TS/SCI w/ Full Scope Poly · ISSE · RMF · Vulnerability Management · Continuous Monitoring

Chari
Pollard

// Information Systems Security Engineer · Security Authorization · System Hardening · Risk Analysis

Multi-skilled cybersecurity professional with deep experience in information systems security engineering, risk management, continuous monitoring, vulnerability remediation, systems administration, and mission-critical operational support. Chari’s background spans security authorization, NIST 800-53 RMF implementation, secure systems validation, audit and control review, IAVA and patch management, enterprise Windows administration, and classified environment support. She has consistently delivered high-impact security support across government and defense-focused environments while staying within budget, time, and compliance constraints.

TS/SCI w/ Full Scope Poly CAP · CEH · CHFI CASP · Security+ · Network+ RMF / POA&M / Continuous Monitoring Windows · VMware · Cisco · Active Directory
20+ Years of experience across systems administration, enterprise security operations, vulnerability remediation, and information assurance support
300+ Security controls self-tested during authorization and reauthorization efforts in classified mission environments
4 System security plans supported simultaneously while maintaining compliance, documentation, and patch accountability
100% Focused on secure system availability, continuous monitoring discipline, and mission-ready compliance execution
// 01

By the Numbers

20+

Years of Technical Security Experience

Career history spans enterprise Windows administration, information assurance, system hardening, vulnerability management, RMF, and secure support operations.

300+

Controls Reviewed & Self-Tested

Completed extensive control validation and self-testing across authorization and reauthorization efforts to sustain agency and NIST alignment.

4

System Security Plans Supported

Maintained compliance, patch accountability, and supporting documentation across multiple active system security plans.

2

Graduate Degrees Completed

Earned advanced degrees in Cyber Technology and Cloud Computing Systems, reinforcing security engineering and modern infrastructure depth.

// 02

Operational Highlights

ISSE · SLA Support · Security Authorization

Supports Monthly Security & SLA Readiness

Provides technical support to help agency systems meet monthly service level requirements while supporting A&A efforts, RMF activities, secure system validation, and security reporting across classified and unclassified environments.

SLA Support A&A NIST 800-53 IATT / ATO
RMF · Continuous Monitoring · Vulnerability Remediation

Executed 300+ Control Self-Tests

Performed security self-testing across more than 300 controls during authorization and reauthorization efforts, using Nessus and baseline review processes to drive system-level remediation and stronger compliance posture.

300+ Controls Nessus Baseline Review Continuous Monitoring
DoD Security Posture · Audit Review · POA&M Tracking

Managed Security Documentation End-to-End

Supported system security plans, continuous monitoring, audit review, decommissioning, risk assessments, vulnerability tracking, and POA&M lifecycle management while coordinating with system owners and stakeholders.

SSP POA&M Risk Assessments Audit Reviews
Systems Administration · Deployment Support · Secure Infrastructure

Built Security from the Server Layer Up

Delivered hands-on administration across Windows Server, VMware, DNS, DHCP, VPN, wireless, patching, and virtual infrastructure while supporting NIPR, SIPR, and other mission environments requiring hardened, always-available systems.

Windows Server VMware DNS / DHCP NIPR / SIPR
// 03

Experience

Jan 2021 — Present
Information Security Engineering · Agency Compliance

Information Systems Security Engineer

AT&T
  • Provides technical support to ensure agency systems meet monthly SLA requirements and remain aligned with security expectations.
  • Supports Authorization and Accreditation efforts using NIST 800-53 RMF across the design lifecycle for classified and unclassified systems.
  • Reviews risk and security assessment reports and provides recommendations to support reauthorization activities.
  • Configures and validates secure systems and physical controls and tests security products to detect weaknesses.
  • Assists ISSOs with waivers, liens, information gathering, compliance monitoring, vulnerability scanning coordination, and system self-test validation.
  • Provides technical guidance for security incidents, reporting activities, and integrated security system support.
Oct 2019 — Dec 2021
ISSO / ISSE · RMF Execution

Information Systems Security Officer / ISSE (Level 1)

AiTech
  • Served as security technical advisor for full system security testing to ensure agency and NIST policy enforcement.
  • Acted as liaison between administrators, engineers, and authorizing stakeholders to help deploy new technologies and complete QRC efforts.
  • Made recommendations using RMF guidance under NIST SP 800-30 and 800-39.
  • Completed self-testing reports across more than 300 security controls during authorization and reauthorization efforts.
  • Conducted Nessus scans, interpreted results, and recommended baseline fixes to administrators and engineers.
  • Reviewed OS settings, monitored security requirements, and supported continuous monitoring across mission-critical platforms.
Apr 2016 — Oct 2019
DoD Continuous Monitoring · Security Documentation

Information Systems Security Officer

Jacobs Engineering
  • Supported DoD information system security posture through RMF continuous monitoring activities.
  • Performed daily, weekly, and monthly reviews to sustain system compliance and audit collection management.
  • Conducted decommissioning activities and created System Security Plans using DoD in-house tools.
  • Performed risk assessments in accordance with RMF and NIST SP 800-30 / 800-39 guidance.
  • Tracked vulnerabilities, IAVAs, patches, and POA&Ms through mitigation and risk acceptance.
  • Worked with stakeholders to maintain current system security documentation, access controls, and system responsibilities.
Feb 2013 — Apr 2016
Systems & Network Administration · Security Planning

Systems and Network Administrator

Leidos
  • Provided security planning, assessment, risk analysis, and risk management for secure infrastructure systems.
  • Supported DNS, email, VPN, wireless networks, firewalls, and enterprise authentication through troubleshooting and maintenance.
  • Performed system audits to assess security issues, mitigate findings, and report results.
  • Maintained virtual machines, DNS, DHCP, and implementation support for multiple IT systems.
  • Ensured systems were operated, maintained, and disposed of in accordance with internal security plans and practices.
  • Supported four active system security plans and tracked patches for compliance using agency tooling.
Mar 2012 — Dec 2012
Deployed IT Security Support · Afghanistan

IT Security Specialist / System Administrator

DSCI · Network Operation Center, Camp Phoenix, Kabul, Afghanistan
  • Provided enterprise-level administration and engineering support across Windows Server, SAN, and desktop systems in NIPR, SIPR, and Centrix networks.
  • Worked with ISSE teams to conduct weekly security and vulnerability scans across multiple networks.
  • Helped enforce government policies protecting confidentiality, integrity, and availability of information systems.
  • Supported preventive maintenance and secure operation of complex datacenter virtual environments using VMware vSphere and ESXi.
  • Implemented security patches using SCCM and scanning tools in alignment with IAVA and other defense guidance.
Jul 2009 — Mar 2012
Enterprise Monitoring · Patch Compliance

Windows System Administrator

Tech USA Inc. · Global Enterprise Command Center, National Security Agency, Fort Meade, MD
  • Monitored, diagnosed, troubleshot, and escalated issues on Windows Server environments supporting global warfighter operations.
  • Processed agency-approved IAVA patches for Microsoft and RHEL/Linux systems and tested releases before deployment.
  • Maintained 100% functional systems through enterprise monitoring tools and updated antivirus definitions across managed environments.
  • Tracked issues through Service Manager and maintained standard operating procedures as needed.
  • Applied incident response knowledge to develop, manage, and administer procedures and scripts for system response activities.
Jan 2005 — Apr 2009
Active Directory · Rapid Response Operations

Windows System Administrator

L-3 STRATIS · V44 Rapid Response Center, National Security Agency, Fort Meade, MD
  • Managed Active Directory environments including Group Policy, server and file access, and user account lifecycle administration.
  • Monitored and diagnosed system performance using enterprise monitoring platforms to ensure continuous functionality.
  • Worked with ISSOs to validate privileged access and keep authorizations current.
  • Supported system owners by enforcing malware protection and ensuring incidents were reported according to NSA/CSS policy.
  • Developed standard operating procedures, coordinated corrective actions, and escalated complex issues to senior management when needed.
// 04

Credentials & Qualifications

Clearance

TS/SCI with Full Scope Polygraph

Trusted to support highly sensitive environments that require disciplined security engineering, rigorous compliance, and mission-ready operational reliability.

Security Certifications

CAP, CEH, CHFI, CASP, Security+, Network+

Certification portfolio reflects depth in authorization, ethical hacking, forensics, advanced security practice, and core network and security fundamentals.

Microsoft & Infrastructure

MCSE, MCSA, MCP, Check Point CCSA

Strong systems foundation across Microsoft enterprise administration, network operations, firewall administration, and secure infrastructure support.

Security Discipline

RMF, Continuous Monitoring, POA&M, Risk Assessment

Hands-on experience with secure system validation, risk assessment and impact analysis, vulnerability administration, and security authorization lifecycle support.

// 05

Technical Skills

// Security Engineering

Authorization & Compliance

Risk Management Framework (RMF)Core
Continuous MonitoringAdvanced
POA&M / Security AuthorizationAdvanced
Risk Assessment & Impact AnalysisStrong
// Vulnerability & Hardening

Secure Operations

Vulnerability ScanningCore
System HardeningAdvanced
IAVA / Patch ManagementAdvanced
Audit Review & Control ValidationStrong
// Systems & Infrastructure

Enterprise Administration

Windows Server / Active DirectoryCore
DNS / DHCP / Remote DesktopAdvanced
VMware / VirtualizationStrong
Firewalls / VPN / Network SecurityStrong
// Platforms & Tools

Operational Tooling

Cisco InfrastructureStrong
Remedy / Service ManagerAdvanced
SCCM / Security Scan ToolingStrong
Technical DocumentationCore
// 06

Let’s Put Chari To Work

Best aligned for information systems security engineering, ISSO/ISSE, RMF execution, continuous monitoring, vulnerability management, system hardening, enterprise Windows administration, and mission-critical cybersecurity roles in highly secure environments.

// 07

Education

University of Maryland Global Campus

Master of Cyber Technology

Graduate education completed in June 2024, reinforcing advanced capability in modern cybersecurity strategy, systems protection, and technical security leadership.

University of Maryland Global Campus

Master of Cloud Computing Systems

Graduate study completed in September 2025, supporting secure cloud-oriented thinking across infrastructure, systems design, and enterprise technology modernization.

DeVry University

Bachelor of Science in Technical Management

Foundational academic training in technical management complements extensive real-world experience in system administration, security operations, and compliance execution.

Professional Development

Security, Microsoft & Infrastructure Certification Portfolio

Professional development spans advanced security certifications, Microsoft enterprise credentials, Check Point administration, and network security training aligned to high-trust operational environments.

AI Certification & Training Portfolio | Accumentum AI Programs

Accumentum® is the leading training provider for a vast array of technology vendors including AWS, Cisco, CompTIA, EC-Council, Fortinet, HRCI, Linux Foundation, Microsoft, Palo Alto, PMI, Salesforce, Scrum, ServiceNow, SHRM, VMWare, and more.

Accumentum® provides training and exam preparation for third-party certifications. Certification names are trademarks of their respective owners. Program availability, schedules, and offerings may vary.

 

Alumni Success Profile - Chari Pollard-Accumentum

 

Alumni Success Profile - Chari Pollard-Accumentum