Profiles search
temi oyeleke
Information Security Analyst at CGI
Houston, TX, United States
Details
Education:
Master of Public Health (M.P.H.)
Epidemiology
Morgan State University
2013 : 2015
Epidemiology
Morgan State University
2013 : 2015
Experience:
• Perform technical analysis, creation and/or review of cyber security artifacts (e.g., SSP, PIA, PTA, CP, ASA, MOU and AOR) and security documentation library. Assist in the creation of documentation for projects within the cyber portfolio. .
• Analyze and advise on the risk and remediation of security issues based on reports from vulnerability assessment scanners, patch management tools, and emerging threat information
• Understanding of IT security in NIST SP 800 (i.e. 800-53 rev4) series guidance to produce Security Authorization documentation for GSS, Major Applications and Minor Applications.
• Initiate, coordinate and track remediation of security weaknesses as they are discovered, via a Plan of Actions and Milestones (POAM)
• Review work instructions and operational procedures for compliance with security requirements and policy; interpreting security principles and requirements for technical teams
• Work within a cross-functional environment applying incremental and agile methodologies and focused on continuous security improvement
• Collaborate with ISMs of other FISMA systems to ensure continued compliance with security control inheritance conditions
2018 : Present
CGI
Information Security Analyst
• Conduct FISMA-based security risk assessments for various systems and applications
• Assist System Owners and ISSO in preparing Security Assessment and Authorization package
• Familiarity with all phases of security control assessment including examining, interviewing and testing.
• Develop, review and evaluate System Security Plan (SSP)
• Conduct security control assessments to assess the efficiency of management, operational, privacy, and technical security controls implemented
• Created post assessment reports and recommendations for security relevant findings.
• A Security Assessment Reports (SAR) are developed detailing the results of the assessment along with plan of action and milestones (POA&M)
• Participates in security related projects including planning, research, testing and implementation
• Provide ISSO with composite reports detailing audit findings and recommendations to correct identified vulnerabilities
• Draft Authorization memos and communicate with ISSO on continuous monitoring activities related to POA&M closures, waivers, and exceptions.
• Coordinated scans with ISSOs and Security Engineers as requested for FISMA compliance.
• Assist with overall review of policy, process improvement, and technical advances in IT Security Management
2014 : 2018
Cybersoft Technologies
Information Systems Security Analyst
Assisted in executing the agency’s Security Assessment and Authorization(SA&A) program
• Responsible for all phases of SA&A to ensure compliance and provide guidance on IT Security requirements to assigned stakeholders.
• Conducted meetings with the IT project teams to gather documentation and evidence about their system operating environment.
• Examined artifacts, conducted interviews, and performed manual assessments.
• Created and maintained user’s accounts, profiles, security, rights disk space and process monitoring.
• Accomplished providing technical support by troubleshooting Day–to-Day issues with various Servers on different platforms.
• Perform all continuous monitoring functions and assist in maintaining Systems Authorization to Operate (ATO)
• Use Risk Management Framework(RMF) to develop and complete risk assessments based on NIST standards to ensure Information Assurance design sufficiently mitigates risk.
• Oversight and development of POA&Ms as part of the Security Assessment and Authorization.
2011 : 2014
Quantanix
Information System Analyst
• Analyze and advise on the risk and remediation of security issues based on reports from vulnerability assessment scanners, patch management tools, and emerging threat information
• Understanding of IT security in NIST SP 800 (i.e. 800-53 rev4) series guidance to produce Security Authorization documentation for GSS, Major Applications and Minor Applications.
• Initiate, coordinate and track remediation of security weaknesses as they are discovered, via a Plan of Actions and Milestones (POAM)
• Review work instructions and operational procedures for compliance with security requirements and policy; interpreting security principles and requirements for technical teams
• Work within a cross-functional environment applying incremental and agile methodologies and focused on continuous security improvement
• Collaborate with ISMs of other FISMA systems to ensure continued compliance with security control inheritance conditions
2018 : Present
CGI
Information Security Analyst
• Conduct FISMA-based security risk assessments for various systems and applications
• Assist System Owners and ISSO in preparing Security Assessment and Authorization package
• Familiarity with all phases of security control assessment including examining, interviewing and testing.
• Develop, review and evaluate System Security Plan (SSP)
• Conduct security control assessments to assess the efficiency of management, operational, privacy, and technical security controls implemented
• Created post assessment reports and recommendations for security relevant findings.
• A Security Assessment Reports (SAR) are developed detailing the results of the assessment along with plan of action and milestones (POA&M)
• Participates in security related projects including planning, research, testing and implementation
• Provide ISSO with composite reports detailing audit findings and recommendations to correct identified vulnerabilities
• Draft Authorization memos and communicate with ISSO on continuous monitoring activities related to POA&M closures, waivers, and exceptions.
• Coordinated scans with ISSOs and Security Engineers as requested for FISMA compliance.
• Assist with overall review of policy, process improvement, and technical advances in IT Security Management
2014 : 2018
Cybersoft Technologies
Information Systems Security Analyst
Assisted in executing the agency’s Security Assessment and Authorization(SA&A) program
• Responsible for all phases of SA&A to ensure compliance and provide guidance on IT Security requirements to assigned stakeholders.
• Conducted meetings with the IT project teams to gather documentation and evidence about their system operating environment.
• Examined artifacts, conducted interviews, and performed manual assessments.
• Created and maintained user’s accounts, profiles, security, rights disk space and process monitoring.
• Accomplished providing technical support by troubleshooting Day–to-Day issues with various Servers on different platforms.
• Perform all continuous monitoring functions and assist in maintaining Systems Authorization to Operate (ATO)
• Use Risk Management Framework(RMF) to develop and complete risk assessments based on NIST standards to ensure Information Assurance design sufficiently mitigates risk.
• Oversight and development of POA&Ms as part of the Security Assessment and Authorization.
2011 : 2014
Quantanix
Information System Analyst
Company:
CGI
Years of Experience:
12
Skills
Active Directory, Integration, IT Security Assessments, Networking, NIST, Security, U.S. Federal Information Security Management Act (FISMA), Vulnerability Management, Windows, Windows Server
About
Experienced System Security Analyst with a demonstrated history of working in the information technology and services industry. Strong information technology professional skilled in Vulnerability Management, Windows Server, Networking, Integration, and U.S. Federal Information Security Management Act (FISMA).