Laquawn Collins is a seasoned System Security Analyst at Cherokee Federal, where she leverages over 13 years of extensive experience in information technology and security. In her current role, Ms. Collins plays a pivotal part in supporting the National Center for Injury Prevention and Control...
Laquawn Collins is a seasoned System Security Analyst at Cherokee Federal, where she leverages over 13 years of extensive experience in information technology and security. In her current role, Ms. Collins plays a pivotal part in supporting the National Center for Injury Prevention and Control Division (NCIPC) and the Office of Informatics (OI). Her primary responsibilities include ensuring compliance with information security standards and system requirements, which are critical for safeguarding sensitive data and maintaining operational integrity. Collaborating closely with the NCIPC System Security and Privacy Officer (SSPO) and various system stewards, she is instrumental in implementing robust security measures that protect the confidentiality, integrity, and availability of information systems.
Ms. Collins's expertise in IT security assessments and information security analysis is complemented by her proficiency in the Software Development Life Cycle (SDLC) and Agile methodologies. Her detailed-oriented approach enables her to identify vulnerabilities and recommend effective mitigations, ensuring that the organization meets its security objectives. Additionally, her skills in SharePoint, IIS, and disaster recovery planning enhance her ability to manage complex IT environments and support organizational resilience.
As a Certified Information Privacy Professional/Government (CIPP/G), Ms. Collins is committed to fostering a culture of security awareness and compliance within the organization. Her dedication to continuous improvement and her strategic insights into information security make her a valuable asset to Cherokee Federal and the broader IT security community. Through her work, she not only addresses immediate IT-related challenges but also contributes to the long-term security posture of the organization, ensuring that it remains agile and responsive to evolving threats.