From:                              route@monster.com

Sent:                               Tuesday, November 15, 2016 2:53 PM

To:                                   hg@apeironinc.com

Subject:                          Please review this candidate for: System Engineer

 

This resume has been forwarded to you at the request of Monster User xapeix03

Tiffani Haynes 

Last updated:  08/19/16

Job Title:  no specified

Company:  Apeiron, Inc.

Rating:  Not Rated

Screening score:  no specified

Status:  Resume Received


Washington, DC  20001
US

Mobile: 240-786-2849   
tiffani_haynes@hotmail.com
Contact Preference:  Email

Quick View Links:

Resume Section

Summary Section

 

 

RESUME

  

Resume Headline: Tiffani_Haynes_Resume_Jun2016.docx

Resume Value: ni8fb3wuw3p4njui   

  

 

Tiffani Haynes

9704 Traverse Way

Fort Washington, MD 20744 

tiffani_haynes@hotmail.com

240-786-2849

Objective

Pursuant of a position as an IT Security Analyst that will allow the opportunity for professional growth while utilizing my solid knowledge and skills of DoD Cybersecurity Policies and obtaining my CISSP certification.

 

Summary of Qualifications:

·        Seventeen years of experience supporting the Federal Government in the IT industry with demonstrated expertise in IT Security, Systems Administration, technical writing, and hardware/software integration.

·        Performs internal security assessments using manual and automated tools Nessus, SCAP Compliance Checker and STIGViewer; experienced with documenting remediation recommendations from internal audits ensuring Information Systems meet the requirements of Federal Government policies, standards and guidelines from FISMA, RMF, CNSSI, NIST, and FedRAMP; create and update POA&Ms from Vulnerability scans, NIST SP800-53 rev4 and CNSSI No. 1253 security controls

·        Experience in leading focus groups, projects, and tasks to meet milestones, deadlines, and customer expectations

·        Demonstrates the ability to effectively communicate orally and in writing with all organizational levels, including internal and external customers and management.

 

 

Certifications:

Certified Ethical Hacker, C|EH

CompTIA Security+ CE

ITIL v3 Foundation Certification

Microsoft Certified Systems Administrator (MCSA 2003)

Microsoft Certified Technology Specialist (MCTS: Windows Vista)

Microsoft Certified Professional (MCP 2003)

 

 

Clearance:

TS/SCI Clearance

 

Professional Summary:

Cybersecurity Analyst (Security Assessment Team\Blue Team), SMS, 5/15 – Present

 

·        Travel to U.S. Coast Guard facilities worldwide to conduct Pre-Command Cyber Readiness Inspection (CCRI) on Classified and Unclassified Networks ensuring Information Assurance and CND Directives compliance by utilizing DISA’s STIGs: Multifunction Device, Windows Operating Systems, Network Infrastructure L2 Cisco Switch, and L3 Router, review documentation (POA&Ms and System Security Plan (SSP)), interview USCG personal on-site and conduct physical security observations in accordance with NIST 800-53rev4 controls.

·        Input Pre-CCRI vulnerability data results into CCRI Scoring Worksheet for the final Security Risk Assessment (SAR) Report presented to upper management and USCG facilities.

·        Run queries and reports within ePolicy Orchestrator 5.1 to ensure HBSS compliance for Operation Order (OPORD) 12-1016 for the entire U.S. Coast Guard

·        Utilize ACAS Nessus Security Center 4.8.1 to perform SCAP compliance scans to import into STIG Viewer for manual security audits, run Network discovery scans and export vulnerability reports.

·        Perform website verification request utilizing open source websites (i.e. VirusTotal, TrustedSource, and Urlquery) and USCG Blacklists.

·        Perform Firewall and DNS request for entire USCG referencing USCG DMZ Security Zone Policy Overview and DISA’s Ports and Services Category Assurance List (CAL)

 

IT Security Analyst, n-Link, 5/13 – 5/15

 

·        Managed and configured Retina Network Vulnerability Scanner, performing weekly Discovery and Vulnerability scans while making recommended mitigation measures to other staff members. Refer to US.CyberCom for all IAVMs notices and tech advisories

·        Provided upper management with high-level audit reports using PivotTables for summarizing Category I, II, and III vulnerability findings.

·        Performed Security Content Automation Protocol (SCAP) scans with latest Open Vulnerability and Assessment Language (OVAL) files; comparing results to United States Government Configuration Baseline (USGCB) and DISA Security Technical Information Guides (STIGs).  Uses scan results to ensure compliance with Committee on National Security Systems Instruction No. 1253 (CNSSI No.1253) and National Institution of Standard Technology Special Publication (NIST SP800-53 rev4) guidelines. 

·        Prepared Assessment & Authorization (A&A) package to include Security Assessment Plan (SAP) and Security Assessment Report (SAR); perform and document remediation recommendations from internal audit ensuring Cloud Service Provider’s (CSP) Information Systems meet the requirements for the Federal Risk and Authorization Management Program (FedRAMP), create and update POA&Ms from Vulnerability scans and NIST SP800-53 rev4 security controls for classified devices

·        Member of the Common Service Provider (CSP) Configuration Control Board (CCB) and Governance Board (GB).  Attended weekly CPS CCB/GB meetings to discuss on-going topics and future implementation plans within the organization.

·        Assisted Government Staff with the development of the Department of Commerce’s requirements and policies for issuing and managing PKI certificates; PKI portal template requirements, document and submit Addendum to NSS PKI CSP Registration Practice Statement v.1.1 for any modifications to CNSSI 1300

·        Authorized Web Registration Authority Officer (WebRAO) for generating ICPKI certificates for Department of Commerce users. Help users import ICPKI Certificates after registration within Scattered Castles and Intelink websites.

·        Responsible for managing and implementing McAfee Email Gateway for classified networks.

·        Responsible for managing and implementing classified WSUS Server.  Provide management with weekly status reports for missing patches that are required on all client workstation, Thin Clients, and servers.   Configure local and domain policies ensuring workstations and ThinClients are rebooted in a timely manner to avoid the risk of any open threats or vulnerabilities on the network.

·        Utilized Tivoli Endpoint Manager (BigFix) for deploying third party software applications and updates.  Create and use built-in Fixlets to configure registry settings and other manual settings that are required by DISA STIG on multiple workstations and servers. Use airgap tool to update classified servers.

 

 

 

 

 

 

 

Senior IT Security Administrator, Sotera, 4/08 – 5/13

 

·        Managed and updated Retina Network Scanner with latest Engine and SCCVI Audit files weekly. Utilize DISA Gold Disk to achieve certification and accreditation for all systems to connect to DoD Networks 

·        Worked closely with IA to conduct routine hardware and software audits for over 100 workstations and 200 + servers to ensure compliance with Army Regulation 25-2 and DISA Security Technical Implementation Guides (STIGs), Submit POA&M and ETP/AORL for all known vulnerabilities from ACA and IG Audits

·        Assisted Information Assurance team with Hercules Remediation Manager 4.5 in mitigating findings for DOD systems on classified and non-classified networks.  Ran baseline scripts to meet INFOCON threat levels.

·        Viewed real time event logs via ArcSight console for troubleshooting network, hardware and software issues

·        Managed WSUS and Symantec servers to ensure the integrality and security on server technologies across all four classifications. Refer to Cyber Command website to view all IAVM notices

·        Conducted research and testing for Information Assurance Vulnerability Management mandates on classified and non-classified systems.

·        Responsible for the installation, maintenance, configuration, and integrity of computer hardware and software.  Support application Administrators and Developers in performance tuning, testing and upgrades 

·        Implemented and configured Distributed File System (DFS) and File Replication Service (FRS) to simplify access to files and folders across the network.

·        Troubleshoot Group Policy settings with the use of importing .inf files within the Security Configuration and Analysis snap-in tool

·        Provided management with weekly reports, status updates on all projects in a timely manner

 

Education and Training

PKI Registration Authority Operator (RAO) Training, Herndon, VA

PKI RAO Completion Certificate – March 2014

 

 

SecureNinja, Alexandria, VA

CISSP Boot Camp – March 2012

 

Global Knowledge Training Center, Arlington, VA

MS Exchange 2010 – January 2010

 

MITRE-2, McLean, VA

VMware Virtual Infrastructure 3.5 Install and Configure – January 2008

 

Global Knowledge Training Center, Arlington, VA

2003 MCSA Boot Camp – December 2007

 

Capitol College, Laurel, MD

B.S. Computer Engineering Technology – May 2002

 

Technical Skills:

 

Hardware:McAfee Email Gateway Appliance, HP, Compaq and Dell Servers, Dell, IBM and HP Laptops, Compaq and Dell notebooks, Konica Minolta, HP LaserJet and Xerox  printers, scanners and NIC cards

Software:Nessus Security Center 4.8.1, Microsoft Windows Vista/7, Microsoft Office 2000/2003/2007/2010, Microsoft Exchange 2003/2010, Content Manager, Microsoft Windows 2003/2008 Server, Active Directory, Secure Copy 2.0, RSA Secure ID, Microsoft Project, Microsoft Visio, Symantec Antivirus Corporate Edition, Symantec Backup Exec 10, McAfee ePolicy Orchestrator, McAfee Email Gateway, McAfee Network Security Manager, SpiceWorks, SoalrWinds KiWi Syslog, Hercules Remediation Manager 4.5, Surf Control, Heat and Remedy Tracking Software, DISA Gold Disk, WASSP Scan, Beyond Trust Retina Network Scanner, SCAP Compliance Checker (SCC) tool, STIG Viewer, ArcSight, WSUS, System Center Operations Manager (SCOM2007), Systems Management Server 2.0, Symantec GHOST 7.5, VMware, Citrix Client, Vulnerability Management System (VMS), Endpoint Manager (BigFix), PKI/PKE

 

REFERENCES AVAILABLE UPON REQUEST

1

 



Experience

BACK TO TOP

 

Job Title

Company

Experience

IT Security Analyst

n-Link

- Present

 

Additional Info

BACK TO TOP

 

Current Career Level:

Experienced (Non-Manager)

Years of relevant work experience:

10+ to 15 Years

Date of Availability:

Within 2 weeks

Work Status:

US - I am authorized to work in this country for any employer.

Active Security Clearance:

Active Top Secret/SCI

US Military Service:

Citizenship:

US citizen

 

 

Target Job:

Target Job Title:

IT Security Analyst

 

Target Company:

Company Size:

Occupation:

IT/Software Development

·         Computer/Network Security

 

Target Locations:

Selected Locations:

US-DC-Washington/Metro

Relocate:

No

Willingness to travel:

No Travel Required