We provide IT Staff Augmentation Services!

Systems Quality Analyst Resume

5.00/5 (Submit Your Rating)

SUMMARY

  • Experienced IT Professional with excellent client and project management skills. Action - oriented with strong ability to communicate effectively with technology, executive, and business audiences.

TECHNICAL SKILLS

  • IAM: CA Identity Manager, Sailpoint, ForgeRock, RSA Secure
  • NIST Framework
  • CSM 1 (ScrumAlliance)
  • Integrated Risk Management
  • Windows 10/8/7, MacOS, Linux
  • ADA: JAWS
  • Agile Management: Workfront
  • Mobile platforms: iOS, Android OS
  • Performance: Loadrunner, ITKO Lisa
  • ERM: SAP/SAP HANA
  • Programming: Ruby, Powershell, BASH, SQL
  • Python, Java
  • Data Analysis: Tableau 10, Power BI
  • Sharepoint, Outlook 2010, 2013, O365
  • Content Management: EZ Pub, AEM 5.0, 6.0
  • Networking: TCP/IP, FTP, HTTP, LAN, WLAN, VLAN
  • Bug Tracking: Mantis, JIRA
  • Test Automation: Selenium Webdriver, Perfecto
  • Test Management: HP Quality Center
  • ITSM: ServiceNow
  • Virtualization: VMWare, Virtual Box
  • Tools: Charles Web Debugging Proxy, Firebug, X-code, Chrome Developer tools, Logcat, MS Office, IBM Rational Jazz
  • SDK: Android SDK
  • Malware Analysis: Kali Linux, Cuckoo Sandbox, Wireshark, Snort, Remnux Linux
  • Compliance: Tripwire, PCI, SOX, HIPAA
  • IPS/IDS: FireEye HX, NX, AX, EX, FX
  • IDE: Visual Studio, Eclipse
  • Forensics: Digital Forensic Framework
  • Technical Writing: Professional examples provided upon request
  • CRM: Salesforce
  • Web Analytics Adobe Analytics

PROFESSIONAL EXPERIENCE

Confidential

Systems Quality Analyst

Responsibilities:

  • Managed 200+ applications along with the 50+ teams who owned them
  • Used iTracker application to log vulnerabilities and track application vulnerability resolution for affected applications.
  • Used Qlikview to pull vulnerability data, such as vulnerability severity, vulnerability game plan solutions for any applications affected by whichever vulnerability, and target date for remediation.
  • Led weekly conference call review attended by team application owners and C-level executives, for the purpose of: confirming vulnerability resolution, resolution blockers, deadline extensions, etc.
  • Technical Analyst duties such as assisting team managers with: vulnerability game plans that provided resolution processes.

Technology used: SAP HR, MS Excel, Word, Access

Confidential

SQA Engineer

Responsibilities:

  • Assigned as a multiple role resource for IAM project, tasked with evaluation of IAM solutions, such as Sailpoint. CA IdentityManager was selected as the choice solution, where I was assigned as the sole IAM QA engineer, Business Analyst and Project Manager (PM for Quality Assurance portion only)
  • Performed heavy testing of CA IdentityManager functions, such as provision, (and de-provision) of employee categories, (C-Level, Full Time Employees below C-Level and Vendor Contractors) where in CAIM workflows can be verified, a provisioning role can be selected, a provisioning task is then setup, where lastly the successful provision is confirmed under: ‘Active Directory Users and Computers ->Geographical Territory->Users--->Refresh (so successful provision is reflected) = User is provisioned’
  • Also during this IAM project, was required to act as: Business Analyst (collecting requirements from various stakeholders and generating a Business Requirements Document) & Jr. Project Manager (for the QA portion of the IAM project detailing/updating “Plans of Action & Milestones” in MS Project) and Splunk user, as log analysis was necessary where errors occurred.
  • Sole Risk & Security QA engineer for a project centered on RSA SecurID, an IAM solution that handled authentication and credential management in order for employee remote access to Lowes workstations.
  • SQL server 2008, 2012 used primarily for queries and some ETL (Extract, Transform, Load) database testing. (Never used for advanced functions such as inner/outer joins and stored procedures.)
  • Obtained ‘Certified Scrum Master 1’ certification through Scrum Alliance (needs to be renewed)
  • Served as QA resource to test Archer platform, testing front-end functionality for policy, exceptions and security-ops incident management.
  • Worked with Business stakeholders on Salesforce initiatives such as Administration functions and Dashboard alterations.
  • Tested front-end security functions for SAP HANA administration dealing with role-based access. Set up employee user accounts and permissions.
  • VMware VM machine setups for malware and forensic analysis, OS installations, where a malware lab would be setup involving 3 VMs with a workstation level OS (XP at the time), Tails as the gateway which are then connected to a Linux Server as a VWAN. And for malware analysis, Remnux Linux was used.
  • Responsible for Mobile Device Access Controls List during Disaster Recovery - Omni-Channel initiative using Charles Web Proxy
  • Used tools such as Putty and SSH to access a sandbox environment for testing Adobe AEM content management system for Lowes.com website migration from Amazon Web Services to Lowes data centers.
  • Led QA portion of Network Segmentation project involving Cisco Tetration where the goal was to limit bandwidth usage by employees to reduce cost, acted in a Business Analyst capacity for functions such as BRD and FSD requirements gathering.
  • Responsible for drafting of heavy technical documentation for both Technical and Non-Technical audiences, this documentation included, business cases, how-to guides for applications, test plans, test strategies, business requirement documents (BRD) Some experience with creating functional systems or requirements documentation (FSD, FRD)
  • Was QA engineer for ITIL/ITSM Service Now testing involving BMC Remedy (Change Management, Problem Management, Incident Management & Knowledge Management)
  • QA engineer for FireEye implementation where 3000 each, of VM workstations, VM servers, physical workstations and servers received a FireEye agent app installation that tied into new upgrades of FireEye modules, such as HX, EX, NX. Testing performed to ensure two-way communication requirements satisfaction. (among other requirements)
  • Worked on PCI Audit Projects using Genesis Credit card services, generating various CC types to ensure data security (E.G. credit card number, customer information, were held in secure servers, ensure a firewall was installed between the payment card data and the public network, etc.)

We'd love your feedback!