We provide IT Staff Augmentation Services!

Sr. Security Incident Response Consultant Resume

4.00/5 (Submit Your Rating)

Atlanta, GA

SUMMARY:

  • A versatile, result driven team - lead with excellent problem solving skills and the ability to adapt to new technologies and environments.
  • Currently focused on transitioning out of the SOC/Incident Response job function with the goal of shifting towards a higher level InfoSec consulting role that aims to improve overall security posture while working with teams from various groups in an organization.

TECHNICAL SKILLS:

Tanium: configuration of system dashboards, authoring sensors/packages, scheduled actions; general use from an IR/hunting perspective.

Resilient IR Platform (IBM): full installation, deployment, administration of system

CyFIR: utilization on live endpoint investigation, evidence collection, IOC identification.

Invincea: behavioral end-point prevention; utilization and identification of threats and remediation

ProofPoint: utilization of both Protection Server and TAPS for email analysis, threat hunting.

Solera (BlueCoat): utilization for network packet capture forensics analysis/IOC identification.

Splunk (Enterprise Security): general utilization for event tracking/use case definitions

FireEye HX: administration/deployment of agents for endpoint IR and IOC identification.

ECAT (RSA): customization and deployment of endpoint agent for IR / IOC detection.

Linux / UNIX: Solid skill set and knowledge of various O/S (FreeBSD, RedHat, Ubuntu, etc.)

Lastline: utilization for file/malware analysis as part of investigations

Incident Response Tools: SIFT, Redline, Volatility, TZWorks, IEF, FTK.

IDS: Tipping Point | McAfee | Snort | Sourcefire

Network Focused Tools: Netwitness, Incapsula, F5 LTM/GTM, BlueCoat

Firewalls: Check Point, A10, Palo Alto, Cisco ASA

SIEM: ArcSight ESM 6.8/6.5/5.2

Other: Symantec DLP 12.5, VMware ESX/ESXi Server, InfoBlox/Secure64, Cisco ACS

PROFESSIONAL EXPERIENCE:

Confidential, Atlanta, GA

Sr. Security Incident Response Consultant

Responsibilities:

  • Responsible for developing and documenting Incident Response methods and guidelines for the organization; built out a detailed Incident Response run book of tools, techniques and forensic methods for personnel to utilize during investigations.
  • Perform live-endpoint investigation; including the identification and gathering of key forensic artifacts, offline investigation as needed and providing remediation actions as needed.
  • Implemented and deployed an Incident Response focused ticketing system to improve incident tracking, remediation and metrics for incidents worked.
  • Responsible for working with 3rd party vendors and MSSP’s in order to improve security, efficiency, rule tuning and escalation procedures.
  • Responsible for reporting of security metrics related to the Incident Response team.
  • Provides mentoring to team members of incident response techniques and methodologies.
  • Assisted in the build out and development of the SOC; including process/procedure build out
Confidential, Bellevue, WA

Sr. Engineer Cyber Incident Response Team

Responsibilities:

  • Responsible for being the focal incident response point for all business units within the organization (host/network/cloud/retail). This includes being able to provide initial analysis and identification of IOC’s, escalation to the appropriate business units and post-incident activities.
  • Responsible for the build-out of our enterprise SIEM/SOC environment, including identification and onboarding of data feeds, as well as use case development per alignment with the defined security policies.
  • Worked on the continued development of CIRT and Machine investigation lifecycles as part of the ongoing process to enhance IR capabilities; also provided significant contribution to the revision of corporate security policies.
  • Response for the development of CIRT forensic techniques, including providing guidelines, documented processes, toolsets and tabletop exercises.
  • Developing and providing high-level technical reports in response to a forensic investigation.
Confidential, Snoqualmie, WA

Sr. Engineer Tier 2 Operations Security

Responsibilities:

  • Responsible for supporting a wide number of technologies and being able to proficiently perform advanced troubleshooting on the fly (packet captures, debugs, traffic analysis)
  • Provide support on both L2L and Remote access VPN endpoints; this includes tunnel establishment, troubleshooting, captures of interesting traffic and end user support
  • Provide support and administration for the company’s core FW NAT components for mobile handset communication.
  • Provide support for the company’s core DNS infrastructure, including GEO FQDN’s via GTM, Internal/External authorative zones and mobile handset caching DNS servers.
  • Served as a member of a 24x7 operational break-fix team, required to perform complex troubleshoot and driving root cause to resolution.
Confidential, Baltimore, MD

Sr. Intrusion Protection Specialist

Responsibilities:

  • Work on the Intrusion Protection Team at the main SSA Headquarters, with primary responsibilities of analyzing security events/malware, with a focus on the external network segments.
  • Responsible for utilizing network threat/intelligence solutions to look for known confirmed malware on the network; in addition to looking at the latest security threats and outbreaks.
  • Responsible for writing daily and ad-hoc reports for the SOC analysts in response to the latest security trends and threats
  • Responsible for managing and building out VMWare infrastructure.
  • Assisted in the engineer and deployment of SIEM, Enterprise Gateway A/V (Bluecoat) and commercialized IDS deployments at the main and secondary data centers for the SSA.
Confidential, Denver, CO

Information Security Engineer

Responsibilities:

  • Work on the Information Assurance / Data Network Security group at DIA, helping safeguard the information resources that are vital to airport operations.
  • Responsibilities include being the primary administrator for four enterprise firewall clusters, as well as reviewing firewall rulesets and policies.
  • Responsible for creating and maintaining both site-to-site and remote access VPN's to third party vendors and support engineers; this includes management of centralized authentication (AAA) and multi-factor authentication (security tokens).
  • Designed and implemented all of DIA's Intrusion Detection Systems (IDS) using all open-source snort implementation.
  • Responsible for monitoring and evaluating security events via our SIEM and serving as our primary Security Analyst.

We'd love your feedback!