Information System Security Consultant Resume
SUMMARY:
- Over 18 years of progressive experience in Information Technology Infrastructure administration, and Information Security policy compliance, auditing, and certification and accreditation.
- Demonstrated expertise in risk and technical vulnerability assessment of network infrastructure utilizing Nessus Tenable, Retina, NMap etc.
- Proven track record in providing leadership and guidance in the development and implementation of certification and accreditation packages for various systems.
- Proficient in the training of senior management staff on vast spectrum of information technology related programs including, high - level Confidential Compliance training and auditing.
- Experience in creating Checkpoint Gaia R75.40 firewall rules from smart dashboard menu and performing policy install.
- Knowledgeable in running reports, alerts and performing event monitoring with Tripwire and Security Incident Event Management tools.
- Instrumental in the successful auditing of the security posture of over 45 CMS/QIO sites throughout the continental United States and Alaska.
- Successful in managing regional corporate accounts for several large Washington metro area based Information Technology Companies.
- Highly effective and result oriented in the achievement of set goals by ensuring that deliverables are ready as of when due.
- Detail oriented, good decision making and problem solving skills, excellent interpersonal and communication skills, ability to work in team and individual environment.
- Skillful in translating complex business processes into solutions in an efficient manner.
TECHNICAL SKILLS:
Software: DOS 5, 6, MS-Windows 3.1, 3.11, 95, 98, NT 3.51, 4.0, Windows 2000, 2003 Servers, XP, Vista, Novell 3.11, 3.12, 4.11, 5.0, MS Office 95, 97, 2000, 2003, XP, ERP SAP, Remedy, MS outlook, Ms Project, Ms Exchange, GroupWise, cc Mail, Lotus Notes, ReWin, Solomon, Arkserve, Innoculan, Veritas; backupexec, Netbackup, Word Perfect, Ghost, Netscape, Internet Explorer, Remedy, A2B, Tax Analyst, Drive Copy, FX, PCAnyWhere, Cronos, Linux Red Hat, VB Script, Remedy, Visio, MS Project, Ms Word, Excel, Access, Power Point, Travel Manager, Nessus, Retina, Nmap, A2B, Dynnacom, WebSence, VMWare-VCM, IDS, Symantec End Protection (SEP), Critical System Protection (CSP), Security and Incident Event Management ( Confidential ), SharePoint, Confidential Log Manager, Q1 Labs (Qradar), ArcSight, McAfee Nitro. Checkpoint Firewall.
Hardware: IBM Compatible PC; Compaq, Dell Power Edge Servers, Confidential, IBM, and Gateway 2000. Compaq Servers, IBM Nefinity 5000 Series Servers, Dell 1855, 1955 Blade Servers, Confidential LaserJet Printers, Confidential Net Servers and Rack Storage, Dell Racks, Dell 136T and ML 6000 backup Libraries, Dell Optiplex Workstations, Toshiba and Dell Laptops, Cisco Routers, Cisco Firewall, Switches, Packeteer 9500 Series, ATM Encryptors, Mainframes, Extreme, Netscreen Juniper firewalls, Checkpoint.
LAN/WAN Protocols: TCP/IP, HTTP, FTP, IPX/SPX, DHCP, WINS, and DNS
Tools: Trusted Agent Confidential (TAF), CMS Files Repository System (FRS) etc.
PROFESSIONAL EXPERIENCE:
Confidential
Information System Security Consultant
Responsibilities:
- Requested for audit evidence from responsible parties, ensuring that requested information is uploaded to Confidential ’s SharePoint site and follow-up on additional information when needed.
- Facilitated, attended and represented the interest of Confidential in meetings between Confidential ’s Auditors and Confidential ’s employees and updated the department’s director on the audit status.
- Sent an email with “Meaningful Use” questionnaire attachment to responsible parties requesting for the completion and return of questionnaire responses of satellites clinics and Physicians’ offices within a specified time frame in preparation for individual site audits and assisted employees in the completion of said forms when needed.
- Reviewed Ford’s audit controls to identify available evidence within the environment that meets control requirements and worked with the department’s director to request for additional evidence needed to meet audit requirements.
- Worked with team members to perform penetration testing of hospital environment to identify areas within the physical environment that is vulnerable to attack in order to develop a counter measure for remediation. Perform phone scam to test user’s ability to identify and report suspected fishing attempts to the appropriate authority within the organization.
- Collaborated with team members to develop control questions (based on several audit standards including; SP 800-53R4, HIPPA, PCI etc.) to be used in performing risk assessment on vendors intending to engage the organization on business venture.
- Scheduled and attended vendor’s and product assessment meeting engaging the Privacy Office, the Information System Security Office, The Network Security Office and sometimes, the Contracting Officer and Program Manager to extract relevant information and documentation needed to determine the risk level of the potential business engagement to aid the risk management board in decision making.
Confidential
Information Security Consultant
Responsibilities:
- Performed data gathering as part of effort to assess the health posture of the information security operating environment by reviewing Confidential logs, rules and offenses.
- Researched and developed outlines on Confidential use cases to address knowledge based challenges and future documentation needs.
- Identified Confidential gaps and worked with team members to develop applicable matrix
- Developed templates to track activities and monitor progress.
- Mapped use cases with Confidential rules to identify research and development needs.
- Collaborated with team members to analyze “defense-in-depth” within the environment as part of cyber security road map and made appropriate recommendations.
- Researched on use case scenarios and developed several use case process documents applicable to nationwide operating environment including; unauthorized system or user, distributed denial of service attack, unusually slow network performance, suspicious activity to administrative accounts, suspicious traffic to a vulnerable host, unauthorized configuration change detection and investigation.
- Researched and developed preliminary performance and capacity indicators modules for Red Seal and Web Reporter.
- Developed audit assessment document based on Confidential 800-53R4 standard to test and identify Gaps within the operating environment and made appropriate arrangement for mitigation.
- Performed software and infrastructure audit to meet PCI compliance requirements
- Reviewed policies and procedure documents to identify gaps, developed POAMs for mitigation.
- Monitored POAMs resolution and wrote procedure documents to update legacy records.
Confidential
Information Security Consultant
Responsibilities:
- Met with key information technology and management personnel in an effort to access the current operating posture of the legacy system in preparation for external information security auditing.
- Developed project plan for Confidential SP800-53R3/R4 auditing and SP800-53R3/R4 moderate impact system assessment Matrix for the Confidential Systems.
- Gathered and reviewed relevant documentations, including system security plan, contingency plan, Confidential policy and procedure handbook, Confidential policy and procedure documents for gaps.
- Interviewed key Confidential personnel to gather pertinent information and documentation necessary for a thorough evaluation of the current operating environment and security posture for compliance
- Performed Auditing of the operating environment and determined gaps within the Confidential operating boundary. Developed Plan of Action and Milestone (POAMs) and Corrective Action Plan for mitigation.
- Reviewed and recommended updates for several documentation including; business continuity and contingency plan, Audit and accountability policy and procedure, computer incident response policy and procedure as well as access control policy and procedure to mitigate lapses.
- Developed configuration management plan, policy and procedure based on Confidential SP800-128; Guideline for security focused configuration management of information systems.
- Evaluated the automated ticketing and tracking system within the environment to ensure that the best business practice is being followed through the use of “Service Now” ticket management tool.
- Reviewed hardening scripts, event logs and configuration files from servers, routers, firewalls, switches, IDS/IPS to determine configuration settings for compliance assessments and to track potential incident for investigation and mitigation.
- Tracked changes to the baseline configuration of the information system through audit log review
- Mapped Confidential SP800-53R3/R4 to ISO/IEC27001; International Standards Organization and reviewed disaster recovery and business continuity plan to ensure that organizational security requirements are met.
Confidential
Information Security Consultant
Responsibilities:
- Performed physical walkthrough of the enterprise network infrastructure to conduct defense-in-depth security assessments of the operating environment in preparation for Confidential SP800-53R3 audit compliance using Security Technical Implementation Guides.
- Interviewed key personnel at Confidential - Confidential to gather pertinent information and documentation necessary for a thorough evaluation of the operating environment
- Performed in-depth security analysis of several network security related infrastructure components including; switches, routers, firewalls, Tipping Point IDS/IPS configurations, Checkpoint, extreme, Netscreen Juniper, Endpoint security Program, VPN Gateways etc.
- Reviewed and tested Confidential wireless remote access policy and procedure, Tipping Point IDS/IPS and Checkpoint baseline documentation, firewall rules for deviation and policy documentation to determine gaps and remediation needs as well as event logs for compliance with Confidential SP800-53R3 using DISA Confidential standards.
- Analyzed Juniper firewall with firewall analyzer and HPNA verification tool, reviewed McAfee Network Intrusion Prevention, firewall configuration logs for compliance entries, reviewed firewall policies, procedure and manuals in the policy center for answers to 912 security audit Confidential requirements, onbase policy and procedure documents for Confidential compliance and performed deviation/exception analysis on Netscreen switches.
- Worked with team members to develop comprehensive assessment-based findings, and remediation reports, worked with firewall engineers on issues that require additional expertise.
- Reviewed several Confidential deviations and develop business, operational and security impact assessment for Confidential Network and Cyber Security Infrastructure; determined the mitigating/compensating controls and residual risk level on several Confidential, worked with the security team on meeting deviation requirements.
- Worked with Tripwire administrators and consultants to reconfigure Tripwire for enhanced quality details of generated report to ease access in meeting required objectives.
- Ran tripwire report on; Windows, IIS, AD, DC, AIX, Solaris LINUX, Solaris, SUSE, Oracle and MSSQL servers and created several reports in Tripwire to assist administrators meet their respective objectives.
- Reviewed and tested Confidential controls on Identification and Authentication, Incident Response, Access Control, Media Protection, Risk Assessment, System and Information Integrity Policies and Procedures of Confidential - Confidential Network infrastructure.
- Installed Check Point R75.40 Gaia OS on Confidential DL380 Server, upgraded Check Point Gaia OS from R75.10 to R75.40. Configured checkpoint firewall to meet required specifications. Created Checkpoint Gaia 75.40 firewall rules on smart dashboard and perform policy install.
Confidential
Information Security Consultant
Responsibilities:
- Designed templates to gather pertinent information for the development of Security Incident Response Team operations.
- Contacted and scheduled series of meetings with key information technology and Information security personnel to determine the current security posture of the operating environment.
- Interviewed key personnel to obtain necessary data for the development of Confidential operation.
- Researched, developed and wrote Security Incident Response Team’s ( Confidential ) procedure, guidelines and processes’ manuals to monitor and manage the operating environment.
- Monitored and analyzed alerts, log files, event logs, policy rules from Cisco, Checkpoint, Extreme Firewalls, switches, routers and IDS/IPS with log monitoring and management tools to determine the security health of the cyber and operating environment thereby ensuring continuity in the business operations.
- Worked with information security team members in addressing and resolving security vulnerability concern within the environment including McAfee Network Intrusion Prevention rules and documented all findings and resolutions.
- Performed assessment of identified incidence to determine the scope, impact and the extent of damage, if any, determined the appropriate information technology personnel and assigned responsibilities for the containment, eradication and recovery of the information technology system to its original state for the resumption of normal business operations.
- Created CA service desk ticket to assign responsibilities to respective departments and to track the resolution of incident, reviewed change order schedule to verify that change management process is properly mapped to changes reported in daily log and alert files.
- Investigated web traffic with WebSence program to capture and analyze web traffic pattern to determine vulnerability source and developed cyber security mitigation strategy.
- Investigated and analyzed internal system access with Confidential Log manager; a Security and Information Event Management ( Confidential ) tool, for security breaches within the network operating environment.
- Reviewed Confidential Special Publication 800-66; An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Confidential (HIPAA) Security Rule, the Center for Internet Security configuration benchmark documents, Cobit 4.1 Framework, Payment Card Industry Data Security Standards (PCI DSS), The Sarbanes-Oxley Confidential of 2002 and ISO/IEC 17799:2005 documents to develop Servers’ configuration benchmark for VMware Vcenter Configuration Manager.
Confidential
Senior Systems Assurance Analyst/Team Lead
Responsibilities:
- Researched, developed and edited training materials for systems assurance compliance training
- Provided Confidential compliance training to key management and technical engineers including the CEO’s and systems administrators of several quality improvement organizations (QIO) through out the continental United States and Alaska.
- Reviewed access control policy and procedure to ensure compliance with account management process, information systems access enforcement, password complexity, separation of duties, unsuccessful login attempts, session lock and termination as provided by Confidential standards.
- Reviewed log files to verify that all users’ accounts and users’ privileges related changes are tracked and recorded in remedy or spreadsheet in adherence to access control policy and procedure.
- Conducted security controls assessment of the QIO information system infrastructure focusing on the managerial, operational and technical controls by interviewing key management staff and technical engineers on the current security posture of their respective operating environment.
- Gathered necessary evidence and documentations to determine gaps within the human resources and information technology-operating environment in compliance with Confidential and Confidential 800 series of standards including: 800-18, 800-30, 800-34, 800-37, 800-53, 800-58, 800-59, 800-60, etc.
- Reviewed available documents including system security plan, contingency plan, Incident response plan, security assessment report, operation and administrative manuals to verify supporting artifacts and to resolve inconsistencies in ensuring strict adherence to set standards.
- Inspected operating environment and application platforms to observe the application of management controls in compliance with set standards.
- Reviewed and resolved IDS/IPS related issues by reconfiguring McAfee Network Intrusion Prevention, Cisco, Firewall etc rules.
- Conducted technical vulnerability assessment of the network infrastructure by scanning entire network IP range with NMAP and NESSUS software to uncover any hidden vulnerability concern in an effort to meet Confidential requirements.
- Plotted graphical representation of audit controls of individual quality improvement organization’s sites to aid in the interpretation of audit findings.
- Wrote a 200 plus pages of comprehensive report detailing audit findings and remediation recommendations in Plan of Action and Milestone (POAM) to mitigate lapses.
- Reviewed, created and updated several C&A documents including, System Security Plan, Contingency Plan, Security Risk Assessment and Security Assessment Report and participated in the certification and accreditation of several systems from initial to continuous monitoring phase.
- Participated in writing and editing of several technical documents and proposals to ensure accuracy of information and to meet set objectives.
- Created a comprehensive report of each site and systems on the CMS FRS repository system for review and approval by relevant authorities of the agency.
Confidential
Principal Security Consultant
Responsibilities:
- Performed compliance testing by meeting with IT team to gather evidence, developed internal audit control plan and performed general computer control to test information security reliability.
- Tested general computer controls to identify operations deficiencies and gaps; developed remediation plans to mitigate lapses. Presented final report to the security management for review and approval.
- Worked with process owners to ensure timely identification and remediation of risk related issues and action plans in compliance with Confidential 800 guidelines.
- Reviewed selected IT audit area through system walk through and prepared work paper documentation in accordance with department’s standards.
- Reviewed and updated Voice over IP policy to ensure compliance to Confidential 800-58; Security Considerations for Voice over IP system. Tested and verified that the Voice over IP system is configured on a separate VLAN system to protect the infrastructure from malicious compromise.
- Reviewed and prepared relevant certification and accreditation documents and supported System Test and Evaluation (ST&E) efforts in the assessment of information technology security compliance designed to meet certification and accreditation objectives of several systems.
- Performed risk assessment test to identify threats and vulnerabilities and participated in drafting recommendations for mitigation by the management.
- Created, reviewed and updated several Certification and Accreditation (C&A) documents including, system security plan, Contingency plan, Security Assessment Report, and Plan of Action and Milestone (POAM) in an effort to meet the certification and accreditation needs of the agency.
Confidential
Senior Systems Engineer/ Security Analyst
Responsibilities:
- Performed preliminary audits of agencies’ LAN/WAN security infrastructure, intruder detection and preventive systems to ensure security compliance.
- Reviewed backup, password, data and network access policies to ensure compliance to Federal Standards.
- Worked with several IT security contractors in conducting ST& E of the Network Infrastructure in an effort to complete Certification and Accreditation (C&A) of several systems.
- Implemented vast spectrum of fundamental security management principles and controls covering; risk management, contingency plan, incident response, and access control.
- Performed stress tests to meet strict agency’s Network standard, developed and implemented IT security test and remediation plans to address lapses in compliance with Confidential standard and controls.
- Reviewed and resolved several pending Plan of Action and Milestones vulnerabilities
- Reviewed and updated contingency plan on the network infrastructure based on 800-34; Contingency Planning guide for the Federal Information Systems.
- Created contingency plan test/exercise program to test the reliability of the operating environment and trained several contingency plan personnel on their respective contingency roles.
- Provided incident response, incident handling and disaster recovery training to technical staff of the agency and performed disaster recovery testing of the backup operation of the system.
- Managed the entire local and wide Area network system for a Federal Government agency in Washington, DC.
- Interacted with top management staff to proffer IT Network related solutions to complex issues.
- Planed, coordinated and executed special projects including building and deploying new servers to several sites to meet strict agencies’ specifications.
- Deployed and configured McAfee EPO, firewalls etc, worked with team members to reviewed network diagram and make corrections to ease deployment exercise and to meet required standards.
- Performed user and data migration across multiple platforms; troubleshoot desktop, LAN, WAN, switches, routers, e-mails, printers, and scanners to diagnose problems.
- Provided site support, systems upgrade, hardware deployment, network administration and engineering support to the agencies’ sites throughout the United States.
- Resolved user’s network, desktop and e-mail related problems remotely through LANDesk program.
- Performed server maintenance, repair and train users on systems and application usage.
- Created and join users, workstations and servers to active directory; assign users and groups’ rights; installed and configured Blackberry devices; established internet and intranet connectivity and configured laptops for Ccmobile, Secure id and VPN access.
- Performed daily network and desktop backup of Novell Netware, Active Directory and e-mail administration utilizing VERITAS Net Backup and Backup Exec software in a cluster environment.
- Created and edited batch files and virtual basic scripts to map network drives and home directories.
Confidential
Senior Systems Engineer
Responsibilities:
- Managed Local and Wide Area Network Security System for the Headquarter of a Confidential .
- Worked with top management staff of the agency to provide IT Network and Security related solutions to address network needs.
- Performed encryption on Information Technology equipments to meet Confidential security requirements by utilizing, Windocs, a special encryption software, scanned the network system with Nessus program for vulnerability.
- Installed and configured Windows 2000, 2003 servers, Novell 4.11, tape library device and Veritas Backup Exec software to meet strict agency’s Security specifications.
- Performed user and data migration across multiple platforms; troubleshoot desktop, LAN, WAN, switches, routers, e-mails, printers, and scanners to diagnose problems.
- Provided site support; systems upgrade, hardware deployment, network administration and engineering support to the agency’s security sites throughout the continental United States.
- Resolved user’s network, desktop and e-mail related problems remotely through LANDesk program.
- Performed server maintenance and repair, trained users on system and application usage.
- Created and joined users, workstations and servers to active directory; assigned users and group rights; install and configured Blackberry devices; established internet and intranet connectivity and configured laptops for Ccmobile, Secure id and VPN access.
- Performed daily Network and Desktop backup of Novell Netware and Active Directory data; utilizing Veritas, Net Backup and Backup Exec software in a cluster environment.
- Troubleshoot firewalls, intrusion detection and preventive systems (IDS) to ensure optimum protection of data.
Confidential
Systems Engineer/Analyst
Responsibilities:
- Provided senior level guidance and assistance to network and desktop support engineers through; researching, writing, sorting, editing and enhancing relevant technical documents and manuals necessary to implement a given task.
- Aided engineers to resolve Servers, Desktops, hardware and software related problems.
- Provided support for the proper testing and evaluation of hardware and software problems and made recommendations to enhance the operation of IT environment.
- Monitored network system for viruses, downloaded and distributed McAfee dat files and scan engine to LAN/server team, customer service FTP site and customer service sites as well as ensured that servers are updated and patched.
- Managed district office sites which is made up of about six sites by providing daily support activities, attended daily meetings, addressed customers concern, worked with site supports to ensure easy operation of daily activity.
- Opened and monitored remedy tickets, troubleshot desktop and network problems over the telephone, visited user’s office or remotely resolved user’s computer-related problem and closed remedy tickets.
- Provided site support, systems upgrade and Hardware deployment as well as performed network, e-mail administrators and engineering duties at several service centers throughout the continental United States and Alaska.
- Participated in the development of Raven image based on Confidential, System Administration Guidance for Windows 2000 professional system.