Profiles search
promise okobia
--
South Laurel, MD, United States
Details
Experience:
Develop, review and update Information Security System Policies, System Security Plans, and Security baselines in accordance with NIST, FISMA, OMB and industry best security practices. Apply appropriate information security control for Federal Information System based on NIST 800-37 rev1, SP 800-53 rev4, FIPS 199, FIPS 200 and OMB A-130 Appendix III. Conduct systems and network vulnerability scans in order to identify and remediate potential risks.
- Coordinate and manage team activities during assessment engagements.
- Establish schedules and deadlines for assessment activities.
- Hold kick-off meetings with CISO and systems stakeholders prior to assessment engagements.
- Prepare and submit Security Assessment Plan (SAP) to CISO for approval.
- Develop and update security plan, plan of action and milestone (POA&M).
- Monitor controls post authorization to ensure continuous compliance with the security requirements.
- Manage vulnerabilities with the aid of CIS-CAT, Retina, Nessus and MBSA vulnerability Scanners to detect potential risks on a single or multiple assets across the enterprise network.
- Prepared and reviewed documentation to include SSP, SAP, SAR, and POAM Packages.
- Create reports detailing the identified vulnerabilities and the steps taken to remediate them.
- Developed, evaluate and implemented information security governance processes, including policies, standards, procedures and risk management practices.
- Implemented governance frameworks and security risk management processes, such as NIST, OMB guidelines and standards.
2012 : Present
Okinyx IT Security Solution
Information Security Analyst
- Coordinate and manage team activities during assessment engagements.
- Establish schedules and deadlines for assessment activities.
- Hold kick-off meetings with CISO and systems stakeholders prior to assessment engagements.
- Prepare and submit Security Assessment Plan (SAP) to CISO for approval.
- Develop and update security plan, plan of action and milestone (POA&M).
- Monitor controls post authorization to ensure continuous compliance with the security requirements.
- Manage vulnerabilities with the aid of CIS-CAT, Retina, Nessus and MBSA vulnerability Scanners to detect potential risks on a single or multiple assets across the enterprise network.
- Prepared and reviewed documentation to include SSP, SAP, SAR, and POAM Packages.
- Create reports detailing the identified vulnerabilities and the steps taken to remediate them.
- Developed, evaluate and implemented information security governance processes, including policies, standards, procedures and risk management practices.
- Implemented governance frameworks and security risk management processes, such as NIST, OMB guidelines and standards.
2012 : Present
Okinyx IT Security Solution
Information Security Analyst
Company:
Okinyx IT Security Solution