Leann Sohne - Technical Writer (Security Policies) |
[email protected] |
Location: Remote, Remote, USA |
Relocation: |
Visa: |
Leann Sohne
2/4/2025 Professional Summary Dynamic technical writer and compliance expert with over 20 years of experience in technical writing, federal compliance, NIST security and compliance policy development, business writing, and IT enterprise documentation. Proven track record in managing complex projects across government, military, and aerospace sectors, specializing in the development of security manuals, enterprise policies, compliance frameworks, and federal proposals. Skilled at fostering consensus among stakeholders, driving content strategy, and ensuring regulatory compliance. Core Competencies Technical Writing & Documentation NIST Security Frameworks, Controls & Compliance Federal Proposals & Grant Writing Project & Program Management IT Security Policies & Procedures System Security Plans (SSPs) Risk Management & Security Assessments SharePoint & Knowledgebase Development Policy Development & Regulatory Frameworks Technical Writing & Documentation Develop, write, and manage IT security manuals, enterprise policies, and business documentation to support federal compliance frameworks. Translate complex business and technical requirements into user-friendly documentation, including technical design documents, user guides, and system engineering diagrams. Create and maintain information architectures, knowledgebases, and SharePoint sites to support enterprise-wide content management. Conduct SME interviews to gather technical data and create comprehensive documentation aligned with compliance and security standards. Compliance & Security Expertise Over 10 years of experience with NIST security controls, system security plans, security assessments, and the development of IT security standards. In-depth knowledge of NIST Special Publications 800-53, 800-171, FedRAMP, DFARS, ISO/IEC 27001:2022, and GSA compliance requirements. Develop, review, and maintain compliance-related policies and procedures, applying a risk-based approach to regulatory requirements. Drive security initiatives across organizations, ensuring adherence to NIST, GSA, and federal oversight commissions Keywords: information technology |