Description
National Industrial Security Program Operating Manual (NISPOM) and DSS Assessment and Authorization Process Manual (DAAPM) Version 2.0 in meeting security risk design secure research analysis existing innovative technologies Aeronautics, Aero IT and EBS Internet of Things (IIoT) devices perform security test utilizing various security scanning tools manage the cyber security assessment & analysis process knowledge of computer vulnerabilities, exploits, and remediation strategies ensure the se manage the cyber security assessment & analysis process and identify risk to the security posture of perimeter facing environments assess industrial infrastructures and identify the security scope for IIoT devices : perform threat modeling assessment/analysis on various Aeronautics environments: perform security test utilizing various security scanning tools for projects as needed assessments of the organization and risk to individuals associated with the operation of a system. * Collaborates with internal and external (other sites) customers to provide recommendations regarding critical infrastructure and network security operations enhancements. * Responsible in providing security oversight for Multi/Single Use Standalones, P2Ps, LANs, and WANs * Develop Continuity of Operations (COOP) and Disaster Recovery (DR) operations and conduct evaluation of COOP and DR during annual incident response training. * Established standards used by Continuous Monitoring (CONMON) on more than 2,000 classified info systems. * Authors System Security Plans (SSP) and supporting appendices in accordance with DAAPM and NIST Guidelines. perform assessments on Aeronautics extranet environments * Leader of Change Control Board (CCB) tests, reviews, and approves all programmatic hardware and software changes ensures security engineering at all stages of system lifecycle. * Accountable for all cyber readiness activities: scanning, patch management, vulnerability mitigation, and physical security. Mentored network users on threats such as phishing, social engineering, computer security, and virus incidents. Directed staff members and Information System Security Officers (ISSO) that were responsible for network domains comprised of 10K information systems and network infrastructure. Commanded base Identity and Access Management program that ensured maximum confidentiality, integrity, and availability. * Established robust processes standardizing compliance with RMF requirements and cross functional collaboration. * Investigates, collects evidence, and develops Administrative Inquiries (AI) to support Insider Threat mitigation.
Work Experience
COMPANY | POSITION HELD | DATES WORKED |
---|---|---|
(Confidential) | Information Systems Security Risk Analysis/Cyber Security/Security Engineer | 1/2014 - Present |