Information Technology Security Auditor
Professional Profile Summary
As an Information Technology Security Auditor specializing in auditing Security Assessment and Authorization (A&A) of information and information systems, with working knowledge and experience in the implementation of the Risk Management Framework (RMF) and Office of Management and Budget (OMB) Circular A- 130 for traditional information systems, Department of Defense RMF (DOD RMF) systems, and FEDRAMP cloud-based systems. Thorough knowledge and working experience with FISMA and NIST compliance requirements and standards, including but not limited to NIST SP 800-37 R1/2, 800-60 vol 2, R1, 800-53 R4/5, 800-53A R4/5, FIPS 199 and 200. Profound knowledge in the initiation and development of Security Artifacts including System Security Plans (SSPs), Security Assessment Plans (SAPs), Security Assessment Reports (SARs), Plans of Action, and Milestones (POA&Ms) PTAs, PIAs, SORNs, ROBs, E- Authentications, CPs, and others. A good team player with a strong sense of responsibility and customer service sensitivity. Possess practical knowledge and experience in reviewing and updating system documentation including but not limited to SSPs, SARs, POA&Ms, PTAs, PIAs, SORNs, IRPs, SAPs, and CPs toward Authorization to Operate (ATO) and reassessment of traditional systems and JAB/PATO for cloud-based systems. Have in-depth knowledge and experience in Identity and Access Management (IAM) to protect and safeguard information and information systems through Role-based access and multi-factor identification, authentication, and authorization among other tools. Other areas of expertise include knowledge and experience in Security Assessments and Authorization (A&A) processes through RMF/FEDRAMP steps to obtain ATO. Experience in processing information and information systems through SDLCs to RMF/FEDRAMP, in compliance with FISMA and NIST regulations and standards.