Post Job Free
Sign in

C A Continuous Improvement

Location:
Vero Beach, FL
Salary:
95000
Posted:
January 21, 2025

Contact this candidate

Resume:

772-***-****

***********@*****.***

/lonnie-ingram/

Vero Beach, 32962

C O N T A C T

P R O F E S S I O N A L S U M M A R Y

E D U C A T I O N

B.S. Information Science

University of South Florida

2018 - 2022

Tampa, Florida

I am a Cybersecurity consultant with over 2 years of experience helping organizations achieve goals in confidentiality, integrity, and availability. I specialize in Systems Administration and NIST Frameworks, conducting risk assessments and developing strategic policies. I work with IT leadership to reduce vulnerabilities, enhance resilience against cyber threats, and ensure continuous improvement and compliance. C E R T I F I C A T I O N S

Security+ (2021)

Microsoft Certified: Identity and Access

Administrator Associate (2024)

L O N N I E I N G R A M

C Y B E R S E C U R I T Y & I T S P E C I A L I S T W O R K E X P E R I E N C E

Cybersecurity Consultant

Ernst & Young

Security Controls Assessment

Evaluated and reconciled existing security capabilities to enhance the protection of sensitive data, mitigate potential risks, and ensure adherence to industry standards and regulatory requirements for an international financial service organization Guided management security roadmap planning via in-depth analysis of data privacy measures, application security protocols, and pinpointing vulnerabilities; offering industry insights and best practices relative to each domain End User Policy Development & Governance

Quantified the estimated required level of effort to develop comprehensive end user policies and standards aligned with cybersecurity controls

Educated leadership team members by organizing concurrent workshop sessions that focused on the maturity of multiple security processes, highlighting identified gaps Visualized operating model proposal which was designed to realign siloed client teams and their business partners to a more formal and collaborative structure Redesigned policies, standards, and procedures during enterprise organizational split to ensure coverage throughout both unique business entities Overhauled subsidiary enterprise’s existing security posture to suit the business needs of the established parent company

Established a policy governance framework with an embedded RACI Matrix to clarify the roles and responsibilities of governing entities

Crafted a comprehensive lifecycle management protocol encompassing creation, implementation, monitoring, review, and updating of policies and standards Presented materials to executives and board members to inform them of their organization’s cyber risks and vulnerabilities

Cybersecurity Strategy & Execution

Created materials for an interactive on-site workshop tailored for company employees and stakeholders

Conducted stakeholder interviews to gather information regarding Cybersecurity Program Management to create a strategic vision workshop

June 2023 - July 2024

Systems Administrator (College Technical Intern)

Northrop Grumman

Identity & Access Control

Administered the lifecycle and access rights of user accounts for MAF DMO Cyber personnel on the corporate network

Designed and implemented role-based access control policies, reducing unnecessary access and improving compliance with internal policies.

Infrastructure and Network Security

Maintained detailed documentation of the network's configuration, system settings, and changes to assist in management and troubleshooting via Confluence Managed Jira service tickets, resolving issues and coordinating escalations as required Compliance and Risk Management

Utilized Open RMF for comprehensive risk management framework tasks and employed STIG Viewer to develop and examine security playbooks and compliance checklists June 2022 - August 2022

H A R D S K I L L S

Cyber Program Assessment

Cyber Program Transformation

Data & Privacy Protection

Gap Assessment

Identity & Access Management

Cyber Risk Management

Compliance & Resilience

T E C H N O L O G I E S

Kali Linux & Metasploit

Nessus & Wireshark

Microsoft Azure & Microsoft Azure AD

Wireshark

Linux & Powershell

SAP HANA, S/4HANA, CyberArk (PAM)

VMware, Windows Server, Hyper-V, RedHat

F R A M E W O R K S

PCI-DSS

ISO 27001

NIST

Java, Python, MySQL

SAML & OpenID Connect



Contact this candidate