Christopher Okpala
Information Systems Security Officer (ISSO) at Superlative Technologies- Claim this Profile
Click to upgrade to our gold package
for the full feature experience.
Topline Score
Bio
Credentials
-
OpenText Course Completion - Incident Investigation 2022
OpenTextOct, 2022- Nov, 2024 -
OpenText Course Completion - Building an Investigation with EnCase 2022
OpenTextJul, 2022- Nov, 2024 -
OpenText Course Completion - Foundations in Digital Forensics with EnCase 2022
OpenTextJul, 2022- Nov, 2024 -
CompTIA Security+ ce Certification
CompTIAOct, 2020- Nov, 2024
Experience
-
Superlative Technologies
-
United States
-
IT Services and IT Consulting
-
100 - 200 Employee
-
Information Systems Security Officer (ISSO)
-
May 2022 - Present
Manage response to IAVAs Oversee efforts in change management process Analyze and report on compliance of DoD orders Ensure networks and systems being developed implement DoD baseline IA Controls Enforce agreed upon controls and mitigation strategies Identify and create solutions to improve system performance and availability Facilitate root cause analysis of system issues to minimize impact and future occurrences Act as a technical resource throughout development and… Show more Manage response to IAVAs Oversee efforts in change management process Analyze and report on compliance of DoD orders Ensure networks and systems being developed implement DoD baseline IA Controls Enforce agreed upon controls and mitigation strategies Identify and create solutions to improve system performance and availability Facilitate root cause analysis of system issues to minimize impact and future occurrences Act as a technical resource throughout development and maintenance lifecycle Keep management appropriately informed of progress and issues Manage risks for the organization Proactively identify areas for improvement in process and regularly assess documentation and reports for accuracy and improvement Analyze the security posture of DoD systems and applications Show less Manage response to IAVAs Oversee efforts in change management process Analyze and report on compliance of DoD orders Ensure networks and systems being developed implement DoD baseline IA Controls Enforce agreed upon controls and mitigation strategies Identify and create solutions to improve system performance and availability Facilitate root cause analysis of system issues to minimize impact and future occurrences Act as a technical resource throughout development and… Show more Manage response to IAVAs Oversee efforts in change management process Analyze and report on compliance of DoD orders Ensure networks and systems being developed implement DoD baseline IA Controls Enforce agreed upon controls and mitigation strategies Identify and create solutions to improve system performance and availability Facilitate root cause analysis of system issues to minimize impact and future occurrences Act as a technical resource throughout development and maintenance lifecycle Keep management appropriately informed of progress and issues Manage risks for the organization Proactively identify areas for improvement in process and regularly assess documentation and reports for accuracy and improvement Analyze the security posture of DoD systems and applications Show less
-
-
-
IPKeys Technologies
-
United States
-
IT Services and IT Consulting
-
1 - 100 Employee
-
Cybersecurity (RMF) Analyst
-
May 2021 - May 2022
Implement the Risk Management Framework (RMF) process. Define, analyze cyber security requirements and recommend information assurance/security solutions to support customers’ requirements for boundary defense systems. Design, develop, engineer, and integrate solutions per cyber security requirements. Apply knowledge of IT Governance requirements, risk mitigation strategies, and encryption and decryption capabilities to establish secure solutions. Conduct Cyber Security Planning and… Show more Implement the Risk Management Framework (RMF) process. Define, analyze cyber security requirements and recommend information assurance/security solutions to support customers’ requirements for boundary defense systems. Design, develop, engineer, and integrate solutions per cyber security requirements. Apply knowledge of IT Governance requirements, risk mitigation strategies, and encryption and decryption capabilities to establish secure solutions. Conduct Cyber Security Planning and Scheduling. Conduct security audits and vulnerability scans to recognize system vulnerabilities.. Perform and review technical security assessments of computing environments to identify points of vulnerability, non-compliance with established cybersecurity standards and regulations, and recommend mitigation strategies to maintain operational security posture for the boundary systems. Utilize eMASS and keep documentation/artifacts up to date for each boundary system. Develop/update POA&Ms and perform vulnerability tracking to ensure all ATO conditions are met (e.g., Security control identification/mapping). Ensure all CCRI findings are met (fixed or POA&M’d). Review STIGs, upload STIG checklist/.csv files for each system asset into eMASS. Work with Engineering team to develop and keep current all system-level documentation. Send risk acceptance requests to ISSM to be pushed to Authorizing Official (AO). Work with the SCA-R to ensure validation of all unofficial eMASS controls. Within 30 days of authorization and every 30 days thereafter, assess, provide compelling evidence for, and submit 30 non-compliant controls for validation. Show less Implement the Risk Management Framework (RMF) process. Define, analyze cyber security requirements and recommend information assurance/security solutions to support customers’ requirements for boundary defense systems. Design, develop, engineer, and integrate solutions per cyber security requirements. Apply knowledge of IT Governance requirements, risk mitigation strategies, and encryption and decryption capabilities to establish secure solutions. Conduct Cyber Security Planning and… Show more Implement the Risk Management Framework (RMF) process. Define, analyze cyber security requirements and recommend information assurance/security solutions to support customers’ requirements for boundary defense systems. Design, develop, engineer, and integrate solutions per cyber security requirements. Apply knowledge of IT Governance requirements, risk mitigation strategies, and encryption and decryption capabilities to establish secure solutions. Conduct Cyber Security Planning and Scheduling. Conduct security audits and vulnerability scans to recognize system vulnerabilities.. Perform and review technical security assessments of computing environments to identify points of vulnerability, non-compliance with established cybersecurity standards and regulations, and recommend mitigation strategies to maintain operational security posture for the boundary systems. Utilize eMASS and keep documentation/artifacts up to date for each boundary system. Develop/update POA&Ms and perform vulnerability tracking to ensure all ATO conditions are met (e.g., Security control identification/mapping). Ensure all CCRI findings are met (fixed or POA&M’d). Review STIGs, upload STIG checklist/.csv files for each system asset into eMASS. Work with Engineering team to develop and keep current all system-level documentation. Send risk acceptance requests to ISSM to be pushed to Authorizing Official (AO). Work with the SCA-R to ensure validation of all unofficial eMASS controls. Within 30 days of authorization and every 30 days thereafter, assess, provide compelling evidence for, and submit 30 non-compliant controls for validation. Show less
-
-
-
EnProVera Corporation
-
United States
-
IT Services and IT Consulting
-
1 - 100 Employee
-
Project Manager
-
Aug 2020 - May 2021
FSA/Emprovera – Washington, DC • Review Data and information from multiple sources including foreign and domestic intelligence • for editing and translations. • Enter and retrieve data from data bases • Prepare and format management reports • Prepare and correct reports and correspondence using all Microsoft software • Conduct validation and verification of case files and case data system • Be responsible for the day to day supervision of contractor… Show more FSA/Emprovera – Washington, DC • Review Data and information from multiple sources including foreign and domestic intelligence • for editing and translations. • Enter and retrieve data from data bases • Prepare and format management reports • Prepare and correct reports and correspondence using all Microsoft software • Conduct validation and verification of case files and case data system • Be responsible for the day to day supervision of contractor assignments • Provide on-site supervision for Contractor workforce • Schedule Contractor employees Show less FSA/Emprovera – Washington, DC • Review Data and information from multiple sources including foreign and domestic intelligence • for editing and translations. • Enter and retrieve data from data bases • Prepare and format management reports • Prepare and correct reports and correspondence using all Microsoft software • Conduct validation and verification of case files and case data system • Be responsible for the day to day supervision of contractor… Show more FSA/Emprovera – Washington, DC • Review Data and information from multiple sources including foreign and domestic intelligence • for editing and translations. • Enter and retrieve data from data bases • Prepare and format management reports • Prepare and correct reports and correspondence using all Microsoft software • Conduct validation and verification of case files and case data system • Be responsible for the day to day supervision of contractor assignments • Provide on-site supervision for Contractor workforce • Schedule Contractor employees Show less
-
-
-
KeyW Corporation
-
United States
-
Defense and Space Manufacturing
-
200 - 300 Employee
-
Intelligence Analyst
-
Aug 2019 - Mar 2020
• Intelligence analyst for the Terrorist Screening Center (FBI) • Identity intelligence research and analysis using Department of Defense, federal, local, and international law enforcement datasets. • Nominating known or suspected terrorists to the national watchlist and screening community. • Balancing analytic diligence and speed to ensure the production of timely and comprehensive identity intelligence products. • Working in small teams to meet and exceed production targets… Show more • Intelligence analyst for the Terrorist Screening Center (FBI) • Identity intelligence research and analysis using Department of Defense, federal, local, and international law enforcement datasets. • Nominating known or suspected terrorists to the national watchlist and screening community. • Balancing analytic diligence and speed to ensure the production of timely and comprehensive identity intelligence products. • Working in small teams to meet and exceed production targets while identifying and sharing process improvements. • Synthesizing disparate, ambiguous and sometimes contradictory data from various sources. • Understanding regional naming conventions, conversion issues, and other nuances of identity intelligence. • Maintaining knowledge of terrorist networks in an assigned area of responsibility. Show less • Intelligence analyst for the Terrorist Screening Center (FBI) • Identity intelligence research and analysis using Department of Defense, federal, local, and international law enforcement datasets. • Nominating known or suspected terrorists to the national watchlist and screening community. • Balancing analytic diligence and speed to ensure the production of timely and comprehensive identity intelligence products. • Working in small teams to meet and exceed production targets… Show more • Intelligence analyst for the Terrorist Screening Center (FBI) • Identity intelligence research and analysis using Department of Defense, federal, local, and international law enforcement datasets. • Nominating known or suspected terrorists to the national watchlist and screening community. • Balancing analytic diligence and speed to ensure the production of timely and comprehensive identity intelligence products. • Working in small teams to meet and exceed production targets while identifying and sharing process improvements. • Synthesizing disparate, ambiguous and sometimes contradictory data from various sources. • Understanding regional naming conventions, conversion issues, and other nuances of identity intelligence. • Maintaining knowledge of terrorist networks in an assigned area of responsibility. Show less
-
-
-
Chenega Corporation
-
United States
-
IT Services and IT Consulting
-
700 & Above Employee
-
Data Analyst
-
Jan 2019 - Apr 2019
Provided administrative information and assistance concerning cases or files for organizations Assisted analysts and government officials in obtaining/collecting documents to complete case files Reconcile inconsistences Perform data entry and meta data entry for electronic files Provided administrative information and assistance concerning cases or files for organizations Assisted analysts and government officials in obtaining/collecting documents to complete case files Reconcile inconsistences Perform data entry and meta data entry for electronic files
-
-
-
CSRA Inc
-
United States
-
IT Services and IT Consulting
-
700 & Above Employee
-
Background Investigator
-
Apr 2018 - Dec 2018
Performed complex, full-field character investigations which provided comprehensive coverage of basic suitability, eligibility, loyalty and overall security-related concerns for approximately fifty government agencies Independently conducted suitability and limited suitability investigations in cases involving prominent individuals or where serious derogatory information has been or is likely to be developed Wrote reports for federal agencies that determined clearance… Show more Performed complex, full-field character investigations which provided comprehensive coverage of basic suitability, eligibility, loyalty and overall security-related concerns for approximately fifty government agencies Independently conducted suitability and limited suitability investigations in cases involving prominent individuals or where serious derogatory information has been or is likely to be developed Wrote reports for federal agencies that determined clearance eligibility Show less Performed complex, full-field character investigations which provided comprehensive coverage of basic suitability, eligibility, loyalty and overall security-related concerns for approximately fifty government agencies Independently conducted suitability and limited suitability investigations in cases involving prominent individuals or where serious derogatory information has been or is likely to be developed Wrote reports for federal agencies that determined clearance… Show more Performed complex, full-field character investigations which provided comprehensive coverage of basic suitability, eligibility, loyalty and overall security-related concerns for approximately fifty government agencies Independently conducted suitability and limited suitability investigations in cases involving prominent individuals or where serious derogatory information has been or is likely to be developed Wrote reports for federal agencies that determined clearance eligibility Show less
-
-
Education
-
University of Baltimore
Master's degree, Computer Investigation -
Bowie State University
Bachelor's degree, Criminal Justice and Corrections