Christopher Okpala

Information Systems Security Officer (ISSO) at Superlative Technologies
  • Claim this Profile
Contact Information
us****@****om
(386) 825-5501
Location
Washington, District of Columbia, United States, US

Topline Score

Topline score feature will be out soon.

Bio

Generated by
Topline AI

You need to have a working account to view this content.
You need to have a working account to view this content.

Credentials

  • OpenText Course Completion - Incident Investigation 2022
    OpenText
    Oct, 2022
    - Nov, 2024
  • OpenText Course Completion - Building an Investigation with EnCase 2022
    OpenText
    Jul, 2022
    - Nov, 2024
  • OpenText Course Completion - Foundations in Digital Forensics with EnCase 2022
    OpenText
    Jul, 2022
    - Nov, 2024
  • CompTIA Security+ ce Certification
    CompTIA
    Oct, 2020
    - Nov, 2024

Experience

    • United States
    • IT Services and IT Consulting
    • 100 - 200 Employee
    • Information Systems Security Officer (ISSO)
      • May 2022 - Present

      Manage response to IAVAs Oversee efforts in change management process Analyze and report on compliance of DoD orders Ensure networks and systems being developed implement DoD baseline IA Controls Enforce agreed upon controls and mitigation strategies Identify and create solutions to improve system performance and availability Facilitate root cause analysis of system issues to minimize impact and future occurrences Act as a technical resource throughout development and… Show more Manage response to IAVAs Oversee efforts in change management process Analyze and report on compliance of DoD orders Ensure networks and systems being developed implement DoD baseline IA Controls Enforce agreed upon controls and mitigation strategies Identify and create solutions to improve system performance and availability Facilitate root cause analysis of system issues to minimize impact and future occurrences Act as a technical resource throughout development and maintenance lifecycle Keep management appropriately informed of progress and issues Manage risks for the organization Proactively identify areas for improvement in process and regularly assess documentation and reports for accuracy and improvement Analyze the security posture of DoD systems and applications Show less Manage response to IAVAs Oversee efforts in change management process Analyze and report on compliance of DoD orders Ensure networks and systems being developed implement DoD baseline IA Controls Enforce agreed upon controls and mitigation strategies Identify and create solutions to improve system performance and availability Facilitate root cause analysis of system issues to minimize impact and future occurrences Act as a technical resource throughout development and… Show more Manage response to IAVAs Oversee efforts in change management process Analyze and report on compliance of DoD orders Ensure networks and systems being developed implement DoD baseline IA Controls Enforce agreed upon controls and mitigation strategies Identify and create solutions to improve system performance and availability Facilitate root cause analysis of system issues to minimize impact and future occurrences Act as a technical resource throughout development and maintenance lifecycle Keep management appropriately informed of progress and issues Manage risks for the organization Proactively identify areas for improvement in process and regularly assess documentation and reports for accuracy and improvement Analyze the security posture of DoD systems and applications Show less

    • United States
    • IT Services and IT Consulting
    • 1 - 100 Employee
    • Cybersecurity (RMF) Analyst
      • May 2021 - May 2022

      Implement the Risk Management Framework (RMF) process. Define, analyze cyber security requirements and recommend information assurance/security solutions to support customers’ requirements for boundary defense systems. Design, develop, engineer, and integrate solutions per cyber security requirements. Apply knowledge of IT Governance requirements, risk mitigation strategies, and encryption and decryption capabilities to establish secure solutions. Conduct Cyber Security Planning and… Show more Implement the Risk Management Framework (RMF) process. Define, analyze cyber security requirements and recommend information assurance/security solutions to support customers’ requirements for boundary defense systems. Design, develop, engineer, and integrate solutions per cyber security requirements. Apply knowledge of IT Governance requirements, risk mitigation strategies, and encryption and decryption capabilities to establish secure solutions. Conduct Cyber Security Planning and Scheduling. Conduct security audits and vulnerability scans to recognize system vulnerabilities.. Perform and review technical security assessments of computing environments to identify points of vulnerability, non-compliance with established cybersecurity standards and regulations, and recommend mitigation strategies to maintain operational security posture for the boundary systems. Utilize eMASS and keep documentation/artifacts up to date for each boundary system. Develop/update POA&Ms and perform vulnerability tracking to ensure all ATO conditions are met (e.g., Security control identification/mapping). Ensure all CCRI findings are met (fixed or POA&M’d). Review STIGs, upload STIG checklist/.csv files for each system asset into eMASS. Work with Engineering team to develop and keep current all system-level documentation. Send risk acceptance requests to ISSM to be pushed to Authorizing Official (AO). Work with the SCA-R to ensure validation of all unofficial eMASS controls. Within 30 days of authorization and every 30 days thereafter, assess, provide compelling evidence for, and submit 30 non-compliant controls for validation. Show less Implement the Risk Management Framework (RMF) process. Define, analyze cyber security requirements and recommend information assurance/security solutions to support customers’ requirements for boundary defense systems. Design, develop, engineer, and integrate solutions per cyber security requirements. Apply knowledge of IT Governance requirements, risk mitigation strategies, and encryption and decryption capabilities to establish secure solutions. Conduct Cyber Security Planning and… Show more Implement the Risk Management Framework (RMF) process. Define, analyze cyber security requirements and recommend information assurance/security solutions to support customers’ requirements for boundary defense systems. Design, develop, engineer, and integrate solutions per cyber security requirements. Apply knowledge of IT Governance requirements, risk mitigation strategies, and encryption and decryption capabilities to establish secure solutions. Conduct Cyber Security Planning and Scheduling. Conduct security audits and vulnerability scans to recognize system vulnerabilities.. Perform and review technical security assessments of computing environments to identify points of vulnerability, non-compliance with established cybersecurity standards and regulations, and recommend mitigation strategies to maintain operational security posture for the boundary systems. Utilize eMASS and keep documentation/artifacts up to date for each boundary system. Develop/update POA&Ms and perform vulnerability tracking to ensure all ATO conditions are met (e.g., Security control identification/mapping). Ensure all CCRI findings are met (fixed or POA&M’d). Review STIGs, upload STIG checklist/.csv files for each system asset into eMASS. Work with Engineering team to develop and keep current all system-level documentation. Send risk acceptance requests to ISSM to be pushed to Authorizing Official (AO). Work with the SCA-R to ensure validation of all unofficial eMASS controls. Within 30 days of authorization and every 30 days thereafter, assess, provide compelling evidence for, and submit 30 non-compliant controls for validation. Show less

    • United States
    • IT Services and IT Consulting
    • 1 - 100 Employee
    • Project Manager
      • Aug 2020 - May 2021

      FSA/Emprovera – Washington, DC • Review Data and information from multiple sources including foreign and domestic intelligence • for editing and translations. • Enter and retrieve data from data bases • Prepare and format management reports • Prepare and correct reports and correspondence using all Microsoft software • Conduct validation and verification of case files and case data system • Be responsible for the day to day supervision of contractor… Show more FSA/Emprovera – Washington, DC • Review Data and information from multiple sources including foreign and domestic intelligence • for editing and translations. • Enter and retrieve data from data bases • Prepare and format management reports • Prepare and correct reports and correspondence using all Microsoft software • Conduct validation and verification of case files and case data system • Be responsible for the day to day supervision of contractor assignments • Provide on-site supervision for Contractor workforce • Schedule Contractor employees Show less FSA/Emprovera – Washington, DC • Review Data and information from multiple sources including foreign and domestic intelligence • for editing and translations. • Enter and retrieve data from data bases • Prepare and format management reports • Prepare and correct reports and correspondence using all Microsoft software • Conduct validation and verification of case files and case data system • Be responsible for the day to day supervision of contractor… Show more FSA/Emprovera – Washington, DC • Review Data and information from multiple sources including foreign and domestic intelligence • for editing and translations. • Enter and retrieve data from data bases • Prepare and format management reports • Prepare and correct reports and correspondence using all Microsoft software • Conduct validation and verification of case files and case data system • Be responsible for the day to day supervision of contractor assignments • Provide on-site supervision for Contractor workforce • Schedule Contractor employees Show less

    • United States
    • Defense and Space Manufacturing
    • 200 - 300 Employee
    • Intelligence Analyst
      • Aug 2019 - Mar 2020

      • Intelligence analyst for the Terrorist Screening Center (FBI) • Identity intelligence research and analysis using Department of Defense, federal, local, and international law enforcement datasets. • Nominating known or suspected terrorists to the national watchlist and screening community. • Balancing analytic diligence and speed to ensure the production of timely and comprehensive identity intelligence products. • Working in small teams to meet and exceed production targets… Show more • Intelligence analyst for the Terrorist Screening Center (FBI) • Identity intelligence research and analysis using Department of Defense, federal, local, and international law enforcement datasets. • Nominating known or suspected terrorists to the national watchlist and screening community. • Balancing analytic diligence and speed to ensure the production of timely and comprehensive identity intelligence products. • Working in small teams to meet and exceed production targets while identifying and sharing process improvements. • Synthesizing disparate, ambiguous and sometimes contradictory data from various sources. • Understanding regional naming conventions, conversion issues, and other nuances of identity intelligence. • Maintaining knowledge of terrorist networks in an assigned area of responsibility. Show less • Intelligence analyst for the Terrorist Screening Center (FBI) • Identity intelligence research and analysis using Department of Defense, federal, local, and international law enforcement datasets. • Nominating known or suspected terrorists to the national watchlist and screening community. • Balancing analytic diligence and speed to ensure the production of timely and comprehensive identity intelligence products. • Working in small teams to meet and exceed production targets… Show more • Intelligence analyst for the Terrorist Screening Center (FBI) • Identity intelligence research and analysis using Department of Defense, federal, local, and international law enforcement datasets. • Nominating known or suspected terrorists to the national watchlist and screening community. • Balancing analytic diligence and speed to ensure the production of timely and comprehensive identity intelligence products. • Working in small teams to meet and exceed production targets while identifying and sharing process improvements. • Synthesizing disparate, ambiguous and sometimes contradictory data from various sources. • Understanding regional naming conventions, conversion issues, and other nuances of identity intelligence. • Maintaining knowledge of terrorist networks in an assigned area of responsibility. Show less

    • United States
    • IT Services and IT Consulting
    • 700 & Above Employee
    • Data Analyst
      • Jan 2019 - Apr 2019

       Provided administrative information and assistance concerning cases or files for organizations  Assisted analysts and government officials in obtaining/collecting documents to complete case files  Reconcile inconsistences  Perform data entry and meta data entry for electronic files  Provided administrative information and assistance concerning cases or files for organizations  Assisted analysts and government officials in obtaining/collecting documents to complete case files  Reconcile inconsistences  Perform data entry and meta data entry for electronic files

    • United States
    • IT Services and IT Consulting
    • 700 & Above Employee
    • Background Investigator
      • Apr 2018 - Dec 2018

       Performed complex, full-field character investigations which provided comprehensive coverage of basic suitability, eligibility, loyalty and overall security-related concerns for approximately fifty government agencies  Independently conducted suitability and limited suitability investigations in cases involving prominent individuals or where serious derogatory information has been or is likely to be developed  Wrote reports for federal agencies that determined clearance… Show more  Performed complex, full-field character investigations which provided comprehensive coverage of basic suitability, eligibility, loyalty and overall security-related concerns for approximately fifty government agencies  Independently conducted suitability and limited suitability investigations in cases involving prominent individuals or where serious derogatory information has been or is likely to be developed  Wrote reports for federal agencies that determined clearance eligibility Show less  Performed complex, full-field character investigations which provided comprehensive coverage of basic suitability, eligibility, loyalty and overall security-related concerns for approximately fifty government agencies  Independently conducted suitability and limited suitability investigations in cases involving prominent individuals or where serious derogatory information has been or is likely to be developed  Wrote reports for federal agencies that determined clearance… Show more  Performed complex, full-field character investigations which provided comprehensive coverage of basic suitability, eligibility, loyalty and overall security-related concerns for approximately fifty government agencies  Independently conducted suitability and limited suitability investigations in cases involving prominent individuals or where serious derogatory information has been or is likely to be developed  Wrote reports for federal agencies that determined clearance eligibility Show less

Education

  • University of Baltimore
    Master's degree, Computer Investigation
    2018 - 2019
  • Bowie State University
    Bachelor's degree, Criminal Justice and Corrections
    2015 - 2017

Community

You need to have a working account to view this content. Click here to join now