We provide IT Staff Augmentation Services!

Information Security Specialist Resume

5.00/5 (Submit Your Rating)

Washington, DC

SUMMARY:

  • Excellent interpersonal, communication, and organizational skills
  • Problem - solving skills and a high degree of self-motivation
  • Able to relay technical information to customers with varying skill levels
  • Ability to learn and respond to demands in a fast-paced, highly technical environment
  • Familiarly with Information Security Publication Series Confidential 800-53 Security Controls
  • Monitoring firewalls and network proxies with a host of security tools to defend against zero day attacks
  • Analyzing IDS alerts to decipher between false positives and real threats
  • Network security vulnerability assessments that include UAT of new software installs
  • Tier 2 escalation of security reports for breaches and repeat offenders
  • Prioritization and categorization of attacks based on statistical / historical data using Confidential & Confidential
  • Constantly researching the latest threats to cross platform technologies and their impact on the network s over all security posture

TECHNICAL SKILLS:

Anti-virus Programs: Norton Symantec Security Suite, MacAfee Internet Security Suite, AVGKaspersky Anti-virus lab, Microsoft Security Essentials, Bit defender, Sofos, CC Cleaner

IDS Tools: MacAfee ePO & DLP, Confidential, Wire shark, NMap, FireEye, Virus Total

System Monitoring: HIPS/ NIPS Firewalls, Intrusion Detection / Prevention Systems, Security Policy Editor, Group Policy Editor

System Access Controls: DAC, RBAC, NAC

EXPERTISE AREA:

  • Installation / Administration of Cisco Switches / Routers; Wireless Access Point Configuration
  • Network connectivity troubleshooting and configuration from the Network Adapter
  • Microsoft Active Directory Services: User Account password lockout and resets
  • Domain Controller propagation and configuration, Creation and Management of Organizational UnitsServer Patch Management

PROFESSIONAL EXPERIENCE:

Confidential, Washington, DC

Information Security Specialist

Responsibilities:

  • Penetration testing devices to verify network security policy compliance
  • Threat prioritization and mitigation by making adjustments to network security posture based on assessment data
  • Conducting daily vulnerability scans of any Confidential device that connects to any Confidential network in compliance with Confidential 800 - 53 Publication Series: Security Controls
  • Coordination with vendors to enforce strict network security polices based on Confidential s Order CIO P 2100.1, Confidential IT Security Policy

Confidential, Alexandria, VA

Lead Field Services Technician

Responsibilities:

  • Desktop Support Manager of two technicians, supporting Confidential employees nationwide (remotely/in person)
  • Software installs and troubleshooting Auditing & Data Analytic applications in a windows environment
  • Domain Security Migration for government clients: Confidential /CBP, CIA, DOJ, NASA, DOT, VA
  • Setup Polycom Teleconference Rooms for Video Conferences between VIPs
  • Lenovo Laptop Asset Management in Remedy ticketing system
  • Air watch mobile Administrator

Confidential, Washington, DC

Networking Administrator

Responsibilities:

  • Coordination with multi - vendor IT: Data Backup / Migration
  • Kiosk touchscreen Interfaces, tablets with proper network IP addresses in local stores, malls and airports
  • Installation & configuration of network hardware equipment to include: ( Confidential / Confidential / Confidential ) Switches.
  • Wireless Access Points and Routers, | Merkaki | Netgear|Linksys and Firewalls, API Hardware UPS.
  • Troubleshooting Point of Sale Devices, CCTV Surveillance Systems

Confidential, Baltimore, MD

Tier I Security Operations Center Analyst

Responsibilities:

  • Monitoring network intrusion dashboards for breaches using MacAfee s Data Lost Prevention firewall software
  • Malware Analysis; threat matrix classification and prioritization
  • Created detailed security reports of industry wide cyber security breaches that affect the entire IT security industryusing various ticketing systems
  • Enforcement of Network Security Policy in conjunction with Confidential for repeat offenders
  • Managing the SPAM / Phishing Inbox
  • Coordination with Confidential & Confidential / Confidential to mitigate the Cyber Attacks

We'd love your feedback!