Is Professional Intermediate Analyst Resume
2.00/5 (Submit Your Rating)
San, AntoniO
SUMMARY:
- Multiple IT, Information Security and customer service support roles
- Experience with PKI, SSL/TLS, key management services and Adobe CDS.
- Experience installing, configuring and supporting Active Directory domains.
- Experience installing, configuring and supporting Cisco switches.
- Experience supporting end users in a law enforcement department.
- AD installation, configuration and administration in a Windows Server 2003/2008 environment.
- Configuration, imaging, and migration of systems on Active Directory to common operating environment image utilizing SMS and SCCM. Operating System migrations. Windows NT to Windows XP. Windows XP to Windows 7.
- Installation, configuration, and support of COTS software.
- Installation of Windows OS, MS Office, and Symantec Endpoint Protection software critical security patches.
- Analysis of LAN/WAN network communications, operations, hardware and application software. Patch verification on client and server machines receiving software updates and patches via SMS/SCCM. Manual update as needed.
- Configuration and support of incoming mobile devices, Blackberry typically, for incoming personnel. Verification of BES accounts and activation for Blackberry units.
- Analysis of software/hardware and identifying network problems as reported by email, telephone, or Remedy service ticket.
- Liaison with service providers for custom physical access control software and hardware design and implementation. Verbal and written communication with internal/external customers, contractors, and vendors to resolve challenges/issues, fulfill requests, or place orders as needed.
- Responsible for security log reviews/reporting for server and client operating systems
- Responsible for yearly Risk Management Process review for Law Enforcement Unit.
- Provided support for end users via telephone, remote desktop services through BOMGARD and at customer desktop. Tracked support and service calls with Remedy ticketing system.
- Key Management Services, PKI, SSL/TLS, and certificates such as Adobe CDS.
PROFESSIONAL EXPERIENCE:
Confidential - San Antonio
IS Professional Intermediate Analyst
Responsibilities:
- Administer Confidential token and encryption, processes, policies, regulations, and governance. Initiates process changes and improvements.
- Able to handle simple thru complex, multi-tiered escalations, and problems independently by utilizing key information security administration practices and policies.
- Lead and resolve severity escalations and identify root cause and creating corrective action plans.
- Represent on compliance calls, meeting with both internal and external auditors.
- Collect and analyze evidence (deliverables) with internal/external compliance and auditing agencies/officials and add intelligence into the information collected.
- Process entitlement, compliance review requests and/or incident/change management handling for Confidential ’s global customer base within established support thresholds, including bulk requests and housekeeping tasks.
- Creates, maintains and performs annual review of all documentation including Process Control Manuals associated with specific systems assigned.
- Able to perform various ID or Functional ID related processes.
- Group, profile and role management, Functional and Temporary ID management.
- Perform Certificate and key management.
- Demonstrate complex application or system knowledge, performs UAT, COB and vulnerability assessment testing of new and existing platforms.
- Interacts with vendors, provides feedback and drives product enchantments.
- Ensure adherence to pre-assigned SLO requirements, contribute to MIS reports for designated requests at a personal and team level.
- Perform system setup, packaging and installation.
- Identifies need for new tasks and CMP products.
- Conduct Confidential Marketplace product maintenance.
- Utilize key information security administration tools.
- Maintain excellent availability to achieve strong results. Interprets and guide others in the principle of Information Security concepts and policies, develops and implements into day-to-day work.
- Ability to explain principles behind IS/GIDA policies and guidelines.
- Checks and reviews implementation of established security procedures within the framework of specific system assignments, focusing on the full scope of GIDA Service Catalog requirements for simple thru complex, multi-tiered applications. for the service/compliance quality and accuracy.
- Identifies registers and escalates potential compliance issues.
- Responsible for performing physical and digital token/key inventory.
- Abides and encourages a compliance based IS culture.
Confidential - San Antonio
Information Security Analyst
Responsibilities:
- Key focus is on implementation of established procedures, policies and audit guidelines defined by the Global Identification Administration (GIDA) organization.
- Effectively manage time to meet overall management target goals.
- Collaborate via Lync and live meetings with other members of the GIDA organization on projects and initiatives.
- Participate in workgroups, conference calls and team meetings related to the transition of new systems into the GIDA Fulfillment center.
- Implementation of established security procedures within the framework of specific system assignments, focusing on password resets and account deletions for applications.
- Utilize request processing tools such as ResolveIT, Confidential Market Place (CMP) & Service Now Client interactions, either by phone or email, with clear, concise terms while adhering to the GIDA Customer Service Guidelines.
- Bulk customer requests for granting of entitlements.
- Support and participate in assembling facts and input for escalation issues to be submitted to senior team members when needed.
- Maintain established access and keep up to date and active for all systems assigned.
Confidential - San Antonio
Information Technology Contractor
Responsibilities:
- OS migrations, user state backup and recovery, software installations, and hardware removal/replacement performed.
Confidential - San Antonio
Access Control System Technician
Responsibilities:
- Information security professional tasked with designing, provisioning, implementing, and administering access control and CCTV systems on a secure stand-alone network solution. Responsible for implementation and administration of all aspects of access control system impacting 100+ staff in San Antonio office.
- Directly responsible for staff orientation to, and support of, the physical access control systems.
- Active support of end users in a secure financial environment on various OS and hardware platforms.
- Design, build, configure and install server and desktop solutions for use with custom and common-off-the-shelf applications.
- Active network support for token ring, ATM, Frame Relay and Ethernet networks.