We provide IT Staff Augmentation Services!

Information Security Analyst Resume

4.00/5 (Submit Your Rating)

Juno Beach, FloridA

SUMMARY

  • 8 Years working in multiple IT groups wifin Florida Power & Light (FPL) and other major companies, wif solid understanding of Utility’s business processes and internal IM Systems and Security Processes.
  • Experience in working wif Cyber Security, GuardiumProcess Monitoring wif understanding of SOX Processes.
  • Experience working in Cyber Security Operations Center (CSOC) handling teh daily operational activities.
  • Capable of defining, deploying and monitoring risk management, compliance, and information securityprograms.
  • Experience in working on Compliance monitoring, Audits such as Sarbanes - OxelyAct .
  • Experience working in different environments like Windows, Oracle, Sybase, Linux and Unix, DB2.
  • Experience in reviewing security logs, alerts for various security events on a daily basis, recognize and identify potential threats to corporate information systems and data.
  • Experience wif vulnerability scans like Qualys, SIEM Qradar tools, Guardium data monitoring tools, Bluecoat web filtering, Sophos End Point Protection, Fire Eye Malware Analysis and email filtering.
  • Very well experienced in customer service, resolving tickets.
  • Experience in database activity monitoring, investigating on teh traffic performing full due diligence and documenting teh incidents.
  • Good experience working on IPS/IDSusing Tipping point, analyzing and creating Filters and implementing them on weekly basis.
  • Very good experience on responding to virus alerts in teh entire organization.
  • Very good experience in determining metrics for all teh security initiatives.
  • Skilled Information Security Analyst wif expertise in risk management, unauthorized access, viruses, and a wide range of vulnerabilities and threats.
  • Well-versed in direct and remote analysis wif strong critical thinking, communication, and people skills. Able to thrive in fast-paced and challenging environments where accuracy and efficiency matter.
  • Experience in participating and working wif internal and external Auditors during Yearly and Quarterly Auditing.
  • Knowledge in developing, documenting, maintain and manage policies and procedures according to compliance standards.
  • Cross Trained Team members and IT Leads on Guardium, MSBI tools & InfoSec processes.
  • 4 Years of technical experience as an Oracle PL/SQL Developer in analysis and development of applications using Oracle 10g & 11g R2, SSRS Reporting, Microsoft BI Dashboards & BIRT Reports.
  • Experience in Developing Analytical Solutions & Reports using Microsoft BI Suite like Power Pivot and Power View.
  • Extensive noledge of Application Support methodologies and in implementing various Production rollouts of application.
  • Good team player wif strongcommunication and interpersonal skills.
  • Excellent leadership qualities and quick learning ability.

TECHNICAL SKILLS

Languages: SQL, PL/SQL

Database: Oracle 8i / 9i / 10g / 11g, SQL-Server, Sybase, Access

DW Tools: Microsoft BI Suite (Power Pivot & Power View) - SharePoint Integrated mode, BIRT ReportsPlateau Reporting, Crystal Reports, SSRS

Development Tools: TOAD for Oracle, SQL Navigator, SQL Developer

Application Support: BMC Remedy, Lotus Notes, AD

Cybersecurity: IBM GuardiumInfosphere, ITIM(Tivoli Identity Manager), EAMS, Qradar SIEM, Tipping Point, Blue Coat, Sophos, ITIM, ITAM, Phonesweep, Co3, CSIRP, Fire Eye

Miscellaneous: Visio, Excel, Powerpoint, Power Pivot

PROFESSIONAL EXPERIENCE

Information Security Analyst

Confidential, Juno Beach, Florida

Roles and Responsibilities:

  • Monitor thesecurityof critical systems and changes to highly sensitive computer securitycontrols to ensure appropriate system administrative actions, investigate and report on noted irregularities.
  • Investigate potential or actualsecurityviolations or incidents in an effort to identify issues and areas that require newsecuritymeasures or policy changes.
  • Monitored events responded to incidents and reported findings.
  • Documenting Incident responses in Co3/Resilient and CSIRP using recommended methods in run books.
  • Run monthly report for internet activity on Sample control devices using Bluecoat and review teh report and follow-up based on teh findings.
  • Review virus alerts that come on a day to day basis, analyze teh virus submit sample to Sophos, clean teh infected machine and advise teh user of security policies.
  • Proven record of evaluating system vulnerability, compiling actionable analysis, reporting threats, and recommending security improvements.
  • Ability to quickly assess and trouble shoot complex problems involving a wide variety of information systems, work independently on large-scale projects, and thrive under pressure in fast-pace environments.
  • Initiated incident handling procedures to isolate and investigate potential information system compromises.
  • Perform risk assessments and execute tests of data processing system to ensure functioning of data processing activities and security measures.
  • Develop rules in teh Qradar for real time alerts of teh security events and also monitor/analyze/document teh alerts.
  • Responding to various security alerts, remedy tickets that come in on a daily basis and performing research in finding teh root cause and solving.
  • Perform semiannual wardial procedures for modem penetration testing to check for vulnerabilities.
  • Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.
  • Coordinate implementation of computer system plan wif establishment personnel and outside vendors.
  • Assisted in IAM(Identity Access management) Project to address teh critical need to ensure appropriate access to resources across different critical environments, and to meet compliance requirements.
  • Implementation of IBM Guardium solution to enable SOX controls for sensitive data monitoring.
  • Demonstrate configurations through development of prototype systems for sensitive data monitoring.
  • Customize, configure and test integrations between Guardium and other technologies including teh modules across each of their respective product sets.
  • Plan, implement, tune and monitor database security tools to ensure teh highest levels of security are maintained for protected information.
  • Monitor SOX regulatory compliance reports on a daily basis and maintain SOX policies and Controls and analyzing in detail about teh traffic generated from teh applications.
  • Deploy new SOX control processes to database servers and develop Guardium policy filters for SOX database servers.
  • Implemented Policies and filters in Guardium to monitor sensitive data and to exclude noise.
  • Very deep noledge on Guardium Tool different versions, participated in guardium upgrades.
  • Verification, Validation & Reporting requests created through EAMS which is used for Identity access management.
  • Work very closely wif Internal and External auditors and providing them necessary documentation for teh audit.
  • Educate and ultimately transfer teh noledge of Information security policies and process to other team members and to teh other business teams wifin teh organization.

Environment/Tools:IBM GuardiumInfosphere, Tipping Point, Sophos, Qradar SEIM, Phone sweep, Bluecoat, ECAT, ITAM, ITIM, EAMS, Oracle, SQL Server, DB2, Sybase

Systems Analyst

Confidential, Juno Beach, Florida

Roles and Responsibilities:

  • Create Reports for monitoring SOX Controls, Monitoring SOX reports on a daily basis and analyzing in detail about teh traffic generated from teh applications.
  • Deploy new SOX control processes to database servers.
  • Work closely wif stakeholders to understand and prioritize requirements for teh solution.
  • Oversee teh conversion of earlier SOX control processes to teh new ones.
  • Verification, Validation & Reporting requests created through EAMS
  • Develop and deploy Guardium policy filters for SOX database servers.
  • Manage and remediate all issues identified by teh Guardium policy and filters.
  • Educate and ultimately transfer teh noledge of developing and managing teh Guardium policy filters to teh application teams.
  • Very good experience in working wif auditors and participated in annual SOX audit.
  • Perform risk assessments and execute tests of data processing system to ensure functioning of data processing activities and security measures.
  • Provide technical leadership to teh enterprise for teh information security program.
  • Mentor and train others in information security in addition to training for other technical groups.
  • Install and maintain security infrastructure, including IPS, IDS, log management, and security assessment systems.
  • Assess threats, risks, and vulnerabilities from emerging security issues.
  • Draft enterprise security standards and guidelines for system configuration.
  • Perform and create procedures for system security audits, penetration-tests, and vulnerability assessments. Develop scripts to maintain and backup key security systems.
  • Develop rules in teh Qradarfor real time failed login alerts for sensitive SOX databases and monitor and analyze teh alerts.
  • Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.
  • Coordinate implementation of computer system plan wif establishment personnel and outside vendors.
  • Responding to various security alerts, remedy tickets that come in on a daily basis and performing research in finding teh root cause and solving.

Environment/Tools: IBM GuardiumInfosphere, Oracle 10g/11g, EAMS, ITIM, Remedy, DB2, Sybase, SQL Server

BI Report Developer

Confidential, Jupiter West, Florida

Responsibilities:

  • Responsible for implementing Guardium for sensitive sox databases.
  • Developedguardiumpolicies and filter rules and responsible for monitoring teh traffic reports for database activity.
  • Performed risk assessment for various high sensitive databases to determine if guardiummonitoring is needed.
  • Act as a Data Steward and translating business requirements for IT Developers to enhance existing reports and bring in new data elements.
  • Requirement Gathering and Testing for BI Reports built for Information Security Group
  • Develop and enhance SSAS Tabular Model ( using SSDT 2012) cubes and Powerpivot on teh Oracle Data warehouse for Analytics and Ad-hoc Reporting
  • Create Reports for Remedy Helpdesk Queues for teh Information Security Group using Microsoft BI tools: Power View and Performance Point Dashboards from Multidimensional Data Sources & SSRS Reports from Oracle Data warehouse.
  • Deploying cube changes to production and regression testing of changes. Formulate test plans and functional verification.
  • Ensure teh daily refresh of Tabular cubes, Manage teh SSRS Subscriptions in Production.
  • Analysis of data issues or queries from teh business on an ongoing basis.
  • Providing timely data to teh Business users by writing Ad-hoc SQL Queries Against teh Data warehouse and teh Application Database
  • Enable business analysts for self-service BI - Prepare How-To docs, Job-Aids and assisting them to navigate teh data using Excel Services and through SharePoint.
  • Handle Helpdesk tickets from Users for application support.
  • Establish disaster recovery testing methodology.
  • Plan and coordinate teh DR testing, test teh reports and make sure all teh environments are working fine.
  • Assisted in teh development of access-controls, separation of duties, and roles.
  • Conducted technical risk evaluation of hardware, software, and installed systems and networks.
  • Assisted in incident response and recommend corrective actions.
  • Communicated wif personnel about potential threats to teh work environment.

Environment: Oracle 11g, Microsoft BI Toolset (SSRS 2012, SSAS - Tabular, Powerview), SQL Server Data Tools 2012, SQL Server Management Studio, Sharepoint, IBM GuardiumInfosphere

Report Designer/Developer

Confidential, Juno Beach, Florida

Responsibilities:

  • System Analysis, Design, Coding, Testing, Development and Documentation.
  • Gather teh requirements from teh users and analyzed their business needs and created Functional specification documents.
  • Writing DDL Statements to Create Aggregate tables to facilitate reporting on a need basis
  • Data Cleansing and migration - Writing Queries to compare data between two systems.
  • Writing SQL queries, Stored Procedures and constructed administrative pages for web-basedreporting.
  • Developed List, Tabular and Matrix Reports, Charts using Eclipse Birt.
  • Involved in performance fine-tuning of teh queries/reports using PL/SQL.
  • Identified Frequently Used Reports and Scheduled for Email Delivery wif PDF and Excel outputs to reduce teh load on teh database.
  • Developed and Tested advanced SQL and PL/SQL based code in support of Reports, Exported Text IO packages and had written many Stored Procedures in many Reports.
  • Assisted Production rollout, warranty support and bug-fixes.
  • Trained teh Business Users on teh features and use of teh new Reporting Framework

Environment: Oracle 10g, SQL, PL/SQL, SQL developer, VMware, Plateau reporting tool, Crystal reports.

Employee Identification System

Confidential, Bear, Delaware

Responsibilities:

  • Identify critical areas and scenarios.
  • Installation of RFID Tag and employee name mappers.
  • Design of a Datamart to Store Employee and Tracking information.
  • Writing SQL queries, Procedures to automatically generate list of employees in critical areas.
  • Crystal reports for generating reports wif employee details
  • Participated in creation of Systems Operations Center for teh company, which maintained hundreds of systems and applications spread throughout teh world.
  • Responsibilities included end-user troubleshooting, document creation, and system design.
  • Documented exiting and in-development policies, procedures, and systems.
  • Participated in development and maintenance of global information security policy.
  • Assisted in teh development of access-controls, separation of duties, and roles.
  • Protected vulnerable networks following detailed risk assessments.
  • Guided cross-functional teams in teh design, validation, acceptance testing and implementation of secure, networked communications across remote sites for several key clients.

We'd love your feedback!