Mechia Cham Email and Phone Number
Seasoned Information Security Professional with extensive experience in Cyber Security, Cloud Security, and Information Technology. Skilled in supporting the Information Systems Development Security Life Cycle (SDLC) and the NIST Risk Management Framework (RMF) process. Expert in executing all six phases of the RMF, from Categorization to Continuous Monitoring. Proficient in cloud security, identity and access management, monitoring and governance, application delivery, and data protection. Experienced in developing and reviewing security documentation including SSP, SAR, SAP, CMP, CP, IRP, SCRTM, POA&M, SOPs, and other policies and procedures.
-
Us NavyUs Navy Sep 2022 - Present -
Information Security SpecialistTrutek Solutions Llc Mar 2020 - Present• Ensured disaster recovery capabilities aligned with RTO and RPO requirements based on Business Impact Analyses (BIA).• Developed, reviewed, and maintained ATO documents for client’s information system to such as, System Security Plans, Software & Hardware Inventory, System Design Document, Control Implementation Matrix, Inheritance, other Security Assessment and Authorization artifacts for ATO packages.• Provide support for Continuous Monitoring activities for Information Systems, including review of systems and applications security vulnerabilities reports from tools such as Nessus, Veracode, and STIG compliance to design and develop remediation plans.• Develop key security Documentations (SSP, SAP, SAR, RA, ISCP, and IRP) and Artifacts for systems undergoing the A&A process utilizing organizational templates.• Investigated and remediated security events as an active member of the incident response team.• Provided Assessment and Authorization (A&A) support for new systems undergoing initial authorization to operate (ATO) process and existing systems undergoing continuous monitoring (CONMON).• Performed annual review and updates of Security documentation and policy such as System Security Plan (SSP), Contingency Plan (CP), Incidence Response (IR), Configuration Management Plan (CMP), Risk Assessment Report (RAR), SOPs, Policies, and other security documents as required. -
Information Security SpecialistTrutek Solutions Llc Mar 2020 - Present• Ensured disaster recovery capabilities aligned with RTO and RPO requirements based on Business Impact Analyses (BIA).• Developed, reviewed, and maintained ATO documents for client’s information system to such as, System Security Plans, Software & Hardware Inventory, System Design Document, Control Implementation Matrix, Inheritance, other Security Assessment and Authorization artifacts for ATO packages.• Provide support for Continuous Monitoring activities for Information Systems, including review of systems and applications security vulnerabilities reports from tools such as Nessus, Veracode, and STIG compliance to design and develop remediation plans.• Develop key security Documentations (SSP, SAP, SAR, RA, ISCP, and IRP) and Artifacts for systems undergoing the A&A process utilizing organizational templates.• Investigated and remediated security events as an active member of the incident response team.• Provided Assessment and Authorization (A&A) support for new systems undergoing initial authorization to operate (ATO) process and existing systems undergoing continuous monitoring (CONMON).• Performed annual review and updates of Security documentation and policy such as System Security Plan (SSP), Contingency Plan (CP), Incidence Response (IR), Configuration Management Plan (CMP), Risk Assessment Report (RAR), SOPs, Policies, and other security documents as required. -
Security Compliance AnalystCurative Computers Dec 2018 - Jan 2020 Provided analytical support for cybersecurity commitments by participating in customer risk assessments and mapping internal policies and controls to customer requirements. Collaborated with analysts from external organizations to investigate security events. Analyzed and documented adherence to security standards including SOC 2, HIPAA Security Rule, HITRUST, and NIST 800-171. Worked with various internal stakeholders to ensure software and data implementations were aligned with internal security policies and customer security requirements. Audited data access, appropriate use of software, and cybersecurity training compliance. Performed comprehensive risk assessments for new and existing applications, identifying potential security vulnerabilities and threats. Utilized Archer to assess and document the inherent risk associated with applications, ensuring a thorough understanding of potential impacts. Conducted risk assessments focused on online fraud authentication processes, identifying vulnerabilities in authentication mechanisms. Prioritized and remediated vulnerabilities based on risk severity and potential impact. -
Security Control AssessorThe Judge Group Sep 2017 - Nov 2018• Reviewed security artifacts such as System Security Plan (SSP), Contingency Plan (CP), Configuration Management Plan (CMP), Incidence Response Plan (IRP), Hardware/Software inventories, screenshots of systems configurations, policies and procedures, Standard Operation Procedures (SOP) to support information assessment and control implementations.• Ensured artifacts are properly completed, accurately reflect the system.• Performed Security Control Assessment as part of ongoing assessment using NIST SP 800-53A to assess the adequacy of management, operational privacy, and technical security controls implemented. Testing the security controls to make sure that the controls have been implemented correctly, functioning as intended, and producing the desired outcome.• Provided ongoing gap analysis of current policies, practices, and procedures as they relate to established guidelines outlined by NIST, OMB, FISMA, and FEDRAMP.• Assisted in maturing the security compliance program, including ongoing operational requirements• Developed policies related to security frameworks such as ISO 27001, NIST 800-53, HIPAA/HITECH, or PCI DSS.• Developed, reviewed, and updated Security Assessment Plan (SAP), Security Control Test Plan, Security Control Requirement Traceability Matrix (SCRTM), and Documentation Request List (DRL) for approval prior to the start of assessment.• Examined organizational policies, standards and procedures and provided advice on their adequacy, accuracy, and compliance following NIST standard guidelines.
Mechia Cham Education Details
-
Registered Nursing/Registered Nurse
Frequently Asked Questions about Mechia Cham
What company does Mechia Cham work for?
Mechia Cham works for Us Navy
What is Mechia Cham's role at the current company?
Mechia Cham's current role is Information Security Professional (NIST,RMF).
What schools did Mechia Cham attend?
Mechia Cham attended International University Bamenda.
Who are Mechia Cham's colleagues?
Mechia Cham's colleagues are Christian Cruz, Samuel Gann, Jay Woodard, John Ashley, Khalid Henderson, Lia Klimesh, Emily Macmillan.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial