Post Job Free
Sign in

Risk Management Information System

Location:
Lanham, MD
Posted:
April 22, 2025

Contact this candidate

Resume:

IGNATIUS NWAIWU, CISSP

**** **** *****

Lanham Maryland 20706

Home: 301-***-****

Cell: 301-***-****

*******@*****.***

TECHNICAL SKILLS SUMMARY:

NIST Special Publications and Guides, OMB circulars, FISMA Act 2002, and FIPS

Security Assessment & Authorization (SA&A) (NIST 800-37 RMF)

FISMA Complaint Tools: XACTA AE,360, XACTA i.0 & Continuum (DHS IACS), Archer GRC, TAF, CSAM, JCAM &ASSERT

Vulnerability Scanning Assessment

FedRAMP Cloud system management

Ca PAM

IT Risk Assessment, Incident Management, Continuous System Monitoring

Vulnerability Assessment Tools -. Tenable Nessus, Nessus Security Eeye Retina, MBSA, Web Inspect, DB Protect, HP Fortify, Qualys, NMAP, Carbon Black, eMcAfee AV ePO.

EMPLOYMENT EXPERIENCE:

ManTech International, INC. - Information System Security Engineer (ISSM Support), Wash. DC, -April. 2024 to Present (Top Secret/SCI Poly) (Federal Bureau of Investigation (FBI))

Reviewed and assessed security authorization activities in compliance with the Information System Assessment & Authorization (SAA) Process of the NIST Risk Management Framework (RMF).

Collaboratively worked with the ISSO to ensure the day-to-day implementation, oversight, continuous monitoring, and maintenance of the security configuration, practices, and procedures for each IS

Perform assessment of ISs, based upon the risk Management Framework (RMF) methodology in accordance with the FBINet Classified, FBI Security Compartmented Information (SCI), and FBI Unet Unclassified systems Implementation Guide

Reviewed and ensure that selected security controls are implemented and operating as intended during all phases of the IS lifecycle.

Reviewed and ensure that system security documentation is developed, maintained, reviewed, and updated on a continuous basis

Reviewed and ensure IS vulnerability scans are performed according to risk assessment parameters

Managed the risks to ISs and other FBI assets by coordinating appropriate correction or mitigation actions, and oversee and track the timely completion of (POAMs)

Ensured that security controls are monitored for FBI ISs to maintain security Authorized to Operate (ATO) and security control evidence are uploaded to the Governance, Risk, and Compliance (GRC) application to support security control implementation during the monitoring phase

Ensured that changes to an FBI IS, its environment, and/or operational needs that may affect the authorization status are reported and documented

Silosmashers, INC. - Information System Security Officer, Wash. DC, -May. 2020 to Present (Top Secret) (Department of Homeland Security (DHS))

Ensure compliance with data and application security policies and relevant legal and regulatory requirements and applicable Risk Management Framework (RMF) requirements.

Ensure controls are Implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security requirements for the system.

Ensure appropriate changes and improvement actions are implemented as required. Maintain current knowledge of authenticator management for unclassified systems.

Ensure compliance with protection requirements, control procedures, incident management reporting, remote access requirements, and system management for all systems under the scope.

Ensure compliance with data and application security policies and relevant legal and regulatory requirements and applicable Risk Management Framework (RMF) requirements.

Ensure appropriate changes and improvement actions are implemented as required. Maintain current knowledge of authenticator management for unclassified systems.

Ensure compliance with protection requirements, control procedures, incident management reporting, remote access requirements, and system management for all systems under the scope.

Perform all procedures necessary to ensure the safety of information systems assets and to protect systems from intentional or inadvertent access or destination.

Monitor, evaluate, and maintain systems and procedures to safeguard internal information systems, network, databases, and Web-based security.

TISTA SCIENCE& TECHNOLOGY, INC. - Information System Security Officer, Wash. DC, -April. 2019 to February 2020 (Public Trust) (Supporting Library of Congress (LOC))

Manage Authorization Packages of assigned Information Systems

Perform periodic and on-demand system audits and vulnerability assessments, including user accounts, application access, file system and external Web scans to determine compliance

Review vulnerability scans and provide mitigation techniques

Advise the information System Owner (ISO), Chief Information Security Officer (CISO), Information Systeme Security Manager (ISSM), and the Delegated and and/or Authorizing Officer (DAO/AO) on any assessment and authorization issues.

Create, review and update Plans of Action and Milestones (POA&Ms)

Monitor and analyze Intrusion Detection System (IDS) to identify security issues for remediation.

Ensure security assessment completed, and results are documented and prepare the security Assessment report (SAR) for Authorization boundary.

Ensure the updates and the implementation of the security policies and procedures.

Work closely with third-party vendors to ensure appropriate security support is provided for hosted application.

Initiate a Plan of Action Milestones (POA&M) with identified weaknesses for each.

Conduct research and providing review recommendations on software and technologies to address vulnerabilities

Review Splunk & Qualys Audit logs for compliance

Conduct security assessment interviews, tests and evaluation to determine the Security posture of the System and to develop a Security Assessment Report (SAR) using NIST SP 800-53A required to maintain Authorization to Operate (ATO), Risk Assessment, System Security Plans, and System Categorization

ADMINISTRATION OF CHILDREN AND FAMILIES- Federal Cyber Security Manager, Washington DC-June 2018 to Jan.2019 (Public Trust) (Supported ACF)

Develop procedures, awareness programs and supporting templates for ACF SA&A.

Supported the CIO in making Authorization decisions with documented system compliances

Oversight of quality assurance (QA) and its on-going maintenance of quality assurance program

Ensure a weekly security status meeting by the contract support staff of the DFS

Ensure a weekly Validation and Testing of Data status meeting by the contract support staff of the IV&V Team

Attend all Lines of Business (LOB) meetings including Advisory and PMOs

Track & monitor tasks assigned to staff to ensure they are on schedule

Provide Oversight to Support Personnel who perform DFS cyber security assessment of Risk Management Framework, Security Testing, IV &V testing & Continuums Monitoring program

SCIENTIFIC APPLICATION INTERNATIONAL CORPORATION- Information Security Project Manager, Mclean VA Oct. 2017 to Mar. 2018 (Public Trust) (PBGC)

Review all work from quality assurance perspective

Ensure non-Occurrence of service deficiencies

Develop and maintain security artifacts including SSP, FIPS 199, PTA/PIA and ISCM Plan

Track & monitor tasks assigned to staff to ensure they are on schedule

Provide Oversight of Personnel who perform cyber security technical assessments of Risk Management Framework, Security Testing, & Continuums Monitoring program.

Develop, Coordinate, Support & Implement IT Security Training

Plan, Schedule, Coordinate, Prepare, Execute, and/or document the results of test plans and scripts for IT Security User Acceptance Testing (UAT) for development,

Review work instructions and operational procedures for compliance with security requirements and policy

Prepare, Review, Update and Maintain SSP and associated documents, Implement and Support Continuous Monitoring

STRATEGIC ENTERPRISE SOLUTIONS. - Information System Security Officer, Wash. DC, -Oct. 2016 to Oct. 2017 (Public Trust) (Supported DHS/ICE)

Maintain an asset inventory of hardware and software within the program/development offices or field site facility

Participate in DevOps Sec (security integrated into Agile processes) requirements for assigned systems

Monitor and respond to Information Security Vulnerability Management (ISVM) Patch Management

Conduct an annual assessment in accordance with guidance in the DHS Information Security Performance Plan

Ensure that requests for Security Assessment & Authorization (SA&A), or Certification and Accreditation(C&A) of assigned major application or general support system is completed in accordance with the DHS 4300A Handbook Policy and procedure

Maintain and update Authorization Packages security documentation including Privacy Impact Analysis, Privacy Threshold Analysis, System Security Plan and System Assessment Report using RSA Archer

Provide audit support for assigned systems (Financial, A-123, FISMA, internal, DHS, etc.), throughout the audit (Pre, During, and Post Audit)

Support the creation, monitoring, and updating the status of POA&Ms to ensure weaknesses are resolved in accordance to their scheduled completion dates

Ensure the implementation of cloud Security & maintenance of the security controls to the assigned DHS system in AWS (FedRAMP).

CGH TECHNOLOGIES- Information Security Analyst, Wash. DC, SW-May 2014 to Sept, 2016 (Public Trust) (Supported OPM)

Develop & assemble Security Assessment and Authorization (SA&A) HCDW system using NIST 800-special publications

Participating in DevOps Sec (security integrated into Agile processes) requirements for assigned systems

Vulnerability Scanning & Analysis of OPM USAjobs Servers for open weaknesses.

Site / Physical facility assessment and survey

Review and validation of systems security assessment & authorization (SA&A) artifacts using FISMA compliant Trusted Agent

Develop a Continuous Monitoring Plan for information systems, IT security controls for systems at the program or system level

Ensure systems compliance of periodic Continuous monitoring process, Contingency Plan & test of artifacts using Trusted Agent a FISMA compliant tool

Review and analyze POA&M items for closures with Weaknesses Completion Plans (WCP) and make recommendations for corrective actions

SCIENTIFIC RESEARCH ANDAPPLICATION INTERNATIONAL, INC.- Information Assurance Analyst, Fair Oak, Virginia-Jan,2010 to April,2014 (Public Trust) (Supported OPM)

Develop & assemble Security Assessment and Authorization (SA&A) artifacts using NIST 800-special publications (NIST 800- 53 Rev 4, 800-53 A rev 1, 800-37 rev 1, FIPS-199)

Review risk assessment reports for consistency following NIST 800-30 and agency’s Information Security Policy

Create Review and Update Information security policies and procedures for Agency system compliance use

Conduct Security Assessments (Security Testing and Evaluations) in support of security authorizations (accreditation), documenting and presenting test results and mitigation strategies

Review and analyze POA&M items for closures with Weaknesses Completion Plans (WCP) and make recommendations for corrective actions

Review & analyze Notice of Findings & Recommendations (NFRs) from FISMA Audit and provide recommendations for corrective actions

Perform vulnerability scans, analyze scan reports and make recommendations for corrective actions

TECHGUARD SECURITY, INC. - Information Security Engineer, Baltimore, MD – Aug. 2004 to Dec 2009 (Public Trust) (Supported PBGC)

Perform systems certifications and accreditations in accordance with FISMA regulations and OMB requirements

Develop security documentation to ensure the Confidentiality, Integrity & Availability of the assigned systems

Tasked with the responsibility of researching, developing and maintaining the agency’s policies, procedures, and guidelines (Information Assurance handbook (IAH)

Develop and maintain security artifacts including SSP, FIPS 199, PTA/PIA and ISCM Plan

Perform security tests and evaluations (ST&Es)

Conducts risk assessments and implements solutions to reduce vulnerabilities.

Monitor system operations for compliance with security policy and accepted best security practices

Perform Vulnerability scan and analysis of PBGC systems

Create Systems Plan of Action &Milestone (POA&M)

Supervision of employees and taking lead in the general tasking activities supporting the clients

GNS, INC. - Senior Network Engineer, Rockville, MD – Sept 2003 to Sept. 2004

Responsible for the review of the operational procedures for the Department of Commerce’s Lotus Notes/Domino mail

Reviewed and analyzed the implementation of Lotus notes/Domino server security features

Tasked with reporting and making recommendations on the proper use of securing Lotus Notes

Provided network end user support for department staff, which involved configuring individual workstations

CES CORPORATION - Local Area Network Administrator, Silver Spring, MD –Mar. 2001 to Sept. 2004

Installed and configured MS client mail (MS Outlook 2000), Win 95, 98 NT 4.0 and 2000 Pro Access 97 Database and Netscape Communicator as Linux mail

Tasked with system backup using ARC serve, Backup exec software and Veritas Auto loader

Supported at least 200 users running Windows 95/98/NT/2000/XP professional workstations in Netware /Linux mixed environment of African Development Foundation

Tasked with configuring, monitoring and administering the firewall servers

Installed and configured Gauntlet firewall and network scanning security software

Managed, monitored, and maintained Novell Netware, Linux Squirrel web mail, Network Printers, Win NT firewall & DHCP Servers and MS Active Directory

OAO CORPORATION - Local Area Network Administrator, Greenbelt, MD –May 1999 to Mar. 2001

Supported at least 300 users and nodes in Win 95/98, NT, 2000 professional and Macintosh workstations in Win NT LAN environment in DC Office of Planning

Installed and configured Win 95, 98 NT 4.0 and 2000 Professional workstations

Monitored and maintained MS Exchange 5.5, primary domain controller, backup domain controller and IQ tracking mail servers & Agency Web mail system

Installed and configured Win NT servers (PDC & BDC)

Created individual and group mailboxes in the MS Exchange server 5.5

KEANE FEDERAL SYSTEM, INC – Network Administrator, Rockville, MD –Sept. 1997 to April 1999

Installed, configured and deployed more than 1,300 Windows 95/98 systems, Microsoft NT workstations, printers, scanners, and other network peripherals

Upgraded, tested and maintained more than 300 client workstations, and supported over 1, 500 LAN/WAN users in the Netware environment

Installed, configured, and maintained Lotus Notes and cc: Mail

Proficient with remote management using Zen works

Backed up network resources using Arc serve

EDUCATION:

Masters Business Administration – Marketing, University of the District of Columbia

Bachelor of Science - Business Administration, Johnson C Smith University

CERTIFICATIONS:

CISSP (Certified Information System Security Professional) (ISC)2 certified)

AWS CCP (AWS Cloud Certified Practitioner}

CNA (Certified Netware Administrator)

MCP (Microsoft Certified Professional)

CLEARANCE:

Top Secret/SCI Poly (Active)

Secret (Active)

PROFESSIONAL DEVELOPMNET/TRAINING:

Cloud Security Administrator-Akamai University

AWS cloud practitioner Training

Business Case Development Training

Information Security seminars and webcasts

International Information system Security Certification Consortium (ISC)2

Peer Review Training

Project management Training

MCSE Training

Productivity and Management Professional Development

LAN configuration and maintenance Training

REFERENCES AVAILABLE UPON REQUEST



Contact this candidate