Joe I. Email and Phone Number
Joe I. work email
- Valid
Joe I. personal email
A cybersecurity professional with over 8 years of experience in Third-Party Risk Management, Security Control Test/Audit, Compliance, and Vulnerability Management. I am experienced in security control audits and tests based on standards and frameworks such as ISO 27001, HITRUST CSF, NIST 800 53, PCI-DSS, GDPR, and SOC2. I am skilled in conducting Third Party Vendor Risk Assessments and Due Diligence, to ensure compliance with organizational onboarding requirements. My strong written and oral communication skills deliver exceptional results in providing subject matter expertise to business stakeholders during external/internal audits as well as in the development and review of documentation such as policies, procedures, standards, and control artifacts to ensure organizations are compliant with laws, standards, and regulations.
Deloitte
View-
Senior ConsultantDeloitte Jan 2020 - PresentWorldwide, Oo -
Security Compliance Analyst Nist 800 53/FedrampTrutek Solutions Llc Dec 2018 - Jan 2020Alexandria, Virginia, Us• Coordinated FedRAMP readiness assessment to include security controls gap analysis on exiting compliance certifications such as ISO 27001 and SOC2. • Tailored existing policy documents from previous audits to FedRAMP requirements.• Reviewed vulnerability scans results to identify/analyze threats and weaknesses on the systems, then proffering remediation action through tickets and POA&Ms.• Coordinated security controls assessment process by participating in kickoff meetings, reviews of SAP, and ensuring the necessary artifacts are in place for the SCA team to test controls for effectiveness.• Authored and maintained A&A documents such as the SSP, POA&M, SAR, SRTM, IRP, CMP, and CP.• Managed continuous monitoring activities to include system status reports, system significant change, A&A documents review/update, periodic security control assessments, audit logs reviews, and vulnerability management.• Maintain Body of Evidence (BOE) artifact, policies, and procedures as well as A&A documents• Tailor baseline security controls by separating the controls into common, system-specific, and hybrid control as well as applying control inheritance, enhancement, and compensating controls as needed. -
Security Assessment And Vulnerability AnalystTrutek Solutions Llc Apr 2016 - Dec 2017• Performed Security Control Assessment as part of ongoing assessment using NIST SP 800-53A to assess the adequacy of management, operational privacy, and technical security controls implemented. Testing the security controls to make sure that the controls have been implemented correctly, functioning as intended, and producing the desired outcome.• Developed, reviewed, and updated Security Assessment Plan (SAP), Security Control Test Plan, Security Control Requirement Traceability Matrix (SCRTM), and Documentation Request List (DRL) for approval prior to the start of the assessment.• Reviewed security artifacts such as System Security Plan (SSP), Contingency Plan (CP), Configuration Management Plan (CMP), Incidence Response Plan (IRP), Hardware/Software inventories, screenshots of systems configurations, policies and procedures, Standard Operation Procedures (SOP) to support information assessment and control implementations.• Developed and regenerated security documentation at the conclusion of assessments such as SSP, SAR, PAO&M, and ATO Letters. Update SSP to reflect the current control implementation status.• Developed risk assessment reports by identifying threats and vulnerabilities applicable to the system.
-
Rmf Support - Security Control Assessor (Sca)Xignette Technologies Llc Aug 2014 - Apr 2016● Liaised with the assessment team in developing the Security Assessment Plan using the NIST 800 53A as a guide to outlining the assessment objectives, scope, test procedures, and schedule. ● Conducted Security Control Assessment in accordance with NIST SP 800-53A to test the technical, management, and operational controls effectiveness for multiple major applications and General Support Systems (GSS).● Developed Security Assessment Reports (SAR) detailing the results of the assessment carried out and documented the corresponding plan of action and milestone (POA&M) to ensure remediation actions and timely mitigation of the findings. -
Information Technology Business AnalystXignette Technologies Llc Apr 2012 - Aug 2014•Gathered user and business requirements by engaging clients, user group representatives, and stakeholders using JAD sessions, and converting them into functional specification documents (FRD).•Created workflows, use case diagrams, and activity diagrams from functional requirements using MS Visio, Word and wireframe.•Developed Requirement Traceability Matrix (RTM) for maintaining/updating current and new system requirements using MS Excel•Served as a liaison between system owners and other software development stakeholders such as system architects, software engineers, Quality Assurance and Testers to ensure that system requirement is effectively communicated.•Employed knowledge of the software development life cycle (SDLC) in designing test cases as well as conducting user acceptance testing to ensure that all identified bugs are communicated to the system engineers for remediation. -
Information Technology Support Specialist ( Call Center)Globacom Nov 2009 - Jan 2012Ng•Collaborated with the IT department in the planning and implementation call center solutions.•Performed diagnostics and analysis of system issues and promptly deliver known solutions to identified issues.•Provided support to application end users, by troubleshooting issues via phone and email, while documenting unresolved issue as tickets escalated to back-office support. •Managed and analyzed websites and social media traffic to collect useful data necessary to enhance user experience as well as providing end-user support.
Joe I. Education Details
-
West Texas A&M University College Of BusinessBusiness Administration And Management -
University Of BeninMedical Microbiology
Frequently Asked Questions about Joe I.
What company does Joe I. work for?
Joe I. works for Deloitte
What is Joe I.'s role at the current company?
Joe I.'s current role is Senior Consultant – Third-Party Risk Management (TPRM) and Compliance | MBA | CISM | CASP+ | SEC+.
What is Joe I.'s email address?
Joe I.'s email address is jo****@****bal.com
What schools did Joe I. attend?
Joe I. attended West Texas A&m University College Of Business, University Of Benin.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial