Shamieka B.

Information System Security Manager at Lone Star Analysis
  • Claim this Profile
Contact Information
us****@****om
(386) 825-5501
Location
Linthicum Heights, Maryland, United States, US

Topline Score

Topline score feature will be out soon.

Bio

Generated by
Topline AI

You need to have a working account to view this content.
You need to have a working account to view this content.

Credentials

  • Security+ce
    CompTIA
    Dec, 2011
    - Nov, 2024

Experience

    • United States
    • IT Services and IT Consulting
    • 100 - 200 Employee
    • Information System Security Manager
      • Jun 2021 - Present

    • Lead Makeup Artist
      • Jan 2015 - Present

      Understanding of the makeup requirements of clients after interaction Build a rapport with the subjects receiving makeup services Take notes of the health and safety issues while making over a client Keep up-to-date knowledge of the makeup industry and its products Maintain an up-to-date portfolio of all work undertaken Understanding of the makeup requirements of clients after interaction Build a rapport with the subjects receiving makeup services Take notes of the health and safety issues while making over a client Keep up-to-date knowledge of the makeup industry and its products Maintain an up-to-date portfolio of all work undertaken

    • United States
    • Business Consulting and Services
    • 700 & Above Employee
    • Information System Officer
      • Dec 2019 - Jun 2021

    • United States
    • IT Services and IT Consulting
    • 700 & Above Employee
    • Information System Officer
      • May 2018 - Dec 2019

      Develop and implement different types of cyber security measures to secure digital information Monitor the information system for which they are responsible and take action to ensure the system is protected Establish and monitor key risk indicators, as well as implement corrective action plans to mitigate risks Determine solutions to minimize or eliminate risks Review risk factors that could potentially impact the system Monitor and assess the post-period implementation of risk management strategies Provide training and technical support to management and employees regarding risk management strategies and programs Create procedures and control assessments in response to identified risks Evaluate the implementation of risk reduction strategies and finding the positive as well as negative outcomes of them Create system-specific documentation, architectural diagrams, and data flow diagrams Run vulnerability scans using security center Conduct system assessments based on RMF controls Show less

    • United States
    • IT Services and IT Consulting
    • 100 - 200 Employee
    • Information System Analyst
      • Feb 2016 - May 2018

      Develop and implement different types of cyber security measures to secure digital information Monitor the information system for which they are responsible and take action to ensure the system is protected Establish and monitor key risk indicators, as well as implement corrective action plans to mitigate risks Determine solutions to minimize or eliminate risks Review risk factors that could potentially impact the system Monitor and assess the post-period implementation of risk management strategies Provide training and technical support to management and employees regarding risk management strategies and programs Create procedures and control assessments in response to identified risks Evaluate the implementation of risk reduction strategies and finding the positive as well as negative outcomes of them Create system-specific documentation, architectural diagrams, and data flow diagrams Run vulnerability scans using security center Conduct system assessments based on RMF controls Show less

    • United States
    • Information Technology & Services
    • 1 - 100 Employee
    • Mission Advocate
      • Dec 2013 - Aug 2015

      Provide Risk Management Framework (RMF) awarenessProcess clarificationArtifacts and Body of Evidence (BOE) clarificationRole and authority clarificationXACTA data input clarificationMonitor and assist in resolving all security related program riskAssist in resolving security issues that are risk to the project scheduleMonitor schedules and provide security relevant awareness and guidance Monitor XACTA and the status/step for projects to identify any impactAddress schedule issues between XACTA and various schedules of recordProactively maintain an overall view of programs/projects and their status in order to identify potential problems/conflicts before they occurAttend program/project meetings with potential security relevancePeriodic communication with customer/stakeholdersPossess knowledge of NIST 800-53/ ICD-503 standards Show less

    • Risk Management Framework Front Door
      • Dec 2011 - Dec 2013

      Responsible for the creation of new projects within XACTAReviews the Required Essential Information (REI) submitted by customers in order to register a new systemResponsible for ensuring all customers know how to begin new registrations within XACTACreates procedures for the RMF front doorResponsible for keeping all documentation up-to-dateResponsible for determining the Delegated Authorizing Official (DAO) for each registration that is receivedAssists customers with questions related to different areas of XACTAAssists customers with questions related to the RMF Performs various tasks for DAOs within XACTAAssists team leads and managers in creating high level briefings for XACTA and the RMFReviews documentation to ensure the metrics for each month are correct for managementAssists with coordinating system review meetings for customersEnsures the customers are informed when their registration has been accepted or rejects Provides leadership and work guidance for new hires Show less

    • ISSO
      • Sep 2010 - Dec 2011

      Coordinate, document, and report on investigations of possible security risks or violations.Implements, develops, enforces, and communicates security policies and/or plans for data, software applications, hardware, and telecommunications. Develops manuals and ensures system support personnel receive/maintain security awareness and training. Assesses the impact on the business unit/customer caused by theft, destruction, alteration ordenial of access to information and reports to senior management. Provides complex technical oversight and enforcement of security directives, orders, standards, plans and procedures at server sites. Perform security monitoring and analysis of system, network and security logs as part of the continuous monitoring and incident response requirements for the Intelink systems and services to report on possible risks to or violations of security. Research activity detected to determine its source, nature and probable cause, and assess to determine actual or potential risk. Conduct periodic security vulnerability testing on systems to validate continued security configuration maintenance and assess any vulnerability found to determine potential for security risk. Identifies security risks, threats and vulnerabilities of networks, systems, applications and new technology initiatives. Provides technical support in the development, testing and operation of firewalls, intrusion detection systems, and enterprise anti-virus and software deployment tools. Develops policies and procedures for securing the system infrastructure and applications. Develops complex technical and programmatic assessments, evaluates engineering and integration initiatives and provides complex technical support to assess security policies, standards and guidelines. Performs highly complex product evaluations, recommends and implements products/services for network security. Provides leadership and work guidance to less experienced personnel Show less

    • United States
    • Individual and Family Services
    • 1 - 100 Employee
    • Administrative Exec (Temporary)
      • May 2009 - Jul 2009

      Answered Phones/ transferred calls Faxed and scanned items to be sent to other offices and/or clients Assisted with casework (calling clients) Received any payments given Worked with Access, Excel, Word, and Outlook by updating databases, creating lists of clients, sending interoffice memo’s, typing letters to be sent out to clients Maintains workflow by studying methods; implementing cost reductions; and developing reporting procedures. Creates and revises systems and procedures by analyzing operating practices, recordkeeping systems, forms control, office layout, and budgetary and personnel requirements; implementing changes. Resolves administrative problems by coordinating preparation of reports, analyzing data, and identifying solutions. Ensures operation of equipment by completing preventive maintenance requirements; calling for repairs; maintaining equipment inventories; evaluating new equipment and techniques. Provides information by answering questions and requests. Maintains supplies inventory by checking stock to determine inventory level; anticipating needed supplies; placing and expediting orders for supplies; verifying receipt of supplies. Completes operational requirements by scheduling and assigning administrative projects; expediting work results. Contributes to team effort by accomplishing related results as needed Show less

Education

  • Alabama Agricultural and Mechanical University
    Bachelor of Arts (BA), Sociology
    2004 - 2008

Community

You need to have a working account to view this content. Click here to join now