Post Job Free
Sign in

Information Systems Risk Management

Location:
NoMa, DC, 20001
Posted:
January 31, 2025

Contact this candidate

Resume:

Professional Summary

DoD Risk Management Framework (RMF)

Authorization to Operate (ATO)/ Interim authorization to test (IATT)

STIG (Security Technical Implementation Guide)

POA&M (Plan of Actions and Milestones)

eMASS (Enterprise Mission Assurance Support Service

RTM (Requirement Traceability Matrix)

NIST SP 800-37

Compliance

Requirements Gathering

AGILE-SCRUM

Intuitive and seasoned professional offering advanced knowledge and consulting experience in cybersecurity in support of the Department of Defense (DoD) regulations and policies. Reliable and systematic capabilities with strong leadership, communication, and interpersonal skills.

Knowledge of accreditation packages for information systems, ensuring regulations and security standards are met, executing cybersecurity risk assessments for secure operational capability, and, lastly, assessing vulnerabilities and recommending mitigation strategies.

Demonstrate thoroughness, conscientiousness in work performance, and meticulous attention to detail, which are vital to completing the task.

Computer Skills:

MS Office Suite: Excel, Word, PowerPoint, Outlook. MS SharePoint, MS Visio, MS Access, Quality Center, JIRA, Rational ClearQuest, SAP, Remedy, Momentum, ALM, Confluence, WebI, SQL, eMASS, DITPR/DADMS Integrated IT Portfolio Management and TFS, AzureDevOps

Professional Experience

Information System Security Manager Sep 2024 - Present

Department of the Army

Hours per Week: 40

Fort Belvoir

Implement cybersecurity processes that align with DOD regulations and policies

Oversee contractors’ on the cyber team

Communicate cyber statuses to leadership

Approve access requests

Review and approve ATO packages

Create SOPs and policy documentation

Assist with implementing RMF for the DoD Information Technology (IT). The RMF process enforces a tailored set of security controls and focuses on security as an integral part of a system’s overall lifecycle

Monitor and follow cyber tasking orders while following the Agile SAFe methodology

Create and prioritize backlog items

Sr. Cybersecurity Analyst Sep 2022 - Present

Department of the Army

Hours per Week: 40

POLK Building

Created SOPs and policy documentation such as Continuous Monitoring Tools Strategy, and completeed annual reviews of documentation

Assisted with implementing RMF for the DoD Information Technology (IT). The RMF process enforces a tailored set of security controls and focuses on security as an integral part of a system’s overall lifecycle

Reviewed, confirmed and uploaded control test results

Reviewed and confirmed POAM packages for AO approval

Reviewed and submitted eMASS packages for ATO renewal

Developed security policy artifacts (such as an Audit policy) required to complete the RMF process

Submitted ALT token request and revoke access

Performed reviews to deprovision personnel who left the program

Key Contributions:

Ensured the information system maintains an active ATO

Ensured the program complies with DoD regulations and policies

Senior Information System Security Office (ISSO) Jun 2022-Sep 2022

DISA JSP

Hours per Week: 40

Taylor Building

Supervisor: Natalie Gaines

Established and implemented security procedures and practices in support of Customer goals and current DoD regulations.

Developed and updated assessment and authorization documentation for management and continuous monitoring of information systems

Initiated the authorization or re-authorization efforts and process for new or expiring systems and coordinated, scheduled, and attended required meetings

Authored and reviewed information systems security-related documentation and submit to eMASS

Provided critical thinking to ensure system security requirements are addressed during all phases of the System Development Life Cycle (SDLC)

Provided security engineering review of proposed changes or additions to the IS (including hardware, software, or connectivity) and advised the ISSM of the security relevance

Performed security audits, IAW established procedures. Developed a process for managing, reviewing, and retaining security audit data.

Made decisions and implemented corrective action as required to resolve audit discrepancies

Key Contributions:

Reviewed authorization and assurance documents.

Confirmed the level of risk is within acceptable limits for each software application, system, and network.

Developed assess-only accreditation packages for systems networks

RMF Analyst Oct 2021-Jun 2022

Department of the Army

Hours per Week: 40

POLK Building

Supervisor: Jennifer Averett

Assisted with the implementation of the RMF for the DoD IT. The RMF process enforces a tailored set of security controls and focuses on security as an integral part of a system’s overall lifecycle

Reviewed, confirmed, and uploaded control test results

Reviewed and confirmed POAM packages for AO approval

Reviewed and submitted eMASS packages for ATO renewal

Developed security policy artifacts (such as an Audit policy) required to complete the RMF process to renew an ATO certificate

Completed STIG checklist files with system administrators provided by DISA

Verified security controls that have been implemented

Created POA&Ms for non-compliant controls and close PO&AMs when controls become compliant

Key Contributions:

Ensure the information system maintains an active ATO

Ensure the program complies with DoD regulations and policies

Senior Cybersecurity Engineer Mar 2017-Oct 2021

Department of Navy

Hours per Week: 40

1000 N Glebe Rd 12th floor Arlington, VA 222201

Supervisor: Philip Bowen

Assist with the implementation of the RMF for the DoD IT. The RMF process enforces a tailored set of security controls and focuses on security as an integral part of a system’s overall lifecycle

Create and execute Cybersecurity test cases

Develop security artifacts (such as the SAP, PPSM, SOPs, and Control plans) required to complete the RMF process to achieve an ATO certificate and IATT

Use eMASS to obtain the Information Assurance Certification and achieve an ATO certificate for the program

Complete STIG checklists provided by DISA

Verify security controls that have been implemented

Create POA&Ms for non-compliant controls and closeout PO&AMs when controls become compliant

Work with Navy Validators to ensure eMASS test results are accurate and satisfy NIST Special Publications 800 requirements

Key Contributions:

Perform Control Account manager (CAM) responsibilities

Review authorization and assurance documents.

Confirm the level of risk is within acceptable limits for each software application, system, and network.

Perform vulnerability analysis.

Recommend mitigation strategies based on analysis findings

Develop accreditation packages for systems networks

Review/evaluate the security impact of system changes on networks and computers within the area of responsibility

Ensure adherence to security standards and protocols

Senior Business Analyst Mar 2016-Mar 2017

Department of Defense and Department of Homeland Security

Hours per Week: 40

6120 Executive Blvd Suite 800, Rockville, MD 20852

Supervisor: Amol Shah

Gathered requirements by facilitating interviews with shareholders

Recorded requirements in the Visual Studio Team Foundation application

Defined Features, Product Backlog Items and Bugs

Generated User Stories and Mockups for developers to understand the requirements

Assisted the QA team to make sure all requirements have been covered in scripts and tested properly

Closed-out features at the end of every release

Created and maintained help content, user manuals and training slides

Key Contribution:

Engaged with clients/customers to assess needs and provide assistance

Committed to provide quality products and services as requested by the clients/customers

Business Analyst Feb 2015-Mar 2016

GFEBS

Hours per Week: 40

12015 Lee Jackson Memorial Hwy, Fairfax, VA 22033

Name of Supervisor: Teri Rathweg

Provided support in design by interacting with clients to evaluate AS-IS and TO-BE processes.

Gathered requirements based on what was in scope

Created data flow diagrams and processes using MS Visio

Generated Functional Requirement specifications to guide the design of the application

Developed wireframes of page layouts indicating where functional elements and contents will be placed

Tracked defects, prioritized trouble tickets, incident reports, and change requests for future releases

Assisted in go-live by executing cutover tasks

Performed product and integrated testing to validate functionality

Tier II support for several ERP modules

Business Analyst Apr 2014-Feb 2015

United Health Group

Hours per Week: 40

Boston, MA

Name of Supervisor: Veer Modi

Gathered requirements based on what was in-scope for open enrollment and documented requirements in a BRD

Assisted in identifying project scope, business objective, feasibilities and risks based on Scope/Vision documents

Worked alongside Project Manager in conducting JAD sessions involving SMEs, business users, data administrators, system architects, managers, and development team in order to create a good business process model

Created Data Flow Diagrams and process diagrams using MS Visio

Generated Business requirements document for sign off

Reviewed test plans and test scripts developed by the development team and QA team to make sure all requirements have been covered in scripts and tested properly

Tracked defects and prioritized trouble tickets, incident reports, and change requests for future Releases

Contributed to assessing and reviewing components within the system during Knowledge Transfer (KT) with other clients

Education

M.S., Cyber Security

§ Southern New Hampshire University, Manchester, NH

B.S., Health Care Administration

§ Rhode Island College, Providence, RI

Certifications

COMPTIA Security +

Certified SAFe 6 Practitioner

Security Clearance

Secret



Contact this candidate