Post Job Free
Sign in

Information Security Clearance

Location:
Stafford, VA
Posted:
March 31, 2025

Contact this candidate

Resume:

Kobina Vandyck

571-***-****, ********@*******.***

SECURITY CLEARANCE: ACTIVE DHS PUBLIC TRUST/ DoD ACTIVE TOP SECRET

EDUCATION/CERTIFICATION

• Certified Information Security Manage (CISM)

• Certified Information Security Auditor (CISA)

• AWS Certified Solutions Architect – Associate

• Microsoft Certified: Azure Security Engineer Associate

• Certificate of Cloud Security Knowledge (CCSK)

• CompTIA Advanced Security Practitioner Certificate (CASP)

• CompTIA Security+, Linux+, Network+

• ITIL V3 Foundation

• Bachelor of Science in International Business; Strayer University, Washington DC

TECHNICAL SKILLS:

Compliance:

• Assured Compliance Assessment Solution (ACAS), Tenable SC, RMF, FISMA, FedRAMP, NIST 800 -53, NIST 800-37, eMASS, CSAM, XACTA

Cloud Platforms:

• AWS, Microsoft Azure

DevOps Tools:

• Jenkins, Git, GitHub, Maven, Terraform, Docker

Security Tools:

• Tenable Nessus Scanner, Qualys, Splunk, CyberArk, Nagios, Microsoft Defender, ServiceNow

PROFESSIONAL EXPERIENCE

Manav Consulting Group Inc (U.S. DoD Contract)

AWS Cloud Infrastructure/DevSecOps Engineer July 2022 – Present

• Design, build, upgrade, and operate AWS cloud environments. Hands-on installation & configuration within the AWS Clouds & DoD Data Centers

• Creates and manages infrastructure components and solutions that are re-usable and flexible across compute and storage of private and public infrastructure

• Implement Infrastructure as Code (IaC) using Terraform for provisioning and managing cloud resources.

• Develop Terraform Configurations: Write, organize, and modularize Terraform code to create reusable, efficient infrastructure-as-code (IaC) templates.

• Automate AWS Infrastructure Management: Automate the deployment, scaling, and maintenance of AWS resources, including EC2 instances, S3 buckets, VPCs, and more.

• Deploy and manage containerized applications using Amazon Elastic Container Service (ECS)

• Configure and manage AWS services, including but not limited to EC2, security groups, VPC, IAM roles & policies, load balancers, ECS, EKS, and S3.

• Experience with CloudWatch, CloudTrail, Security Hub, AWS IAM, KMS, VPC, ECR, Load-balancers, Elastic Container

• Manage firewalls, networking, and security configurations in a cloud environment.

• Implement and maintain security best practices for cloud environments, including identity and access management (IAM), encryption, and compliance with security standards and regulations.

• Utilizes tools to include AWS Security Hub, Tenable Nessus scanners (ACAS), and Splunk.

• Assist with upgrading, installing, configuring and monitoring solutions in Azure for Windows and Linux servers.

• Participates in the continuous development, monitoring, and troubleshooting highly configurable and continuously deployable environments in public and private infrastructure

• Implements operational and security policies and procedures throughout service delivery lifecycle

• Perform Static Application Security Testing (SAST), Dynamic Application Security Testing (DAST), and Interactive Application Security Testing (IAST) to identify vulnerabilities in software applications

• Administers and updates storage, data backup, system redundancies and disaster recovery systems

• Implement security controls and processes within CI/CD pipelines.

• Integrating Security tools into CI/CD pipelines, managing and remediating pipeline security finding.

• Collaborate with security and DevOps teams to maintain compliance and operational efficiency

• Track and manage Plans of Action and Milestones (POAMs) for all systems, recommend remediation steps, and ensure timely completion.

• Create Splunk dashboards, reports and queries

• Manage multiple tickets, queues, and customers, and prioritize across all of them

• Design, manage, and maintain agency SIEM infrastructure to improve data ingestion processes, including architectural work on data pipelines to ensure optimal flow of data

• Develop, create, and implement a comprehensive vulnerability management program that aligns with our enterprise’s objectives and risk appetite.

• Performing system administration activities, and writing simple Linux commands to patch, upgrade, and maintain Windows and Linux servers.

• Monitor and analyze security threats and vulnerabilities and implement appropriate countermeasures.

• Review detected vulnerabilities, filtering false-positive results, and assisting developers as questions arise from findings.

• Plan and implement upgrades of operating systems and other relevant systems.

• Develop and Maintain the Security Procedure Guides to keep pace with changes to each cloud platform.

• Strong knowledge of NIST 800-53 Revision 4/5, NIST 800-37, FISMA, Risk Management Framework (RMF), FedRAMP and additional cyber security standards and policies.

• Leverage automated testing tools and manual test methodologies to identify system vulnerabilities and noncompliance.

• Maintain documentation of cloud architecture, configurations, and operational processes and procedures.

• Conduct documents analysis, assisting with privacy complaints and incidents in accordance with federal privacy policies and procedures.

• Work with engineering/architectural teams to assist with privacy assurance protocols.

• Set up monitoring, alerting, and logging solutions to track the health and performance of cloud resources. Respond to incidents and troubleshoot issues promptly. Creating and Monitoring Splunk Queries, dashboards and alerts

• Review new security solutions designs and specifications to validate they are ready for existing security operations environment.

• Manage incident and problem tickets within ServiceNow, including triaging, tracking, and resolving issues in a timely manner.

• Validate security configurations to ensure they are implemented in accordance with DoD Cybersecurity policies, requirements, and directives, including compliance with Security Technical Implementation Guidance (STIG), Security Requirements Guides (SRGs), and checklists.

Advanced Systems Development, Inc (Joint Chief of Staff)

Senior Information Assurance/Cloud Security Specialist May 2019- July 2022

• Determine enterprise information assurance and security standards.

• Develop and implement information assurance/security standards and procedures.

• Coordinate, develop, and evaluate security programs for an organization. Recommend information assurance/security solutions to support customers' requirements.

• Understanding of AWS services and features related to security, including IAM, KMS, VPC, AWS WAF, AWS Firewall Manager, AWS Security Hub.

• Overhaul continuous monitoring program by spearheading Assured Compliance Assessment Solution (ACAS), Security Content Automation Protocol (SCAP), and Security Technical Implementation Guide (STIG) engineering and analysis activities.

• Identify, report, and resolve security violations.

• Maintain accreditation package and prepare/update artifacts in support of ongoing authorization, changes to the system, and other even driven changes that required updates to the accreditation package.

• Document and report incidents from initial detection through final resolution using standard DoD incident reporting channels and methods.

• Help cloud platform team stay compliant with required reviews in accordance with their SSP (i.e., access control list, configuration changes, approved change requests, etc.).

• Monitor open-source feeds and reporting on the latest threats against computer network defenses.

• Establish and satisfy information assurance and security requirements based upon the analysis of user, policy, regulatory, and resource demands.

• Identifying and validating system/service vulnerabilities

• Support customer at the highest levels in the development and implementation of doctrine and policies.

• Perform analysis, design, and development of security features for system architectures.

• Create and present reports and other artifacts on the vulnerability assessment and penetration testing processes and routines to support Agency and Federal security and privacy compliance goals and requirements.

• Design, develop, engineer, and implement solutions that meet security requirements.

• Provide integration and implementation of the computer system security solution.

• Analyze general information assurance-related technical problems and provide basic engineering and technical support in solving these problems.

• Perform vulnerability/risk analyses of computer systems and applications during all phases of the system development life cycle.

• Identify, track, and remediate vulnerabilities identified by Information Assurance Vulnerability Alerts (IAVA), A&S teams, or by scanning with automated security tools.

Knowledge Consulting Group, Inc. (FBI Contract)

Information Systems Security Officer (ISSO) November 2015 –May 2019

• Ensure that assigned information systems are operated, maintained, and disposed of in accordance with approved security policies and practices.

• Ensure that system security requirements are addressed during all phases of the IS lifecycle.

• Develop and maintain SSPs and all other system security documentation, reviewing and updating them at least annually for all assigned systems.

• Author or coordinate the development of other required system security plans: Configuration management (CM), Contingency Plan (CP), Continuity of Operations (COOP), Disaster Recovery Plan (DR) and Incident Response Plan (IRP).

• Support risk assessment and evaluation activities throughout the system's lifecycle.

• Implement a strategy for continuous monitoring for assigned systems including Establishing system audit trails and ensuring their review, reporting all identified security findings and initiating the periodic review of security controls.

• Knowledge utilizing Risk Vision to update the security controls for various systems.

• Performing Vulnerability scanning using Nessus and AppDetector

• Request or conduct required information system vulnerability scans in accordance to establish policy; Develop system POA&Ms in response to reported vulnerability Ensure compliance with annual FISMA deliverables and reporting.

• Investigate any information technology or system security incidents.

• Assesses and mitigates system security threats/risks throughout the program life cycle; determines/ analyzes and decomposes security requirements at the level of detail that can be implemented and tested; reviews and monitors security designs in hardware, software, data, and procedures,

• Perform system certification and accreditation planning and testing and liaison activities; supports secure systems operations and maintenance.

• Perform security engineering analysis, risk, and vulnerability assessment, etc. Monitor and analyze security functional tests. Prepare C&A documentation such as SSP, SCONOPS, ST&E reports, etc.

Smartronix, Inc., Marine Corps Network Operations and Security Center

Database Security November 2013-November 2015

• Responsible for the operation, maintenance and support of the high-availability SQL server database/SAN platforms located in remote Data Centers across multiple time zones.

• Support daily operations including monitoring, alerting, troubleshooting, capacity management, software configuration, patching, upgrades, proactive performance monitoring/maintenance and backup/recovery of all installed MSSQL databases across all environments.

• Help with cyber defense of client networks at the DB and related technology level.

• Create, manage, and troubleshoot Windows Clustering and SQL Server

• Sustainment of SQL 2008 and 2012 clusters and migration of various disparate SQL environments onto new clusters.

• Under general supervision, operated all aspects of Information Systems, data availability, integrity, authentication, confidentiality, and non-repudiation.

• Ensure timely resolution of vulnerabilities on agency IT Systems

• Work with team members in identifying potential vulnerabilities to cyber and information security.

• Usage of SCOM and SCCM for the monitoring and applying patches of SQL and the servers they reside.

• Resolve all DBA incident tickets and provide a DBA Status Report on a weekly basis on DBA incidents escalated from Tier I organizations.

• Provide guidance and instruction to the service desk for handling standard network infrastructure related incidents and service requests.

• Administration, implementation, monitoring, and operations and maintenance of SQL databases on VMware servers and on non-virtualized servers.

• Provide DBA Documentation to Tier I organizations on the procedures for completing the task.

• Support multiple servers and multiple databases of medium to high complexity with multiple concurrent users, ensuring control, integrity and accessibility of the data.

• Allocation and management of drive space on the servers.

• Maintain the overall health of technologies associated with Database Infrastructure.

• Monitor the health of Database Infrastructure with MCNOSC provided event management tools.

• Provide MCNOSC project support for Database Infrastructure related technologies.

• Coordinate with S5 and other MCNOSC sections on DBA issues and participate in a Change Review Board. Escalate DBA issues to third party product vendors.

• Conduct Certification and Accreditation using Department of Defense (DOD) Standard Implementation Guidance (STIG) for SQL Server



Contact this candidate