Department of Defense standards

-Trained new employees and deployed military on the proper use and maintenance of hardware, software, peripherals, as detailed in the USFOR-A Cyber Directive

-Deployed customized Windows 7 images and performed software installation, upgrades and IAVA patching in compliance with Army security policies and DISA Security Technical Implementation Guides (STIG)

-Successfully migrated 30,000 systems to Windows 7 by Joint Network Operation Center Afghanistan (JNCC-A) suspense date

ROTHE DEVELOPMENT (AFNetOps) San Antonio, Texas Site Manager/Information Technology Specialist January 2009-July 2011

-Served as a principle interface between military leadership, enterprise managers and site personnel on Air Force Network Operations (AFNetOPs) contract

-Responsible for creating schedules, preparation of timesheets, recommendations for promotions and terminations

-Maintained the security of SIPR and NIPR networks for United States Air Force (USAF) and United States Air Force in Europe (USAFE)

-Performed troubleshooting analysis on network connectivity computer and user account issues, routed incidents via BMC Remedy Trouble Ticketing System, as needed

-Pushed vital patches to remote computers to ensure network security using best practices, according to Department of Defense and Air Force Space Command Regulations

-Provided client support to included, but not limited to the management and creation of users, computers, and groups using Microsoft Active Directory

COMPUTER SKILLS

Splunk, FireEye, Tanium, ArcSight, Niksun, Tenable Nessus, ACAS, WireShark, Blue Coat Proxy Secure Gateway (SG), Exchange Server 2010, Windows 2012/2008/2000, Cisco Unified Call Management Console, SNMPc, National Institute of Standards and Technology (NIST) Special Publications, Risk Management Framework (RMF), Federal Information Security Management Act (FISMA), Enterprise Mission Assurance Support Service (eMASS), Cyber Command Readiness Inspection (CCRI), US-Cert Publications, DoDI 8500, DoDI 8510, AR 25-1, and AR25-2



Contact this candidate