We provide IT Staff Augmentation Services!

Information Security Analyst Resume

SUMMARY:

An Information Security Analyst with detailed knowledge in identifying security threats and vulnerabilities, instruction detection technologies, system monitoring, and system policy. Extensive experience in implementing, configuring, and maintain Active Directory, developing, testing, and operating firewalls, IT security risk and compliance, enterprise anti virus, and software deployment tools.

TECHNICAL SKILLS:

Software Tools/ Hardware Tools: ASCOM Qvoice 5.4.1, Agilent, MapInfo Valere, Siteboss, XCAL - X, Clearwire WiTT, SWISSQUAL, Ericsson TEMS Investigator Ericsson TEMS EDGE, Ipconfig, PING, ARP, NESTAT, TCP/IP, DNS, NMAP, Nessus, Kali Linux, Exploitation, Metasploit and Msfconsole

Hardware: IBM compatible PCs, Sun Workstations, Ethernet, Cisco Routers, Video & Sound Cards, CD-ROM Drives, Multiplexors, Some high end printing systems

Operating Systems: Windows XP/2000/NT/98/95, Microsoft Exchange, Window 2003, 2007, 2008, Microsoft Office 2010, Novell, DOS, TCP/IP, UNIX; ERP

COMPUTER SKILLS: PC and Macintosh Operating Systems, Microsoft Office, Outlook, SharePoint, Internet

PROGRAMMING LANGUAGE: C/C++, VISUAL BASIC, JAVA

PROFESSIONAL EXPERIENCE:

Confidential

Information Security Analyst

Responsibilities:

  • Identified various security risks, threats, and Vulnerabilities of networks, systems, and new technology initiatives.
  • Installed firewalls, intrusion prevention and detection systems, enterprise anti-virus systems and software deployment tools
  • Provided complex engineering analysis and support for firewalls, routers, networks, and operating systems.
  • Performed and evaluated vulnerability scans within a multi-platform, large enterprise environment.
  • Reacted to and initiated corrective action regarding security violations and attempt to gain unauthorized access, virus infections that may affect the network or other event affecting security.
  • Overseen user access process to ensure operational integrity of the system.
  • Enforced the information security configuration and maintained system for issuing, protecting, changing and revoking passwords.
  • Monitored operational logs in ensuring that unauthorized users do not compromise the integrity of the system.
  • Developed, implement, enforced, and communicated security policies and/or plans for data, software applications, hardware and telecommunications.
  • Performed complex product evaluations, recommends and implements products/services for network security.
  • Validated and tested complex security architecture and design solutions to produce detailed engineering specifications with recommended vendor technologies.
  • Ensured system support personnel receive/maintain security awareness and training.

Confidential

System Administrator

Responsibilities:

  • Operate as service point of contact for help-desk, helping to diagnose, troubleshoot, and resolve approximately 8 tickets per day.
  • Monitor the security of critical systems (e.g., e-mail servers, database servers, web servers, etc) and changes highly sensitive computer security controls to ensure appropriate system administrative action, investigate and report on noted irregularities.
  • Conduct network vulnerability assessments using tools to evaluate attack vectors, identify system vulnerabilities and develop remediation plans and security procedures.
  • Provide daily technical support for email, network, connectivity, telecommunications, and system maintenance. Set up computers and install software.
  • Helped transfer help desk requests from e-mail to web based system.
  • Installed anti malwares.
  • Reacted to and initiated corrective action regarding security violations and attempt to gain unauthorized access, virus infections that may affect the network or other event affecting security.
  • Set up accounts and passwords for specific users with authorization to access networks.
  • Conduct routine social engineering tests.

Hire Now