Shamieka B.
Information System Security Manager at Lone Star Analysis- Claim this Profile
Click to upgrade to our gold package
for the full feature experience.
Topline Score
Bio
Credentials
-
Security+ce
CompTIADec, 2011- Nov, 2024
Experience
-
Lone Star Analysis
-
United States
-
IT Services and IT Consulting
-
100 - 200 Employee
-
Information System Security Manager
-
Jun 2021 - Present
-
-
-
Freelance Makeup Artist
-
Maryland
-
Lead Makeup Artist
-
Jan 2015 - Present
Understanding of the makeup requirements of clients after interaction Build a rapport with the subjects receiving makeup services Take notes of the health and safety issues while making over a client Keep up-to-date knowledge of the makeup industry and its products Maintain an up-to-date portfolio of all work undertaken Understanding of the makeup requirements of clients after interaction Build a rapport with the subjects receiving makeup services Take notes of the health and safety issues while making over a client Keep up-to-date knowledge of the makeup industry and its products Maintain an up-to-date portfolio of all work undertaken
-
-
-
Jacobs
-
United States
-
Business Consulting and Services
-
700 & Above Employee
-
Information System Officer
-
Dec 2019 - Jun 2021
-
-
-
CACI International Inc
-
United States
-
IT Services and IT Consulting
-
700 & Above Employee
-
Information System Officer
-
May 2018 - Dec 2019
Develop and implement different types of cyber security measures to secure digital information Monitor the information system for which they are responsible and take action to ensure the system is protected Establish and monitor key risk indicators, as well as implement corrective action plans to mitigate risks Determine solutions to minimize or eliminate risks Review risk factors that could potentially impact the system Monitor and assess the post-period implementation of risk management strategies Provide training and technical support to management and employees regarding risk management strategies and programs Create procedures and control assessments in response to identified risks Evaluate the implementation of risk reduction strategies and finding the positive as well as negative outcomes of them Create system-specific documentation, architectural diagrams, and data flow diagrams Run vulnerability scans using security center Conduct system assessments based on RMF controls Show less
-
-
-
ASRC Federal Vistronix
-
United States
-
IT Services and IT Consulting
-
100 - 200 Employee
-
Information System Analyst
-
Feb 2016 - May 2018
Develop and implement different types of cyber security measures to secure digital information Monitor the information system for which they are responsible and take action to ensure the system is protected Establish and monitor key risk indicators, as well as implement corrective action plans to mitigate risks Determine solutions to minimize or eliminate risks Review risk factors that could potentially impact the system Monitor and assess the post-period implementation of risk management strategies Provide training and technical support to management and employees regarding risk management strategies and programs Create procedures and control assessments in response to identified risks Evaluate the implementation of risk reduction strategies and finding the positive as well as negative outcomes of them Create system-specific documentation, architectural diagrams, and data flow diagrams Run vulnerability scans using security center Conduct system assessments based on RMF controls Show less
-
-
-
Tenacity Solutions Incorporated
-
United States
-
Information Technology & Services
-
1 - 100 Employee
-
Mission Advocate
-
Dec 2013 - Aug 2015
Provide Risk Management Framework (RMF) awarenessProcess clarificationArtifacts and Body of Evidence (BOE) clarificationRole and authority clarificationXACTA data input clarificationMonitor and assist in resolving all security related program riskAssist in resolving security issues that are risk to the project scheduleMonitor schedules and provide security relevant awareness and guidance Monitor XACTA and the status/step for projects to identify any impactAddress schedule issues between XACTA and various schedules of recordProactively maintain an overall view of programs/projects and their status in order to identify potential problems/conflicts before they occurAttend program/project meetings with potential security relevancePeriodic communication with customer/stakeholdersPossess knowledge of NIST 800-53/ ICD-503 standards Show less
-
-
Risk Management Framework Front Door
-
Dec 2011 - Dec 2013
Responsible for the creation of new projects within XACTAReviews the Required Essential Information (REI) submitted by customers in order to register a new systemResponsible for ensuring all customers know how to begin new registrations within XACTACreates procedures for the RMF front doorResponsible for keeping all documentation up-to-dateResponsible for determining the Delegated Authorizing Official (DAO) for each registration that is receivedAssists customers with questions related to different areas of XACTAAssists customers with questions related to the RMF Performs various tasks for DAOs within XACTAAssists team leads and managers in creating high level briefings for XACTA and the RMFReviews documentation to ensure the metrics for each month are correct for managementAssists with coordinating system review meetings for customersEnsures the customers are informed when their registration has been accepted or rejects Provides leadership and work guidance for new hires Show less
-
-
ISSO
-
Sep 2010 - Dec 2011
Coordinate, document, and report on investigations of possible security risks or violations.Implements, develops, enforces, and communicates security policies and/or plans for data, software applications, hardware, and telecommunications. Develops manuals and ensures system support personnel receive/maintain security awareness and training. Assesses the impact on the business unit/customer caused by theft, destruction, alteration ordenial of access to information and reports to senior management. Provides complex technical oversight and enforcement of security directives, orders, standards, plans and procedures at server sites. Perform security monitoring and analysis of system, network and security logs as part of the continuous monitoring and incident response requirements for the Intelink systems and services to report on possible risks to or violations of security. Research activity detected to determine its source, nature and probable cause, and assess to determine actual or potential risk. Conduct periodic security vulnerability testing on systems to validate continued security configuration maintenance and assess any vulnerability found to determine potential for security risk. Identifies security risks, threats and vulnerabilities of networks, systems, applications and new technology initiatives. Provides technical support in the development, testing and operation of firewalls, intrusion detection systems, and enterprise anti-virus and software deployment tools. Develops policies and procedures for securing the system infrastructure and applications. Develops complex technical and programmatic assessments, evaluates engineering and integration initiatives and provides complex technical support to assess security policies, standards and guidelines. Performs highly complex product evaluations, recommends and implements products/services for network security. Provides leadership and work guidance to less experienced personnel Show less
-
-
-
Springboard Community Services
-
United States
-
Individual and Family Services
-
1 - 100 Employee
-
Administrative Exec (Temporary)
-
May 2009 - Jul 2009
Answered Phones/ transferred calls Faxed and scanned items to be sent to other offices and/or clients Assisted with casework (calling clients) Received any payments given Worked with Access, Excel, Word, and Outlook by updating databases, creating lists of clients, sending interoffice memo’s, typing letters to be sent out to clients Maintains workflow by studying methods; implementing cost reductions; and developing reporting procedures. Creates and revises systems and procedures by analyzing operating practices, recordkeeping systems, forms control, office layout, and budgetary and personnel requirements; implementing changes. Resolves administrative problems by coordinating preparation of reports, analyzing data, and identifying solutions. Ensures operation of equipment by completing preventive maintenance requirements; calling for repairs; maintaining equipment inventories; evaluating new equipment and techniques. Provides information by answering questions and requests. Maintains supplies inventory by checking stock to determine inventory level; anticipating needed supplies; placing and expediting orders for supplies; verifying receipt of supplies. Completes operational requirements by scheduling and assigning administrative projects; expediting work results. Contributes to team effort by accomplishing related results as needed Show less
-
-
Education
-
Alabama Agricultural and Mechanical University
Bachelor of Arts (BA), Sociology