Post Job Free

Resume

Sign in

Information Security Risk Management

Location:
Atlanta, GA
Posted:
August 05, 2023

Contact this candidate

Resume:

Othniel Alphonse

MSISM, CCISO, CISSP, HITRUST

adyqki@r.postjobfree.com

Mobile: 678-***-****

Objective:

•Obtain a CISO role or support a CISO/VP of information security implement an effective organizational security program, assess security IT controls, security charter and execution, concerned with planning, strategy governance and compliance. Oversee internal audits and support external audits through utilization of my 23 years of skills and experience in information systems risk, compliance and analysis. I have competency in applying project management, information security, information security policy, business analysis, IT risk management, compliance, and internal auditing for government and private organizations.

Education:

•Howard University - Washington D.C. - B.A., Business Administration and Computer Information Systems and Analysis (2004)

•Graduate School, USDA Certified Information Security Specialist to(2003)

• University of Fairfax, Masters of Science in Information Security Management (2010)

•University of Fairfax, Doctorate in Information Assurance/Cybersecurity (Expected Graduation 2023)

•CCISO, Certified Chief Information Security Officer training certification completed August 2022.

Certifications and Training:

•CISSP, Masters of Science Information Security Management, University of Fairfax 2017

•National Security Agency Information Security Specialist (ISSP) - Computer Forensics

•HITRUST Practitioner

•MyCSF tool Administrator

•Computer Forensic Analyst Certified

•Risk Framework Security Controls Assessor (23 years of experience)

•NIST 800-53(a),

•NIST SP800-18 Guide for Developing Security Plans for Federal Information Systems

•NIST SP800-30 Guide for Conducting Risk Assessment

•NIST SP800-53 Recommended Security Controls for Federal Information Systems

•NIST 800-37 Risk Management

•FISMA standards, implementation, accreditation

•HIPAA

•Network vulnerability testing

•Intrusion detection system training

•Project Management

•DISA training

•DITSCAP training

•AWS Cloud Services/Products

•ISO 270001

•GDPR

•SOC 2 & 3 audits

•CCISO training

•ServiceNow GRC

Industry Clients Overview:

Federal

Role

Bank/Finance

Role

1.Department of Justice (DOJ)

Jr. IT Security Controls Consultant

14. Bank of America (Finance)

Senior Security Risk Advisor

2.Department Homeland Security (DHS)

Senior Security IT Controls Analyst

15. Deutsche Bank (Finance

Senior Security Risk Advisor

3.Department of Veteran Affairs

Security Administrator

16. Deloitte & Touche

Security Risk & Compliance Analyst

4.FAA

Security Analyst

17. LPL Financial

Senior Security Risk & Compliance Analyst

5.Oakland Ridge Nuclear Laboratory

Senior. Security Controls Assessor

Technology

6.Department of Commerce

Senior IT Security Controls Assessor

18. Amazon Web Services (AWS)

Senior Enterprise Risk Program Manager 2019

7.IRS

Senior IT Security Controls Assessor

19. Apptio Inc (CSP/SaaS provider)

Senior Government Cloud Manager (ISSO) 2022/2023

8.House of Representatives

Senior Security Risk Advisor

20. Lexus Nexus

Senior Risk Assessor

9.National Institutes of Health NIH

Senior Security Analyst

21. PegaSystems (CSP/SaaS provider))

Senior Security Risk & Compliance

10.Center for Medical Services (CMS)

Senior Security Analyst

11.State of Georgia

Senior IT Security Controls Assessor

12.Department of Interior (DOI)

Senior Security Consultant

13.US Coast Guard

Senior Security Analyst

Areas of Expertise Overview:

1.Senior leader acting as an ISSO managing Government Community Cloud covering all Cloud Security, Risk & Compliance initiatives.

2.Senior Advisor, developed enterprise security program charters, policies and enforced policies via internal audit.

3.Senior manager leading teams of 5 or more and coordinating with Sales, Engineering, HR, Executive and Legal teams.

4.Conducted Risk Assessments (Qualitative & Quantitative (Fair Method)) and corporate maintained risk registries.

5.Assessed Cloud & On Prem infrastructures using NIST 800-53;CSF;FEDRAMP;STATERAMP;NIST 800-171; HITRUST; GDPR;ISO 27001; DOD IL4; DOD IL6

6.Advisor to CISO/Vp concerning security implementation, risk, compliance, risk acceptances.

7.Responsible for managing Risk/Finding mitigation projects

8.Managed 3rd party assessment programs.

9.Preparing & presenting reports to executive leadership.

10.Drafted & finalized FEDRAMP Authorize To Operate (ATO) packages.

11.Conducted full internal audits & external audits, interfacing with stakeholders.

12.Lead project manager responsible for tracking and monitoring projects involving multiple teams

13.On Prem to Cloud Migrations

14.Contingency Test Planning/Disaster Recovery

15.AWS/Azure/GCP Cloud Security Controls/DevSecOps, ConMon Manager

Recent Technical Experience Overview:

1.On Prem to Cloud migrations (Datalink)

2.ConMOn Scans (Host, Containers)

3.AWS Console Admin (Access Review/Audit logs)

4.AWS CloudWatch

5.SIEM Tools- AlienVault; Splunk

6.Symantec DLP

7.Endpoint Protection

8.HP Fortify/Agile/SDLC experience

9.Big Query

10.Monday Project Mgmt

11.Jira experience

12.ServiceNOW

13.Slack Teams

14.Confluence

Additional Technical Skills:

•Software – AWS Workdocs, AWS eQuip, AWS Projects, AWS Security Hub, Confluence, Redlock.io, Splunk, IP360, Alienvault, SIEM tools, DBProtect, Spiceworks, SharePoint 2010/2007; MS Access, MS Project, SQL Server, MS Office, MS Visio, Symantec Endpoint Antivirus, MS Anti- Spyware; Windows OS {all versions}, MAC OS X, ClearCase, Adobe Acrobat, Filezilla, Remedy, Nessus/Retina port scanner

•Hardware - Mac, PC, Network Printers, Laptops, Desktops

•Platforms - Office 365, Windows NT, Active Directory, UNIX/LINUX, Sybase, UDB, Mainframe, CentreOS

•Other - Computer Forensics, CIS, NIST, ISO 27001, ITIL, SOC2/3, Sarbanes-Oxley, Cobit, CCNA training, Network Administrator training, Database Training, Systems Analysis Training, Mainframe Administrator, Configuration Management

Professional Work Experience:

Apptio Software Company June 2022 - Feb 2023

Senior Federal GovCloud ISSO

(VA, DHS, DOD, NAVY, AIRFORCE)

4

•Lead responsible for maintaining Apptio GovCloud FedRamp P-ATO.

•Lead responsible for responding to questions, concerns, comments from the JAB.

•Responsible for writing up risk findings, recommend remediations, and draft risk acceptances and report directly to the CISO.

•Senior lead advisor for security impact assessments (SIA) for Apptio GovCloud.

•Senior lead advisor on all Significant Change Request (SCRs) to Apptio GovCloud.

•Scoping for Apptio GovCloud “uplift” from Moderate to IL4 security baseline.

•Perform Moderate to IL4 gap analysis.

•Collaborate with ConMon to ensure vulnerabilities are remediated in a timely manner and meet FedRamp thresholds.

•Lead SSP updates/revisions to include SCRs, and technological changes/updates.

•Developed risk management strategy for Apptio GovCloud.

•Managing security & compliance team daily tasks around information assurance, i.e. security documentation, jira ticketing approval, vulnerability remediations for Apptio GovCloud, and general security & compliance advisory.

•Collaborated with Products & Engineering to ensure vulnerabilities thresholds are not exceeded.

•Collaborated with the Information Security team to ensure security monitoring and response/incident mechanisms are operating as intended.

•Managed all security access reviews and IAM processes.

•Responsible for drafting and enforcing IAM policies.

•Communicated cyber security risks, trends, threats from 3rd party sources to ensure Apptio internal threat modeling is continuously updated and security mechanisms configured as needed.

•Collaborate with the Apptio GovCloud stakeholders to ensure all security controls are in place and meet Apptio security policies.

•Worked with Apptio Sales to train personnel on FedRamp GovCloud space advise on sales/advertising strategy.

•Managed FedRAMP Annual Assessments.

•Managed team of two contractors and 3PAO advisor.

•Managed project tickets and provided input for ServiceNOW implementation project.

Kratos Defense Supporting Amazon Web Services May 2021 to May 2022

Senior Security Risk & Compliance

(AMAZON WEB SERVICES)

•Senior lead advisor for security impact assessments for AWS Cloud Features/Services.

•Project managed AWS features FedRamp approval process.

•Developed risk management strategy for U.S. Government Security & Compliance (UGSC) team responsible for providing oversight and guidance on FedRamp authorizations for AWS Services and Features

•Developed risk registry for UGSC team.

•Collaborated with AWS Service teams.

•Provided weekly status updates with the AWS Global Engineering and Architecture Readiness (GEAR) team.

•Prioritized Features assessments and coordinated yearly roadmap with AWS services teams, GEAR, and vulnerability management (VM) onboarding teams to ensure features met JAB security requirements for U.S Federal clients.

•Developed FedRamp Security Impact Assessments (SIAs) for 3PAO reviews.

•Reviewed 3PAO attestations and provided features authorization packages to the JAB.

•Advised and improved overall features assessments, tracking, and workflow processes.

•Maintain internal AWS features status and wiki page.

Avertium Inc, Atlanta, GA Aug 2020 to April 31 2021

Enterprise Consultant, Security Controls Assessor

(ORNL, Lexus Nexus)

•Advised and developed FedRAMP readiness and risk assessment for Deputy CISO at Lexus Nexus for On Prem migration to a cloud environment.

•Drafted FedRamp compliant system security plan for Deputy CISO at Lexisnexis.

•Lead FedRamp internaudit for Oakland Ridge Nuclear Laboratory (ORNL).

•Developed roadmap for AWS Cloud ATO.

•Drafted a security assessment plan.

•Conducted technical assessment interviews.

•Mapped Control Review items to NIST 800-53; 37;137.

•Drafted and finalized Lexisnexis system security plan (SSPs), contingency plans (CP).

•Drafted and finalized security assessment reporting, risk exposure tables, and executive summaries.

•Lead two-week ISO 27001 compliance assessment.

•Lead FedRamp readiness assessment.

Amazon Web Services (AWS), Seattle, WA Sept 2019 to Jan 2020

Enterprise Risk Management (ERM), Program Manager

•Key AWS Enterprise Risk Management member responsible for assessing risk related to information security and data protection.

•Developed a roadmap for standing up a new AWS Enterprise Risk Management Program.

•Project manager for the risk assessment team.

•Developed AWS Third Party Risk assessment questionnaire.

•Evaluated and assessed enterprise risks across the global AWS operations.

•Drafted AWS Enterprise Risk Management policy.

•Drafted the AWS Third party risk management policy.

•Developed AWS third party risk framework.

•Coordinated risk assessment interviews with AWS risk owners and stakeholders across the enterprise.

•Remediated AWS asset management risk concerns relating to GDPR.

•Assessed risks relating to AWS general ledger and Spending and Transaction policy.

•Completed training for AWS Security HUB.

•Completed training for integrating security findings from AWS Guard Duty and commercial SIEM tools to AWS Security Hub.

•Applied FAIR method for evaluation of AWS corporate risks.

•Developed ERM tool for initial risk scoring of AWS corporate risks.

•Reviewed ERM Implementation Plan.

•Responsible for ERM reporting from AWS Risk registry to upper management.

•Responsible for maintaining AWS risk registry and risk mitigation.

SJL Solutions Inc Boston (Short-term) March 2019 to July 2020

Senior Information Security Specialist

•Performed HITRUST self-assessment on MS Azure environment.

•Reviewed cloud implementation security documentation.

•Wrote control implementations descriptions based on documentation review.

•Administered HITRUST MyCSF tool, providing user permissions.

•Drafted security policies based on gap analysis to reflect required security domains.

•Managed HITRUST Assessment via MyCSF tool for entire cloud implementation.

•Provided HITRUST Assessment reporting and results to client including findings report.

•Collected technical artifacts to validate risk assessment results.

•Managed security implementation descriptions for access management controls via Active Directory.

•Performed SOC 2 audits for clients.

LPL Financial, San Diego, CA Nov 2018 to Jan 2019

Cloud Risk & Security Analyst

•Provided executive cloud risk assessment report to VP of Technology Risk.

•Performed cloud security risk assessment baselined against NIST 800-53

•Project managed two cloud risk assessments for Director of Risk Management for AWS Landing Zone

•Drafted and finalized 14 security policies aligned with NIST 800-53 requirements.

•Assesses risk of landing zone for 2 mobile applications.

•Developed Corrections Action Plans based upon risk assessment findings

•Interviewed stakeholders within the Enterprise Operations, Info Sec, and Application Development team.

•Recommended Multi factor Authentication be implemented on a network system component.

•Ensured data encryption is applied to data at rest and data in transit

•Performed SOC 2 audits.

•Ensured CyberArk was implemented for privileged access to AWS/Azure environments.

•Ensured Email scanning was implemented via ProofPoint.

•Ensured code scanning via Veracode.

•Ensured Endpoint protection was implemented via Crowd Strike/Windows Defender.

•Ensured certificate life cycle management was implemented via Venafi.

•Ensured vulnerability mgmt. was implemented via Nexpose/Splunk.

•Ensured firewalls were configured properly via Palo Alto.

•Ensure server configuration followed CIS hardening baselines.

•Ensured Redlock.io compliance tool is configured on the cloud environment.

TDI, Washington DC March 2018 to July 31 2018

Senior Information Security Specialist

(House of Representatives)

•Developed SAR for government clients.

•Developed SSP for Microsoft Azure Cloud solution for government clients.

•Drafted and finalized 14 security policies aligned with NIST 800-53 requirements.

•Managed drafting of security policies aligned with 800-171 requirements.

•Conducted CIS audit for commercial clients.

•Wrote up access control policies and assisted with Microsoft Azure MFA configurations.

Alqimi Inc, Washington DC (Short-term) March 2018 to July 2018

Senior Information Security Specialist

•Performed HITRUST assessment on AWS Cloud solution.

•Administered HITRUST MyCSF tool, providing user permissions.

•Reviewed cloud implementation security documentation.

•Managed HITRUST Assessment via MyCSF tool for entire cloud implementation.

•Provided HITRUST Assessment reporting and results to client including findings report.

•Managed security implementation descriptions for access management controls via Active Directory.

•Performed SOC 2 audits.

Optum/QSSI, Tysons Corner June 2013 to 12/2017

Lead Senior Security Specialist

(NIH, CMS, VA)

•Performed IT security support function to the Office of the CISO regarding risk management, internal audits, policy development, project support.

•Responsible for implementing access control policies for management of user accounts.

•Project lead on multiple corporate security control assessments (SCA) on general support systems (GSS)/major applications (MA).

•Developed DAR for Symantec DLP solution.

•Worked with Symantec DLP reps to align network infrastructure with product offering.

•Acted a project coordinator between Symantec DLP rep and QSSI.

•Drafted Corporate Vendor Management Policy.

•Drafted vendor management procedure.

•Developed vendor security assessment questionnaires and business reqs.

•Drafted Sharepoint Administration Policy.

•Supported IT audits for corporate projects for CMS, DSH.

•Working experience with CMS CFACTS audit tool.

•Managed and mitigated POAMs and CP test for ACA exchange systems.

•Developed SSPs, RAs, CPs, POAMs for applications/systems.

•Coordinated infrastructure vulnerability scans using IP360, nCircle CCM, DB protect.

•Responsible for POAM mitigation on corporate GSS systems.

•Provided NIH Proposal QSSI Technical documentation.

•Provided Contingency Plan training to IT staff.

•Reviewed security policies and mapped to NIST standards and HIPAA standards.

•Performed security control assessment on major financial applications (Deltek CostPoint).

•Created risk determination methodology for the Chief Information Security Officer (CISO).

•Identified technical common controls for enterprise adaptation.

•Reviewed Incident Response Plans.

•Reviewed Facilities Management Plans.

•Obtained HITRUST assessor certification/HITRUST Tool experience.

•Provided project plans and goal setting for corporate internal audits.

•Drafted business development initiative plans for acquiring new business.

•Developed Mobile Security, Mobile Code, and Incident Response policies.

•Employed XLC methodologies.

•Monitored firewall configurations for best security practices

•Implemented OpenFISMA for corporate audit needs.

•Drafted Master Corporate Security Plans.

•Regularly reported to the CISO overall corporate infrastructure security status.

•Developed privileged access management policies for organization corporations.

•Developed and advised on Identity Access Management policies and baseline configurations for enterprise implementation.

TekSystems (supporting Bank of America), August 2011-January 2013

Alexandria, VA

Enterprise Risk Specialist Consultant

Global Information Security Team

•Performed security policy reviews and recommendations for technology devices/applications employed at BOA systems.

•Information Security SME on multiple technical policy documents.

•Supported daily activities of the VP, Senior Architect Enterprise Information Security.

•Drafted security control guidelines and practices for BOA Global Information Security (GIS) team.

•Provided new technology recommendations to business units.

•Provided security input on multiple new technologies for baseline implementation.

•Monitored and provided security input within a major mobile payment project at BOA.

•Provided weekly updates on mobile payment projects to the entire global information security (GIS) team at BOA.

Healing Our Community, 501c June 2011 to November 2013

Independent Security Consultant

•Developed Health Care Security Policy for the company.

•Provided daily IT consultation.

•Repaired computers for the health-care office.

GNS Inc. supporting Department of Commerce, April 2011-May 2011

Washington DC

Information Security Specialist III

•Mapped Control Review items to NIST 800-53; 37;137.

•Created control criteria for control review questions for C&A effort.

•Wrote guidance document on Continuous Monitoring based upon NIST 800-137.

Pillar Inc. (supporting DHS), VA May 2011-August 2011

Information Security Specialist

•Trusted Agent FISMA (TAF) coordinator, assessing NIST documents.

•Quality control management with Risk Management Systems (RMS)

•Mapped Control Review items to NIST 800-53A; 37;137.

•Managing multiple applications for FISMA/NIST 800-53 C&A effort.

•Performing training in TAF/RMS for DHS employees.

Deloitte & Touche, LLP, Washington DC Dec 2009 – Oct 2010

Enterprise Risk Specialist

• Prepared security controls for audit of enterprise security architecture based on industry accepted security standards.

•Proposed IBM Tivoli Access Manager (TAM) for Deloitte client.

•Conducted security assessments for 37 web-based applications.

•Prepared risk assessments outlining residual risk levels.

•Prepared security assessment report deliverables for client.

•Prepared AO matrix dashboard for client deliverables.

•Provided & implemented improvement recommendations to AO matrix.

•Provided weekly status reports.

•Performed identity access management (IAM) client assessments for technical solution requirements.

•Performed data loss protection (DLP) client assessments for technical solution requirements.

•Provided Identity access management planning//Data Loss prevention current status reports to client.

•Reviewed client policies regarding information security and enforcement of policies.

CSSS.net - Washington, DC May 2009 - July 2009

Information Security Engineer III/IRS Consultant

• Responsible for aligning current IRS technical controls with updated applicable Treasury and NIST guidance.

• Rewrote current Identification and Authentication (IA) controls for IRS organization-wide policy documents.

• Provided security controls for web security.

• Rewrote current Access Controls (AC) for IRS policy document.

• Provided applicable guidance for E-Authentication implementation based upon OMB and E-Gov guidance.

•Attended and documented server farm migration meetings.

•Provided weekly status reports.

VMD System Integrators, Washington DC October 2008 - January 2009

Senior Security Engineer/FAA Consultant

•Coordinated SCAP (System Certification & Accreditation Packages) for FAA applications.

•Wrote and reviewed system security plans, incident recovery plans, and contingency plans.

•Performed penetration testing on FAA systems using NESSUS scanner and reviewed and reported on results.

•Created POA&M items for the security team and verified completion of existing POA&M items.

•Provided auditable evaluation documentation in the form of reports and checklist for FISMA requirements.

•Created and edited executive summaries, risk assessments, POA&Ms for FAA systems.

•Installed Symantec antivirus on workstation and server levels.

Blackstone Technology, Washington DC July 2008-October 2008

Senior C&A Specialist/Department of Interior

•Conducted Internal Control Reviews (ICRs) for their National Business Center.

•Reviewed STIGS and verified server baseline configuration implementation.

•Reviewed and verified server configurations and patch management.

•Tested internal controls on servers, and web based software.

•Evaluated system security plans, incident recovery plans, contingency plans, and risk assessments against the 800-53a standards.

•Created POA&M items for security team and verified completion of existing POA&M items.

•Provided auditable evaluation documentation in the form of reports and checklist for FISMA requirements.

•Mapped NIST 800-53a controls to the existing controls found in place for DOI GSS/MA applications.

Convergenz Inc - Washington DC February 2008-March 2008

Senior Information Security Specialist

House & Urban Development

•Evaluated system security plans, incident recovery plans, and contingency plans, against the 800-53 standards and HUD’s established common controls.

•Created POA&M items for the security team and verified completion of existing POA&M items.

•Coordinated ST&E testing for over 10 applications.

•Provided auditable evaluation documentation in the form of reports and checklist for FISMA requirements.

•Evaluated web security vulnerability results.

Drug Enforcement Administration (DEA) September 2007- February 2008

Senior Information Security Engineer

Policy Engineer

Pentagon City, VA

•Information security engineer lead for DEA Security Programs, Information Security section.

•Evaluated and updated NIST special publications database.

•Managed DEA-wide Computer Security Assessment Training program for web security.

•Information security engineer lead on the security programs team responsible for drafting DEA standards regarding use of portable electronic devices within DEA secure facilities.

•Drafted DEA policy regarding the standard operating procedure for employing external vendors for the destruction of classified documents.

•Drafted Memorandum of Agreement regarding Foreign Nationals employment within DEA.

•Drafted standard operating procedure for encrypting storage devices within DEA.

•Administered training for appropriate use of portable electronics devices.

•Facilitated and implemented plan for internal social engineering evaluation exercise within DEA.

Department of Veteran Affairs - Reston, VA July 2007-August 2007

Senior Information Security Engineer

Mainframe Security Administrator

•Administered mainframe security configurations.

•Reset security passwords for database administrators nationwide.

•Performed mainframe help desk duties.

•Provided NIST publication research.

•Updated mainframe records for active veteran benefits.

SM Consulting/Fannie Mae - Baltimore, MD October 2006 - June 2007

Senior IT Auditor to Fannie Mae

•Team member for central monitoring team, responsible for daily monitoring of 21 financial applications on Active Directory.

•Team member for central monitoring team, responsible for daily monitoring of UNIX root logins, successful su attempts, and failed su-attempts.

•Reviewed daily application logs of 65,000 rows of activity and filtered for privileged activity.

•Managed and created incidents reports in SHAREPOINT and FILEZILLA for all privileged or unapproved activity by internal users.

•Reconciled incident reports through REMEDY ticketing software.

•Escalated incident report status when explanation provided by application teams was considered insufficient.

TWM Associates Inc. March 2006 - October 2006

Freddie Mac - Merrifield, VA

Senior Information Security Specialist

IT Auditor to Freddie Mac

•Created complete process documentation for Sarbanes Oxley (SOX) review of internal financial applications as a contractor to Freddie Mac

•Created a complete procedural instructions document for Sarbanes Oxley (SOX) review of internal controls to be followed by all internal auditors of Freddie Mac SOX artifacts.

•Reviewed data security dumps from UNIX, Sybase, UDB, Windows NT, and Mainframe platforms for violations based upon Freddie Mac security policy standards.

•Trained over 50 project managers in the process of SOX reviews through PowerPoint presentations.

•Provided violation reports based upon SOX reviews to senior management weekly and daily team status reports upon request.

•Mapped SOX review items to Freddie Mac policies, CoBIT controls, and ISACA application control standards.

•Managed SOX orientation training of new auditors.

•Facilitated and observed security audit meetings between Freddie Mac VP’s, directors and system owners.

Self-employed - Washington D.C. June 2005 - March 2006

IT Support Professional

•Advised small business owners on web page development.

•Provided desktop support to users.

•Installed and configured necessary anti-virus components for new systems.

Howard University - Washington D.C. June 2004 - June 2005

Junior Computer Support Specialist

IT Project Manager

•Managed 30 workstation technology labs. Responsible for network maintenance, hardware repair, and software installation.

•Managed FacNet project where over $100,000 worth of new desktops/laptop (IBM/Mac) computers were disseminated to various university faculty.

•Coordinated hired installers daily activities and school/department assignments.

•Created documentation for FacNet database conversion plan.

•Exported data necessary for FacNet inventory database.

•Responsible for pc support for all distinguished faculty and high-ranking administrators.

•Provided weekly status reports on all weekly tasks.

•Presented a PowerPoint presentation on the strengths and weaknesses of iMac and IBM compatible PC’s.

•Wrote official Howard University network access documentation for iMac and IBM pc configuration.

New York Times. Co - New York, NY June 2000 - August 2000

Interning Computer Specialist

•Assisted MCSE professional with daily network maintenance in order to support over 10, 000 end-users.

•Provided PC support to office departments to enhance company work efficiency.

•Managed nationwide inventory auditing project to help the accounting department accurately report financial statements to the IRS.

•Populated inventory database containing national computer equipment information of over 100 outlets nationwide. (Workstations, modems, faxes, etc.)

U.S Justice Department - Rockville, MD December 1999 - April 2000

Interning Computer Security Specialist

•Assisted with organization of Y2K contingency plan manual for Justice Department Y2K task force.

•Ran daily surveillance of Internet servers that facilitated over 20,000 “hits” of different IP addresses worldwide in order to deter possible Internet intrusion.

•Collected and evaluated over 200 datasets taken daily in order to assure the protection of government networks.

•Administered mainframe software “Top Secret” concerned with storing large datasets.



Contact this candidate