Network Security Engineer Resume
Ann Arbor, MI
SUMMARY:
- IT infrastructure professional with substantial experience in network security. Intellectual Property protection, fraud investigation and anti - phishing expert. Industry experience includes banking, professional services, and academia.
TECHNICAL SKILLS:
Operating Systems: UNIX (Several varieties including AIX, Solaris, BSD, LINUX/Free BSD, XENIX, UNIX v7, System III and V); PICK; PC/MS-DOS and Windows; OS/2; VMS; others.
Hardware: Confidential RS6000, SUN, Intel-based PC; Macintosh; Confidential /VAX; others. Telecommunications/Networks Ethernet, TCP/IP, and VOIP (Asterisk).
Languages: C, Shell, Perl, PL/1, BASIC, FORTRAN, ADA, and Assembly Languages.
Software Packages: Windows, X-Windows, spreadsheets; editors; word processing/typesetting packages including LaTeX; MySQL and other database and statistical packages.HTTP servers (including Apache and Domino); firewall and security packages (intrusion detection, monitoring (Nagios/Centreon, Big Brother, etc), PHP.Forensics packages including EnCase, AccessData s Forensic Toolkit (FTK), and other tools.
PROFESSIONAL EXPERIENCE:
Confidential
Network Security Engineer
Responsibilities:- Developed, released, and managed anti - fraud policies and operations on a global basis. This included anti-phishing, domain squatting, protection of Intellectual Property, centralized management of domain portfolio, and other Internet based fraud issues.
- Collaborated very closely with Legal, Compliance, Architecture, Brand
- Management/Communications, Group Security, Regional ISOs, and IT infrastructure groups both to fulfill a wide variety of business needs as well as implement changes to accommodate them and delivered on-time and on-budget.
- Provided forensic support for North America security/anti-fraud groups as well as HR/Legal. Reviewed and analyzed logfiles routinely as well as for specific custom needs to look for potential problems as well as to respond to incidents..
- Past projects included refining Security Operations Center process, training new staff, documentation, and significant coding. The end result was that the North American operation became the model for global security operations and best practices. Analyzed malicious code and developed custom IDS signatures. Designed anti-phishing procedures in collaboration with other business units, anticipating the first NA outbreak.
- Developed forensic investigative procedures and custom built equipment. Collaborated with Messaging Group on design and implementation of a 'lockdown' of email systems. Worked on design and implementation of Global Computer Incident Response Team process and support infrastructure, based on local CIRT. Provided general consulting for Technology Risk Management and to other departments.
Confidential
Senior IT Specialist
Responsibilities:- Provided general technical expertise on a contract basis to a wide variety of customers both internal and external to Confidential . Projects included:
- Engaged in a 16 - month deployment as lead system administrator/technical resource on a multi-layer data mining application with web-based content delivery. Kept the project on track to meet initial release date. Originally on Sun/Solaris platform; led the application port to Confidential /AIX platforms increasing capacity and reducing costs. The application used Apache for a web server with Tomcat servlet server, CA Strategy to build queries and Oracle as the database.
- Ported a major county's web page from BSD to Linux to improve security and performance. Ongoing support of Apache/PHP/Mysql, traffic analysis, and security of the hosts.
- Participated in/team leader in 20-month project Confidential a local area hospital upgrading numerous systems.
- Implemented a 'firewall' system using 5 separate Confidential /AIX servers (3SP nodes,2 F40s),
- Maintained/launched outbound proxy servers (2IBM/AIX) for WWW (Netscape Proxy) allowing internal users to securely use the Internet.
- Secured E-mail (Lotus Domino), and a number of other services (sockets based 'relay' programs),
- Implemented a centralized ADSM based backup/recovery system ( Confidential /AIX) improving operational security and reduced costs due to data loss.
- Trained onsite personnel on operations/security to minimize the use of consultants to reduce costs.
- Provided rapid problem determination/resolution and performance analysis on a highly visible web service involving multiple terabytes of data (Oracle on Confidential /AIX SP nodes with NAS/SAN and NT front ends) allowing the customer to meet published release date with a reliable and usable system.
- Provided problem determination/resolution and performance analysis on a large stock brokerage web application (modern systems with legacy mainframe backends) keeping the project on track with appropriate hardware configuration.
- Performed problem determination/resolution and performance analysis on a highly visible 'educational testing service' web based application (modern servers with legacy mainframe backends) ending a long term standoff between vendors and allowing the customer to fully realize the benefits of online delivery of services.
Systems Administrator
Responsibilities:- Responsible for all aspects of the administration and operation of the financial, billing and practice management system for over two dozen clinic sites Confidential the main hospital and in remote locations. The system consists of Confidential /AIX applications servers running with a PICK guest OS with workstations running LINUX, Windows, DOS or OS/2. Implement new software and hardware, add and support users, perform backup and disaster recovery, monitor performance (database, disk and network) and tune the system, diagnose and resolve problems. Manage operations and support-staff and coordinate with other data processing groups in the main hospital. Some accomplishments include:
- Developed a standard method to execute such diverse tasks as 3270/SNA SDLC applications, Word Perfect, electronic mail, accounting, and management functions on a variety of terminals or Confidential PC workstations, and "hot key" between them. Developed a system for EDI/electronic claim submission (early 'e-commerce'). Automated many functions, including billing and accounting processing. Wrote numerous standards, procedures, and operations manuals.
Confidential
Lab Manager
Responsibilities:- Responsible for all aspects of five different user labs including user support, staffing, budgeting, and cost containment.
- Wrote various documents including operations manual for staff and a problem-solving guide for users.
- Developed various security and anti-'virus' utilities, including protection from the Internet (pre 'firewall').
- Integrated a wide variety of software to provide functional workstations for lab users. Developed prototype network workstations integrated with UNIX and VMS hosts.
- Provided technical consulting to GSB professors, staff, and students.
Confidential, Ann Arbor, MI
Director
Responsibilities:- Responsibilities in a small company included allocation of budget, managing direct marketing efforts, providing ongoing customer support, and offering product design and development for the UNIX market.
- Applied existing design of a spelling corrector and text output formatter (written in C) to a variety of UNIX platforms running Berkeley and Confidential UNIX, and XENIX.
- Designed and built 80386-based workstations for a Local Area Network used internally. Repaired and supported internal systems as well as those for outside clients.
Confidential, Ann Arbor, MI
Technical Manager
Responsibilities:- Provided technical support/consulting to company after spin-off, designed and integrated a number of custom systems based upon Confidential, Confidential, and Confidential hardware for clients. Served as a repair systems technician/consultant to outside clients. Developed client equipment database system. Sold off-lease and overstock equipment.
- Provided technical sales support to HCA subsidiary. Managed disposal of all off-lease and overstock equipment. Supervised the translation of a leasing management system from ALGOL on a Confidential PDP/11 to an Confidential &T 3B2 running PICK/UNIX.
- Responsible for maintaining stable computer environment for product development, daily operations, and commercial timesharing on a network of Confidential, ISI, Confidential &T and other vendor hardware. Provided product integration support as well as customization and translations to new environments. Worked with outside vendors to provide national and international network access to NETI's commercial timesharing systems. Developed a customer billing system in C, a security and performance audit system in C and shell script, a menu shell in C, and a wide-area network file transfer terminal emulation package in C and 8086 assembler. Ported a number of system utilities and programs across internal and commercial systems.
Confidential, Ann Arbor, MI
Co-founder
Responsibilities:- Implemented and marketed a number of technical products.
- Designed an automated steel billet cutter.
- Designed and constructed a number of computer systems, interfaces for a variety of photo typesetters, and various protocol converters.
- Software projects included: design and implementation of a quality assurance and control/inventory management system for a large manufacturing plant written in PL/1; general ledger, accounts receivable, accounts payable, and payroll systems written in BASIC; and device drivers written in z80/8080 assembler.
Confidential, Ann Arbor, MI
Research assistant
Responsibilities:- Set up computer laboratories for various departments Confidential the Confidential and integrated them with U of M's main computer systems.