Systems Quality Analyst Resume
5.00/5 (Submit Your Rating)
SUMMARY
- Experienced IT Professional with excellent client and project management skills. Action - oriented with strong ability to communicate effectively with technology, executive, and business audiences.
TECHNICAL SKILLS
- IAM: CA Identity Manager, Sailpoint, ForgeRock, RSA Secure
- NIST Framework
- CSM 1 (ScrumAlliance)
- Integrated Risk Management
- Windows 10/8/7, MacOS, Linux
- ADA: JAWS
- Agile Management: Workfront
- Mobile platforms: iOS, Android OS
- Performance: Loadrunner, ITKO Lisa
- ERM: SAP/SAP HANA
- Programming: Ruby, Powershell, BASH, SQL
- Python, Java
- Data Analysis: Tableau 10, Power BI
- Sharepoint, Outlook 2010, 2013, O365
- Content Management: EZ Pub, AEM 5.0, 6.0
- Networking: TCP/IP, FTP, HTTP, LAN, WLAN, VLAN
- Bug Tracking: Mantis, JIRA
- Test Automation: Selenium Webdriver, Perfecto
- Test Management: HP Quality Center
- ITSM: ServiceNow
- Virtualization: VMWare, Virtual Box
- Tools: Charles Web Debugging Proxy, Firebug, X-code, Chrome Developer tools, Logcat, MS Office, IBM Rational Jazz
- SDK: Android SDK
- Malware Analysis: Kali Linux, Cuckoo Sandbox, Wireshark, Snort, Remnux Linux
- Compliance: Tripwire, PCI, SOX, HIPAA
- IPS/IDS: FireEye HX, NX, AX, EX, FX
- IDE: Visual Studio, Eclipse
- Forensics: Digital Forensic Framework
- Technical Writing: Professional examples provided upon request
- CRM: Salesforce
- Web Analytics Adobe Analytics
PROFESSIONAL EXPERIENCE
Confidential
Systems Quality Analyst
Responsibilities:
- Managed 200+ applications along with the 50+ teams who owned them
- Used iTracker application to log vulnerabilities and track application vulnerability resolution for affected applications.
- Used Qlikview to pull vulnerability data, such as vulnerability severity, vulnerability game plan solutions for any applications affected by whichever vulnerability, and target date for remediation.
- Led weekly conference call review attended by team application owners and C-level executives, for the purpose of: confirming vulnerability resolution, resolution blockers, deadline extensions, etc.
- Technical Analyst duties such as assisting team managers with: vulnerability game plans that provided resolution processes.
Technology used: SAP HR, MS Excel, Word, Access
Confidential
SQA Engineer
Responsibilities:
- Assigned as a multiple role resource for IAM project, tasked with evaluation of IAM solutions, such as Sailpoint. CA IdentityManager was selected as the choice solution, where I was assigned as the sole IAM QA engineer, Business Analyst and Project Manager (PM for Quality Assurance portion only)
- Performed heavy testing of CA IdentityManager functions, such as provision, (and de-provision) of employee categories, (C-Level, Full Time Employees below C-Level and Vendor Contractors) where in CAIM workflows can be verified, a provisioning role can be selected, a provisioning task is then setup, where lastly the successful provision is confirmed under: ‘Active Directory Users and Computers ->Geographical Territory->Users--->Refresh (so successful provision is reflected) = User is provisioned’
- Also during this IAM project, was required to act as: Business Analyst (collecting requirements from various stakeholders and generating a Business Requirements Document) & Jr. Project Manager (for the QA portion of the IAM project detailing/updating “Plans of Action & Milestones” in MS Project) and Splunk user, as log analysis was necessary where errors occurred.
- Sole Risk & Security QA engineer for a project centered on RSA SecurID, an IAM solution that handled authentication and credential management in order for employee remote access to Lowes workstations.
- SQL server 2008, 2012 used primarily for queries and some ETL (Extract, Transform, Load) database testing. (Never used for advanced functions such as inner/outer joins and stored procedures.)
- Obtained ‘Certified Scrum Master 1’ certification through Scrum Alliance (needs to be renewed)
- Served as QA resource to test Archer platform, testing front-end functionality for policy, exceptions and security-ops incident management.
- Worked with Business stakeholders on Salesforce initiatives such as Administration functions and Dashboard alterations.
- Tested front-end security functions for SAP HANA administration dealing with role-based access. Set up employee user accounts and permissions.
- VMware VM machine setups for malware and forensic analysis, OS installations, where a malware lab would be setup involving 3 VMs with a workstation level OS (XP at the time), Tails as the gateway which are then connected to a Linux Server as a VWAN. And for malware analysis, Remnux Linux was used.
- Responsible for Mobile Device Access Controls List during Disaster Recovery - Omni-Channel initiative using Charles Web Proxy
- Used tools such as Putty and SSH to access a sandbox environment for testing Adobe AEM content management system for Lowes.com website migration from Amazon Web Services to Lowes data centers.
- Led QA portion of Network Segmentation project involving Cisco Tetration where the goal was to limit bandwidth usage by employees to reduce cost, acted in a Business Analyst capacity for functions such as BRD and FSD requirements gathering.
- Responsible for drafting of heavy technical documentation for both Technical and Non-Technical audiences, this documentation included, business cases, how-to guides for applications, test plans, test strategies, business requirement documents (BRD) Some experience with creating functional systems or requirements documentation (FSD, FRD)
- Was QA engineer for ITIL/ITSM Service Now testing involving BMC Remedy (Change Management, Problem Management, Incident Management & Knowledge Management)
- QA engineer for FireEye implementation where 3000 each, of VM workstations, VM servers, physical workstations and servers received a FireEye agent app installation that tied into new upgrades of FireEye modules, such as HX, EX, NX. Testing performed to ensure two-way communication requirements satisfaction. (among other requirements)
- Worked on PCI Audit Projects using Genesis Credit card services, generating various CC types to ensure data security (E.G. credit card number, customer information, were held in secure servers, ensure a firewall was installed between the payment card data and the public network, etc.)
