Summary
Overview
Work History
Education
Skills
Certification
Personal Information
Certificates
Timeline
Generic

MARTIN LOGO

Laurel

Summary

Results-oriented risk-based vulnerability management expert with strong Information System Security officer (ISSO) and Analyst background; skilled in enterprise-wide security strategy, preparing organizations for Risk Management Framework using NIST Special Publications Series. Reviewed & Put ATO packages (SSP, SAR, POA&M) together; Master all NIST 800-Series. Implemented and managed FISMA, FedRAMP, and HIPAA. Expert in various vulnerability scanning tools such as Nessus, Nmap, CSAM, and more. Work on several (DOD) Department of Defense contracts. Played a key role in prioritizing cybersecurity risks prevention and when they arise. Experience in Linux Systems and Windows System. Built Virtual Machines from Linux System and supported all flavors (Rhel, CentOS, Oracle, Debian, Unix, Fedora, and KVM) and linkup to Red Hat. Proposed and initiated automation projects (Cockpit, kick start, passwordless ssh, Mariadb, DNS Server, Active Directory and more) to optimize my company’s operating systems to improve efficiency.

Overview

12
12
years of professional experience
1
1
Certification

Work History

Systems Security Engineer

E-Solutions
08.2022 - Current

Responsibilities:

  • Designed, implemented, and maintained the security framework and policies
  • Conducted risk assessments, developed secure network solutions, monitored for security breaches, responded to incidents, and educated staff on security best practices
  • Handle security assessments, prioritized remediation actions, and worked closely with Product and Operations teams.
  • Designed and maintained security controls, enhanced monitoring, and fostered a security-first culture across the company.
  • Worked on a dynamic tech stack and made significant contributions to our security posture
  • Process and prioritize security assessment reports
  • Design and maintain security controls for applications and infrastructure
  • Implement WAF configurations, network segregation, and device security
  • Enhance security monitoring and detection systems
  • Conduct security training and awareness programs

Skills:

  • Training in RMF, Computer Science, System Engineering, Information Security
  • 4+ years in security roles (Red or Blue team experience)
  • Hands-on experience with application, system, and network security within Git GoTechology.
  • Familiarity with cloud computing, Linux administration, and TCP/IP protocols
  • Strong knowledge of security fundamentals and best practices
  • Excellent communication skills in English and french.


Information System Security Officer

D-Vine Consulting
03.2019 - 07.2022

Responsibilities:

  • Provided advisor to the information system owner and the CISO/ISSM on all matters (technical and otherwise) involving the security of the information system.
  • Took proactive security measures, assessing risks, and responding to security breaches.
  • Monitored networks, databases, and computer systems and created a risk management plan for IT systems.
  • Troubleshooting software to minimize any security threats or performance issues
  • Charged with collating authorization package (SSP, SAR, and POAM), managing, and ensuring all Assessments and Authorizations (A&A) documentation are included
  • Oversee controls post-authorization to ensure continuous compliance with security requirements on various contracts and private projects using appropriate Risk Management Framework.

Skills:

  • Had hands-on experience using vulnerability scanners such as Nexpose or Netsparker
  • Hade a background in developing and implementing information security policies and programs.
  • Assisted with the loading and unloading of buses, as assigned.

Information System Security Officer

Brothers Health Collective
04.2016 - 02.2019

Results-oriented risk-based vulnerability management expert with strong Information System Security officer (ISSO) and Analyst background; skilled in enterprise-wide security strategy, preparing organizations for Risk Management Framework using NIST Special Publications Series

Responsibilities:

  • Reviewed & Put ATO packages (SSP, SAR, POA&M) together; Master all NIST 800-Series
  • Conducted risk assessments to identify potential security threats and vulnerabilities.
  • Supported new ATO packages in eMASS and XACTA.
  • Provided cybersecurity planning and maintenance services, including updates of security documentation to reflect new or changed physical configurations and security requirements.
  • Coordinated the implementation of security measures in workstations, servers, and other system components.
  • Ensured that hardware and software deliverables meet cybersecurity requirements as specified under DoDI 8500.01, RMF IT, and NIST SP 800-53, including guidance from Authorizing Officials (AOs).
  • Evaluated scans, artifacts, plans, and STIGs to ensure compliance with all system security controls, facilitating waivers as required.
  • Ensured that system hardware and software installation on ONI networks complies with ONI assessment and authorization (A&A) processes for all enclaves and cross-domain systems.
  • Develop, maintained, and updated security documentation, including System Security Plans (SSPs), security assessment reports, and plans of action and milestones (POA&Ms).
  • Prepared and managed Authority to Operate (ATO) packages and other accreditation documentation.
  • Monitored information systems for security incidents and vulnerabilities.
  • Conducted regular security audits and assessments.
  • Reported security status and incidents to appropriate authorities and stakeholders.
  • Stayed updated on the latest security threats, trends, and technologies.
  • Continuously improved security processes and controls to enhance the overall security posture of the organization.

Skills:

  • Training in Certified in Governance, Risk and Compliance (CGRC)
  • Training in certification in Information Systems Security.
  • 5+ years of experience in Vulnerability Management
  • 6 + years of Experience with categorizing, STIGing, and developing ATO packages using the RMF playbook.
  • Proficient in eMASS and XACTA.
  • Strong understanding of DoDI 8500.01, RMF IT, and NIST SP 800-53 guidelines.
  • Experience in cybersecurity planning and maintenance.
  • Strong analytical and problem-solving skills.
  • Excellent communication and teamwork abilities.


Information System Security Officer

The Project Of The Quad Cities
07.2012 - 04.2016
  • Joined/participated in client interviews to determine the security posture of the system
  • Supported Information Assurance (IA) team; conducted risk assessments, and audits, provided documentation for security control assessment, and conducted vulnerability testing/scanning
  • Partnered with System Owner to develop and perform periodic testing of contingency and disaster recovery plans
  • Led, composed, and updated the Security Plan, Plan of Action, and Milestones (POA&M)
  • Led successfully, prepared, and submitted the Security Assessment Plan (SAP) for approval
  • Led, prepared, and updated the Security Assessment Report (SAR) and ensured FISMA compliance using NIST guidelines and controls
  • Aided in the development of Information System Categorizations using appropriate standards and NIST guidance
  • Built and updated system security plan (SSP) to provide an overview of federal information system security requirements and implementation of security controls
  • Spearheaded kick-off meetings with the IT client team to gather evidence, and develop test plans, and test procedures
  • Led and managed controls post-authorization to ensure continuous compliance with the security requirements.

Education

M.Sc. - Public Health & Computer Science (Minor)

Kaplan University
Chicago, Illinois
09.2012

B.A. - Modern Literature & Computer Science (minor)

University of Lome
09.2003

Skills

  • RFM - DOD - ISSO - Windows - Security Posture - SCI - Configuration Management - Linux - ICD - Incident Response - Nessus - Computer System Security - ISSM - Microsoft Team - Microsoft Word - PowerPoint - Publisher - Excel - Security Control Assessor - Information Risk Compliance - Security Risk Assessment& Management - IT Audits - CSAM - VPN - Proxy - Firewalls - Internet Gateway - POAM - NIST 800 series - FIPS - FISMA - EMass - FedRAMP - HIPPA - Federal & States Contracts - PII - Information Assets Protection - IT Systems implementation - Cybersecurity Governance - Policy Framework - Security and Privacy Regulatory - Computer Sciences - Cybersecurity Tools - Digital Authentication - Encryption - Security Implementation - Vulnerability Assessment
  • Risk Management Framework, RMF (Manage risk and ensured compliance with federal regulations / created security documents / implemented and maintained systems security plans / Prepared certification and accreditation documentation / Tracked and monitor risk and performed independent compliance reviews)
  • Provided quarterly FISMA reporting and supporting RMF transition and Continuous Monitoring implementation
  • Supported multiple government programs under NISP, JAFAN, and JSIG using the RMF approach
  • Developed and implemented DOD policies and procedures for the day to day operations
  • Provided security guidance to ensure new systems integrate appropriately into the existing security architecture and that it meets DoD security policies
  • perform vulnerability assessments and network accreditation in accordance with DoD security policies
  • Ensured that all ISSO critical elements were in-line with the requirements mandated by NavajoArea Office and the Office of Information Technology
  • Supported the Security Incident Response team in the remediation, documentation and reporting of all incidents for the ISSO assigned system
  • Patched and secured accredited testing laptops weekly for compliance with customer security requirements through Windows registry, and local security policy
  • Performed basic system administration on Information System for Windows utilizing Active Directory and manually for Linux OS
  • Engaged with both technical and policy stakeholders to maintain and document the security posture of Navy information technology systems
  • Ensured compliant information systems, security infrastructure, design and configurations to deliver dependable information security posture
  • Developed Sensitive Compartmented Information (SCI) systems security policy and procedural guidance
  • Maintained DD254s, clearance and access data files on all SCI, SAP, and Collateral cleared personnel and contracts
  • Experience in writing and executing test cases, POA & M's and policies
  • Performed security assessments using GAO's current processes supporting configuration management, vulnerability scanning, web application security and network monitoring
  • Developed and oversaw developers with the implementation of a secure web-enabled configuration management tool utilizing Microsoft web and database technologies
  • Developed Linux based log analysis tools
  • Provided system support of applications and services running on Linux servers, and networked storage services
  • Provided recommendations to the ISSM for developing plans to approach and resolved information system security solutions
  • Worked with the ISSM in writing system accreditation/certification documentation
  • Provided company organizations with computer forensic support, including trusted download verification, forensic imaging and incident response and investigations
  • Performed information security officer duties including; intrusion prevention and detection, incident response, investigation, and key-certificate administration
  • Directed and verifed compliance with operating system security controls, computer system security controls, and application layer security controls
  • Performed senior operator and systems and network administrator duties, unit level maintenance functions on assigned computer systems
  • Monitored and manage information system security programs; reported security incidents and formulated and recommend and applied corrective security procedures
  • Implemented and enforced information system security regulation and guidelines according to the Department of Defense and National Security Agency standards
  • Cross-Functional Communication & Team Leadership
  • Strategic Planning and Implementation &
  • Process Improvement
  • High Value Asset (HVA) Systems
  • Binding Operational Directive BOD 18-02

Certification

  • CompTIA Security+ Certified
  • AWS Certified Cloud Practitioner
  • CISM (Passer)
  • CISSP (processing)
  • Red Hat Certified System Administrator (RHCSA 8 - Processing)
  • Certified in Governance, Risk and Compliance (CGRC-Processing)

Personal Information

Title: Systems Security Engineer & Information System Security Officer (ISSO)

Certificates

CompTIA Security+ Certified

AWS Certified Cloud Practitioner

Timeline

Systems Security Engineer

E-Solutions
08.2022 - Current

Information System Security Officer

D-Vine Consulting
03.2019 - 07.2022

Information System Security Officer

Brothers Health Collective
04.2016 - 02.2019

Information System Security Officer

The Project Of The Quad Cities
07.2012 - 04.2016

M.Sc. - Public Health & Computer Science (Minor)

Kaplan University

B.A. - Modern Literature & Computer Science (minor)

University of Lome
MARTIN LOGO