Ed Cooper CISM, CDPSE, CEH
Details
Business, Management, Marketing, and Related Support Services
Hawaii Pacific University
2001 : 2005
Northeast HS
1986 : 1989
Legal & General Retirement America
Information Security Manager
•Lead in the development/adoption and enforcement of Information Security policies, procedures and standards. Conduct and complete an annual review of required PCI, SOC2 regulations and reports.
•Maintained the Company’s Security Policies. These are formal policies that detail and document actual mechanisms and controls and should include at least the following :
•Administrative : Risk analysis and management, documentation management and controls, information access controls and sanctions for failure to comply.
•Personnel Security : Personnel only have access to the sensitive information for which they have appropriate authority and clearance.
•Physical Safeguards : Assign security responsibilities, control access to media and the controls in place against unauthorized access to workstations and related equipment.
•Technical Security : Set the access and authorization controls for everyday operations as well as emergency procedures for data.
•Maintain the Company’s Security Procedures that include :
•Evaluation and compliance with security measures.
•Disaster Recovery and Emergency operating procedures.
•Security Incident Response and process protocols including Incident Reporting and Sanctions.
•Testing of security procedures, mechanisms, and measures.
•Maintain appropriate security measures and mechanisms to guard against unauthorized access to electronically stored and /or transmitted patient data and protect against reasonably anticipated threats and hazards.
•Oversee and/or assist in performing on-going security monitoring of organization information systems including :
•Assess information security risk periodically.
•Conduct functionality and gap analyses to determine the extent to which key business areas and infrastructure comply with statutory and regulatory requirements.
•Evaluate and recommend new information security technologies and counter-measures against threats to information or privacy.
2019 : 2023
Brightwell
Infomation Security Officer
• The Cyber Security Watch Officer’s responsibility includes ensuring time sensitive and mandatory communication from USCYBERCOM, DISA, JFHQ-DODIN and other internal and external entities are received, acknowledged, processed, and coordinated within the Network Operations Security Center in a timely and efficient manner. The Watch Officer acts in a 24X7X365 environment, l coordinate with the Fusion, Response, Vulnerability Management and Infrastructure Teams as well as CSSP Management staff to meet on-going Computer Network Defense requirements. I serve as the Incident Commander in response activity and daily CYBER Operations Officer.
• Constant monitoring, analysis, and response reporting of network and security events as well as organizational and governmental directives.
• Creation of technically detailed reports based on incidents, network events, alerts and directives.
• Evaluate anomalous network and system activity to determine cause and effect to assist in determining risk exposure to overall security posture.
• Assists in troubleshooting and problem solving a wide variety of network and Cyber Incidents issues in support of the DCMA.
2015 : 2019
NSSPLUS
Cyber Security Watch Officer Lead
2015 : 2015
NSSPLUS
Cyber Security Watch Officer
• Support, monitor, test, and troubleshoot hardware and software Information Assurance (IA) and Information Technology (IT) problems pertaining to the assigned unit computer and network environment.
• Configure and manager enclave network environment IAW customer support policies, procedures and standards.
• Develop and update local IA related customer support policies, procedures and standards.
• Assist with development and maintenance SAP IA education and training program
• Ensure all information systems are operated, maintained and disposed of IAW SAP directives aware of their security responsibilities.
• Ensure configuration management for security-relevant IS software hardware, and firmware is maintained and documented.
• Conduct audits of all classified and unclassified IS to ensure compliance with established directives.
• Monitor system recovery processes to ensure security features and procedures are properly restored.
• Ensure all IS security-related documentation is current and accessible to properly authorized individuals.
2015 : 2015
SAIC
Information Security Analyst
Skills
A+ Certified, Active DoD Top Secret Clearance, Budgets, CCNA, CEH, CISSP, Command, CompTIA, CompTIA A+, CompTIA A+ Certification, CompTIA Network+ Certified, CompTIA Security , CompTIA Security+, CompTia Security+ Certified, Computer Security, COMSEC, Customer Service, Defense Support to Civil Authorities, DoD, Equal Opportunities, Hardware, Information Assurance, Microsoft Excel, Microsoft Exchange, Microsoft Office, Microsoft Servers, Microsoft Word, Military, Network Administration, Networking, Operating Systems, Physical Security, PowerPoint, Public Speaking, Research, Routers, Security+, Servers, SharePoint Services 3.0, Software Installation, Strategic Planning, Switches, System Administration, System Deployment, Teaching, Technical Support, Top Secret, Troubleshooting, U.S. Department of Defense, Windows, Active DoD Top Secret, CompTIA Security, CompTIA Network, Defense Support to
About
Highly skilled IT professional with 25 plus years of experience in information systems; Extensive knowledge in security, design, and deployable network communications; Extremely proficient in developing and supporting networks, telecommunications systems, systems administration and Operations Centers.
● Innovative and dynamic team builder with excellent interpersonal, written, and oral communication skills; proven abilities in translating complex technical terms and concepts to leadership and technical user
• Recognize a potential security violation, report the incident, and mitigate any adverse action
• Apply instructions and pre-established guidelines to perform tasks
• Support, monitor, test, and troubleshoot hardware and software IA problems pertaining to their Computing Environment
• Provide end-user IA support for all Computing Environment operating systems, peripherals, and applications
• Install and operate the IT system in a test configuration manner that does not alter the program code or compromise security safeguards
• Implement applicable patches including Information Assurance Vulnerability Alerts (IAVA) for their Computing Environment operating system(s)
• Perform customer support functions including installations, configuration, troubleshooting, customer assistance, and/or training, in response to customer requirements for the NE.
• Provide end user support for all IA related applications for the NE.
• Analyze system performance for potential security problems.
• Configure, optimize, and test network services, hubs, routers, and switches to ensure they comply with security policy, procedures, and technical requirements.
● Knowledgeable in diverse applications, Windows and UNIX operating systems, client-server computing, network functions, system administration and database management