Security Analyst Resume
3.00/5 (Submit Your Rating)
SUMMARY:
To enhance my career as a successful Security Officer in a major global organization utilizing my broad range of Information Technology skills while continuing my security education.
SKILLS:
- Information Assurance .NET Project Management Risk Management Disaster Recovery
- Team Leadership Network Security Security Network Administration
- Security Audits Configuration Management Creative Direction
- Storage Architecture Solution Implementation Secure VMware Infrastructure
- Security Systems Integration SharePoint Security Designer Creative Problem Solving
- Account Management NIST 800 series Vulnerability Assessment Vulnerability Scanning
- DIARMF NISPOM IBM AppScan Kali Accounting Finance WebSense Palo Alto Malware Analysis
EXPERIENCE:
Confidential
Security Analyst
Responsibilities:
- Design, Develop, and Govern SharePoint 2013 Security Architecture Plan
- Utilize Nessus, Metasploit, Nexpose to perform security assessments
- Perform Malware Analyze for Indicators of Compromise
- Perform Web application testing using IBM AppScan
- Participate in CIRT table top exercises
- Provide Digital Forensic investigation documentation
- Confidential malware and botnet indicators
- Create PowerShell scripts for security tasks
- Review Information security training
- Review Information Security architecture designs
- Review Cyber Incident handling Documents
- Review Rapid7, Nessus scans
- Apply NIST standards to security framework
- Review SSAE 16
- Perform .NET code reviews
- Apply ISO 27000 Standards
- Provide data classification briefings
Confidential
Information Technology Specialist
Responsibilities:
- Audit Information Systems employing Risk Management Framework
- Perform auditing/reviews at contractor facilities in accordance with NISPOM and NIST policies
- Use Python, VBScript, to create security scripts
- Utilize tools inside KALI (formerly BackTrack) performing penetration testing especially the Metasploit toolkit
- Develop guidelines, instructions, methodologies, techniques, and standards for the analysis, testing, and evaluation of Information Systems
- Provide guidance and technical assistance to Representatives and Security Manager
- Advise and assist the Security Manager on conducting facility security validations to ensure facility and Systems security
- Referring and recommending solutions to KMP (Key Management Personnel)
- Audit defined security Profiles and configuration management, DR/Continuity plans
- Analyze, evaluate, and verifying security plans for Windows 2008, 2003, 7, XP SP3, Unix, Linux, AIX, and Solaris computer systems, complex LAN s and WAN s, SQL and ORACLE databases, within established timelines to ensure protection of classified or confidential information
- Verify IDS/IPS placement and configurations within secure networks ( HIPS and NIPS)
- Documenting security plan errors and/or omissions and corresponding and communicating errors and/or omissions to Security Managers and executives
- Prepare certification and accreditation approval letters and supporting documentation
- Perform security and training briefs to companies
- Participating in developing, implementing, or conducting IS security training sessions
- Provide technical guidance and assistance in the development of training materials
- Systemically sample systems inside enclave to verify GPO (Group Policy Object) settings and or security templates deployed through standard *.inf templates
- Inspect, assess core and edge switches to ensure proper configurations utilizing STIGs (Standard Technical Implemental Guides) developed by NSA or NIST certified
- Utilize Retina to verify defined security setting inside enclave
- Responsible for maintaining IT proficiency
- Participating as an Information Security representative at conferences and special meetings on matters relevant to Information Security
- Maintain close and continuous liaison within the industry information assurance communities to keep abreast of system security matters and their impact on Industrial Security
- Keep up - to-date with state of the art technology developments and its impact to Industrial Security
- Participate in the development and analysis of management data and reporting systems
Confidential
SharePoint Developer
Responsibilities:
- Advanced knowledge and understanding of data base administration with applicable Server Integration Services and/or related technology. Strong Transact SQL skills, including coding/debugging/performance tuning of complex stored procedures
- Advanced knowledge of database analysis, manipulation, mapping cleansing; data structures; exporting data; data processes/flow; database performance tuning/optimizing
- Ensure change management requirements are met
- Troubleshoot database issues, identify root causes, and implement optimal solutions
- Prepare written activity status reports
- Lead for SQL Server DBA requirements
- Ensure processes in place for service pack updates
- Create, backup and restore the web parts in SharePoint
- Create and maintain detailed database documentation
- Creating, testing and deployment of workflows using SDLC
- Capacity planning and KPI gathering for all DB systems
- Expert knowledge in developing SharePoint 2010 & 2013 solutions
- Expert knowledge in SharePoint customization
- Expert knowledge in SharePoint search configuration
- Good Knowledge of design pattern (MVP)
- Good knowledge of team leading
- Expert knowledge of .net framework
- Ensure proper stored procedures to thwart SQL injections
Confidential
Information Technology Specialist
Responsibilities:
- Supervise all IT services according to ITIL requirement
- Direct and oversee all Information Systems
- Chair Configuration board for new system approval or hardware/software changes
- Configure desktops, servers utilizing PXE server with security harden image to satisfy DIACAP requirements
- Prepare security audit procedures
- Utilize Backup applications Commvault for data availability
- Utilized WireShark for network sniffing
- Utilized ACAS for vulnerability scanning
- Managed Symantec Server for antivirus definition updates
- Managed, directed OS upgrades
- Resolved 200+ trouble tickets/month with 100% satisfaction
- Conducted thorough accountability of IT assets accounting for 100%
- Revised authentication protocol for .net ASP application to enhance security footprint
- Oversee all VTC (Video Teleconference) and SVTC (Secure Video Teleconference)
- Drafted revised and launched system architecture proposal plan for physical to virtual migration for application server running ORACLE
- Designed normalized database schema for enhanced functionality of custom .net application
Confidential
Information Technology Specialist
Responsibilities:
- Managed virtualization plan from cradle to grave
- Implemented PAGP on Confidential 6500 for Confidential tagging to separate ISCSI, administrative, public, NFS traffic
- Detailed Coop and virtualization plans using Visio and Gantt charts and developed, published continuity artifact
- Installed configured 16 blade servers with vSphere architecture
- Created hardened server template for easily deploying servers that meet NSA guidelines for virtual servers
- Initiated and overseen data centralization of desktop data with active directory folder redirection
- Revamped Intranet and Internet site using .net technology and CSS (cascading style sheets)
- Set up extensive virtual network implementing 10 GB Ethernet with Confidential port aggregation
- Configured NAS/SAN interface for virtualization and oracle projects
- Successfully designed and implemented complete coop/DR plan
- Served as technical advisor for all systems projects
- Conducted feasibility studies for new projects
- Expert in encryption standards
- Expert in PKI infrastructure
- Expert in providing servers and workstations baseline requirements to satisfy security standards
- Expert in risk management measures for security auditing to lessen business cost
- Expert in converting complex technical information into clear concise terms for project implementation
- Excellent in converting business practices to technology needs
- Excellent in communication to subordinates, peers, and higher authorities
- Expert in Confidential (Fiber Channel over Ethernet) using virtual network technology and Confidential IOS
- Understanding of capability frameworks such as CMMI
- Understanding of industry standard project management methods (e.g. PMBOK)
- Understanding of TOGAF Enterprise Architecture framework
- Understanding of industry standard development methods (e.g. RUP, SCRUM)
Confidential
Network/System Administrator
Responsibilities:
- Developed/managed IT budget during CIO absence
- Oversaw all IT aspects for 13 branches geographically dispersed
- Handled all customer interaction regarding Information technology
- Configured AS400
- Aided in Data set merge during transition to in - house processing
- Developed custom IT trouble ticket application with .Net technology and SQL database
- Developed custom VB applications for excel to expedite loan calculations
- Handled all ATM's in 13 locations implementing 3DES encryption
- Oversee and performed conversion from Windows NT to active directory
- Handled all auditing requirements according to Sarbanes-Oxley
- Implemented VOIP over DS3 using Confidential technology
- Converted T1 to DS3 for voice support
- Installed and configured DNS servers
- Moved entire Data center a distance of 30 miles maintaining 100% availability
Confidential
Avionics Sensor Maintenance Technician
Responsibilities:
- Maintain, repair, and inspect avionic sensor electronic systems equipment
- Expert in infrared detection sets, closed circuit and low light level television, night vision goggles, optical cameras
- Expert in laser target designators, laser receivers, terrain following radar, sensor control systems
- Ensured resolution of all optical components checking integrity of wiring, and gyroscopic stabilization systems
- Experienced in the use of oscilloscopes, multi-meters, pulse function generators, scope-meters, time domain reflect meter, collimators and various pieces of measurement equipment
- Assured proper integration of avionic sensor systems with various other aircraft avionic systems
- Repaired Circuit Cards following