La Toya Haigler

La Toya Haigler

$50/hr
Cybersecurity, Information Technology, End User Support
Reply rate:
-
Availability:
Hourly ($/hour)
Age:
45 years old
Location:
Severn, Maryland, United States
Experience:
15 years
L. Monique Haigler- |- 10 Pt Preference Eligible Veteran | US Citizen | VEOA | VRA | Schedule A EligiblE CYBER | CLOUD ENGINEERING | IT PROGRAM MANAGEMENT Resourceful, strategic IT leader with over 15 years of extensive experience in cybersecurity, risk management, program management , cloud engineering, and information assurance. Expert in developing, implementing, and managing comprehensive cybersecurity programs to safeguard critical infrastructure and sensitive data. Proven ability to lead cross-functional teams in identifying vulnerabilities, mitigating risks, and ensuring compliance with federal regulations and industry standards. Demonstrated success in incident response, threat analysis, and the deployment of advanced security technologies. Adept at fostering a culture of security awareness through training and policy development. Recognized for strategic vision and hands-on approach to cybersecurity management, delivering robust solutions that enhance organizational resilience and operational continuity. •Exceptional attention to detail and proven ability to identify process improvement opportunities and adhere to project schedules. •Strong expertise in performing extremely analytical, detail-oriented tasks creating, deploying, and managing new ideas and creative solutions to achieve optimally desired organizational results. •Excellent oral and written communication skills and strong interpersonal skills. •Strong organizational, planning, and project management skills. SUMMARY OF QUALIFICATIONS Project Management: Participated in developing project plans, operating plans, and supporting budgets: determining scope, methods, and resource requirements and schedules for projects. Provided input to requirements statements for acquisition and participated in technical evaluations. Operations: Tracked performances, and handled timekeeping, work completions, and customer surveys. Trained staff on customer service operations, handling a variety of call centers, customer service points, issues and resolutions. Managed budgets, approved purchase requests, managing a variety of financial systems. Managed procurement and purchasing requests. Mastery in multi-tasking, documenting administrative processes and procedures, prioritizing assignments, and researching and analyzing investigative and administrative leads. Experienced in handling confidential information and sensitive materials. Technical & Business Leadership: Handles a variety of business operations such as HR, inventory, and customer service management. Provides IT services to clients with a focus on cybersecurity, project management, and service desk management. Manages IT project planning and execution by managing changes, reviewing open issues, and communicating essential information to the project team and stakeholders. Quickly identifying areas for improvement to processes across an organization and recommending solutions that provide value. Information Security: Knowledgeable of the concepts of security, compliance, and risk assessment as well as have the technical ability to converse with software engineers about their plans and security concerns. Experience in FISMA and FedRAMP compliance and NIST-800-53 security specifications Management: Over ten years of managing performance, staff promotions, review of works performed, training, and staffing. Built a motivating environment that focuses on encouraging team members, and their development. PROFESSIONAL EXPERIENCE Amazon, Remote Cloud Support Engineer09/2022 to Present Hours Per Week: 40 Related Competencies: Issue Resolution, Team Collaboration, Technical Support, Troubleshooting, Performance Tuning, Incident Management, Customer Service, Communication Skills, Problem Solving, Technical Documentation, Analytical Thinking, Root Cause Analysis, SLA Management, Automation, Configuration Management, System Monitoring, Process Improvement, Capacity Planning, Escalation Management, Security Compliance, Technical Training, Log Analysis, Scripting Skills, Disaster Recovery, Risk Assessment, Change Management, Attention to Detail, Customer Service, Oral Communication, Problem Solving Optimize company policies, procedures, and tools through meticulous proofreading and constructive feedback. Improve user experience by collaborating with service teams and account managers to deliver high-quality support. Optimize account management by conducting in-depth analyses of Enterprise customer accounts. Utilizes Mastery level knowledge of project management principles, methods, and practices, including developing plans and schedules, estimating resource requirements, defining milestones and deliverables, monitoring activities, and evaluating and reporting on accomplishments sufficient to correctly interpret, apply, and develop policies and procedures and to ensure a high level of technical support to the organization. Executes process improvements and led organizational process changes; maintained compliance with policies, procedures, and regulations. Key Achievements: Enhanced client retention by successfully resolving escalated customer service issues. Increased efficiency by streamlining the processing of customer cases using case management tools and email. Ensured compliance with SOP and policies by accurately handling spam cases and assessing email deliverability. Improved customer satisfaction by managing day-to-day customer care and cloud services administration effectively. WheelsUP / ADISYS, Remote Cyber Threat Security Analyst04/2022 to 03/2023 Hours Per Week: 40 Related Competencies: Network Security, Incident Response, Threat Intelligence, Malware Analysis, SIEM (Security Information and Event Management), Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), Firewall Management, Penetration Testing, Vulnerability Assessment, Cyber Forensics, Security Information Management (SIM), Risk Assessment, Compliance Management, Endpoint Protection, Cryptography, Scripting (Python, PowerShell), Security Policies, Cloud Security, Network Protocols, Log Analysis, Attention to Detail, Customer Service, Oral Communication, Problem Solving Strengthened risk management by developing cyber scenarios and tracking Key Risk Indicators (KRIs). Continuously developed threat detection and prevention systems to adapt to evolving threats. Improved awareness and response capabilities by presenting daily cyber threat reviews. Provided effective cybersecurity recommendations to organizations of varying maturity levels, from those that advance the state of practice in the field to those that are establishing initial cybersecurity capabilities. Key Achievements: Ensured compliance with industry standards, enhancing organizational security posture. Protected client business functions from cyber-attacks through critical threat research and analysis. Enhanced system security through comprehensive review of IA certification and accreditation. Reduced operational risks by identifying and mitigating threats and vulnerabilities. JACOBS (VDTG), Columbia, MD Cyber Threat Intel Analyst / ISSM / TTO Lead08/2015 to 10/2021 Hours Per Week: 40 Related Competencies: Threat Intelligence Analysis, Security Information And Event Management (SIEM), Incident Response, Network Security, Vulnerability Management, Risk Assessment, Security Clearance Requirements, Security Policies And Procedures, Security Tools, Compliance Frameworks, Cyber Threat Hunting, Penetration Testing, Cyber Threat Modeling, Malware Analysis, Attention to Detail, Customer Service, Oral Communication, Problem Solving Provided expert guidance on information system management to a team of six employees and over 100 SSPs, fostering collaboration and effective leadership. Facilitated clear understanding and adherence to security protocols through the development of comprehensive documentation including System Security Plans (SSP) and Incident Response plans. Enabled efficient data flow management and governance by creating detailed hardware/software lists and topology diagrams, enhancing organizational transparency and facilitating Privacy Impact Assessments (PIA). Performed risk management framework security determinations of fixed, deployed, and mobile information systems and telecommunications resources to monitor, evaluate, and maintains systems, policy, and procedures to protect clients, networks, data/voice systems, and database from unauthorized activity. Reviewed service performance reports identifying any significant issues and variances, initiating, where necessary, corrective actions and ensuring that all outstanding issues are followed up. Gave advice, counsel, and instruction to employees on both work and administrative matters.Made recommendations regarding the selection of cost-effective security controls to mitigate risk (e.g., protection of information, systems, and processes). Identified the need for changes based on new security technologies or threats Key Achievements: Heightened network efficiency and reliability through streamlined performance testing methodologies, reflected in improved performance statistics and reports. Strengthened security posture by identifying and resolving cross-domain violations, contributing to enhanced risk mitigation strategies. Bolstered compliance with NIST standards, certifying and hardening classified information systems to fortify security protocols. Ensured seamless user experience and satisfaction by optimizing software functionality through rigorous testing and troubleshooting. Agency Consulting Group, Columbia, MD System Engineer (Operations Manager)04/2014 to 02/2015 Hours Per Week: 40 Related Competencies: Cloud Computing, Virtualization, Network Administration, DevOps, Automation, IT Security, Disaster Recovery, Linux Administration, Windows Server Administration, Scripting, Database Management, Monitoring and Alerting Tools, Configuration Management, Containerization, CI/CD pipelines, Attention to Detail, Customer Service, Oral Communication, Problem Solving Enhanced mission readiness for over 750 critical systems, ensuring uninterrupted operations through correlated downtime analysis. Guaranteed swift deployment and adherence to security protocols, maintaining system stability and readiness. Led proactive risk monitoring, resulting in strategic mitigations against equipment failures. Supervised and executed work that involved security operations (ex. cyberspace, threat reduction, vulnerability reduction, deterrence, internal engagement). Key Achievements: Optimized efficiency and minimized operational disruptions through strategic resource allocation guidance. Maintained system integrity and functionality, achieving seamless deployment of patches, service packs, and upgrades. Improved system reliability and reduced vulnerability to cyber threats through streamlined patch management processes. Ensured systems remain at the cutting edge of technology and capability by implementing robust mechanisms for baseline upgrades. Booz Allen Hamilton, Annapolis Junction, MD Requirements Manager09/2012 to 04/2014 Hours Per Week: 40 Related Competencies: Stakeholder Engagement, Requirements Elicitation, Documentation Management, Configuration Management, Risk Analysis, Quality Assurance, Agile Methodology, System Engineering, Technical Writing, and Change Management, Attention to Detail, Customer Service, Oral Communication, Problem Solving Ensured optimal utilization of current resources and alignment with evolving mission needs by authoring, amending, and revalidating Collection Requirements. Spearheaded strategic analysis to define targetable intelligence, leading to refined techniques and improved access and collection discovery methods. Conducted initial intelligence research and analysis for access and collection discovery, identified collection gaps, prioritized collection, and strategically aligned collection posture with mission requirements. Continually improved methods and procedures for processes, measurement, documenting, and workflow techniques. Answered inquiries and addressed, resolved, or escalated management personnel issues to ensure client satisfaction and received and routed business correspondence to the correct department or staff members Key Achievements: Optimized intelligence-gathering capabilities, resulting in enhanced resource allocation, refined techniques, and aligned collection posture with mission objectives. Improved efficiency and effectiveness in intelligence operations through evaluation and enhancement of the entire product line for collection, access, and target discovery. Enhanced overall intelligence-gathering processes by providing expert recommendations for improvements in tools, procedures, and resources. Applied Signal Technology, Annapolis Junction, MD CND Analyst02/2011 to 01/2012 Hours Per Week: 40 Related Competencies: Network Security, Intrusion Detection, Incident Response, Malware Analysis, Cyber Threat Intelligence, Packet Analysis, SIEM Management, Vulnerability Assessment, Forensic Analysis, and Cyber Defense Technologies, Attention to Detail, Customer Service, Oral Communication, Problem Solving Ensured continuous system integrity and threat detection through security tool configuration and monitoring. Preempted potential threats by analyzing network traffic and IDS alerts. Contributed to proactive threat mitigation by characterizing and analyzing network traffic. Key Achievements: Enhanced network security posture by identifying and mitigating anomalous activity. Optimized response efficiency by prioritizing and differentiating intrusion attempts from false alarms. Reduced noise and enhanced alert accuracy by implementing filters to mitigate false positives. Computer Science Corporation, Hanover, MD Lead Citrix VMware Administrator / Intrusion Detection Analyst04/2010 to 09/2012 Hours Per Week: 40 Related Competencies: Citrix Administration, VMware Administration, Intrusion Detection, Network Security, Security Information and Event Management (SIEM), Cybersecurity Tools, Incident Response, Network Monitoring, Penetration Testing, Firewall Management, Endpoint Security, Security Policy Enforcement, Vulnerability Assessment, Threat Analysis, Log Analysis, Security Architecture Design, Attention to Detail, Customer Service, Oral Communication, Problem Solving Strengthened network defences and minimized threats through the implementation of intrusion detection and prevention systems. Safeguarded organizational assets through comprehensive network security assessments. Facilitated early detection and mitigation of potential security breaches via robust network monitoring and analysis. Key Achievements: Enhanced operational resilience by proactively maintaining and managing Citrix provisioning servers. Improved security posture and access control by optimizing user account administration within Active Directory. Increased reliability and data integrity by ensuring seamless functionality of critical servers. Additional Experience: System Support Engineer (2006 to 2010), BAE Systems, McLean, VA. Network Security Technician (2005 to 2006), SSI Services, Inc., Falls Church, VA System Engineer (2003 to 2005), Early Morning Software, Baltimore, MD Network Engineer (2002 to 2003), Windermere, Annapolis, MD Signals Analyst (1997 to 2002), United States Army, Various Locations EDUCATIONAL BACKGROUND Master’s Degree, Cybersecurity (2019), University of Maryland Baltimore College Bachelor of Arts (BA), Business Management (2010), Strayer University Bachelor of Science (BS), Information Systems (2007), American Intercontinental University CERTIFICATIONS Technology Sales Certificate (2022), UMBC Training Center, Virtanza Graduate Certificate in Cybersecurity Strategy and Policy (2018), University of Maryland Baltimore College Graduate Certificate in Cybersecurity Operations (2018), University of Maryland Baltimore College Undergraduate Certificate in Security Administration (2019), Strayer University AWS Certified Cloud Practitioner Certificate CompTIA CASP Certificate iTil V3 Foundations Certificate CompTIA Linux+ Certificate EC Council Certified Network Defense Architecture (CNDA) EC Council Certified Ethical Hacker (CEH) CompTIA Security+ Certificate REFERENCES available upon request “I certify that, to the best of my knowledge and belief, all of my statements are true, correct, complete, and made in good faith.” March 20, 2025
Get your freelancer profile up and running. View the step by step guide to set up a freelancer profile so you can land your dream job.