We provide IT Staff Augmentation Services!

Cyber Forensic Architect Resume

PROFESSIONAL EXPERIENCE:

Confidential

Cyber Forensic Architect

Responsibilities:

  • Using Symantec DLP to protect the company against exfoliation.
  • Monitor critical controls and appliances using Fire Eye.
  • Threat hunting in Qradar, and Splunk for worms, bots and creative intrusions.
  • Researching and logging SIEM movements in Firepower/SourceFire.
  • Reverse engineering using Cisco Amp, Carbon Black, Fire Eye MAS.
  • Accessing Symantec ATP, and Cylance tools for IOC landscape overview.
  • Developing use cases for ransomware, hijacks, backdoors, and next generation threats.

Confidential

Senior Security Engineer

Responsibilities:

  • Conducting Confidential audits internally and for managed clients.
  • Managed Confidential Metrics using Metric Stream.
  • Confidential controls were used as a baseline for the enterprise environment.
  • Created Governance policies and controls for CMDB and risk management.
  • FireEye was used to locate the endpoint of an attempted malicious event.
  • Used Confidential tools Confidential Archer to maintain and report on controls..
  • Identifying endpoints to implement, and support Tripwire.
  • Scanning the protected cardholder environment with Qualys, and Nexpose.
  • Working with executives within the company to ensure baseline and best practices are in place.
  • Responsible for ticket SLA s within Triole using Service Desk.
  • Bluecoat support was critical for allocated restricted web access for the entire enterprise company.
  • Lead management calls to patch, firewall, or proper VLAN and segment effectively.
  • Preventing threats using signatures and advanced algorithms.

Confidential

Security Analyst

Responsibilities:

  • Running vulnerability scans using Qualys.
  • Provisioned request for global access for thousands of employees, vendors and third parties.
  • Installing security controls on wireless access points
  • Created a SharePoint with SANS intrusion and penetration updates.
  • Assisted users with permissions on group shares, local LANs and VPNs.
  • Manually setup group roles and policies.
  • Completed OIM request by validating, documenting and referring to best practices.

Confidential

Information Security Engineer

Responsibilities:

  • Worked with SOX, ITAR, and Confidential regulations to maintain risk and controls.
  • Perform computer forensic investigations, malware analysis, network log review, and intrusion investigations using various forensic tools and techniques to identify network computer intrusions; deploy network sniffers for intrusion investigations.
  • Provisioning request using Oracle identity management (OIM) on top level domains, secure domains, tiered domains, and vendor s domains as well.
  • Document investigations; create incident response processes; create diagrams and graphics to communicate intrusions.
  • Worked on a diagnostic system would then help distributed intrusion detection systems to effectively correlate detection reports from various sources.
  • Experience troubleshooting and enhancing desktop security and configuration management through Group Policy Objects.

Confidential

Manager of Information Technology

Responsibilities:

  • Created firewall rules to establish hardening and IPS.
  • Frequently participate in Penetration Testing and Vulnerability Assessment.
  • Based entire infrastructure based on ITIL and industry standards.
  • Implementing security policy to protect internal network against unauthorized access, and to make provisions for disaster recovery in the event of successful intrusion/attack.
  • Managing and administered a Windows 2008 server platform.
  • Web Vulnerability Scanner and also Firewall configuration vulnerabilities using port scanning.
  • Works under no supervision and self manages all projects.
  • Coordinated and conducted application and network vulnerability scans.

Confidential

Network Security

Responsibilities:

  • Supported and hosted a secure infrastructure using Active directory to manage domain controllers, Forest, OU's, group policies and add - ons.
  • Used VMware to install, secure and create cloud infrastructure.
  • Installed patches and updates to servers using remote tools.
  • Monitored security certificates, backups, and VNC server to ensure authenticity.
  • Performed BES activations, updated patches, and created new accounts.
  • Maintained authentication of software and certificates.
  • Supported SharePoint users with transferring information into a cloud network.
  • Migrated Outlook 2003 to 2007 in an Exchange platform.
  • Performed maintenance on systems that included regedit, windows dump file, and safe mode.
  • Measured performance based on a SLA time measuring system.
  • Configured Active Sync by install
  • Used System Center Configuration Manager to remote into machines on a global platform. Setup LAN/WAN/Wi-Fi networks for enterprise roll outs and migrations.
  • Verified customers using People Soft tools.
  • Supported Microsoft Office Suite, Windows, Linux, Mac environment.
  • Performed regedit and advanced system recovery operations to retrieve and or modify workstations.
  • Searched and maintained customer records using Remedy ticketing system.
  • Repaired, restored and maintained .pst files and Exchange mailbox settings.
  • Activated Blackberry's and configured firmware for IPhone, Blackberry, and other data phones.

Confidential

Infrastructure Support

Responsibilities:

  • Supported 20,000+ users in migrating Lotus Notes to Exchange.
  • Blackberry and other platforms.
  • Worked with a Citrix network team to resolve network issues.
  • Completed design on VMware platform for users.
  • Supervised migrations that affected more than 20,000 users.
  • Responsible for monitoring call center for Internet and Intranet failures.
  • Ensured connectivity of approximately 15,000 remote POS sites for Blackberry users.
  • Provided Level 3 support in an Exchange environment.
  • Phased out Lotus Notes F.A.Q... and converted to Exchange.
  • Tested Exchange server before migration.
  • Migrated and updated systems to current operating systems and software.
  • Corrected clients concerns and computer problems.
  • Created a technical document stated "order of procedure for customer care."
  • Set up new users on Web hosting server.
  • Used client ftp to transfer files.
  • Responsible for Confidential - 1 accounts to new and current users.
  • Assisted on wireless towers that were the backbone for all Blackberry users.
  • Used a variety of call center software.
  • Supported Blackberry users via, VOIP, VPN, and intranet.
  • Maintained a low rate of escalation to Level 4.
  • Trained new hires and temporary employees.
  • Managed Active Directory domain of ten servers and 400 computers and printers.
  • Used SMS Installer and Wise Installer for networking and desktop solutions.

Hire Now