Post Job Free
Sign in

Information Systems Security Officer (ISSO) or GRC Analyst

Location:
Philadelphia, PA
Posted:
November 22, 2024

Contact this candidate

Resume:

Christopher J. Ware

Upper Chichester, PA *****

********@****.***

(302) 613 – 8368 http://www.LinkedIn.com/in/warehousesecurity

University of Delaware: Newark, Delaware December 2017

Bachelor of Science, Computer and Information Sciences

Accomplishments and Organizations

Goddard Space Flight Center OCIO & Wallops Diversity Committee

Birds of a Feather presenter - Tapia Conference 2017; panel member – Tapia 2019

Team Captain – Code4PA – Pennsylvania’s First Open Data Hackathon (September 2017)

SME participant in 2017 EvoHax – Hack to Change Lives

University of Delaware Dean’s List (Spring 2015)

Technical Skills

NIST SP 800-53, SP 800-171, 172 Splunk, Network Scout, QRadar, SQL

CMMC Certified Registered Practitioner (RP) – May 2021

Scrum Master experience (academic)

Microsoft Professional Program certificate – Introduction to Big Data

Department of Defense (DoD) Mandatory CUI Training – June 2021

CompTIA CySA+ - certification expected September 2024

Github, Visual Studio, R, Minitab and JMP

Professional Experience and Technical Projects

KBRWyle, Inc. (NASA) March 2022 – present 40 hours

Information Systems Security Officer (ISSO-alternate)

Manages Risk and Controls Compliance for two (2) NASA System Security Plans at 99.6 & 95.2% Compliance (Ranked #1 & #15 of 53, respectively)

Comprehensive development of the WRSP (Classified) System Security Plan and accompanying S.O.Ps

Collaborating in meetings for Agency-wide deployment of SentinelOne EDR platform

Monitoring and troubleshooting of IT Security services to secure Agency assets and resources

Continuous monitoring of security controls for NSRO Groundstations and CSBF at NASA locations

Performs outreach to local schools on behalf of NASA and KBR

AG Grace March 2021 – March 2022 30 hours

Senior Information Security Consultant

Planned and designed robust, compliant security architectures for IT projects pursuant to NIST SP 800-171

requirements

Provided professional consultation to security teams to analyze gaps in SP 800-171 compliance and its’

fourteen (14) domains therein

Evaluated organizational vulnerabilities, and provides risk-based solutions to remediate

Researched systematic ways to protect business networks and applications against potential incidents

Performed research on cybersecurity frameworks, security systems, and validation procedures

DXC Technology December 2019 – November 2020 42 hours

Cybersecurity Threat Analyst

Aided a Fortune 10 organization with compliance by identifying, detecting and responding to high-

severity events and documenting required information

Analyzed real-time data and logs to thwart bad actors from network infiltration for a dedicated client

Identified gaps in security protocols, investigated and escalated to proper Tier\Tower

Collaborated with senior analysts and engineers to fulfill contractual duties toward clients

Drafted a Daily Health Check Report which provided a global view of company’s overall security outlook

Envision July 2019 – August 2019 98 hours

STEM Explorer Advisor

Facilitated STEM programs in Forensics and Robotics for approximately 40 middle-school scholars at Emory University and Occidental College

Participated in staff meetings to drive curriculum and operational issues

Collaborated with staff to ensure safety and compliance to organizational policies

Black Girls Code June 2019 45 hours

Technical Assistant

Assisted Instructor with teaching Python coding course to 24 Tech Divas at American University

Helped to administer curriculum and maintain compliance with organizational policy

Contributed to daily staff meetings to improve policy matters and analyze metrics from feedback

Apex Systems (Comcast) October 2018 – May 2019 43 hours

Cybersecurity Analyst

Consulted with 17 residential and commercial subscribers daily on best practices in cybersecurity

Processed an average of 55 phishing ticket submissions for data aggregation and sorting

Escalated appropriate incidents to higher tiers based upon experience and sound judgment

Macy’s December 2017 – October 2018 25 hours

Receiving Associate – Operations

Contributed to the fulfillment team shipping over $800,000 in inventory over holiday season 2017

Interpreted dashboard and logistical software to help support team achieve various objectives

Collaborated with various managers to maintain departmental readiness at Exton Square location

Assists customers with having a great overall consumer experience

EvoX Labs July 2016 – September 2016 20 hours

Technical Accessibility Intern

Worked on Project Aditum’s data entry to create a fully accessible API

Helped in construction of statistical medical datasets for the City of Philadelphia

Utilized pair programming with Python scripts to parse documents within an API framework

Received training and mentorship in career and professional development initiatives

CISC 466 – Independent Research Project University of Dundee

Dundee, Scotland February – April 2016 35 hours

Gained valuable, collaborative project experience using SQL Server 2016 and SQL

Designed an images database for cross-disciplinary experiment on context prediction in the field of

Augmentative and Alternative Communication (AAC) http://AAC.Dundee.ac.UK/research

Participated in weekly status meetings with stakeholders to update team on progress/receive feedback

Educated administrators on SQL Server Management Studio(SSMS) and productivity benefits for team

Professional Summary

Comprehensive oral and written communication skills-English, Spanish, Russian

A Registered Practitioner in the Cybersecurity vertical with a comprehensive understanding of NIST SP 800-53 and application to security controls for the Federal Government and its’ contractors

National Security Clearance (SECRET level)

In depth knowledge of technical concepts such as the software development life cycle (SDLC), TCP/IP protocols, and gaining experience with red team tools like Kali Linux and Metasploitable

Experience with NIST RMF controls and their application to diverse networks and systems



Contact this candidate