Cybersecurity | Information Assurance Analyst
Active Secret Clearance, SecurityX, CYSA+, Security+, Network+, CCNA, Server+. Results-driven information security professional prepared to leverage strong analytical background in cybersecurity. Proven track record of identifying vulnerabilities and implementing effective security measures. Known for collaborative teamwork and consistently delivering high-quality results, adaptable to changing security needs. Proficient in risk management, identifying and mitigating security threats, and compliance. Utilizes comprehensive risk assessment techniques to protect sensitive data. Knowledge of incident response and policy enforcement ensures robust information security.
Responsible for providing key government personnel with policy coordination and interpretation support, general information security support, and assisting with the development and implementation of a defensive security program that protects information systems and documents. Coordinate with USARCC-SWA Defensive Cyber Operations implement, automate, maintain, and optimize measures protecting systems, networks, and information. Responsible for ensuring and documenting that all systems are regularly scanned and audited in accordance with applicable DOD policy and procedures, and that incidents are documented and accounted for as necessary through leadership.
Developed Risk assessment reports to identify threats and vulnerabilities.
Maintains a database to track trends, unauthorized activities, and common practice procedures and remedies to be followed by subordinate units in correcting deficiencies identified during information assurance vulnerability compliance visits. Detect, document, and report potential or confirmed incidents and security issues. Employs network scanning tools such as ACAS, and SCCM etc., to detect system and network vulnerabilities/deficiencies as part of a proactive network security policy. Provides daily status on findings and recommendations and provides follow-on written technical analyses and reports. Provides 24/7 IAVA reporting, to include review of logs, open tickets, and recommended process for remediation. Responsible for ensuring the appropriate DoD RMF (Risk Management Framework) process is met and the adequate input of documentation, such as ACAS scans, STIGs, HW/SW List and Network Diagrams are updated monthly into eMass to meet the continuous monitoring requirements. Analyzed network security and current infrastructure, assessing areas in need of improvement.
Coordinated secure system access of users to various department systems and platforms.
Conducted risk analysis, system certifications, auditing, security documentation and security testing.
Assessed threats, risks and vulnerabilities from emerging security issues to advise pertinent stakeholders on appropriate measures.
Manage communication for both classified/unclassified computer system stability through DoD-approved, operating systems and software. Maintained network hardware and software and monitored network to support network availability to end users. Identifies, analyzes, and resolves network incidents and issues. Provide System management, administrating Monitors the Tier 1 and/or 2 server operations/performance using appropriate software applications and tools. POC for all theater enterprise systems issues, create and/or manage trouble tickets, and monitor status. Maintains security requirements by following Security Technical Implementation Guides (STIGs) provided by DISA. Operates and maintains all aspects of server administration to include but is not limited to Microsoft 200X Active Directory Organization Units (OU) and objects (Users, Computers, MAB), Windows File Server, Network Policy Server (NPS), Domain Host Configuration Protocol (DHCP), Print Server, Internet Information Services (IIS), etc.
Administered server maintenance and updates to ensure optimal performance across network infrastructure.
Implemented system monitoring tools to identify and resolve issues proactively, enhancing operational efficiency.
Collaborated with cross-functional teams to develop disaster recovery plans, ensuring data integrity and availability.
Managed user accounts and permissions, enforcing security protocols to safeguard sensitive information.
Operates and maintains all aspects of server administration to include, but is not limited
to, Microsoft 2008 Active Directory, Windows Internet Name Service (WINS), Domain Name System (DNS), Domain Host Configuration Protocol (DHCP), print queues, etc.
Managing day-to-day operations protecting Secured areas and conducting security training and security checks. Performs required general administrative and logistical functions,including personnel, property, maintenance, and operational records. Responsible for the overall operations of the arms room which includes issuing and receiving weapons, ammunition and sensitive items inventories, conducting weapons maintenance inspections, completing and filing all required reports and forms. Enforcing regulation, providing surveillance, responding to incidents, and documentation. Implementing and enforcing standard operation procedures, work instruction, and safety measures. Responsible for supervising and training Force Protection Officer on missions, duties, and responsibilities of security operations. Training weapon fundamentals and weapon Safety, Vehicle Searches. Conduct Performance evaluations. Analyzed and investigated all incidents, creating reports to proper chain of command. Oversaw Force Protection Officer timekeeping entries and reports through Deltek payroll management program. Assessed ongoing risk factors and suggested projects/operations improvements to senior chain of command.
Manages Maintenance and operation of Cisco routing and switching technologies, Monitored operational and security procedures for workstation in network and related system administration. Cisco IOS Network Configuration, and Network Troubleshooting to document, test, implement, integrate, maintain, or modify IT systems. Ensures workstation/server data integrity by implementing standard software and hardware solutions. installations and upgrades to operating systems and layered software packages. Utilize network management tools SolarWinds to monitor, evaluate, and Report health statistics of WAN/LAN, Diagnose, troubleshoot, WAN/LAN connectivity restore technical service and end-user software. Provide technical support for VoIP networks. Troubleshooting network or connectivity problems for users or user groups. Monitor network performance to determine whether adjustments need to be made, and to determine where changes will need to be made in the future. Maintain logs related to network functions, as well as maintenance and repair records. Configured networks for smooth, reliable operation to meet business processes and objectives.
Plan, coordinate and implement security measures to safeguard information in computer files against accidental or unauthorized damage, modification or disclosure Create or implement security standards, policies, and procedures. Plan, direct, or coordinate security activities to safeguard company assets, employees, guests, or others on company property. Work as part of a project team to coordinate database development and determine project scope and limitations. Collect and analyze security data to determine security needs, security program goals, or program accomplishments. Review project plans to plan and coordinate project activity. Manage backup, security and user help systems. Provide users with technical support for computer problems. Install CCTV system, maintain update, monitored surveillance equipment, conducting inspection, access media .
Managed operation of 3 sites, Created updated report system security audits to identify operations resolutions. Manages and perform all logistics functions in support of operations related to physical security, staff safety and asset protection. Managed and trained manager of each site . Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs. Review violations of computer security procedures and discuss procedures with violators to ensure violations are not repeated. Implement training on new policies. Performed evaluations. Work with manager to develop safety projects to ensure normal operations. Provided communication between the Director of Security and Clients. Responded to all emergency issue. Receives, reviews compiles, integrates and submits administrative reports into project-level reports and corporate office.
Managed safety and security of location to prevent intrusion, criminal activity, vandalism and injuries to workers. Collaborated with management, technical crew members and fellow supervisors to organize efficient site operations and achieve demanding schedule targets. Delivered reports to each to detail project updates and likely completion dates, noting delays and causes. Responded quickly to incidents and assessed active situations for security concerns. Completed evalutation and investigate concerns. Supported criminal investigations by collaborating fully with local law enforcement representatives.
Rover Supervisor duties to secure the premises and personnel by patrolling property. Maintaining security operation, troubleshoot malfunction, calling for repairs, evaluation of new equipment. Manages safety and security of location, conducting patrol and oversaw the rover detail. Monitored and authorized entrance and departure of employees and visitors daily. Wrote detailed reports on property damage, theft, presence of unauthorized persons and unusual incidences. Patrolled location to preserve law and order, deter and detect criminal activity, enforce laws and regulations, respond to citizen requests for assistance and provide public safety
Manage project execution to ensure adherence to budget, schedule, and scope. Maintain and administer computer networks and related computing environments including computer hardware, systems software, applications software, and all configurations. Managed Structured compensation and benefits according to market conditions and budget demands. Followed programs closely to assess effectiveness and make proactive changes to meet projects demands. Liaised between multiple business divisions to improve communications. Developed succession plans and promotion paths for all staff. Streamlined HR efficiencies, coordinated new hire orientations and provided on-boarding and training for new employees. Maintained payroll, financial accounting, of all sales budgets, scheduling, expense control Expanded operational bases and increased revenues while developing and integrating efficient business plans. Train
employees in successful selling methods and encouraged cross- selling to drive revenue. Delivered engaging sales presentations to new clients, explaining technical information in simplified language to promote features and increase client base. Identified, hired and trained highly-qualified staff by teaching best practices, procedures and sales strategies. Identified opportunities for growth within territory and collaborated with sales teams to reach sales goal. Accomplished sales goals and boosted revenue by $40k-120k through product knowledge and customer relationship management.