We provide IT Staff Augmentation Services!

Security Engineer Resume

5.00/5 (Submit Your Rating)

Atlanta, GA

SUMMARY:

  • Matured IT professional, with almost a decade experience in IT, new to the field of Cybersecurity and Information security, a current degree in the field, and transferable skills such as Incident response management,
  • Threat intelligence and analysis, Endpoint Security maintenance, Vulnerability and risk management.

TECHNICAL SKILLS:

  • Intrusion Detection/Prevention
  • Malware Analysis
  • Network Security
  • Web application firewalls (WAF)
  • AZURE
  • Penetration Testing and reverse Engineering
  • CIA Triad
  • Endpoint Security (Cylance, Symantec, and Carbon Black/Bit9)
  • Vulnerability Scanning and Detection tools (Qualys)
  • Digital Forensics
  • Mobile Forensics
  • Malware Analysis
  • Cryptography

PROFESSIONAL EXPERIENCE:

Confidential, Atlanta, GA

Security Engineer

Responsibilities:

  • Monitoring, improving and implementing security projects in both the PCI and internal networks
  • Monitoring the security of networks and systems to maintain Delta's security posture
  • Documentation and enforcement of policies and procedures.
  • Planning and implementing new software deployments and processes
  • Assess, design, implement, and integrate enterprise security solutions including, but not limited to, next - generation firewalls, web application firewalls (WAF), intrusion prevention/detection systems (IDS/IPS), content filtering, secure log management, security information, event management (SIEM) systems, anti-malware solutions, mobile device management (MDM), User Behavioral analysis (UBA), and endpoint security solutions.
  • Develop reports that detail compliance and security gaps including risk severity level, systems impacted, business risk summary, and recommendations that re-mediate all findings.
  • Incident response management, Investigate and report on security incidents of routine to moderate complexity, through the incident reporting process, by providing initial assessment of impact severity and types on incidences being addressed seeking guidance from Senior/Lead analyst if needed.
  • Automated Vulnerability Data with Governance, Risk Management and Compliance tool Archer application.

    Use carbon black formerly known as bit9 to analyze processes on corporate users computers to “hunt” for malicious processes or hijacked processes using advanced queries: process name: java.exe AND child proc: powershell.exe AND filemod: *.vbs.

  • Analyze malware and phish scams by installing using sandbox machines and reverse engineering it.
  • Create watch list rules to alert company of any ransomware or malicious activity that may cause data exfiltration.
  • Working closely with Threat intelligence team to monitor the environment for zero-day attacks, Phishing campaigns, blocking indicators of compromise, setting security alerts.
  • Working with Forensics team to investigate critical cases, analyzing filesystems, memories, and networkflows as well traffics to find the root cause of incidents.
Confidential, Suwannee, GA

Network Admin Specialist

Responsibilities:

  • Designed a secured Network infrastructure for the organization including LAN, Wireless, Remote access.
  • Assisted clients with system implementation, training, and technical support including creating tutorial video and pamphlets.
  • Implement, develop and troubleshoot the network and online ordering web-based application
  • Install software and hardware (Servers, Printers, PCs, antivirus protections, etc.)
  • Set up user accounts, permissions, and passwords
  • Administrate and monitor the network
Confidential, Fort Irwin, CA

School Age Services (SAS) &Middle School Teen (MST) Center Technology Lab Specialist

Responsibilities:

  • Responsible for the operation of SAS and MST Technology Lab including 30 computers in separate lab environments
  • Installed required software and hardware programs in the computer labs (Servers, Printers, PCs, antivirus protections)
  • Designed and responsible for implementing Educational Technology Program for youth 6-18 years of age such as Robotic and Electronic projects.
  • Maintained computer, peripherals, and software in good condition and working order.
  • Troubleshoot hardware, printers, scanners, servers and software.
  • Trained children/youth in use of equipment and software programs and trained employees and Family Child Care Providers in Basic Computer Skills as required.
Confidential, Fort Jackson, SC

Interpreter/Translator (09L) Army Intelligence Service

Responsibilities:

  • Simultaneous translation in Farsi, Dari and Tajik to English and vise versa
  • Document translation and Interpretation in target languages
Confidential, Atlanta, GA

Computer Specialist

Responsibilities:

  • Diagnosed and Troubleshoot computers software and hardware.
  • Created Image of hard drives utilizing Ghost.
  • Assembled computer’s components and Building new PCs from several donated parts.
Confidential

Telecommunication System Consultant

Responsibilities:

  • Developed a communication system’s platform from SMS based to SSID based for new services.
  • Negotiated with vendors to obtain the best choice in purchasing technical equipment.
  • Prepared effective cost-free services for customers.
  • Monitored unit personnel’s performance.
  • Established a customer service call center for Communication department including 25 representatives.
Confidential

Product and VAS Services Specialist

Responsibilities:

  • Managed and supervised a team of 5 staffs that achieved all targeted marketing customer service goals and launched 56 SMS based services in almost a year.
  • Assisted Technical team in designing and launching value added services.
  • Supported marketing team in development of the annual marketing plan including: forecasted tariff, active subscribers count, sales targets, penetration targets and budget for product and services especially in terms of supplying, aggregating & analyzing the data needed for outcome plan
  • Prepared literature for promotions (flyers, posters, outdoor billboards, Intelligence Voice Response (IVR) announcements, SMS & Cell broadcast, Web interface, manuals)
  • Prepared and presented reports of finding, illustrating data graphically and translating complex findings into written text.

We'd love your feedback!