This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Welcome and Introduce yourself

Welcome to the Cyber Security discussion page on Engineering Communities!

This is a thread to introduce yourself to your fellow network members. We’d love to hear more about you so here are a few questions to start you off:
 
Name:
Brief career history:
What interests you about cyber security:
Other interests:
Parents
  • Hello my name is Dilibe. A mechanical & model-based system engineer, who is grateful to play a central role in the design and implementation of moving parts in the defense, energy & medical sector. I am a code and cybersecurity enthusiasts. As an IT security analyst, I served as an assessor and performed security CONTROLS assessment (SCA) as part of Certification and Accreditation (C&A) and continuous monitoring testing/projects, I also perform a review of security documents updated by ISSO to confirm they are FISMA compliant, review and certifying/validation of items uploaded into POA&M tracking tool in support of remediated/closed findings. vulnerability scanning, vulnerability assessment, penetration testing, development and updating of IT Security policies and procedures, Assessment & Authorization (A&A) package development and review (such as FIPS 199 categorization, E-Authentication risk assessment).

    As Information System Security Officer (ISSO) position, my daily duties included day-to-day support and maintenance of the IT Security program/FISMA compliance for my assigned systems (these could be between 7-10 systems), which include security policies and procedures development and update.

Reply
  • Hello my name is Dilibe. A mechanical & model-based system engineer, who is grateful to play a central role in the design and implementation of moving parts in the defense, energy & medical sector. I am a code and cybersecurity enthusiasts. As an IT security analyst, I served as an assessor and performed security CONTROLS assessment (SCA) as part of Certification and Accreditation (C&A) and continuous monitoring testing/projects, I also perform a review of security documents updated by ISSO to confirm they are FISMA compliant, review and certifying/validation of items uploaded into POA&M tracking tool in support of remediated/closed findings. vulnerability scanning, vulnerability assessment, penetration testing, development and updating of IT Security policies and procedures, Assessment & Authorization (A&A) package development and review (such as FIPS 199 categorization, E-Authentication risk assessment).

    As Information System Security Officer (ISSO) position, my daily duties included day-to-day support and maintenance of the IT Security program/FISMA compliance for my assigned systems (these could be between 7-10 systems), which include security policies and procedures development and update.

Children
No Data