We provide IT Staff Augmentation Services!

Security Analyst Resume

3.00/5 (Submit Your Rating)

SUMMARY:

To enhance my career as a successful Security Officer in a major global organization utilizing my broad range of Information Technology skills while continuing my security education.

SKILLS:

  • Information Assurance .NET Project Management Risk Management Disaster Recovery
  • Team Leadership Network Security Security Network Administration
  • Security Audits Configuration Management Creative Direction
  • Storage Architecture Solution Implementation Secure VMware Infrastructure
  • Security Systems Integration SharePoint Security Designer Creative Problem Solving
  • Account Management NIST 800 series Vulnerability Assessment Vulnerability Scanning
  • DIARMF NISPOM IBM AppScan Kali Accounting Finance WebSense Palo Alto Malware Analysis

EXPERIENCE:

Confidential

Security Analyst

Responsibilities:

  • Design, Develop, and Govern SharePoint 2013 Security Architecture Plan
  • Utilize Nessus, Metasploit, Nexpose to perform security assessments
  • Perform Malware Analyze for Indicators of Compromise
  • Perform Web application testing using IBM AppScan
  • Participate in CIRT table top exercises
  • Provide Digital Forensic investigation documentation
  • Confidential malware and botnet indicators
  • Create PowerShell scripts for security tasks
  • Review Information security training
  • Review Information Security architecture designs
  • Review Cyber Incident handling Documents
  • Review Rapid7, Nessus scans
  • Apply NIST standards to security framework
  • Review SSAE 16
  • Perform .NET code reviews
  • Apply ISO 27000 Standards
  • Provide data classification briefings

Confidential

Information Technology Specialist

Responsibilities:

  • Audit Information Systems employing Risk Management Framework
  • Perform auditing/reviews at contractor facilities in accordance with NISPOM and NIST policies
  • Use Python, VBScript, to create security scripts
  • Utilize tools inside KALI (formerly BackTrack) performing penetration testing especially the Metasploit toolkit
  • Develop guidelines, instructions, methodologies, techniques, and standards for the analysis, testing, and evaluation of Information Systems
  • Provide guidance and technical assistance to Representatives and Security Manager
  • Advise and assist the Security Manager on conducting facility security validations to ensure facility and Systems security
  • Referring and recommending solutions to KMP (Key Management Personnel)
  • Audit defined security Profiles and configuration management, DR/Continuity plans
  • Analyze, evaluate, and verifying security plans for Windows 2008, 2003, 7, XP SP3, Unix, Linux, AIX, and Solaris computer systems, complex LAN s and WAN s, SQL and ORACLE databases, within established timelines to ensure protection of classified or confidential information
  • Verify IDS/IPS placement and configurations within secure networks ( HIPS and NIPS)
  • Documenting security plan errors and/or omissions and corresponding and communicating errors and/or omissions to Security Managers and executives
  • Prepare certification and accreditation approval letters and supporting documentation
  • Perform security and training briefs to companies
  • Participating in developing, implementing, or conducting IS security training sessions
  • Provide technical guidance and assistance in the development of training materials
  • Systemically sample systems inside enclave to verify GPO (Group Policy Object) settings and or security templates deployed through standard *.inf templates
  • Inspect, assess core and edge switches to ensure proper configurations utilizing STIGs (Standard Technical Implemental Guides) developed by NSA or NIST certified
  • Utilize Retina to verify defined security setting inside enclave
  • Responsible for maintaining IT proficiency
  • Participating as an Information Security representative at conferences and special meetings on matters relevant to Information Security
  • Maintain close and continuous liaison within the industry information assurance communities to keep abreast of system security matters and their impact on Industrial Security
  • Keep up - to-date with state of the art technology developments and its impact to Industrial Security
  • Participate in the development and analysis of management data and reporting systems

Confidential

SharePoint Developer

Responsibilities:

  • Advanced knowledge and understanding of data base administration with applicable Server Integration Services and/or related technology. Strong Transact SQL skills, including coding/debugging/performance tuning of complex stored procedures
  • Advanced knowledge of database analysis, manipulation, mapping cleansing; data structures; exporting data; data processes/flow; database performance tuning/optimizing
  • Ensure change management requirements are met
  • Troubleshoot database issues, identify root causes, and implement optimal solutions
  • Prepare written activity status reports
  • Lead for SQL Server DBA requirements
  • Ensure processes in place for service pack updates
  • Create, backup and restore the web parts in SharePoint
  • Create and maintain detailed database documentation
  • Creating, testing and deployment of workflows using SDLC
  • Capacity planning and KPI gathering for all DB systems
  • Expert knowledge in developing SharePoint 2010 & 2013 solutions
  • Expert knowledge in SharePoint customization
  • Expert knowledge in SharePoint search configuration
  • Good Knowledge of design pattern (MVP)
  • Good knowledge of team leading
  • Expert knowledge of .net framework
  • Ensure proper stored procedures to thwart SQL injections

Confidential

Information Technology Specialist

Responsibilities:

  • Supervise all IT services according to ITIL requirement
  • Direct and oversee all Information Systems
  • Chair Configuration board for new system approval or hardware/software changes
  • Configure desktops, servers utilizing PXE server with security harden image to satisfy DIACAP requirements
  • Prepare security audit procedures
  • Utilize Backup applications Commvault for data availability
  • Utilized WireShark for network sniffing
  • Utilized ACAS for vulnerability scanning
  • Managed Symantec Server for antivirus definition updates
  • Managed, directed OS upgrades
  • Resolved 200+ trouble tickets/month with 100% satisfaction
  • Conducted thorough accountability of IT assets accounting for 100%
  • Revised authentication protocol for .net ASP application to enhance security footprint
  • Oversee all VTC (Video Teleconference) and SVTC (Secure Video Teleconference)
  • Drafted revised and launched system architecture proposal plan for physical to virtual migration for application server running ORACLE
  • Designed normalized database schema for enhanced functionality of custom .net application

Confidential

Information Technology Specialist

Responsibilities:

  • Managed virtualization plan from cradle to grave
  • Implemented PAGP on Confidential 6500 for Confidential tagging to separate ISCSI, administrative, public, NFS traffic
  • Detailed Coop and virtualization plans using Visio and Gantt charts and developed, published continuity artifact
  • Installed configured 16 blade servers with vSphere architecture
  • Created hardened server template for easily deploying servers that meet NSA guidelines for virtual servers
  • Initiated and overseen data centralization of desktop data with active directory folder redirection
  • Revamped Intranet and Internet site using .net technology and CSS (cascading style sheets)
  • Set up extensive virtual network implementing 10 GB Ethernet with Confidential port aggregation
  • Configured NAS/SAN interface for virtualization and oracle projects
  • Successfully designed and implemented complete coop/DR plan
  • Served as technical advisor for all systems projects
  • Conducted feasibility studies for new projects
  • Expert in encryption standards
  • Expert in PKI infrastructure
  • Expert in providing servers and workstations baseline requirements to satisfy security standards
  • Expert in risk management measures for security auditing to lessen business cost
  • Expert in converting complex technical information into clear concise terms for project implementation
  • Excellent in converting business practices to technology needs
  • Excellent in communication to subordinates, peers, and higher authorities
  • Expert in Confidential (Fiber Channel over Ethernet) using virtual network technology and Confidential IOS
  • Understanding of capability frameworks such as CMMI
  • Understanding of industry standard project management methods (e.g. PMBOK)
  • Understanding of TOGAF Enterprise Architecture framework
  • Understanding of industry standard development methods (e.g. RUP, SCRUM)

Confidential

Network/System Administrator

Responsibilities:

  • Developed/managed IT budget during CIO absence
  • Oversaw all IT aspects for 13 branches geographically dispersed
  • Handled all customer interaction regarding Information technology
  • Configured AS400
  • Aided in Data set merge during transition to in - house processing
  • Developed custom IT trouble ticket application with .Net technology and SQL database
  • Developed custom VB applications for excel to expedite loan calculations
  • Handled all ATM's in 13 locations implementing 3DES encryption
  • Oversee and performed conversion from Windows NT to active directory
  • Handled all auditing requirements according to Sarbanes-Oxley
  • Implemented VOIP over DS3 using Confidential technology
  • Converted T1 to DS3 for voice support
  • Installed and configured DNS servers
  • Moved entire Data center a distance of 30 miles maintaining 100% availability

Confidential

Avionics Sensor Maintenance Technician

Responsibilities:

  • Maintain, repair, and inspect avionic sensor electronic systems equipment
  • Expert in infrared detection sets, closed circuit and low light level television, night vision goggles, optical cameras
  • Expert in laser target designators, laser receivers, terrain following radar, sensor control systems
  • Ensured resolution of all optical components checking integrity of wiring, and gyroscopic stabilization systems
  • Experienced in the use of oscilloscopes, multi-meters, pulse function generators, scope-meters, time domain reflect meter, collimators and various pieces of measurement equipment
  • Assured proper integration of avionic sensor systems with various other aircraft avionic systems
  • Repaired Circuit Cards following

We'd love your feedback!