Information Security Specialist Resume
Washington, DC
SUMMARY:
- Excellent interpersonal, communication, and organizational skills
- Problem - solving skills and a high degree of self-motivation
- Able to relay technical information to customers with varying skill levels
- Ability to learn and respond to demands in a fast-paced, highly technical environment
- Familiarly with Information Security Publication Series Confidential 800-53 Security Controls
- Monitoring firewalls and network proxies with a host of security tools to defend against zero day attacks
- Analyzing IDS alerts to decipher between false positives and real threats
- Network security vulnerability assessments that include UAT of new software installs
- Tier 2 escalation of security reports for breaches and repeat offenders
- Prioritization and categorization of attacks based on statistical / historical data using Confidential & Confidential
- Constantly researching the latest threats to cross platform technologies and their impact on the network s over all security posture
TECHNICAL SKILLS:
Anti-virus Programs: Norton Symantec Security Suite, MacAfee Internet Security Suite, AVGKaspersky Anti-virus lab, Microsoft Security Essentials, Bit defender, Sofos, CC Cleaner
IDS Tools: MacAfee ePO & DLP, Confidential, Wire shark, NMap, FireEye, Virus Total
System Monitoring: HIPS/ NIPS Firewalls, Intrusion Detection / Prevention Systems, Security Policy Editor, Group Policy Editor
System Access Controls: DAC, RBAC, NAC
EXPERTISE AREA:
- Installation / Administration of Cisco Switches / Routers; Wireless Access Point Configuration
- Network connectivity troubleshooting and configuration from the Network Adapter
- Microsoft Active Directory Services: User Account password lockout and resets
- Domain Controller propagation and configuration, Creation and Management of Organizational UnitsServer Patch Management
PROFESSIONAL EXPERIENCE:
Confidential, Washington, DC
Information Security Specialist
Responsibilities:
- Penetration testing devices to verify network security policy compliance
- Threat prioritization and mitigation by making adjustments to network security posture based on assessment data
- Conducting daily vulnerability scans of any Confidential device that connects to any Confidential network in compliance with Confidential 800 - 53 Publication Series: Security Controls
- Coordination with vendors to enforce strict network security polices based on Confidential s Order CIO P 2100.1, Confidential IT Security Policy
Confidential, Alexandria, VA
Lead Field Services Technician
Responsibilities:
- Desktop Support Manager of two technicians, supporting Confidential employees nationwide (remotely/in person)
- Software installs and troubleshooting Auditing & Data Analytic applications in a windows environment
- Domain Security Migration for government clients: Confidential /CBP, CIA, DOJ, NASA, DOT, VA
- Setup Polycom Teleconference Rooms for Video Conferences between VIPs
- Lenovo Laptop Asset Management in Remedy ticketing system
- Air watch mobile Administrator
Confidential, Washington, DC
Networking Administrator
Responsibilities:
- Coordination with multi - vendor IT: Data Backup / Migration
- Kiosk touchscreen Interfaces, tablets with proper network IP addresses in local stores, malls and airports
- Installation & configuration of network hardware equipment to include: ( Confidential / Confidential / Confidential ) Switches.
- Wireless Access Points and Routers, | Merkaki | Netgear|Linksys and Firewalls, API Hardware UPS.
- Troubleshooting Point of Sale Devices, CCTV Surveillance Systems
Confidential, Baltimore, MD
Tier I Security Operations Center Analyst
Responsibilities:
- Monitoring network intrusion dashboards for breaches using MacAfee s Data Lost Prevention firewall software
- Malware Analysis; threat matrix classification and prioritization
- Created detailed security reports of industry wide cyber security breaches that affect the entire IT security industryusing various ticketing systems
- Enforcement of Network Security Policy in conjunction with Confidential for repeat offenders
- Managing the SPAM / Phishing Inbox
- Coordination with Confidential & Confidential / Confidential to mitigate the Cyber Attacks