Post Job Free
Sign in

Information Security Risk Management

Location:
Fowlerville, MI
Salary:
150000
Posted:
April 24, 2025

Contact this candidate

Resume:

Professional Summary

An IT and cyber security professional specializing in governance, compliance and risk management as well as infrastructure design and implementation. Adept at writing policies and procedures, as well se designing, implementing, and managing information security infrastructure.

Skills and others

Governance

Develop policies and procedures for IT and Security and Legal as it pertains to compliance and IT

Work with legal and other departments to ensure compliance Policy writing

Developed ethical standards and policies for IT and compliance

Developed standards for conflict resolution within IT

Write and manage SSP’s

Write and manage POA&M

Managed all IT resources

Risk Management

Perform risk assessments on systems and mitigated as needed

Perform risk assessments on processes and mitigated as needed

Performed risk assessments on software and mitigated as needed

Performed Risk assessments on hardware and mitigated as needed

Developed a Change Management Process

Compliance Standards

CMMC Level 3 (V1)

CMMC Level 2 (V2)

NIST 800-171

NIST 800-172

ITAR/EAR

DFARS

HIPAA

NISPOM

DIACAP

SAAS

Google Workspace

Microsoft 365

Microsoft Intune (Limited)

CISCO Meraki

Elastic SIEM

CrowdStrike

Carbon Black Defense

KnowBe4 Training

Abnormal Security

Citrix ShareFile

Virtru

DUO Security

Cisco Umbrella

PAAS

AWS (Limited)

MS Azure (Limited)

GRC Tools

Netwrix Auditor

Manage Engine

i2ACT

Qualys

Professional Experience

02/2025 - 04/2025

Sr. Security Analyst, Tek Systems for Roush Defense, Troy, Mi.

Assist in CMMC L2 Compliance

Review/Update Policies and Procedures

Assist in updating various controls related to SSP

Conduct Risk Assessments on various systems

Conduct GAP analysis on various IT systems

Migrate CrowdStrike from Government Cloud to Commercial Cloud

Monitor CrowdStrike for anomalies and detections

Develop CrowdStrike policies for Identity Management Protection

Configure CrowdStrike environment for 3 separate domains (Federal, Defense, Commercial)

Develop rules and policies for detection in CrowdStrike for various platforms, and groups

Perform GAP Analysis and mitigate those findings or give direction to other departments

Manage Change Management Process

Manage DUO Security

Write and manage a process for vetting software approvals for use in Roush Defense

Assist in mitigating various POA&M findings for CMMC L2

Monitor Elastic SIEM for anomalies and mitigate according to policies and procedures

Configure, manage, and monitor Cisco Umbrella and mitigate threats

Work with various IT teams to shore up defenses across the Roush Defense environment

Monitor various external security feeds for emerging threats and IOC’s and inform the various departments of those threats and recommend protection strategies.

08/2010 - 02/2025

IT Manager/Security Engineer, RedViking

Security Engineering

Develop security roadmap and budgets for the organization

Research, design, and implement security stack revolving around Fortinet, Cisco Meraki, and other technologies

Implement and manage all firewalls, traffic analyzers, EMS, and AV to include rules, policies, and access.

Manage all IDS and IPS rules and investigate detections

Investigate, Implement, and manage DUO Security

Investigate, implement, and manage Abnormal Security

Investigate, implement, and manage physical security controls

Implement and manage application control policies and controls at the firewall and AD Group Policy level

Implement and manage software and device restriction policies and strategies.

Implement and manage physical access security at the switch level.

Implement and manage DNS policies at the internal DNS and firewall level

Implement and manage all web filtering policies and controls

Perform threat management at the firewall level and throughout the network and endpoints to include containment and mitigation.

Build automation into firewalls, antivirus, and other detection systems

Monitor and manage logs at all levels of the security stack for internal and external anomalies and threats.

Investigate, implement, monitor, and manage EMS for detected vulnerabilities and patch management.

Monitor various external security feeds for emerging threats and IOC and build rules in the security stack to counter those threats.

Perform forensic analysis for detected anomalies and threats throughout the security stack.

Work with application and developer teams to build security best practices and access controls into their cloud ventures to include AWS and Azure.

Provides security analysis and guidance to the administrator team members.

Provide information security guidance to the organization at large concerning threats that may impact them or their family members in their private lives. An educated workforce is a safer workforce.

Implement and manage security and access controls for the organizations SQL databases which include Epicor ERP and the SolidWorks EPDM vault.

Author and Implement access control policies and procedures for AD Security Groups

Implement security and controls at the file and application server levels

Implement and manage security groups at the Active Directory level

Author and update all policies and procedures related to IT, security, compliance, and privacy.

Conduct all Information Security Training

Perform all risk assessments related to IT and compliance and mitigate as required

Perform GAP analysis and mitigate as required

Develop and implement Change Management Process

Develop and implement patch management policies and procedures

Implemented encryption solutions throughout the network to protect data in motion

Implement encryption standards at the SAN, server, backup, and workstation level

Implement data protection solutions as well as policies and procedures to protect data transmitted to customers, vendors, etc.

Worked with HR and other departments to ensure PII and other regulated data was protected

Develop and implement comprehensive controls to protect regulated government data, CUI

Develop and implement multi-layered data backup strategies

Develop, implement and manage all patch management strategies for all IT and other covered systems

Developed threat management policies and strategies

Develop solutions to protect SAAS solutions such as Google Workspace and Microsoft 365 and ensure those solutions were compliant with DFARS and CMMC compliance standards

Write SSP’s in accordance to CMMC and NIST compliance standards and the protection of CUI for government contracts.

Ensured compliance with all applicable Federal, state and local laws

Developed ethical standards within IT and security

USE various GRC tools such as NetWrix Auditor, Manage Engine, i2ACT

Conduct Phishing and other tests

Compliance Management

Write all policies and procedures for IT and compliance

Spearhead all efforts for NIST 800-171/800-172 compliance – SPURS Score 100/110

Spearhead all efforts for CMMC Level 2 compliance

Conduct all risk assessments associated with compliance

Write and maintain SSP for compliance reasons

Implemented Change Management process

Implemented Data Classification

Work with various departments to ensure their compliance with ITAR/EAR, DFARS, NIST, CMMC, ISO

Work with customers to ensure our compliance with their standards requirements

Develop and test Disaster Recovery Plan (DRP)

Develop and test Incident Response Plan (IRP)

Implement and conduct Security Awareness training activities

Conduct vulnerability analysis

Conduct regular user assessment activities to include Phishing test

Implement and manage various physical security controls to include badge reader system, camera system, and visitor management system.

IT Management

Work with corporate leadership to ensure IT and business objectives are aligned.

Develop annual budgets for IT and Compliance.

Research various technologies for infrastructure implementation

Research, evaluate, and engage various IT vendors

Design, implement, and manage the infrastructure

Backend management of Epicor ERP System

Manage Active Directory

Develop Baselines for workstations/Servers/Virtual workstations (Generally based off STIGS)

Consult with customer IT departments to assist with their issues, to ensure compliance

Physically perform cable runs, copper and fiber

Migrated to Google Workspace

Develop access controls for folders

Design folder structure for all data repositories

Design permissions structure for all data repositories

01/2010 - 08/2010

System Specialist II, Tyonec Native Corporation, Madison, Al.

Responsible for maintenance, analysis, troubleshooting and repair of computer systems, hardware and peripherals.

Documents, maintains, and upgrades and replaces hardware and software systems.

Works with other IT staff members to ensure all policies are applied consistently throughout the corporation.

Development of system images on a quarterly /semiannual basis and provide regular education to Tyonek personnel to ensure policies/procedures are understood.

Investigate policy violations and forensically investigate workstations as needed

12/2009 - 01/2010

INFORMATION SECURITY COORDINATOR/SENIOR ANALYST, EMCO Technologies, Madison, Al.

Company Overview: (NASA Contract)

Examine, write, or update Information Security Policies and Procedures.

Perform facility and infrastructure audits and risk analysis.

Write and present reports and suggestions based on findings to management.

Ensure the infrastructure is compliant with all NASA and other federal directives concerning information security.

Maintain knowledge of NIST 800-53 and FDCC standards.

Perform annual site security certification and accreditation audit.

Stay current on threats to security.

Work with the facility training coordinator to ensure help desk staff has appropriate knowledge of NASA information security standards and how to implement those standards.

Provide tier one support for end users at all NASA sites and facilities worldwide

Resolve hardware, software, and customer support issues.

Answers, evaluates, and prioritizes incoming telephone, voice mail, and E-mail requests for assistance.

Logs and tracks calls using problem management database (Remedy), maintain history records and related documentation.

NASA 85P security Clearance required.

(NASA Contract)

12/2008 - 12/2009

INFORMATION SECURITY COORDINATOR, VIVA Health, Birmingham, Al.

Responsible for the on-going management of information security policies, procedures and technical systems in order to maintain the confidentiality, integrity, and availability of all organizational healthcare systems.

Worked within the NIST 800-53 as well as HIPAA compliance framework

06/2004 - 12/2008

Senior Help Desk Analyst, EMCO Technologies, Madison, Al.

Company Overview: (NASA Contract)

Provide tier one support for end users at all NASA sites and facilities worldwide

Resolve hardware, software, and customer support issues.

Answers, evaluates, and prioritizes incoming telephone, voice mail, and E-mail requests for assistance.

Logs and tracks calls using problem management database (Remedy), maintain history records and related documentation.

NASA 85P security Clearance required.

(NASA Contract)

05/2004 - 06/2008

Senior Help Desk Analyst, AC Technologies, Tuscaloosa, Al.

Company Overview: (Department of Veterans Affairs Contract)

Tier one support for end users with hardware and software issues.

Answers, evaluate, and prioritize incoming telephone, voice mail, e-mail, and in-person requests for assistance from users experiencing problems with hardware, software, networking and other computer-related issues.

Logs and tracks calls using problem management database (Remedy) and maintain history records and related documentation.

Requires excellent verbal and written communication skills

(Department of Veterans Affairs Contract)

Education

06/2021

Masters of Science, Information Assurance and Security specializing in Network Defense

Capella University, Minneapolis, MN

06/2014

Bachelors, Information Technology specializing in Information Assurance and Security

Capella University, Minneapolis, MN

2025 CMMC Candidate

2025 CCP Candidate

References

Kevin Butler – CFO/Manager at RedViking – 734-***-****

Kevin Presley – Compliance Manager – RedViking – 734-***-****

Josh Johnson – Information Security – NSK – 248-***-****

Dakota Samuels – CMMC Consultant – Lincoln Electric – 256-***-****

Tommy French – IT Project Manager (CMMC) – Lincoln Electric – 440-***-****

Dustain Ebaugh

256-***-**** • *******@*****.*** • Fowlerville, MI 48836



Contact this candidate