Christopher Okpala

CEO

Washington, District of Columbia, United States7 yrs experience
Most Likely To Switch

Key Highlights

  • Over five years of cybersecurity expertise
  • Proficient in Risk Management Framework implementation
  • Strong background in IT Governance and compliance
Stackforce AI infers this person is a Cybersecurity professional with expertise in Risk Management and IT Governance.

Contact

Skills

Core Skills

Risk Management Framework (rmf)Cyber Security PlanningRisk ManagementChange ManagementProject ManagementIntelligence AnalysisBackground Investigation

Other Skills

eMASSSTIGsSecurity AuditsVulnerability ScansIAVAsDoD ComplianceSystem Performance ImprovementData ManagementMicrosoft OfficeReport PreparationIdentity IntelligenceData AnalysisResearchData EntryAdministrative Support

About

Accomplished cybersecurity professional with over five years of expertise as an Information Systems Security Officer (ISSO), Cybersecurity Analyst, and Project Manager. Proven abilities in implementing the Risk Management Framework (RMF) to ensure robust security measures, analyzing compliance with DoD orders, and identifying solutions to enhance system performance and availability. Proficient in overseeing change management processes, conducting security audits, and maintaining documentation for regulatory adherence. With a comprehensive background in IT Governance, risk mitigation strategies, and system-level documentation, I excel in managing risks, improving processes, and ensuring compliance. Throughout my career, I've demonstrated a keen eye for enhancing brand awareness through meticulous attention to security posture, proactive risk identification, and continual process improvements. My tenure spans diverse roles, enabling me to contribute effectively to organizations while ensuring stringent security protocols.

Experience

7 yrs
Total Experience
1 yr 2 mos
Average Tenure
2 yrs 1 mo
Current Experience

Private

Information Systems Security Officer (ISSO)

Apr 2024Present · 2 yrs 1 mo · Fort George G. Meade, Maryland, United States · Hybrid

  • Implement the Risk Management Framework (RMF) process.
  • Define, analyze cyber security requirements and recommend information assurance/security solutions to support customers’ requirements for boundary defense systems.
  • Design, develop, engineer, and integrate solutions per cyber security requirements.
  • Apply knowledge of IT Governance requirements, risk mitigation strategies, and encryption and decryption capabilities to establish secure solutions.
  • Conduct Cyber Security Planning and Scheduling.
  • Conduct security audits and vulnerability scans to recognize system vulnerabilities..
  • Perform and review technical security assessments of computing environments to identify points of vulnerability, non-compliance with established cybersecurity standards and regulations, and recommend mitigation strategies to maintain operational security posture for the boundary systems.
  • Utilize eMASS and keep documentation/artifacts up to date for each boundary system.
  • Develop/update POA&Ms and perform vulnerability tracking to ensure all ATO conditions are met (e.g., Security control identification/mapping).
  • Ensure all CCRI findings are met (fixed or POA&M’d).
  • Review STIGs, upload STIG checklist/.csv files for each system asset into eMASS.
  • Work with Engineering team to develop and keep current all system-level documentation.
  • Send risk acceptance requests to ISSM to be pushed to Authorizing Official (AO).
  • Work with the SCA-R to ensure validation of all unofficial eMASS controls. Within 30 days of authorization and every 30 days thereafter, assess, provide compelling evidence for, and submit 30 non-compliant controls for validation.
eMASSSTIGsRisk Management Framework (RMF)Cyber Security PlanningSecurity AuditsVulnerability Scans

Superlative technologies

Information Systems Security Officer (ISSO)

May 2022Apr 2024 · 1 yr 11 mos · Fort Meade, Maryland, United States · Hybrid

  • Manage response to IAVAs
  • Oversee efforts in change management process
  • Analyze and report on compliance of DoD orders
  • Ensure networks and systems being developed implement DoD baseline IA Controls
  • Enforce agreed upon controls and mitigation strategies
  • Identify and create solutions to improve system performance and availability
  • Facilitate root cause analysis of system issues to minimize impact and future occurrences
  • Act as a technical resource throughout development and maintenance lifecycle
  • Keep management appropriately informed of progress and issues
  • Manage risks for the organization
  • Proactively identify areas for improvement in process and regularly assess documentation and reports for accuracy and improvement
  • Analyze the security posture of DoD systems and applications
IAVAsChange ManagementDoD ComplianceRisk ManagementSystem Performance Improvement

Ipkeys technologies

Cybersecurity (RMF) Analyst

May 2021May 2022 · 1 yr · Maryland, United States

  • Implement the Risk Management Framework (RMF) process.
  • Define, analyze cyber security requirements and recommend information assurance/security solutions to support customers’ requirements for boundary defense systems.
  • Design, develop, engineer, and integrate solutions per cyber security requirements.
  • Apply knowledge of IT Governance requirements, risk mitigation strategies, and encryption and decryption capabilities to establish secure solutions.
  • Conduct Cyber Security Planning and Scheduling.
  • Conduct security audits and vulnerability scans to recognize system vulnerabilities..
  • Perform and review technical security assessments of computing environments to identify points of vulnerability, non-compliance with established cybersecurity standards and regulations, and recommend mitigation strategies to maintain operational security posture for the boundary systems.
  • Utilize eMASS and keep documentation/artifacts up to date for each boundary system.
  • Develop/update POA&Ms and perform vulnerability tracking to ensure all ATO conditions are met (e.g., Security control identification/mapping).
  • Ensure all CCRI findings are met (fixed or POA&M’d).
  • Review STIGs, upload STIG checklist/.csv files for each system asset into eMASS.
  • Work with Engineering team to develop and keep current all system-level documentation.
  • Send risk acceptance requests to ISSM to be pushed to Authorizing Official (AO).
  • Work with the SCA-R to ensure validation of all unofficial eMASS controls. Within 30 days of authorization and every 30 days thereafter, assess, provide compelling evidence for, and submit 30 non-compliant controls for validation.
eMASSRisk Management Framework (RMF)Cyber Security PlanningSecurity AuditsVulnerability Scans

Enprovera corporation

Project Manager

Aug 2020May 2021 · 9 mos · Washington DC-Baltimore Area

  • FSA/Emprovera – Washington, DC
  • Review Data and information from multiple sources including foreign and domestic intelligence
  • for editing and translations.
  • Enter and retrieve data from data bases
  • Prepare and format management reports
  • Prepare and correct reports and correspondence using all Microsoft software
  • Conduct validation and verification of case files and case data system
  • Be responsible for the day to day supervision of contractor assignments
  • Provide on-site supervision for Contractor workforce
  • Schedule Contractor employees
Data ManagementMicrosoft OfficeReport PreparationProject Management

Keyw corporation

Intelligence Analyst

Aug 2019Mar 2020 · 7 mos

  • Intelligence analyst for the Terrorist Screening Center (FBI)
  • Identity intelligence research and analysis using Department of Defense, federal, local, and international law enforcement datasets.
  • Nominating known or suspected terrorists to the national watchlist and screening community.
  • Balancing analytic diligence and speed to ensure the production of timely and comprehensive identity intelligence products.
  • Working in small teams to meet and exceed production targets while identifying and sharing process improvements.
  • Synthesizing disparate, ambiguous and sometimes contradictory data from various sources.
  • Understanding regional naming conventions, conversion issues, and other nuances of identity intelligence.
  • Maintaining knowledge of terrorist networks in an assigned area of responsibility.
Identity IntelligenceData AnalysisResearchIntelligence Analysis

Chenega corporation

Data Analyst

Jan 2019Apr 2019 · 3 mos · Mclean,Virginia

  •  Provided administrative information and assistance concerning cases or files for organizations
  •  Assisted analysts and government officials in obtaining/collecting documents to complete case files
  •  Reconcile inconsistences
  •  Perform data entry and meta data entry for electronic files
Data EntryAdministrative Support

Csra inc

Background Investigator

Apr 2018Dec 2018 · 8 mos · Washington D.C. Metro Area

  •  Performed complex, full-field character investigations which provided comprehensive coverage of basic suitability, eligibility, loyalty and overall security-related concerns for approximately fifty government agencies
  •  Independently conducted suitability and limited suitability investigations in cases involving prominent individuals or where serious derogatory information has been or is likely to be developed
  •  Wrote reports for federal agencies that determined clearance eligibility
Background InvestigationReport Writing

Education

University of Baltimore

Master's degree — Computer Investigation

Jan 2018Jan 2019

Bowie State University

Bachelor's degree — Criminal Justice and Corrections

Jan 2015Jan 2017

Stackforce found 100+ more professionals with Risk Management Framework (rmf) & Cyber Security Planning

Explore similar profiles based on matching skills and experience