Lanre Abolanle

Cyber Security Specialist at Resource Management Concepts, Inc.
  • Claim this Profile
Contact Information
us****@****om
(386) 825-5501
Location
Waldorf, US

Topline Score

Topline score feature will be out soon.

Bio

Generated by
Topline AI

You need to have a working account to view this content.
You need to have a working account to view this content.

Credentials

  • Amazon Web Services Solutions Architect - Professional
    Amazon Web Services (AWS)
    Feb, 2023
    - Nov, 2024
  • Certified Ethical Hacker (CEH)
    EC-Council
    May, 2019
    - Nov, 2024
  • Certified Network Defense Architect (CNDA)
    EC-Council
    May, 2019
    - Nov, 2024
  • Certified Information Security Manager (CISM)
    ISACA
    Jan, 2021
    - Nov, 2024
  • A+
    CompTIA A+
    Oct, 2017
    - Nov, 2024
  • Security+
    CompTIA Security+
    Sep, 2017
    - Nov, 2024

Experience

    • United States
    • Information Technology & Services
    • 200 - 300 Employee
    • Cyber Security Specialist
      • Apr 2023 - Present

      Risk management framework (RMF) using NIST 800-37 as a guide, assessments, and continuous monitoring: performed RMF assessment included initiating meetings with various system owners and information system security officers (ISSO), providing guidance of evidence needed for security controls, and documenting findings of the assessment. Identifying, analyzing and categorizing system information type using DOD and NIST SP 800-60 Baseline. Security documentation: perform updates to system… Show more Risk management framework (RMF) using NIST 800-37 as a guide, assessments, and continuous monitoring: performed RMF assessment included initiating meetings with various system owners and information system security officers (ISSO), providing guidance of evidence needed for security controls, and documenting findings of the assessment. Identifying, analyzing and categorizing system information type using DOD and NIST SP 800-60 Baseline. Security documentation: perform updates to system security plans (SSP) using NIST 800-18 as a guide to developing SSP, risk assessments, and incident response plans, create change control procedures, and the draft, review, update plans of action and milestones (POAMS). POAM remediation: performed evaluation of policies, procedures, security scan results, and system settings in order to address controls that were deemed insufficient during certification and accreditation (CA), RMF, continuous monitoring, and Fiscal audits. Expertise in national institute of standards and technology special publication (NIST SP) documentation: performed assessments, POAM remediation, and document creation using NIST sp 800-53 rev. 1 and NIST sp 800-53 rev. 4. Conducting threat analysis/risk assessment operations as well as numerous IT professionals. Ability to understand and translate complex technical issues into business implications for technical and business representative. Maintains ongoing awareness of current and emerging information regarding security threats, techniques, and landscape. Evaluate the security control assessment of the technical, management, and operational controls for the operating information systems. Ensure that all IT systems are operating, using, maintaining and disposing of in accordance with internal security policies and procedures. Strong analytical communication and interpersonal skills. Able to communicate effectively with senior level. Show less Risk management framework (RMF) using NIST 800-37 as a guide, assessments, and continuous monitoring: performed RMF assessment included initiating meetings with various system owners and information system security officers (ISSO), providing guidance of evidence needed for security controls, and documenting findings of the assessment. Identifying, analyzing and categorizing system information type using DOD and NIST SP 800-60 Baseline. Security documentation: perform updates to system… Show more Risk management framework (RMF) using NIST 800-37 as a guide, assessments, and continuous monitoring: performed RMF assessment included initiating meetings with various system owners and information system security officers (ISSO), providing guidance of evidence needed for security controls, and documenting findings of the assessment. Identifying, analyzing and categorizing system information type using DOD and NIST SP 800-60 Baseline. Security documentation: perform updates to system security plans (SSP) using NIST 800-18 as a guide to developing SSP, risk assessments, and incident response plans, create change control procedures, and the draft, review, update plans of action and milestones (POAMS). POAM remediation: performed evaluation of policies, procedures, security scan results, and system settings in order to address controls that were deemed insufficient during certification and accreditation (CA), RMF, continuous monitoring, and Fiscal audits. Expertise in national institute of standards and technology special publication (NIST SP) documentation: performed assessments, POAM remediation, and document creation using NIST sp 800-53 rev. 1 and NIST sp 800-53 rev. 4. Conducting threat analysis/risk assessment operations as well as numerous IT professionals. Ability to understand and translate complex technical issues into business implications for technical and business representative. Maintains ongoing awareness of current and emerging information regarding security threats, techniques, and landscape. Evaluate the security control assessment of the technical, management, and operational controls for the operating information systems. Ensure that all IT systems are operating, using, maintaining and disposing of in accordance with internal security policies and procedures. Strong analytical communication and interpersonal skills. Able to communicate effectively with senior level. Show less

  • Advance System Incorporated
    • Patuxent River, Maryland
    • Cyber Security Specialist
      • Feb 2019 - Apr 2023

      Risk management framework (RMF) using NIST 800-37 as a guide, assessments, and continuous monitoring: performed RMF assessment included initiating meetings with various system owners and information system security officers (ISSO), providing guidance of evidence needed for security controls, and documenting findings of the assessment. Identifying, analyzing and categorizing system information type using DOD and NIST SP 800-60 Baseline. Security documentation: perform updates to system… Show more Risk management framework (RMF) using NIST 800-37 as a guide, assessments, and continuous monitoring: performed RMF assessment included initiating meetings with various system owners and information system security officers (ISSO), providing guidance of evidence needed for security controls, and documenting findings of the assessment. Identifying, analyzing and categorizing system information type using DOD and NIST SP 800-60 Baseline. Security documentation: perform updates to system security plans (SSP) using NIST 800-18 as a guide to developing SSP, risk assessments, and incident response plans, create change control procedures, and the draft, review, update plans of action and milestones (POAMS). POAM remediation: performed evaluation of policies, procedures, security scan results, and system settings in order to address controls that were deemed insufficient during certification and accreditation (CA), RMF, continuous monitoring, and Fiscal audits. Expertise in national institute of standards and technology special publication (NIST SP) documentation: performed assessments, POAM remediation, and document creation using NIST sp 800-53 rev. 1 and NIST sp 800-53 rev. 4. Conducting threat analysis/risk assessment operations as well as numerous IT professionals. Ability to understand and translate complex technical issues into business implications for technical and business representative. Maintains ongoing awareness of current and emerging information regarding security threats, techniques, and landscape. Evaluate the security control assessment of the technical, management, and operational controls for the operating information systems. Ensure that all IT systems are operating, using, maintaining and disposing of in accordance with internal security policies and procedures. Strong analytical communication and interpersonal skills. Able to communicate effectively with senior level. Show less Risk management framework (RMF) using NIST 800-37 as a guide, assessments, and continuous monitoring: performed RMF assessment included initiating meetings with various system owners and information system security officers (ISSO), providing guidance of evidence needed for security controls, and documenting findings of the assessment. Identifying, analyzing and categorizing system information type using DOD and NIST SP 800-60 Baseline. Security documentation: perform updates to system… Show more Risk management framework (RMF) using NIST 800-37 as a guide, assessments, and continuous monitoring: performed RMF assessment included initiating meetings with various system owners and information system security officers (ISSO), providing guidance of evidence needed for security controls, and documenting findings of the assessment. Identifying, analyzing and categorizing system information type using DOD and NIST SP 800-60 Baseline. Security documentation: perform updates to system security plans (SSP) using NIST 800-18 as a guide to developing SSP, risk assessments, and incident response plans, create change control procedures, and the draft, review, update plans of action and milestones (POAMS). POAM remediation: performed evaluation of policies, procedures, security scan results, and system settings in order to address controls that were deemed insufficient during certification and accreditation (CA), RMF, continuous monitoring, and Fiscal audits. Expertise in national institute of standards and technology special publication (NIST SP) documentation: performed assessments, POAM remediation, and document creation using NIST sp 800-53 rev. 1 and NIST sp 800-53 rev. 4. Conducting threat analysis/risk assessment operations as well as numerous IT professionals. Ability to understand and translate complex technical issues into business implications for technical and business representative. Maintains ongoing awareness of current and emerging information regarding security threats, techniques, and landscape. Evaluate the security control assessment of the technical, management, and operational controls for the operating information systems. Ensure that all IT systems are operating, using, maintaining and disposing of in accordance with internal security policies and procedures. Strong analytical communication and interpersonal skills. Able to communicate effectively with senior level. Show less

    • United States
    • IT Services and IT Consulting
    • 700 & Above Employee
    • Information Technology Security Analyst
      • Jan 2017 - Feb 2019

      • Conducts FIPS-199 categorization and control selections for systems, develops test plans, and testing procedures. • Monitor controls post-authorization to ensure continuous compliance with the security requirements by evaluating threats and vulnerabilities through Nessus scan results and work with the IT staff for mitigation actions • Prepares and reviews security documentation including System Security Plans (SSP), Security Assessment Reports (SAR), Contingency Plan (CP), Privacy… Show more • Conducts FIPS-199 categorization and control selections for systems, develops test plans, and testing procedures. • Monitor controls post-authorization to ensure continuous compliance with the security requirements by evaluating threats and vulnerabilities through Nessus scan results and work with the IT staff for mitigation actions • Prepares and reviews security documentation including System Security Plans (SSP), Security Assessment Reports (SAR), Contingency Plan (CP), Privacy Impact Analysis (PIA), and other artifacts required for the system’s security. • Supports the remediation actions to correct assessment findings and develops supporting the plan of action and milestone (POA&M) reports. • Develop and update Authorization to Operate (ATO) packages such as the SSPs, SAP, SAR, and POA&Ms for information systems to ensure they comply with an organization’s information security requirements. • Reviews vulnerability scanning results and identifies weaknesses in systems and recommends corrective actions. • Supports the penetration testing group with information gathering (reconnaissance) and scanning using Nessus and Nmap tools. Show less • Conducts FIPS-199 categorization and control selections for systems, develops test plans, and testing procedures. • Monitor controls post-authorization to ensure continuous compliance with the security requirements by evaluating threats and vulnerabilities through Nessus scan results and work with the IT staff for mitigation actions • Prepares and reviews security documentation including System Security Plans (SSP), Security Assessment Reports (SAR), Contingency Plan (CP), Privacy… Show more • Conducts FIPS-199 categorization and control selections for systems, develops test plans, and testing procedures. • Monitor controls post-authorization to ensure continuous compliance with the security requirements by evaluating threats and vulnerabilities through Nessus scan results and work with the IT staff for mitigation actions • Prepares and reviews security documentation including System Security Plans (SSP), Security Assessment Reports (SAR), Contingency Plan (CP), Privacy Impact Analysis (PIA), and other artifacts required for the system’s security. • Supports the remediation actions to correct assessment findings and develops supporting the plan of action and milestone (POA&M) reports. • Develop and update Authorization to Operate (ATO) packages such as the SSPs, SAP, SAR, and POA&Ms for information systems to ensure they comply with an organization’s information security requirements. • Reviews vulnerability scanning results and identifies weaknesses in systems and recommends corrective actions. • Supports the penetration testing group with information gathering (reconnaissance) and scanning using Nessus and Nmap tools. Show less

  • Strayer University Virtual Lab
    • Virginia Beach, Virginia
    • Systems Administrator
      • Jan 2017 - Jun 2017

      • Deployed and managed Windows Server operating system, monitoring and patch management. • Deployed and managed Active Directory users and computers, users account setup/reset. • Deployed and managed group policy and Windows firewall. • Deployed & configured domain controller and DHCP service. • Deployed and managed Windows Server operating system, monitoring and patch management. • Deployed and managed Active Directory users and computers, users account setup/reset. • Deployed and managed group policy and Windows firewall. • Deployed & configured domain controller and DHCP service.

  • BAE Systems Security
    • Virginia Beach, Virginia, United States
    • Information Technology Security Analyst
      • Mar 2015 - Dec 2016

      • Employ NIST SP 800-60 and FIPS 199 to categorize information and information systems to Low, Moderate or High to determine the potential adverse impact for each security objective (CIA). • Use Risk Management Framework (NIST 800-37 rev1) to help different system stakeholders to develop and maintain Authorization to Operate (ATO) packages for their information systems such as SSPs, SARs, POA&Ms. • Create and review security artifacts such as Contingency plans (CP), Contingency Plan Test… Show more • Employ NIST SP 800-60 and FIPS 199 to categorize information and information systems to Low, Moderate or High to determine the potential adverse impact for each security objective (CIA). • Use Risk Management Framework (NIST 800-37 rev1) to help different system stakeholders to develop and maintain Authorization to Operate (ATO) packages for their information systems such as SSPs, SARs, POA&Ms. • Create and review security artifacts such as Contingency plans (CP), Contingency Plan Test (CPT), Configuration Management (CM), Privacy Impact Assessment (PIA), Incident Response (IR) per NIST800 guidelines for various agencies. • Monitor controls post-authorization to ensure continuous compliance with the security requirements by regularly reviewing the Nessus scan results and collaborate with the IT team for mitigation actions. • Train and direct clients using (NIST 800-37 rev1) on the process of obtaining and maintaining Authorization to Operate (ATO) and the required security documentation. • Host and facilitate kick-off meetings and presentations with system stakeholders/clients on the operational security posture for the system in their purview and on security-related policies Show less • Employ NIST SP 800-60 and FIPS 199 to categorize information and information systems to Low, Moderate or High to determine the potential adverse impact for each security objective (CIA). • Use Risk Management Framework (NIST 800-37 rev1) to help different system stakeholders to develop and maintain Authorization to Operate (ATO) packages for their information systems such as SSPs, SARs, POA&Ms. • Create and review security artifacts such as Contingency plans (CP), Contingency Plan Test… Show more • Employ NIST SP 800-60 and FIPS 199 to categorize information and information systems to Low, Moderate or High to determine the potential adverse impact for each security objective (CIA). • Use Risk Management Framework (NIST 800-37 rev1) to help different system stakeholders to develop and maintain Authorization to Operate (ATO) packages for their information systems such as SSPs, SARs, POA&Ms. • Create and review security artifacts such as Contingency plans (CP), Contingency Plan Test (CPT), Configuration Management (CM), Privacy Impact Assessment (PIA), Incident Response (IR) per NIST800 guidelines for various agencies. • Monitor controls post-authorization to ensure continuous compliance with the security requirements by regularly reviewing the Nessus scan results and collaborate with the IT team for mitigation actions. • Train and direct clients using (NIST 800-37 rev1) on the process of obtaining and maintaining Authorization to Operate (ATO) and the required security documentation. • Host and facilitate kick-off meetings and presentations with system stakeholders/clients on the operational security posture for the system in their purview and on security-related policies Show less

Education

  • Strayer University
    Master's of Science, Computer and Information Systems Security/Information Assurance
    2019 - 2020
  • Strayer University
    Bachelor of Science (B.Sc.), Network and System Administration/Administrator
    2015 - 2018
  • Strayer University
    Associate of Arts (A.A.), Information Technology
    2013 - 2015

Community

You need to have a working account to view this content. Click here to join now