Ebenezer Manu

Ebenezer Manu Email and Phone Number

Cyber Security Analyst at USDA @ USDA
Ebenezer Manu's Location
Fredericksburg, Virginia, United States, United States
Ebenezer Manu's Contact Details

Ebenezer Manu work email

Ebenezer Manu personal email

About Ebenezer Manu

A dedicated, hardworking, and passionate professional, motivated to make a positive impact on the cybersecurity industry and society at large. Excellent communication skills and the ability to present technical issues to a wide variety of audiences. Highly adaptive, organized, goal-oriented cyber security analyst with the proven ability to multi-task, work independently, and serve as a significant contributor as a member of a broader team. Apply proper and robust methods to resolve complex and challenging issues of cybersecurity. Deep understanding of risks and vulnerabilities in cybersecurity driven results — finding out ways to approach. Motivates the team members by applying the company’s best practices to remediation strategies to resolve cybersecurity issues. As a Cyber Security Analyst, led cross-functional team in a company that had never used cross-functional teams before. Took people from various functions and cross-trained them. Were able to do twice the update, testing of controls, and production in a shorter period and saved the company money in the process. It was received well and is now a common practice at the company. Thrive in all environments, whether they are supportive, collaborative, and knowledgeable regarding Cyber Security Analyst. A strong background in all phases of Risk Management Framework that is the Certification and Accreditation process (A&A).

Ebenezer Manu's Current Company Details
USDA

Usda

View
Cyber Security Analyst at USDA
Ebenezer Manu Work Experience Details
  • Usda
    Cyber Security Analyst
    Usda Jul 2018 - Present
    Washington, Dc, Us
    • Experience with Nessus and analyzing all the scan results to the clients • Research and recommend resolutions to technical issues after scans. • Develop Privacy Threshold Analysis (PTA), and Contingency plan (CP) as Information System Security Officers (ISSOs) • Updates maintain and review policies to ensure compliance with Federal agency requirements within the scope of the CDM solution Participate in incident, problem, and change management processes. • Experience of analyzing scan results to determine if scans were successfully remediated. • Evaluate the operational effectiveness of the collection, use, and dissemination of personal information (PII). • Special Publications and FIPS as a framework for conducting (A&A) activities on federal IT systems. • Maintain integrity of POA&M database to ensure data is correct and update POA&MS and provide guidance to correct or mitigate risks. • Conduct appropriate compliance documentation, such as Privacy Threshold Analyses (PTA), Privacy Impact Assessments (PIA), and System of Records Notices (SORN), in coordination with program, business, and system owners across the organization’s enterprise. • Complete and close Plan of Action and Milestones (POA&Ms) vulnerability related POA&Ms, policy, and procedure based on Based Decisions (RBD) POA&MS. • Review Closure/Decommission Evidence and Validate that POA&M closure evidence is accurate and applicable. • Draft executive reports of vulnerability management status and map Security Assessment Report to POA&M. • Mapping security assessment report findings to POA&Ms. • Performing (NIST) 800 series such as 800-30, 800-171, 800-60, 800-53, 800-137, FIPS 199, FIPS 200 • Develop Security Privacy Impact Analysis (PIA) by working closely with the Information System Security Officers (ISSOs), the System Owners, the Information Owners • Experience with tools such as CSAM and Nessus.
  • Gamenana Consulting
    Information Analyst
    Gamenana Consulting Apr 2015 - May 2018
    .Provide services as security control assessor (SCA) being an integral part of the Assessments and Authorizations process to include A&A scanning, documentation, reporting and analysis requirements. .Monitor Security Controls using NIST 800-137 as a guide, and test portion of the applicable security controls annually and perform periodic vulnerability scanning. • Conducted CDM meeting to discuss vulnerabilities and potential remediation actions with system and application owner. • Ensured identified weaknesses from vulnerabilities scans are remediated in accordance with NIST standards. • Conducted kick off meetings to start security control assessment on assigned systems • Develop Security Assessment Report (SAR) detailing the results of the assessment along with Plan of Action and Milestones (POA&M) • Reviewing and updating, and operation to assess and mitigate potential privacy risks and ensure compliance with all applicable Federal privacy laws and regulations, implementing corrective, remedial, and preventive actions whenever necessary. • Develop System Security Plans (SSP) to provide an overview of system security requirements. • Recommend technological and administrative measures to ensure the privacy protection of personally identifiable information used by data systems, processes, and facilities. • Conducted IT risk assessment to identify system threats, vulnerabilities, and risks. • Prepares recommendation reports that are made available to system owners to remediate identified vulnerabilities during the risk assessment process. • Strong understanding of frameworks, such as NIST 800-53, Cybersecurity Framework, 800-37, Fed RAMP, NIST 800-Series. • Completing Security Authorization packages, to include system security plans, security assessment reports and POA&M summaries.
  • Information Analyst
    It Analyst
    Information Analyst Feb 2013 - Jan 2015
    • Performed Continuous Monitoring tasks which involves identifying, monitoring, and reporting new findings and assets to PMO with vulnerability assessment reports. • Initiate kick-off meetings to collect system information to assist in the categorization phase using FIPS 199 and NIST SP 800-60. • Review and update Contingency Plan (CP) using NIST SP 80-34 guidelines. • Experience in Governance, Risk and Compliance (GRC) tools such as XACTA, CSAM • Security Assessment Reports (SAR) are developed detailing the results of the assessment along with Plan of Action and Milestones (POA&M) • Develop risk assessment reports to identified threats and vulnerabilities applicable to assigned systems. • Evaluates likelihood vulnerabilities can be exploited and assess the impact associated with these threats and vulnerabilities and identified the overall risk level. • Collaborate with ISSOs and system owners to document and manage POA&Ms for the client database. • Assist in the development of an Information Security Continuous Monitoring Strategy to help in maintaining an ongoing awareness of information security (Ensured continued effectiveness of all security controls) • Develop Privacy Threshold Analysis (PTA), and Contingency plan (CP) by working closely with the Information System Security Officers (ISSOs) and the Information Owners. • Review monthly vulnerability scan reports and track and address weaknesses in POA&Ms as needed. • Review and update Contingency Plan (CP) using NIST SP 80-34 guidelines. • Experience using Governance, Risk and Compliance (GRC) tools such as, CSAM

Ebenezer Manu Skills

Writing Consulting Sca Testing Tools Cap Windows Ato Vulnerability Authentication Clinical Research Change Control Amazon Continuous Monitoring Assessment Categorization Management Vulnerability Assessment Impact Assessment Science Security Information Assurance Sar Auditing Information Systems Publications System Assessments System St&e Cell Reports Security Tools Strategy Inventory Complex Systems Microsoft Office Testing Risk Management Training Policy Federal Agencies Artifacts Enterprise Software Retina Learner Documentation Mitigation System Monitoring Incident Stakeholders Commercial Real Estate Trails Hardware Written Analysis Information Security Cp Accreditation Yahoo Nessus Evaluations Applications Hipaa Configuration Management Communication Schedules Active Privacy Law Ghana Risk Assessment Omb Quantitative Analytics Timelines Technical Support Security Clearance Remediation Fisma Compensation Diacap Fips Regulations Justice Active Directory Multi Tasking Open Source Microsoft Exchange Reviews Government Computer Security Nist Guidelines Bridge Inspection Software Circular Technical Writing Compliance Phase Parties Public Trust C&a Internal Controls Contingency Work Independently Rmf Scanners Risk Meetings Templates Evaluation Ssp Tia Coordinate Vulnerability Scanning

Ebenezer Manu Education Details

  • University  College
    University College
    Information Technology
  • University College
    University College
    Information Technology

Frequently Asked Questions about Ebenezer Manu

What company does Ebenezer Manu work for?

Ebenezer Manu works for Usda

What is Ebenezer Manu's role at the current company?

Ebenezer Manu's current role is Cyber Security Analyst at USDA.

What is Ebenezer Manu's email address?

Ebenezer Manu's email address is eb****@****hoo.com

What schools did Ebenezer Manu attend?

Ebenezer Manu attended University College, University College.

What skills is Ebenezer Manu known for?

Ebenezer Manu has skills like Writing, Consulting, Sca, Testing Tools, Cap, Windows, Ato, Vulnerability, Authentication, Clinical Research, Change Control, Amazon.

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.