We provide IT Staff Augmentation Services!

Is Professional Intermediate Analyst Resume

2.00/5 (Submit Your Rating)

San, AntoniO

SUMMARY:

  • Multiple IT, Information Security and customer service support roles
  • Experience with PKI, SSL/TLS, key management services and Adobe CDS.
  • Experience installing, configuring and supporting Active Directory domains.
  • Experience installing, configuring and supporting Cisco switches.
  • Experience supporting end users in a law enforcement department.
  • AD installation, configuration and administration in a Windows Server 2003/2008 environment.
  • Configuration, imaging, and migration of systems on Active Directory to common operating environment image utilizing SMS and SCCM. Operating System migrations. Windows NT to Windows XP. Windows XP to Windows 7.
  • Installation, configuration, and support of COTS software.
  • Installation of Windows OS, MS Office, and Symantec Endpoint Protection software critical security patches.
  • Analysis of LAN/WAN network communications, operations, hardware and application software. Patch verification on client and server machines receiving software updates and patches via SMS/SCCM. Manual update as needed.
  • Configuration and support of incoming mobile devices, Blackberry typically, for incoming personnel. Verification of BES accounts and activation for Blackberry units.
  • Analysis of software/hardware and identifying network problems as reported by email, telephone, or Remedy service ticket.
  • Liaison with service providers for custom physical access control software and hardware design and implementation. Verbal and written communication with internal/external customers, contractors, and vendors to resolve challenges/issues, fulfill requests, or place orders as needed.
  • Responsible for security log reviews/reporting for server and client operating systems
  • Responsible for yearly Risk Management Process review for Law Enforcement Unit.
  • Provided support for end users via telephone, remote desktop services through BOMGARD and at customer desktop. Tracked support and service calls with Remedy ticketing system.
  • Key Management Services, PKI, SSL/TLS, and certificates such as Adobe CDS.

PROFESSIONAL EXPERIENCE:

Confidential - San Antonio

IS Professional Intermediate Analyst

Responsibilities:

  • Administer Confidential token and encryption, processes, policies, regulations, and governance. Initiates process changes and improvements.
  • Able to handle simple thru complex, multi-tiered escalations, and problems independently by utilizing key information security administration practices and policies.
  • Lead and resolve severity escalations and identify root cause and creating corrective action plans.
  • Represent on compliance calls, meeting with both internal and external auditors.
  • Collect and analyze evidence (deliverables) with internal/external compliance and auditing agencies/officials and add intelligence into the information collected.
  • Process entitlement, compliance review requests and/or incident/change management handling for Confidential ’s global customer base within established support thresholds, including bulk requests and housekeeping tasks.
  • Creates, maintains and performs annual review of all documentation including Process Control Manuals associated with specific systems assigned.
  • Able to perform various ID or Functional ID related processes.
  • Group, profile and role management, Functional and Temporary ID management.
  • Perform Certificate and key management.
  • Demonstrate complex application or system knowledge, performs UAT, COB and vulnerability assessment testing of new and existing platforms.
  • Interacts with vendors, provides feedback and drives product enchantments.
  • Ensure adherence to pre-assigned SLO requirements, contribute to MIS reports for designated requests at a personal and team level.
  • Perform system setup, packaging and installation.
  • Identifies need for new tasks and CMP products.
  • Conduct Confidential Marketplace product maintenance.
  • Utilize key information security administration tools.
  • Maintain excellent availability to achieve strong results. Interprets and guide others in the principle of Information Security concepts and policies, develops and implements into day-to-day work.
  • Ability to explain principles behind IS/GIDA policies and guidelines.
  • Checks and reviews implementation of established security procedures within the framework of specific system assignments, focusing on the full scope of GIDA Service Catalog requirements for simple thru complex, multi-tiered applications. for the service/compliance quality and accuracy.
  • Identifies registers and escalates potential compliance issues.
  • Responsible for performing physical and digital token/key inventory.
  • Abides and encourages a compliance based IS culture.

Confidential - San Antonio

Information Security Analyst

Responsibilities:

  • Key focus is on implementation of established procedures, policies and audit guidelines defined by the Global Identification Administration (GIDA) organization.
  • Effectively manage time to meet overall management target goals.
  • Collaborate via Lync and live meetings with other members of the GIDA organization on projects and initiatives.
  • Participate in workgroups, conference calls and team meetings related to the transition of new systems into the GIDA Fulfillment center.
  • Implementation of established security procedures within the framework of specific system assignments, focusing on password resets and account deletions for applications.
  • Utilize request processing tools such as ResolveIT, Confidential Market Place (CMP) & Service Now Client interactions, either by phone or email, with clear, concise terms while adhering to the GIDA Customer Service Guidelines.
  • Bulk customer requests for granting of entitlements.
  • Support and participate in assembling facts and input for escalation issues to be submitted to senior team members when needed.
  • Maintain established access and keep up to date and active for all systems assigned.

Confidential - San Antonio

Information Technology Contractor

Responsibilities:

  • OS migrations, user state backup and recovery, software installations, and hardware removal/replacement performed.

Confidential - San Antonio

Access Control System Technician

Responsibilities:

  • Information security professional tasked with designing, provisioning, implementing, and administering access control and CCTV systems on a secure stand-alone network solution. Responsible for implementation and administration of all aspects of access control system impacting 100+ staff in San Antonio office.
  • Directly responsible for staff orientation to, and support of, the physical access control systems.
  • Active support of end users in a secure financial environment on various OS and hardware platforms.
  • Design, build, configure and install server and desktop solutions for use with custom and common-off-the-shelf applications.
  • Active network support for token ring, ATM, Frame Relay and Ethernet networks.

We'd love your feedback!