We provide IT Staff Augmentation Services!

Sr. Information Security Engineer Resume

Greenwich, CT

PROFESSIONAL SUMMARY:

  • Over 9+ years of experience in Application Security, DevSecOps, Cloud Security, Threat Modeling, SSO, Application Security Controls and Validation, Risk Assessments, IT Risk Assessments, cryptography, security assurance, Security Architecture & Design, Mobile Application Security,, Regulatory Compliance and Secure Software Development Life Cycle (secureSDLC) and Continuous Integration (CI) and Continuous Delivery (CD) of security scanning, Security Information and Event Management (ArcSight SIEM, Splunk), Penetration Testing and Secure Coding.
  • In - depth knowledge of Mobile Application Security, Application Security Controls and Validation, IT Risk Assessments, Regulatory Compliance and Secure Software Development Life Cycle (secureSDLC) and Continuous Integration (CI) and Continuous Delivery (CD) of security scanning.
  • Hands-on with Penetration Testing, DAST, SAST and manual ethical hacking.
  • Experience in conducting IT Security Risk Assessments in accordance to NIST and FFIEC framework.
  • Working knowledge of Cloud Access Security Broker (CASB).
  • Worked with global security teams performing application and IT infrastructure security assessments.
  • In-depth knowledge of penetration testing for web and mobile (iOS and Android) applications.
  • Working knowledge on cloud security engineering and administrating for SaaS, PaaS, and IaaS (including AWS and Azure)
  • Experience in implementing Security Incident and Event Management System (SIEM) using HP ArcSight, Splunk.
  • Performed security design and architecture reviews for web and mobile applications
  • Hands-on experience in developing threat models, security controls, threat analysis, creation of risk control matrices and risk mitigation strategies.
  • Working knowledge of AWS Cloud Security in implementing Web Application Firewalls (WAF).
  • Working knowledge of OWASP Top 10 and SANS Top 25 software guidelines, Federal Financial Institutions Examination Council's (FFIEC) regulations, including Payment Card Industry (PCI-DSS 3.2), HIPAA and Sarbanes-Oxley Section404 (SOX).
  • Ability to handle multiple tasks and work independently as well as in a team.
  • An efficient team player in challenging and creative environment with excellent capacity to adapt new technologies and skills.
  • Proficiency with scripting languages such as Python, Perl, Java Script and Power Shell.
  • Working knowledge of Imperva and AWS Cloud Security in implementing Web Application Firewalls (WAF).
  • Possess strong technical aptitude with strong analytical, work ethic, problem solving and communication skills.

TECHNICAL SKILLS:

Security Tools: AppDetect, AppRador, BeyondTrust PowerBroker Password Safe, Oracle Identity Manager, ArcSight SIEM, Logger, Oracle Access Manager,JHijack, Metasploit Pro, ZED attack proxy, SQLMAP, Wireshark, WebScarab, Paros, Nmap, BMC BladeLogic, Nessus, Checkmarx, Rapid7 Nexpose, Tripwire, Symantec Vontu, DBProtect, ArcSight SIEM, e-DMZ Password Auto Repository (PAR), Varonis, Amazon Web Services (AWS) Cloud security.

Identity & Data Protection Tools: SafeNet KeySecure, ProtectDB, ProtectFile, RSA Single Sign-On (SSO), Two-Factor (2F) authentication, SafeNet eToken 5110.

Networking: Symantc Vontu DLP, Checkpoint, Palo Alto, Check Point, Cisco, IDS/IPS, Anti-virus, BMC BladeLogic, Remedy.

DAST and SAST tools: IBM AppScan Enterprise (ASE), Standard & Source editions, HP WebInspect, QualysGuard, BurpSuite Pro, Acunetix, Fortify SCA, SQLMAP

Operating Systems: Oracle Solaris UNIX, RedHat LINUX 4/5, Windows Server2003/2008.

Java & J2EE Technology: Spring Framework, EJBs, Struts2, Servlets, JavaServerPages (JSPs), JMS, Java Mail API, JNDI, LDAP, JDBC, JTS, RMI, AWT, Swing, Socket Programming, IONA Orbix CORBA.

Application Servers: Weblogic Server, iPlanet, Netscape Application Server and Microsoft IIS.

Languages: Java, Python, C/C++, C#.NET, Perl, UML.

Scripting Languages: AngularJS, XML, XSLT, XPath, XQuery, HTML/JavaScript/JQuery, AJAX.

Middleware: TIBCO EMS, IBM WebSphere MQ, JMS

Databases: Oracle, MS SQL Server, Sybase.

Web Services: RESTFul/SOAP, SOA, UDDI, WSDL.

Web Servers: Apache Tomcat, Weblogic, Netscape Enterprise Server3.5, Jboss and JRun.

PROFESSIONAL EXPERIENCE:

Confidential, Greenwich, CT

Sr. Information Security Engineer

Responsibilities:

  • Performed security assessments to ensure compliance to firm’s security standards (i.e., OWASP Top 10, SANS25). Specifically, security testing has been performed to identify Cross-Site Scripting, ClickJacking, and SQL Injection related attacks within the code.
  • Developed Application Security program (DAST and SAST) at the enterprise level to identify, report and remediate security vulnerabilities from applications deployed in DEV, PRE-PROD and PROD environments.
  • Conducted security testing of Internet of Things (IoT) and provided recommendations to resolve the security vulnerabilities.
  • Participated in the development of IT security risk assessments for enterprise applications. The NIST framework has been utilized for IT risk assessments.
  • Interacted with third party vendors in conducting security assessments and security compliance audits (Type 1 and Type II).
  • Implemented Security Group Policies for Elastic Compute Cloud (EC2), Simple Storage Service (S3), Docker Containers, ECS, ECRs within AWS. Developed AWS Service Roles to protect Identity Provider access.
  • Implemented security controls for AWS Virtual Private Clouds (VPCs), EC2 instances, RDS and Route53.
  • Reviewed source code (Java/J2EE/Spring/FTL/JavaScript) and developed security filters within IBM AppScan for critical applications.
  • Configured Gemalto ProtectDB to enable column level encryption for securing confidential customer data.
  • Designed security architecture for web and mobile apps. Reviewed Solution overview Documents (SODs) to identify security anomalies in the system architecture and design, and provided recommendations to address data security and privacy concerns.
  • Developed threat modeling framework (STRIDE, DREAD) for critical applications to identify potential threats during the design phase of applications.
  • Implemented file system security by applying hashing techniques for protecting data stored in files on the file servers.
  • Rolled out IBM AppScan products such as AppScan Enterprise (ASE), Standard, Source, Checkmarx, Developer plug-ins to various development teams across the business lines.
  • Automated the security scanning process as part of DevSecOps efforts using Jenkins, Maven, Gradle to support CI/CD inititatves.
  • Working knowledge of Splunk in developing search queries including, knowledge objects such as Event Types, Tags, Database Queries etc.,
  • Configured SafeNet/Gemalto ProtectDB to enable column level encryption for securing confidential customer data.
  • Implemented authentication for applications using web application vulnerability scanning tools ( IBM AppScan, IBM AppScan Source, HP Fortify, HP WebInspect, BurpSuite Pro, ZAP, Kali Linux, etc.)
  • Implemented SSO for AzureAD & Mobile applications.
  • Administered cryptography, public and private key management (PKI) and implemented dual keys to address segregation of duties issue between DBAs and security admins.
  • Participated in the implementation of Imperva SecureSphere, Database Activity Monitoring (DAM) and AWS Cloud security for applications being deployed in the Cloud. Developed WACLS and configured to rules and conditions to detect security vulnerabilities in the Cloud Front.
  • Generated executive summary reports showing the security assessments results, recommendations (CWE, CVE) and risk mitigation plans and presented them to the respective business sponsors and senior management.
  • Conducted monthly developer workshops to educate and train developers on secureSDLC, scan source code using IBM AppScan Source, triage and resolve the security vulnerabilities.
  • Participated in the implementation of Cloud Access Security Broker (CASB) for applications being deployed in the Cloud. Developed WACLS and configured to rules and conditions to detect security vulnerabilities in the Cloud Front.
  • Experience with SaaS applications in configuring and deploying to the cloud platform.
  • Worked with DevOps teams to automate security scanning into the build process.
  • Worked extensively with software development teams to review the source code, triage the security vulnerabilities generated by IBM AppScan, BurpSuite, HP WebInspect, HP Fortify, Checkmarx and eliminated false positives.
  • Reviewed Android and iOS mobile source code manually and recommended code fixes.
  • Strong knowledge of web application security, web-related protocols (HTTP, HTTP/2, SSL, WebSockets, etc.).
  • Participated in the implementation of CyberArk Privileged Access Management (PAM) solutions across the organization.
  • Implemented authentication solutions for various types of applications using OAuth2.0, SAML2.0 and OpenID.
  • Participated in the Proof of Concept (POC) in implementing Arxan application protection software for Mobile apps.
  • Analyzed security incidents originated from various network/application monitoring devices (e.g., Symantec DLP) and coordinated with Engineering teams for tracking and problem escalation, including remediation.
  • Performed the penetration testing of mobile (Android and iOS) applications, specifically, APK reverse engineering, traffic analysis and manipulation, dynamic runtime analysis.
  • Developed secureSDLC policies and standards for Web and Mobile apps.
  • Developed, implemented and migrated applications based on NIST Framework. Developed information assurance (IA) designs to meet specific operational needs and environmental factors

Confidential, Natick, MA

Sr. Security Engineer

Responsibilities:

  • Performed pen testing of both internal and external networks as per PCI-DSS standards. The pen testing scope included O/S (Windows and Linux) and external facing web apps and database servers that store credit card information.
  • Reviewed security vulnerability reports for applications and databases, analyzed and worked extensively with the development teams for the implementation of mitigating controls.
  • Implemented IBM AppScan standard, source editions, HP WebInspect, Nessus, and QualysGuard web application scanners. In addition, the security tools Metasploit and BurpSuite were utilized for manual penetration testing.
  • Performed Static and Dynamic Analysis and Security Testing (SAST and DAST) for various applications as per firm’s security standards (i.e., OWASP, SANS 25).
  • Conducted workshops and user awareness training on security policies, procedures and baselines.
  • Worked with software development teams, DB/Unix administrators and solution architects as a subject matter expert related to security compliance with PCI DSS and industry standards.
  • Worked with Internet Engineering team in the design and configuration of BlueCoat Internet proxy. Implemented WebFilter database for URL content Filtering.
  • Performed security assessments for the client-facing apps. The associated IT infrastructure such as database management systems, middleware systems, web services (SOA) were also included in the security assessments.
  • Implemented Secure Software Development Life Cycle (S-SDLC) processes; developed secure coding practices for web, mobile applications, including database and middleware systems.
  • Reviewed Architecture Design Documents (ADD) and Solution overview Documents (SODs) to identify security anomalies in the system architecture and design, and provided recommendations to address data security and privacy concerns.
  • Implemented HP ArcSight ESM including, correlation rules, data-monitors, reports, event annotation stages, case customization, active lists, and pattern discovery.
  • Conducted manual source code reviews of the client-facing Wyndham brand web and mobile applications, including iOS and Android mobile apps. The key areas of confidential and sensitive data stored on the mobile devices were reviewed and made recommendations to secure customers’ PII and PCI data.
  • Conducted pen testing for the Web Services (SOA) used by various travel agency partners to connect to Wyndham for booking and reservations.
  • Reported security findings, recommendations and presented to the business users, executive committee and Compliance departments.
  • Experience with Identity and Access Management (IAM) and development of user roles and policies for user access management.
  • Performed Static and Dynamic Analysis and Security Testing (SAST and DAST) for various applications as per firm’s security standards (i.e., OWASP, SANS 25).
  • Conducted workshops and user awareness training on security policies, procedures and baselines.
  • Worked with software development teams, DB/Unix administrators and solution architects as a subject matter expert related to security compliance with PCI DSS 3.2 and industry standards.
  • Worked with Internet Engineering team in the design and configuration of BlueCoat Internet proxy. Implemented WebFilter database for URL content Filtering.
  • Developed security policies and baselines for mobile and web applications. Performed compliance audits to ensure security policies and baselines have been adequately implemented.
  • Participated in the implementation of SafeNet product for encrypting customer credit card information using Public Key Infrastructure (PKI).
  • Developed correlation rules for Security Incident and Event Management (SIEM) system. Reviewed the solution implemented for “log forwarding” from various network devices to ArcSight central logging for alerting and security monitoring. Experience with Splunk Enterprise in investigating various logger events related to security incidents.
  • Performed PCI pre-assessment audit for the entire network as well as the related applications in preparation for the annual external PCI compliance audit.

Confidential, Columbus, OH

Security Engineer

Responsibilities:

  • Performed the tasks of designing Advanced Security & Management Solutions for the organization.
  • Experience with Identity and Access Management (IAM) and development of user roles and policies for user access management.
  • Well versed with various vulnerabilities and attacks at application - OWASP Top 10, SQL Injection, XSS, LDAP injection, XPath injection etc.
  • Conducts regularly review of Global Security Incidents as well as reports and update the same to the internal teams.
  • Execute and craft different payloads to attack he system to execute XSS and different attacks.
  • Worked with Internet Engineering team in the design and configuration of BlueCoat Internet proxy. Implemented WebFilter database for URL content Filtering.
  • Performed IT Risk Assessment Services and provides Solutions to mitigate Risks identified and reported.
  • Conducted security assessments for various applications supporting Corporate & Investment Banking, Loan, Treasury, Equities and FI businesses. The web application infrastructure such as IBM WebSphere, Apache Tomcat, and IIS web/application servers were reviewed for compliance to firm’s security baselines.
  • Developed correlation rules for Security Incident and Event Management (SIEM) system. Reviewed the solution implemented for “log forwarding” from various network devices to ArcSight central logging for alerting and security monitoring.
  • Ensured that the operation, design, and management of information systems are in according to the standards of the organization.
  • Established and maintained a framework to ensure that information security policies, technologies and processes are aligned with the business regulations of the organization.
  • Identifies as well as applies innovative practice in security to enhance the global operations of the organizations.
  • Performed risk assessments and defines strategies to address the identified risks.
  • Ensured that risk identification, mitigation controls and analysis are integrated into application life cycle and change management processes.
  • Performed PCI-DSS (3.2, 3.1) pre-assessment audit for the entire network as well as the related applications in preparation for the annual external PCI compliance audit.

Confidential

Java Developer

Responsibilities:

  • Implemented MVC architecture by making use of Java Spring framework.
  • Developed Java Server Pages(JSPs) and Servlets in the web-tier and EJB's in the business tier
  • Client side validation was done using JavaScript and CSS was used to define the view of the pages.
  • Developed Servlets and Utilized Node.js to create a fast and efficient chat server.
  • Implemented the Scrum Agile methodology for iterative development of the application.
  • Involved in system design, enterprise application development using object-oriented analysis in Java/JEE6.
  • Analyzed performance issues in the application, related system configuration and developed solutions for improvement.
  • Involved in WebLogic and Tomcat application server installation and configuration in production, development and QA environments.
  • Implemented business logic using Session Beans.
  • Implemented data access objects using Entity Beans.
  • Used JMS/TIBCO for synchronous/asynchronous communication and sending updates to various other applications.
  • Developed user interface using JSPs and HTML, JavaScript, CSS, Stylesheets.
  • Designed Tables, Indexes, Stored Procedures, Functions and Triggers for the database.
  • Involved in different phases of Software Development Lifecycle (Agile methodology) such as Requirement Analysis, Design and Development.
  • Developed the application using JBoss.
  • Coded Ant build scripts to build and deploy the application on JBoss on Unix.

Hire Now