Networking & Security Consultant Resume
St Louis, MO
PROFESSIONAL SUMMARY:
- Intelligent IT Security/Technical Support Analyst with notable experience supporting end users with various technical issues (installations, configurations, troubleshooting/maintenance, security and vulnerability management, etc.).
- Possesses a broad range of technical experience, including: LAN, WAN, VOIP, PC/OSX/Linux, VPN, hardware, applications, DVR/NVR, security compliance ( Confidential, SOX, Confidential ), vulnerability and risk assessment, along with a knowledge of various security tools.
- Possesses exceptional communication skills to be able to communicate with non - technical end users to ensure issue is resolved quickly and correctly.
TECHNICAL SKILLS:
Network: LAN, WAN, VOIP, Barracuda Firewall, Cloud computing (Azure, MS 365, AWS), Virtual networking, Cisco Small Business, Dell Sonic Wall, VPN, DVR/NVR (HikVision).
Compliance: Confidential & Confidential
Security: Encryption (bitLocker, PGP, GPG, KeePass, True Crypt), Vulnerability & Risk Management (Metasploit, Burp, OWASP), Penetration testing of Operating Systems, networks, hardware, and web applications, Risk analysis as well as security audits/ reports and assessments, SIEM (Splunk, LogRythm), Endpoint protection (Kaspersky, Malwarebytes, McAfee).
Development: PHP, C, HTML/CSS, JavaScript, node.js, JAVA, Eclipse IDE, Android studio, Visual Basic, SQL, NoSQL, PSQL, Object Oriented design and Process documentation for said languages in any environment.
Other Misc.: Adobe premiere, after effects, and Photoshop. Windows, OS X, Linux/Unix (Kali, Pentoo, Parrot, Qubes), Excel, Word, PowerPoint, Visio, etc.
PROFESSIONAL EXPERIENCE:
Confidential, St. Louis, MO
Networking & Security Consultant
Responsibilities:
- Design and implement the network infrastructure required for migrating multiple entities that provide and conduct business for Imo’s in St. Louis, as well as designing the infrastructure for the 90+ stores in and around Missouri supporting thousands of end users via phone, email, and in-person.
- Deploy LAN, WAN, and VOIP communications, working with various vendors and service providers to provide the newest technologies while maintaining availability and security to the end-users.
- Support and maintain technology assets for each and every end-user.
- Troubleshoot and support Windows 7, 8, 10 as well as Linux based operating systems
- Deployed endpoint security on iOS and Android with Kaspersky
- Troubleshoot issues with MS Office, point of sale (POS) and other applications.
- Deploy web-based & network based solutions for project management and support, including applications.
- Implemented network access controls through Kaspersky and group policy object to enable software deployment, patching and remote support tools using MS Server 2012.
- Provide surveillance to separate entities using DVR/NVR security technology.
- Modify all entities information security policies, procedures and standards to ensure that they met client requirements, corporate, and compliance needs.
Confidential
IT Security Consultant
Responsibilities:
- Provided consulting services to large enterprise clients, as well as multi-nationals.
- Handled many cases with exploited e-commerce apps, web services, mobile apps, Point of Sale (POS) systems, client-server apps, network penetration tests, as well as hardware and operating systems.
- Documented and analyzed code reviews on Java, .NET, PHP, JavaScript, and other languages, where our team was able to find vulnerabilities that commercial scanning tools missed.
- Responsible for the identification of security issues as well as demonstrating them in reporting and providing guidance on severity level and remediation
- Our team discovered and documented several CVE’s in commercial products.
- Worked with security team to ensure company infrastructure and applications meet Confidential and Confidential 800 compliance standards.
- Our team successfully exploited devices demonstrating to the client the exfiltration of credit card ( Confidential ), personnel, financial, and other sensitive data.
- Analyzed the company’s information security policies, procedures and standards to ensure that they met client requirements, corporate, and compliance needs.
- Worked with security team to ensure company infrastructure meets Confidential and Confidential compliance standards.
- Used Python to write a script in Kali that would run a list of IP addresses against nslookup to increase productivity when running 5000+ IP addresses against nslookup.
- Picked from applicants crossed the nation; only 11 individuals selected to travel to Kansas City for an expedited security consultant training program at the Fishnet Worldwide Headquarters.
- Immense CISSP prep and training from Certified Instructor Tim Ramsey.
- Professional management, sales, consulting, and security training from certified professional’s full time.