SlideShare a Scribd company logo
1 of 2
Benjamin EssombeP
P: 470 535 9898 | email: benpenda1@gmail.com | Atlanta, GA
IT Security Analyst Consultant
I’m a results-driven Information System Security Consultant with experience in IT Audit, Risk
Management Framework, Vulnerability Management, Risk Assessment, and System Development Life
Cycle (SDLC). A proven project and team manager with aptitude for good customer service, leadership,
excellent communication and problems solving skills
PROFESSIONAL EXPERIENCE
Information System Security Analyst
PALSUR LLC.
February 2014 - Present
 Conduct Security Assessment & Authorization tasks (Security Controls Testing;
Vulnerability Scanning; Penetration Testing; and Authorization Approval)
 Develop, review, and update Information Security System Policies,
System Security Plans, and Security baselines in accordance with NIST/FISMA
Framework for federal agencies; SANS-20 and ISO 27001 ISMS Framework for
commercial and International organization.
 Perform Incident report and management task
 Apply appropriate information security control for Federal Information System
 Develop and review System Security Plans, Plan of Action and Milestones,
Security Control Assessments, Configuration Management Plan, Contingency Plans,
Incident Response Plans (IRP), and other specific security documentation in accordance
with NIST SP 800-37 rev 1, 800-18, 800-53 rev 4 and 800-34.
 Performed vulnerability and baseline scans on the client network using Retina
Network SecurityScanner (RNSS) and Nessus in accordance with the organization
Continuous Monitoring Plan and NIST 800-137.
 Worked with IT Operations and Network Engineers to mitigate system vulnerabilities
discovered in network
 Prioritized and managed service requests, incident management, escalation, and reporting
to maintain service level agreement.
Information System Auditor
MOTIVON Inc.
01/2012 – 02/2014
 Conducted review of key IT General Control (ITGC)
 Conduct audited walkthrough, assisted with Audit facilitation
 Perform and document audit activities in accordance with professional industry
standards: COBIT, COSO, PCI, HIPPA, SOX and SOC SSAE 16
 Tested IT SOX controls
 Conducted IT Risk Assessment and Compliance Audit
Benjamin EssombeP
P: 470 535 9898 | email: benpenda1@gmail.com | Atlanta, GA
IT Business Analyst
ORISON IT Inc.
Jun 2011 – July 2012
IT Business Analyst
 Planning and monitoring
 Elicited requirements
 Gathered business requirements
 Translated and simplified requirements
 Requirements management and communication
PCT / CCHT
Davita Inc
January 2003 – Jun 2011
 Assisted in treatment quality improvement projects
 Served as preceptor
 Staff and patient scheduler
 Served as access manager
 Safety manager
Financial Manager
SOCOMAR Sarl, Cameroon
October 1998 – December 2002
 Assisted in determining the company’s proper capital structure
 In charge of financial department
 Helped the company efficiently managed business expense
 Engage in ongoing cost reduction analysis in all areas of the company
 Prepares reports and audits current procedures and processes to monitor efficiency of
operations
EDUCATION
 DeVry / Keller University Decatur, GA
Current Student MBA / Project Management
 Devry University Decatur, GA
Bachelors of Business Administration / Finance, 2014
 University of Douala Cameroon
Bachelors of Business Administration 2002
CERTIFICATION
 CISSP in process

More Related Content

What's hot

Hernan Huwyler - Boards in a Digitalized World
Hernan Huwyler - Boards in a Digitalized WorldHernan Huwyler - Boards in a Digitalized World
Hernan Huwyler - Boards in a Digitalized WorldHernan Huwyler, MBA CPA
 
Regulatory Risk
Regulatory RiskRegulatory Risk
Regulatory Risknikatmalik
 
Information Systems Audit & CISA Prep 2010
Information Systems Audit & CISA Prep 2010Information Systems Audit & CISA Prep 2010
Information Systems Audit & CISA Prep 2010Donald E. Hester
 
Roger Sloan Resume
Roger Sloan ResumeRoger Sloan Resume
Roger Sloan ResumeRoger Sloan
 
AReNA - Debate Is Machine Learning Mature Enough
AReNA - Debate Is Machine Learning Mature EnoughAReNA - Debate Is Machine Learning Mature Enough
AReNA - Debate Is Machine Learning Mature EnoughHernan Huwyler, MBA CPA
 
Resume - Viola_Iskandar
Resume - Viola_IskandarResume - Viola_Iskandar
Resume - Viola_IskandarViola Iskandar
 
Cybersecurity Audit
Cybersecurity AuditCybersecurity Audit
Cybersecurity AuditEC-Council
 
1303 independent risk assessments
1303 independent risk assessments1303 independent risk assessments
1303 independent risk assessmentsJenny Reid
 
Angel Sudario Regulatory Compliance and Data Governance Work History Summary(1)
Angel Sudario Regulatory Compliance and Data Governance Work History Summary(1)Angel Sudario Regulatory Compliance and Data Governance Work History Summary(1)
Angel Sudario Regulatory Compliance and Data Governance Work History Summary(1)Angel Sudario
 
JillBushorJune15
JillBushorJune15JillBushorJune15
JillBushorJune15Jill Bushor
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewTandhy Simanjuntak
 
ICAB - ITA Chapter 5 class 7-8 - Controls and Standards
ICAB - ITA Chapter 5 class 7-8 - Controls and StandardsICAB - ITA Chapter 5 class 7-8 - Controls and Standards
ICAB - ITA Chapter 5 class 7-8 - Controls and StandardsMohammad Abdul Matin Emon
 
Tips for IT Risk Management Prof. Hernan Huwyler Information Security Institute
Tips for IT Risk Management Prof. Hernan Huwyler Information Security InstituteTips for IT Risk Management Prof. Hernan Huwyler Information Security Institute
Tips for IT Risk Management Prof. Hernan Huwyler Information Security InstituteHernan Huwyler, MBA CPA
 
SABSA: Key features, advantages & benefits summary
SABSA: Key features, advantages & benefits summarySABSA: Key features, advantages & benefits summary
SABSA: Key features, advantages & benefits summarySABSAcourses
 
Risk Management & Information Security Management Systems
Risk Management & Information Security Management SystemsRisk Management & Information Security Management Systems
Risk Management & Information Security Management SystemsIT-Toolkits.org
 
Security & Risk Management
Security & Risk ManagementSecurity & Risk Management
Security & Risk ManagementAhmed Sayed-
 
Control and Audit Information System
Control and Audit Information SystemControl and Audit Information System
Control and Audit Information Systemarif prasetyo
 
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)Muhammad Azmy
 

What's hot (20)

TyroneResume[1]
TyroneResume[1]TyroneResume[1]
TyroneResume[1]
 
Hernan Huwyler - Boards in a Digitalized World
Hernan Huwyler - Boards in a Digitalized WorldHernan Huwyler - Boards in a Digitalized World
Hernan Huwyler - Boards in a Digitalized World
 
Steps in it audit
Steps in it auditSteps in it audit
Steps in it audit
 
Regulatory Risk
Regulatory RiskRegulatory Risk
Regulatory Risk
 
Information Systems Audit & CISA Prep 2010
Information Systems Audit & CISA Prep 2010Information Systems Audit & CISA Prep 2010
Information Systems Audit & CISA Prep 2010
 
Roger Sloan Resume
Roger Sloan ResumeRoger Sloan Resume
Roger Sloan Resume
 
AReNA - Debate Is Machine Learning Mature Enough
AReNA - Debate Is Machine Learning Mature EnoughAReNA - Debate Is Machine Learning Mature Enough
AReNA - Debate Is Machine Learning Mature Enough
 
Resume - Viola_Iskandar
Resume - Viola_IskandarResume - Viola_Iskandar
Resume - Viola_Iskandar
 
Cybersecurity Audit
Cybersecurity AuditCybersecurity Audit
Cybersecurity Audit
 
1303 independent risk assessments
1303 independent risk assessments1303 independent risk assessments
1303 independent risk assessments
 
Angel Sudario Regulatory Compliance and Data Governance Work History Summary(1)
Angel Sudario Regulatory Compliance and Data Governance Work History Summary(1)Angel Sudario Regulatory Compliance and Data Governance Work History Summary(1)
Angel Sudario Regulatory Compliance and Data Governance Work History Summary(1)
 
JillBushorJune15
JillBushorJune15JillBushorJune15
JillBushorJune15
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An Overview
 
ICAB - ITA Chapter 5 class 7-8 - Controls and Standards
ICAB - ITA Chapter 5 class 7-8 - Controls and StandardsICAB - ITA Chapter 5 class 7-8 - Controls and Standards
ICAB - ITA Chapter 5 class 7-8 - Controls and Standards
 
Tips for IT Risk Management Prof. Hernan Huwyler Information Security Institute
Tips for IT Risk Management Prof. Hernan Huwyler Information Security InstituteTips for IT Risk Management Prof. Hernan Huwyler Information Security Institute
Tips for IT Risk Management Prof. Hernan Huwyler Information Security Institute
 
SABSA: Key features, advantages & benefits summary
SABSA: Key features, advantages & benefits summarySABSA: Key features, advantages & benefits summary
SABSA: Key features, advantages & benefits summary
 
Risk Management & Information Security Management Systems
Risk Management & Information Security Management SystemsRisk Management & Information Security Management Systems
Risk Management & Information Security Management Systems
 
Security & Risk Management
Security & Risk ManagementSecurity & Risk Management
Security & Risk Management
 
Control and Audit Information System
Control and Audit Information SystemControl and Audit Information System
Control and Audit Information System
 
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
 

Similar to Consulting_Audit_Security

Bayo Omisore, IT Auditor-Compliance Analyst
Bayo Omisore, IT Auditor-Compliance AnalystBayo Omisore, IT Auditor-Compliance Analyst
Bayo Omisore, IT Auditor-Compliance AnalystBayo Omisore.
 
Resume-APOORVA KABRA
Resume-APOORVA KABRAResume-APOORVA KABRA
Resume-APOORVA KABRAApoorva Kabra
 
Saikiran_CV_Operational Risk_updated
Saikiran_CV_Operational Risk_updatedSaikiran_CV_Operational Risk_updated
Saikiran_CV_Operational Risk_updatedkonchada
 
Saikiran_CV_Operational Risk_updated
Saikiran_CV_Operational Risk_updatedSaikiran_CV_Operational Risk_updated
Saikiran_CV_Operational Risk_updatedkonchada
 
Thomas reinheimer resume 04152016
Thomas reinheimer resume 04152016Thomas reinheimer resume 04152016
Thomas reinheimer resume 04152016Tom Reinheimer
 
Proteus OCM Company Profile
Proteus OCM Company ProfileProteus OCM Company Profile
Proteus OCM Company ProfileKGanzy
 
TITUS JOHN NJUHIGU- cv
TITUS JOHN NJUHIGU- cvTITUS JOHN NJUHIGU- cv
TITUS JOHN NJUHIGU- cvtitus njuhigu
 
Titus john njuhigu cv
Titus john njuhigu  cvTitus john njuhigu  cv
Titus john njuhigu cvtitus njuhigu
 
Quality and Information Security Assurance
Quality and Information Security AssuranceQuality and Information Security Assurance
Quality and Information Security AssuranceKumud Mishra
 
Nauman_Shah Resume
Nauman_Shah ResumeNauman_Shah Resume
Nauman_Shah ResumeNauman Shah
 
Visual_ CV_of_Umesh ranade
Visual_ CV_of_Umesh ranadeVisual_ CV_of_Umesh ranade
Visual_ CV_of_Umesh ranadeUmesh ranade
 
Steve alameda burlingame ca
Steve alameda   burlingame caSteve alameda   burlingame ca
Steve alameda burlingame caSteve Alameda
 
Consultant Profile - Ellen R Shaffer_21JUN2016
Consultant Profile - Ellen R Shaffer_21JUN2016Consultant Profile - Ellen R Shaffer_21JUN2016
Consultant Profile - Ellen R Shaffer_21JUN2016Ellen Shaffer
 

Similar to Consulting_Audit_Security (20)

Bayo Omisore, IT Auditor-Compliance Analyst
Bayo Omisore, IT Auditor-Compliance AnalystBayo Omisore, IT Auditor-Compliance Analyst
Bayo Omisore, IT Auditor-Compliance Analyst
 
Dennis Batdorf resume
Dennis Batdorf resumeDennis Batdorf resume
Dennis Batdorf resume
 
Balaji Jagan -Resume
Balaji Jagan -ResumeBalaji Jagan -Resume
Balaji Jagan -Resume
 
Resume-APOORVA KABRA
Resume-APOORVA KABRAResume-APOORVA KABRA
Resume-APOORVA KABRA
 
Castillo 011117
Castillo 011117Castillo 011117
Castillo 011117
 
Saikiran_CV_Operational Risk_updated
Saikiran_CV_Operational Risk_updatedSaikiran_CV_Operational Risk_updated
Saikiran_CV_Operational Risk_updated
 
Saikiran_CV_Operational Risk_updated
Saikiran_CV_Operational Risk_updatedSaikiran_CV_Operational Risk_updated
Saikiran_CV_Operational Risk_updated
 
Thomas reinheimer resume 04152016
Thomas reinheimer resume 04152016Thomas reinheimer resume 04152016
Thomas reinheimer resume 04152016
 
Proteus OCM Company Profile
Proteus OCM Company ProfileProteus OCM Company Profile
Proteus OCM Company Profile
 
TITUS JOHN NJUHIGU- cv
TITUS JOHN NJUHIGU- cvTITUS JOHN NJUHIGU- cv
TITUS JOHN NJUHIGU- cv
 
Titus john njuhigu cv
Titus john njuhigu  cvTitus john njuhigu  cv
Titus john njuhigu cv
 
G-CISO
G-CISOG-CISO
G-CISO
 
Quality and Information Security Assurance
Quality and Information Security AssuranceQuality and Information Security Assurance
Quality and Information Security Assurance
 
Nauman_Shah Resume
Nauman_Shah ResumeNauman_Shah Resume
Nauman_Shah Resume
 
S Rod Simpson Resume
S Rod Simpson ResumeS Rod Simpson Resume
S Rod Simpson Resume
 
Mahalakshmi_Profile
Mahalakshmi_ProfileMahalakshmi_Profile
Mahalakshmi_Profile
 
Visual_ CV_of_Umesh ranade
Visual_ CV_of_Umesh ranadeVisual_ CV_of_Umesh ranade
Visual_ CV_of_Umesh ranade
 
Steve alameda burlingame ca
Steve alameda   burlingame caSteve alameda   burlingame ca
Steve alameda burlingame ca
 
Consultant Profile - Ellen R Shaffer_21JUN2016
Consultant Profile - Ellen R Shaffer_21JUN2016Consultant Profile - Ellen R Shaffer_21JUN2016
Consultant Profile - Ellen R Shaffer_21JUN2016
 
Michael Bowers Resume
Michael Bowers ResumeMichael Bowers Resume
Michael Bowers Resume
 

Consulting_Audit_Security

  • 1. Benjamin EssombeP P: 470 535 9898 | email: benpenda1@gmail.com | Atlanta, GA IT Security Analyst Consultant I’m a results-driven Information System Security Consultant with experience in IT Audit, Risk Management Framework, Vulnerability Management, Risk Assessment, and System Development Life Cycle (SDLC). A proven project and team manager with aptitude for good customer service, leadership, excellent communication and problems solving skills PROFESSIONAL EXPERIENCE Information System Security Analyst PALSUR LLC. February 2014 - Present  Conduct Security Assessment & Authorization tasks (Security Controls Testing; Vulnerability Scanning; Penetration Testing; and Authorization Approval)  Develop, review, and update Information Security System Policies, System Security Plans, and Security baselines in accordance with NIST/FISMA Framework for federal agencies; SANS-20 and ISO 27001 ISMS Framework for commercial and International organization.  Perform Incident report and management task  Apply appropriate information security control for Federal Information System  Develop and review System Security Plans, Plan of Action and Milestones, Security Control Assessments, Configuration Management Plan, Contingency Plans, Incident Response Plans (IRP), and other specific security documentation in accordance with NIST SP 800-37 rev 1, 800-18, 800-53 rev 4 and 800-34.  Performed vulnerability and baseline scans on the client network using Retina Network SecurityScanner (RNSS) and Nessus in accordance with the organization Continuous Monitoring Plan and NIST 800-137.  Worked with IT Operations and Network Engineers to mitigate system vulnerabilities discovered in network  Prioritized and managed service requests, incident management, escalation, and reporting to maintain service level agreement. Information System Auditor MOTIVON Inc. 01/2012 – 02/2014  Conducted review of key IT General Control (ITGC)  Conduct audited walkthrough, assisted with Audit facilitation  Perform and document audit activities in accordance with professional industry standards: COBIT, COSO, PCI, HIPPA, SOX and SOC SSAE 16  Tested IT SOX controls  Conducted IT Risk Assessment and Compliance Audit
  • 2. Benjamin EssombeP P: 470 535 9898 | email: benpenda1@gmail.com | Atlanta, GA IT Business Analyst ORISON IT Inc. Jun 2011 – July 2012 IT Business Analyst  Planning and monitoring  Elicited requirements  Gathered business requirements  Translated and simplified requirements  Requirements management and communication PCT / CCHT Davita Inc January 2003 – Jun 2011  Assisted in treatment quality improvement projects  Served as preceptor  Staff and patient scheduler  Served as access manager  Safety manager Financial Manager SOCOMAR Sarl, Cameroon October 1998 – December 2002  Assisted in determining the company’s proper capital structure  In charge of financial department  Helped the company efficiently managed business expense  Engage in ongoing cost reduction analysis in all areas of the company  Prepares reports and audits current procedures and processes to monitor efficiency of operations EDUCATION  DeVry / Keller University Decatur, GA Current Student MBA / Project Management  Devry University Decatur, GA Bachelors of Business Administration / Finance, 2014  University of Douala Cameroon Bachelors of Business Administration 2002 CERTIFICATION  CISSP in process