From: route@monster.com
Sent: Wednesday,
October 26, 2016 3:05 PM
To: hg@apeironinc.com
Subject: Please
review this candidate for: CISSP
This resume has been forwarded to
you at the request of Monster User xapeix03
|
|||||||
|
|||||||
|
|
|
||||||
|
||||||
|
Richard Allan Tanoh 22562
LOWER KELLS LANE GREAT MILLS MD
20634-2436 (240)
298-2196 Tanoha@comcast.net Professional Skills
Summary: Over 15 years of diverse
experience working with the Department of Defense (DoD). Skills include, but
are not limited to system and network administration, hardware and software
installation and configuration, and Project Management. Possess extensive
training and hands on experience in the DoD Information Assurance
Certification and Accreditation (DIACAP) process and related
tools. Professional Experience: Cyber Security Technical
System Matter Expert
(SME)
July 2014- Present Cyber Security & Assured
Compliance Assessment Solution (ACAS) Support & Cyber Security
Portfolio Risk Management Lead ECS-Federal/ U.S
Government
PMW-205, Naval Enterprise Networks · The Cyber Security
Technical System Matter Expert (SME's) directly supports both the Product
Service Owner (PSO) and the Product Service Engineer (PSE) for the services
and products associated with the Cyber Security Portfolio. · Support analysis of
requirements and traceability to programmatic requirements, alignment with
current NGEN design and architecture, impacts to cost and performance, and
supporting the derivation of technical requirements in alignment with the
customer requirements. · Provide analyses and
recommendations related to solution approaches for engineering projects,
applicability of solution to the sites and systems for which the solution is
proposed, and a description of the solution and its attributes. · Work with PSOs and PSEs to
coordinate design tasks, support service/system technical oversight, schedule
development, and participate in the planning and execution of projected
reviews and milestones. · Support technical reviews
and verification that the service provider design, build, and test artifacts
can be traced back to original customer/government requirements and
constitute adequate proof that that the requirements are being met
satisfactorily. · Support independent
government assessment of the technical risks (including productions and
implementation risks) associated with projects/solutions under review. · Responsibilities also
include close coordination of activities with stakeholder, NETOPS,
NAVYCYBERFOR, Service Providers and internal PMW205 organizations.
Perform the duties of the
organization Information Assurance Security Officer to include supporting the
Information Assurance (IA) compliance of Operating Systems (OS) and
applications of unclassified and classified Army Knowledge Online/Defense
Knowledge Online (AKO/DKO) systems. Ensure that the Agency has an active
program to safeguard information security assets, including assigning
security responsibilities, developing security plans, screening users,
developing problem reporting systems, planning for disaster contingencies,
and reviewing appropriate authorizations for processing of data. Implement
and test vendor patches in support of Information Assurance Vulnerability
Alert (IAVA) requirements. Conduct Certification and Accreditation (C&A)
planning and testing of all new systems. Conduct vulnerability
assessment of all systems using Retina Scan and review and validate the
vulnerability scan results at the OS and application level, and remediate
vulnerabilities when applicable. Develop and maintain the Plan of Action and
Milestones (POA&M) for all systems. Support the design, deployment,
and maintenance of new and existing security infrastructure capabilities for
the organization. Assist in the development and maintenance of the
DIACAP packages, Certificate of Networthiness (CoN), and Privacy Impact
Assessments (PIA) for all applications. Analyze IA security events,
including threat model development and resulting security risk analysis of
systems.
Planned and scheduled the
installation of new or modified equipment in support of the Armed Forces
Medical Examiner Systems. Troubleshot and diagnosed servers, network
connectivity, and personal computer software and hardware issues. Ensured
system availability, functionality, integrity, and efficiency for all
installed software and hardware. Implemented security procedures in
accordance with established procedures and best practices. Provided end user
training on hardware and software functionality. Managed accounts, to include
limiting rights and accesses as appropriate. Ensured systems were operated
and maintained in accordance with all applicable Departments of the Army
(DA), Medical Command (MEDCOM), Armed Forces DNA Identification Laboratory
(AFDIL) and DoD security directives and procedures. Performed and managed all
data protection and backup efforts utilizing multiple tools and programs, to
include ARC Serve Backup.
Directly managed multiple U.S. Army security measures and capabilities
for advanced Picture Archiving and Communication System (PACS) technology,
associative imaging, and diverse teleradiology program initiatives.
Consistently maintained and safeguarded IA documentation for all area systems
and networks. Provided concise and regimented TARA stakeholders’ information
and analysis of emerging technologies reports as requested and required.
Conducted market surveillance and comprehensive market analysis, which
enabled unencumbered technology refresh and modernization for systems of
responsibility and future planning efforts. Other supportive duties included
intensive evaluation of security aspects pertinent to sustained and extended
deployment of equipment and systems of responsibility; tactical vendor interaction
and steerage for development of applicable IA documentation and control
measures; coordination of all associative testing activities, and direct line
submission efforts for DAA accreditation and certification.
Provided administration and
support for a United States Navy (USN) mission critical network system.
Responsible for the maintenance, development, and management of all aspects
of DoD DIACAP packaging for the system, including identification,
remediation, and configuration of vulnerabilities via Gold Disk and Retina,
as well as other Information Assurance specific ideals and working
tools. Additional duties included leadership and administration of
group and user authorization and authentication for multiple network
resources; development and management of all intra-office Certification and
Accreditation (C&A) activities; supervision of all IA and DIACAP relative
efforts within his office and Project Arena; and development and delivery of
Computer Security Incident Response (CSIR), which was critical to the
mission.
Performed, directed, and enacted
multiple site-wide security and control procedures to ensure provision of
maximized system and personnel security alignment in accordance with (IAW)
the Information System Security Officer (ISSO) duties. Analyzed security
posture of systems and provided suggestions for improvement. Interacted
frequently with multiple Government agencies and divisions to develop and
implement a Security Concept of Operations/ System Security Plan
(SECONOPS/SSP) and evaluated and aligned existing security practices with the
documents. Analyzed and proposed changes and amendments for mission
associative Information Systems (IS) and infrastructure and ensured
configuration management control and notation for all associated IS systems
and system components. Assumed the responsibility for multiple measures
of user, personnel, and site security control and clearance determinations.
Conducted periodic internal IS audits and reviews and made recommendations
for corrective action where warranted.
Provided optimized information
system maintenance and operational activities to include: management and
determination of multi-faceted Ethernet, Redundant, and Mega Ethernet
surfaces, networks, and connections; management and institution of redundant
and system state backups utilizing Net Vault and EMC SAN techniques and
software; and preparation and testing of disks and data for multiple
applications efforts to include Boot & Root of disk images and virtual
CD-ROM management utilizing pServer technology. Commanded archival activities
for Disaster Recovery (DR) utilizing Resource Configuration Collector
applications, and SCSI Disk File System Resource Configuration; implemented
universal user accounts and access control assignation efforts, performed
load balancing and balance control configurations, and multiple other
administrative roles as mission required.
Managed a specialized team responsible for
configuration, security enactment, and validation procedures for core and
distributed servers critical to vital mission efforts. Standard duties
included base and complex server and system configurations, Defense
Information Systems Agency (DISA) Security Technical Implementation Guide (STIG)
compliance, assurance and implementation for all associated servers and
systems; power management, utilization and error log mediation for all
associated machines and servers; and timely test and customer support.
Actively supported and
implemented ICAP and EA-6B programmatic efforts while assigned as an
Engineering Security Team Lead. Specific responsibilities included
managerial institution of Test and Evaluation (T & E) support for Joint
Mission Planning Systems (JMPS), and CONUS wide network security support for
JMPS and all associated missions; implementation and control of all software
updates for associated MIDS Universal Planning Component (UPC) systems;
distributive authorship of integral plans to support reduction of DSMU and
IMUX data effecting JMPS and PDATS systems; and multiple other duties as
required.
Served in a management position
supporting both an integral Windows and LINUX structured network and the team
of personnel responsible for the network’s maintenance and operation. Daily
responsibilities encompassed architectural planning and initiation;
configuration, automation, and deployment activities for associated
large-scale, globally distributed systems; direct management of Top Tier USN
critical servers and hardware in all facets of operations and security
assurance; management, planning, and assignation and / or implementation of
all associated hardware and software upgrades and installations; and
management and joint implementation of supportive Sybase and Oracle
administrative and database development issues. Additional duties involved
direct operational management of 100+ OOMA Top Tier and Mid-Tier servers and
hardware; establishment and implementation of performance metrics procedures
to support said servers for trend analysis and troubleshooting efforts;
operational control and management of operational backups for multi-tier
servers utilizing VERITAS and Tivoli Backup tools and software; management of
all relative system logs, user files, security software, and system
documentation. Specific major accomplishments achieved included service as
key team lead and planner for the installation of mission-critical intranet
connectivity between Pentagon and CHIP resources; planned, constructed, and
implemented a Live Link and NT 4.0 base server configuration utilizing Cisco
supportive infrastructure for load balancing and Oracle 8.15 for database and
cooperative support; and the rapid achievement of managerial level
familiarity with multiple IT-crucial skills and policies to include: TCP/IP,
calculative IP subnetting for multi-subnet networks and infrastructures, Wins
Server and Wins Proxy Agent operations, DHCP, DHCP Relay Agent, Preferred
Master Browser role enabling from multiple Registry techniques, and multiple
other techniques and services. Education: · Master of Science,
Communication Technology, Strayer University, Alexandria, Virginia, 2006 · Bachelor of Science,
Computer Networking, Strayer University, Alexandria, Virginia; 2004 · AA, Computer Systems,
Networks & Hardware Technology Computer Learning Center, Alexandria, VA
1997 · Electronic Technology
Diploma Computer Learning Center, Alexandria, VA 1995 · Bachelor of Science, Math
& Physics, University of Ivory Coast, Cote d'Ivoire, West Africa, 1992 Training: · GIAC Security Leadership
(GSLC), Baltimore, MD 2013 · Fundamental of System
Acquisition Management, Defense Acquisition University 2011 · Certified Information
System Security Professional (CISSP), Reston VA 2010 · DoD DIACAP Virtual Training
· Army G3 Computer Security
Training · Risk Management CL017
Section 888, Defense Acquisition University 2014 Professional
Certifications: · Security + CE
Certifications · A+ CE Certifications · Security Technical
Implementation Guide (STIG) · Information Assurance
Security Officer Certificate (IASO) · PKI Certificates · Certificate of
Information System Security Professional (CISSP) · Working on GIAC Security
Leadership Certification (GSLC) · Other previously held
certifications: Microsoft
Certified Systems Engineer (MCSE) Microsoft
Certified Professional & Internet MCP+I Microsoft
Windows 2000and 2008 security Microsoft
Windows 2000 and 2003 Operation System Optimization and Troubleshooting Tivoli
Storage Manager 4.2 and Tivoli Storage Manager Advanced 4.2 Linux
Administration and Support Hands-On Security Clearance:
Secret (Active) |
|||||||||||||||||||||||||||||||||||||||||
|
|
||||||||
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
Languages: |
Languages |
Proficiency Level |
|
English |
Fluent |
|
|
French |
Fluent |
|
|
|