Security Analyst/technical Instructor Resume
2.00/5 (Submit Your Rating)
TexaS
SUMMARY:
- Interdisciplinary Security, Intelligence, Digital Forensics and Network Security Specialist; experienced in system administration, Analysis, investigation, forensics, security, incidence response, and IAM.
- Over 6+ years of hands - on experience in Development of Identity And Security Management Solutions involving resources such as SAP Security, CA siteminder, Symantec, CyberArk, SIM, Oracle Directory Server(LDAP), Active Directory (AD), Role Based Access Control (RBAC) and different flavors of UNIX.
SKILL:
- INFOSEC
- Security risk and compliance management
- Wireshark
- TCPView
- Web Server
- SMTP
- RBAC
- Encryption
- Barracuda
- Sonic
- DLP
- NAC
- TeamViewer
- Smoothwall
- Kali DNS Server
- Mail Server
- SSO
- 7 Mail Server
- FTP Server
- Intranet
- IIS
- SMS
- AD
- Operation Systems
- Firewalls
- Splunk
- Linux
- Unix
- Helix
- IOS
- Encase
- Access Data (FTK
- PRTK
- Reg Viewer etc.)
- FireEye
- Citrix
- SecurID
- VMware
- Samba
- Syslog
- SQL server
- Single Sign On
- IAM
- Identity Federation
- SOP
- FISMA
- SOX
- HIPAA
- HITECH
- COR
- ISO
- NIST
- PCI DSS
- ITIL
- Enterprise Directory Architecture and Design including directory schema namespace and replication topology
- AD
- Resource Provisioning
- Tivoli
- RBAC
- MAC
- DAC
- SQL
- Bit locker
- SCCM App Catalog
- Fire Amp
- SCEP
- SDLC
- Consulting
- Packet Analysis
- Retina map
- Syslog
- Samba
- Nessus
- Internet Security Scanner
- Host Based System Security (HBSS) integrating identity management access management access governance
- IdentityNow developing implementing and architecting information systems improve profitability
- Identify evaluate control and mitigate complex business and technology risks
- Oracle Identity & Access Manager
- CA Identity Manager
- CA Siteminder security and privacy policies security and privacy compliance privacy
- PowerShell
- Data security or encryption
- McAfee
- Norton
- Bitdefender
- Intel Security
- Active Listening team-oriented
- Azure
- ITIL
- Dell
- Virtualization and Netbackup
- Advanced working knowledge of Microsoft Backoffice Products including Systems Management Server (SMS)
- MS-SQL
- ISA Server
PROFESSIONAL EXPERIENCE:
Confidential, Texas
Security Analyst/Technical Instructor
Responsibilities:
- Train over 37 Employees about quality Customer Service, IT services and Security, Privacy, and Healthcare policies each hiring season.
- Provide Security Awareness, ISO, and HIPAA also provide the training on the same.
- Developed new training materials maximizing the company quality goals.
- Maintain utmost discretion when dealing with sensitive topics.
- Worked with IAM team on projects using CA Single Sign-On and CA Identity Manager.
- Team lead and team player to facilitate exchange and effective flow of data.
- Handled Trainees credentials and logon issues through Active Directory or a ticketing based system;
- Installed and configured software necessary for the training.
- Worked with IAM Operations, IT support, and applications teams to needs and requirements
Helpdesk Analyst Tier 2
Responsibilities:
- Provided first-level technical support for global IT infrastructure supporting clients throughout the Confidential ;
- Troubleshooted hardware, software and connectivity; •additionally supported Expense Processing and E-Procurement, voicemail, telephone and telecom systems;
- Challenged to provide timely resolutions to support mission-critical application users.
- Achieved the highest levels of productivity, handling over 1,000 calls per week and averaging 200+ calls daily;
- Earned solid reputation for resolving complex issues and providing exceptional customer service
- Assisted users with policies and procedures for setting up conference calls, new accounts, web/network presentations and voice mail.
- Supported remote access using Dialup/VPN SecurID; leveraged extensive experience in multiple operating environment including mainframe connectivity and security, Windows 7 workstation and server, assisted with O365 upgrade and setup/config Windows 10 devices
Helpdesk Analyst Tier 1
Responsibilities:
- Respond to requests for technical assistance via phone, electronically, diagnose and resolve technical hardware and software issues for a select client group; •administer service desk software for various clients. Provide technical support for Windows XP and Windows 7 platforms as well as Citrix and VMware environments.
- Provide connectivity support for Confidential, Confidential, Confidential devices as well as Confidential Support.
- Active Directory Administration (password resets, account creations,
- Exchange accounts, etc.), provide printer and copier support/repair. I can identify and escalate situations requiring urgent attention as well as prepare activity reports and stay current with system information, changes and updates
Confidential, Texas
IT Security Consultant
Responsibilities:
- Analyze systems from different vendors, design and implement technical solutions Configure Firewalls. Servers and hosts while securing ports and protocols for effective administration Support and maintain.
- Linux and Microsoft Servers (AD) by applying industry standard risk management techniques System and Network Audits.
- Research, investigate threats and provide solutions for approval by leadership Risk assessment, control network perimeter, backup systems and data using industry standards.
- Execute company IT strategy to ensure all digital assets are always accessible and robust against most likely forms of disasters and hardware failures, and IP remains private to the company and secure.
- Programming using languages like Java, and Powershell.
Confidential
RBAC and Identity Management Analyst
Responsibilities:
- Grant users appropriate entitlements and access in a timely manner via LDAP, AD.
- Revoke access in a timely manner when access is no longer required due to termination or transfer.
- Enforce user access to applications and systems using authentication and authorization.
- Set up SAP Security Enforce compliance with access management policies and requirements. Auditing user access per policy requirements. Perform periodic privileged user review.
- Enforce consistent processes and segregation of duties. Maintain sensitive identity and credential information centrally.
- Define KPIs/reports to compare performance against success criteria.
- Implement reports to support audit evidence requests. Periodically review IAM metric reports to confirm improvement.
Confidential
Computer System Administrator
Responsibilities:
- Supported customer deployments on both UNIX/LINUX and Microsoft based operating systems in conjunction with an LDAP directory including: Active Directory, Windows Migration, Certificate Deployment, Malware Analysis, Secureway, NDS (eDirectory); installing and configuring software on any Windows and LINUX servers. Configured MSSQL Database and maintain server running.
- Used Citrix companions like XenDesktop for productivity and cost saving.
- Implementation of ESSO (Citrix Password Manager for XenApp SSO)
Confidential
Forensics & Incident Response Engineer (CSIRT)
Responsibilities:
- Responsible for the monitoring and examination of security infrastructure and systems.
- Reviewed, analyzed, remediated, and reported security incidents as required through department channels and the Inspector in Chief for the Vulgarization of telecommunication.
- Forensically examines Ministry computers, computer networks, and any devices or storage media attached to the agency network as required by the Chief Information Security Officer (CISO).
- Physically disassembles and examines computers and related hardware; analyzes electronic media; prepares written reports of forensic examinations; collaborates with local and federal CSIRTs and law enforcement personnel if need be; documents incidents using various case management systems; documents findings i.a.w established local, region, and federal rules for evidence handling and chain of custody.
Responsibilities:
Cyber Security Analyst
- Perform Computer Security Incident Response activities, record and report incidents. Monitor and analyze Intrusion Detection Systems (IDS) to identify security issues for remediation. Create, modify, and update IDS and Security Information Management (SIM) tool rules; as well as log analysis Recognize potential, successful, and unsuccessful intrusion attempts and compromises thorough reviews and analyses of relevant event detail and summary information.
- Perform preliminary forensic evaluations of internal systems. Perform analysis of Malware (e.g. obfuscated code) through open - source and vendor provided tools.
- Communicates alerts regarding intrusions and compromises, applications and operating systems as stated in Incident Response plan. Assists with the planning and implementation of counter-measures or mitigating controls.
- Evaluate firewall change requests and assess organizational risk.
- Support FISMA audits and Certifications and Accreditations and all continuous monitoring activities.
- Manage the Enterprise Log Management for all critical systems and applications.
- Prepare briefings and reports of analysis methodology and results.
Network Secuirty Analyst
Responsibilities:
- Troubleshoot Network Changes, Software and Hardware.
- Resetting Passwords through AD, Configuring baselines, Maintaining IIS Servers, and doing research for future recommendations System and Network Audits; Research, investigate threats and provide solutions for approval by leadership Using Wireshark, Splunk and other vulnerability tools for discovery
Desktop Support
Responsibilities:
- Setup, troubleshoot domains, computer and software issues and implementing solutions
- Install computer stations, Use of Bach files for configuration of system services, Check systems configurations. Desktop, Technical, Helpdesk, user accounts and software accounts support; configure, test, troubleshoot network.
- Connectivity and wireless access for local and remote computers or devices, add or replace memory, new keyboards, Motherboard (etc...), format, install setup, maintain, troubleshoot desktop and laptop computer of different vendors; notably Microsoft