Lead Security Engineer Resume
2.00/5 (Submit Your Rating)
Chicago, IL
SUMMARY:
- Hands - on experience in developing threat models, security controls, threat analysis, creation of risk control matrices and risk mitigation strategies.
- Experience in conducting IT Security Risk Assessments in accordance to NIST and FFIEC framework.
- Experience in collaborating with various product management and development teams to ensure alignment between security and development practices.
- IT Professional Security /Risk Analytic and Architectural skills, IT Governance and Security Operations expertise overseeing the alignment of enterprise
- Hands-on with Penetration Testing, Source Code Review, DAST, SAST and manual ethical hacking.
- IT Security Strategy in meeting the Company's IT Security efforts for dynamic Business Goals. Additionally, proficient in security policy write up, procedures and control review to attain optimal maturity level.
- Expertise in Security assessment on the applications, web sites, and web applications to determine the security posture.
- Experience in performing manual exploitation using different tools like NMAP and Kali Linux.
- Expertise in Penetration Testing and established a formal vulnerability management process.
- Experience in monitoring and recommended solutions for correcting issues related to security technologies such as to monitor viruses, malware, and intrusions.
- Expertise in Highlighting Best Security Practices, Procedures and Metrics - KPIs, KRIs Enterprise-wide for effective Risk and Vulnerability Control Experience on maintaining better administer, secure and monitor user access privileges and activities using Oracle and AWS IAM (Identity Access Management) Tools like IDI, IDS, and ISAM.
- Experience in Security Audit proactive mindset for Risk Mitigation and proven ability to using Information Technological Solutions and Tools to Optimized different Information Security Frameworks and approaches through Practical Application to evolving Business needs.
- Experienced in Developing, Documenting and Deploying Security Controls against IT Cyber Threats such as Data Exfiltration, Security Non-Compliance Issues and Social Engineering Antics.
- Experienced in Security Assessment tools: Nessus, Burp Suite, NMap, Netcat, and WireShark etc.
- Experience and also have strong working knowledge on various information security standards and compliances such HIPPA, HITRUST, PCI-DSS, FISMA, GLBA, SOC2, NIST and other GRC's. Additionally, passionate in Enterprise Data Classification, Identity and Access Control management (IAM) deployment solutions, IT Risk Management, Governance, Security Compliance Methodologies.
PROFESSIONAL EXPERIENCE:
Confidential, Chicago, IL
Lead Security Engineer
Responsibilities:
- Penetration testing based on OWASP Top 10 and SANS25. Analyze the results of penetrations tests, design reviews, source code reviews and other security tests.
- Decide on what to remediate and what to risk accept based on security requirements. Highly analytical computer security analyst with success both defending and attacking large-scale enterprise networks.
- Experience using a wide variety of security tools to include Kali-Linux, Metasploit, HP WebInspect, HP Fortify, Burp Suite Pro, Wireshark, L0phtcrack, Snort, Nmap, Nmap-NSE, Cain and Abel, Nitko, Dirbuster, IBM AppScan, OWASP ZAProxy, Nessus, Open Vas, W3AF, BeEF, Etthercap, Maltego, Wifi-Security, SIFT, SOAP UI, FOCA, Havij, Yersinia, Recon-ng, Aircracking suite
- Involved in implementing and validating the security principles of minimum attack surface area, least privilege, secure defaults, avoiding security by obscurity, keep security simple, Fixing security issues correctly. Strong knowledge in Manual and Automated Security testing for Web Applications.
- Administered encryption, certificate management, key generation and implemented dual keys to address segregation of duties issue between DBAs and security admins.
- Working knowledge of OWASP Top 10 and SANS Top 25 software guidelines, Federal Financial Institutions Examination Council's (FFIEC) regulations, including Payment Card Industry (PCI-DSS), HIPAA and Sarbanes-Oxley Section404 (SOX).
- Analyzed the results of penetrations tests, design reviews, source code reviews and other security tests.
- Performed Continuous Integration (CI) and Continuous Delivery (CD) of SAST scans using IBM AppScan Source for Automation.
- Configured AWS Simple Storage Service (S3) to securely store the organization’s critical file systems. Implemented Access Control Lists (ACLs) and Bucket Policies for controlling access to the data.
- Participated in the implementation of Virtual Private Cloud (VPC). Implemented multiple layers of security, including security groups, network access control lists, to control access to Amazon EC2 instances in each subnet.
- Implemented Security Group Policies for Elastic Compute Cloud (EC2) instances within AWS. Developed AWS Service Roles to protect Identity Provider access.
- Decide on what to remediate and what to risk accept based on security requirements.
- SOX Compliance Audit experience on controls like User access management, Change Management, Incident Management.
- Good Experience in exploiting the recognized vulnerabilities.
- Experience in Threat Modeling during Requirement gathering and Design phases.
- Experience with Security Risk Management with TCP-based networking.
- Experience with TCP/IP, Firewalls, LAN/WAN. Experience in implementing Security.
- Incident and Event Management System (SIEM) using HP ArcSight, Splunk.
- Quick Learner, Committed team player with interpersonal skills and enjoy challenging environment with scope to improve self and contribute to the cause of the organization.
- Excellent problem-solving and leadership abilities. Experience in Web UI Development implementing web development tools like HTML 4.0/5, XHTML, DHTML, CSS/CSS3, JavaScript, jQuery, AJAX, JSON and XML.
- Knowledgeable about Document Object Model (DOM) and DOM Functions along with experience in Object Oriented Programming Concepts, Object Oriented JavaScript and Implementation.
Confidential, Chicago, IL
Sr. Security Engineer
Responsibilities:
- Penetration testing based on OWASP Top 10 and SANS25. Analyze the results of penetrations tests, design reviews, source code reviews and other security tests.
- Decide on what to remediate and what to risk accept based on security requirements. Highly analytical computer security analyst with success both defending and attacking large-scale enterprise networks.
- Experience using a wide variety of security tools to include Kali-Linux, Metasploit, HP WebInspect, HP Fortify, Burp Suite Pro, Wireshark, L0phtcrack, Snort, Nmap, Nmap-NSE, Cain and Abel, Nitko, Dirbuster, IBM App Scan, OWASP ZAProxy, Nessus, Open Vas, W3AF, BeEF, Etthercap, Maltego, Wifi-Security, SIFT, SOAP UI, FOCA, Havij, Yersinia, Recon-ng, Aircracking suite
- Involved in implementing and validating the security principles of minimum attack surface area, least privilege, secure defaults, avoiding security by obscurity, keep security simple, Fixing security issues correctly. Strong knowledge in Manual and Automated Security testing for Web Applications.
- Working knowledge of OWASP Top 10 and SANS Top 25 software guidelines, Federal Financial Institutions Examination Council's (FFIEC) regulations, including Payment Card Industry (PCI-DSS), HIPAA and Sarbanes-Oxley Section404 (SOX).
- Analyzed the results of penetrations tests, design reviews, source code reviews and other security tests.
- Decide on what to remediate and what to risk accept based on security requirements. SOX Compliance Audit experience on controls like User access management, Change Management, Incident Management.
- Good Experience in exploiting the recognized vulnerabilities.
- Experience in Threat Modeling during Requirement gathering and Design phases.
- Experience with Security Risk Management with TCP-based networking.
- Experience with TCP/IP, Firewalls, LAN/WAN. Experience in implementing Security
- Incident and Event Management System (SIEM) using HP ArcSight, Splunk.
- Quick Learner, Committed team player with interpersonal skills and enjoy challenging environment with scope to improve self and contribute to the cause of the organization.
- Excellent problem-solving and leadership abilities. Experience in Web UI Development implementing web development tools like HTML 4.0/5, XHTML, DHTML, CSS/CSS3, JavaScript, jQuery, AJAX, JSON and XML.
- Knowledgeable about Document Object Model (DOM) and DOM Functions along with experience in Object Oriented Programming Concepts, Object Oriented JavaScript and Implementation.
Confidential, New York, NY
Security Analyst
Responsibilities:
- Vulnerability assessments using HP Web Inspect, Acunetix scanners perform map and gap analysis on all systems, software, and network appliances Access vulnerability dataprepare reports and load scan data into database.
- Discuss false positives and prepare a plan of action and milestones for mitigation Prepare incident reports for reported and unreported attacks APT hunting for Ransomware.
- Performed Root Cause Analysis for the incidents reported at Security Operations Center. Performed Security event monitoring of heterogeneous networks such as Firewalls, IDS/IPS, Cisco ASA, DLP devices using Splunk.
- Provided solution to many problems on a call with the best of my knowledge on the applications using event logs on the system/server and telemetry logs on the server, later started using Splunk for health monitoring, analysis, and reporting.
- Wrote scripts on servers using PowerShell on Windows Server 2008 in order to update servers with the latest patches and changes systems configurations at large.
- Used Remedy Information Technology Service Management (ITSM) tool for managing the incidents based on the priorities and solved issues which are in the security domain.
- Experience in performing authenticated and unauthenticated testing.
- Generated Vulnerability reports to monitor the health of the applications and also reported High, Medium and low vulnerabilities in this system.
- Analyze attack patterns Build workflows to automatically analyze the samples
- Determine what functionality attackers may have introduced and scan for malicious artifacts based on sandbox results Investigate endpoint attacks and replay attacks on systems.
- Analyze JavaScript, PDFs, Office documents, and packet captures for signs of malicious activity SIEM implementation and analysis by writing rules and reference sets.
- SIEM to determine attack vectors and source of incident Troubleshoot network application inbound/outbound connectivity utilizing Cisco WSA proxies and Wireshark.
- Actively involved on Bridges in solving High / Severe incidents reported in the application or in the environment.
- Ironport URL filtering for known bad URL content IronportMail.
- Analysis and blocking for known bad emails Analysis of pcap files using FireEye and Wireshark System audit and analysis using DOD checklist for PA series Threat and virus scanning using Malwarebytes from centralized console.
- Enforcement of policies and procedures for users, admins, and management Reverse engineering of malware using tools like malwr, process hacker and so on Incident response tabletop exercise by documenting and alerting necessary personnel.
Confidential
Java/J2EE Developer
Responsibilities:
- Designed and created DAO using data modeling in the integration layer.
- Worked closely with the infrastructure team to create the performance environment for enterprise services.
- Migrated MKS Source control to RTC and created JENKINS builds for all enterprise services.
- Used HPQC for defect tracking and working on the defects and created Triage process (Microsoft Visio) to track the defects in the application.
- Created log back file based on time based triggering policy and application based triggering policy.
- Used Log4j for logging for debugging, warnings, errors etc.
- Setup meeting to configure and understand the Data power for security, for accessing the application.
- Updated the WSDL in WSRR for the governance & storing, accessing and managing information.
- Worked on HP portfolio Management software to create the PPM packages and deploy the various environments.
- Hands-on a service-oriented approach (SOA) using WebLogic for integration.
- Used Jenkins for continuous integration with maven built in to generate the EAR files and sanity4j code quality testing reports.
- Worked and configured with MKS and RTC versioning tools for keep track of source code.
- Used JSON marshaller for marshaling and unmarshalling the JSON Objects and Dom manipulations with various SAX and Dom parsers
- Created virtual host and configured based on the IP configuration for all enterprise services.
- Exposed Stateless session beans as restful web services using Jersey JAX-RS.
- Used various spring features to deploy custom properties and static context in the application.
- Configured all dependencies with spring framework and various stateful and stateless beans in the application.
- Implemented request and response objects using SOAP web services and JAXB for converting WSDL to java classes.
- Modified WSDL documents for the internal clients and deployed on WSRR.
- Exposed all the enterprise services to the clients using SOAP and REST based web services, and tested using SOAPUI.