Principal Consultant - Information Security And Systems Engineer Resume
3.00/5 (Submit Your Rating)
SUMMARY:
- Confidential Enterprise Computing
- Data Center Migration & Consolidation
- Information Security
- RFP Writing & Preparation
- BYOD Security
- Microsoft Office 2007 & 2010
- Government Compliance - FISMA & FISCAM
- Quality Assurance & Testing
- Project Management
- Desktop Technology - Intel x86 & 64 CPU
- Mainframe - z/OS & z/VM
- Data Center Security Compliance and Audits
CORE SKILLS:
- z/OS MVS & z/VM
- Sysplex - Parallel and Basic
- Confidential, Confidential & Top Secret
- TSO & ISPF
- Confidential
- NDM Connect Direct
- Tivoli Access Manager
- VTAM & TCP/IP
- Firewall & Routers
- VSAM & IDCAMS
- Tivoli Access Manager
- Microsoft Windows 7 & Vista
- Active Directory & GPO
- IOF & SDSF
- Tivoli Netview
- Computer Associates ETrust
- Project 2007 Professional
- SMP/E
- SuSE Linux
- Microsoft Office 2007
- Visio 2007 Professional
- Acronis
- FDR/ABR
- Tivoli Storage Manager
- RMM
- SMF, MXG, RMF
- Tivoli Identity Manager
- CA-1
- CA-7 & CA-11
- Omegamon
- JCL
- JES2 & JES3
- Unix System Services
- DFDSS, DFHSM, ICKDSF
- Confidential Global Parallel File System Platform
- Confidential Transaction Server
- Confidential Gateway Server
- LDAP
- CA-Compliance
- CA-Audit
- Vanguard Integrity Suite
- SAS v9r2
- SAS Confidential Language
- CA-ASM2
- CA-IDMS
- Z/OS Assembler
- Confidential
- Clist
- ISPF Dialog Manager
- RAID Storage Configuration
EXPERIENCE:
Confidential, New York, NY
Principal Consultant - Information Security and Systems Engineer
Responsibilities:
- Develop technology partner relationships for research, testing and customer engagement delivery.
- Project delivery: demonstrated strong analytical skills, hands-on and proactive approach to investigating emerging technology. Experience working with other vendors in client setting.
- Partner resource: key consultant who fosters successful teamwork and communication with client stakeholders. Ability to work independently to identify and resolve issues. Emphasis on best practices and quality assurance.
- Public speaker technology conferences and vendor presentations
- Microsoft Business Partner, focus on desktop security software and Intel vPro technology.
Information Security Engineer
Confidential
Responsibilities:
- Perform configuration and customization of commercial-off-the-shelf (COTS) software products and work with vendor to implement any required patches and maintenance. Manage highly complex hardware and software technology. Determine hardware resource requirements necessary to maintain and/or expand service levels or tune hardware and software components for optimum performance
- Problem determination SME assistance with data center and operations staff as required. Test and diagnose component issues with GTF, IPCS and VTAM Trace. Manage deployment of Confidential and vendor software on z/Series processors with testing, proof of concept and activation into production mode. Scripting using Rexx Language, CLIST and Batch TSO. Basic SAS Programming with use of SAS Confidential .
- Served as Project Lead in the completion of medium to large-scale technology upgrade implementations between 1984 to present
- Key contributing RFP Proposal writer for a winning engagement $5.4 million data-integration project for automotive manufacturing firm that consolidated data center technology.
- Contributing pre-sales systems engineer for data center management and facilities management offerings in both government and private sectors.
- Enhanced end users’ understanding of mainframe security systems by conducting pre-implementation workshops, delivering group and individual training sessions and creating user-friendly training materials for client post-engagement.(Lockheed Martin, Confidential, Fujitsu Amdahl)
- Configured, managed and analyzed large scale DASD and Tape environment using DFDSS, DFHSM, VSAM (IDCAMS) objects, Master and ICF Catalogs, Computer Associates software tools for utilization and capacity reports. Segregated SMS and non-SMS storage volumes' full volume backup; ensured nightly execution incremental backup with production operations.
- Provided disk management of Intel Core 2 Duo mobile personal computers (Windows 7 Ultimate 64-bit and SuSE Linux v11). Mobile computers' configuration used Intel RST (Rapid Storage Technology) with Confidential bios enabled, Turbo Memory mini-PCI (Robson), SeaTools report utility, Acronis True Image, Lenovo Thinkvantage Recovery. Enabled mobile laptop SATA-2 Seagate Momentus XT hybrid SSD HDD exploiting 2nd generation 3Gb/s interface. Examined performance data access event log data with Windows 7 Microsoft WMI console, Norton Utilities and open source CrystalDiskInfo. Maintained standards-based recovery of installation media and HP software setup directory structure allowing for full system, bare-metal recovery. configure HP and Lenovo laptop PCs with enablement of ACHI SATA to accommodate Seagate Hybrid SSD Momentus XT HDD; enable vPRO capability with Intel AMT and Trusted Platform Module for remote client support; BIOS upgrade using HP and Lenovo flash software. Install WWAN M2M mini PCI hardware for CDMA and GPRS data connection.Application Development support: Confidential subject matter expert role for MCI (now Verizon) long distance billing application rewrite; client engagement required Netview, VTAM SNA, Confidential methodology, SNA transport using Confidential and third party tools (Netview Distribution Manager, NDM Connect Direct). Assisted with Confidential, IMS, DB2, flat file feeds, COBOL, source code management, SAS, Assembler proprietary software review during Requirements Definition phase of development effort. Assisted in review of Information Maps showing data flow between Ericsson switch collection of Confidential (call data records), Confidential collection of long distance billing data and feeds into fraud detection systems.
- BlackBerry smartphone handset "modding", backup of user contents, and restore using Desktop Manager. Enable BES features, handset unlocking and factory hard reset. Configure port settings for BIS/BES. Maintain BlackBerry APP Store configuration. Configuration of unlocked RIM device types
Confidential, New Jersey
Information Security Engineer
Responsibilities:
- Subject Matter Expert advising corporate policy and operational procedures for ensuring protection of corporate mainframe, midrange, virtual server, desktop, key technology assets and data. Enforcement of compliance measures which protect mainframe operating systems (z/OS, AS400, Linux, Unix, Windows), client production data and executable program files. Monitor unauthorized access and modification.
- Programming using SAS, SyncSort, DFSORT and Rexx to report on security data. Writing and presentations to C-level and senior management audience.
- Mentoring to junior and intermediate staff persons.
- SAS Programming using base SAS and Confidential developing reports of CA-Top Secret and Confidential security metadata from extracted flat datasets.
- Administered mainframe's PKI management of ownership and permissions across z/OS LPAR images.
- Coordinate Confidential and CA-Top Secret security support for application migrations, product rollouts, and contingency testing.
Confidential, Baltimore, Maryland
Subject Matter Expert
Responsibilities:
- Examined federal agency's security compliance in a large scale enterprise environment consisting of z/OS, z/VM, virtual Linux, Unix Server clusters, and Windows client desktops.
- Identified key review areas using Confidential 800-53.
- Evaluated agency security management at all mandated levels which included entity-wide (site), system, and business process application.
- Report findings identified deficiency areas, and confirmed compliance to Confidential 800-53 requirements.
Confidential, Salem, Oregon
Information Security EngineerResponsibilities:
- examined technical and management requirements to combine/ consolidate multiple Confidential security database across six z/OS LPAR images.
- Examined using RRFS, Confidential database copy/merge utility software to produce a common Group tree hierarchy, SETROPTS configuration, privileged user accounts and exits.
- Wrote SAS v9r2 programs that examined Confidential extract files and produced ad-hoc reports of historical and live metadata isolating data ownership, permissions by group and user, SURROGATE user ids, z/OS Started Task Id configuration and Confidential Transactions.
Confidential, Scottsdale, Arizona
Information Security EngineerResponsibilities:
- Preplanning research with Confidential and OEM vendors, create Sandbox LPAR platform, coordinate user community testing and change control deployment into production mode. Maintained Syslog console, SMF and Netview event log data with retention periods conforming to client information security standards.
- In a architect role, developed storage strategies with disaster-recovery measures for client firms.
- Addressed client business and technology requirements with a service level agreement approach operational databases and operating system disk storage with a solution that guaranteed recovery performance and high availability (Used FDR/ABR, DFDSS and DFHSM) for mainframe hardware, application and database backup protection as Confidential transitioned from using outsource provider to in-house operations of its storage management. z10 Processor: worked with team using Confidential to examine new z10 processor.
- Made recommendation of testing of Confidential Linux, Java, Websphere and Unix System Services applications requiring Confidential protection replacing Confidential (used by outsourcing providers)
Confidential, Bloomfield, Connecticut
Conducted infrastructure security audit
Responsibilities:
- Constructed areas of review using technology defense in depth criteria advised by Confidential STIG for z/OS and z/Linux. Advised client to implement SAF Confidential protection of Unix System Services files, directory structure and Super user credentials, including Confidential SMF record logging.
- Submitted report of findings and recommendations to executive sponsor.
- Application Security Engineer review activities: reviewed SDLC cycle with development and database support teams to secure project LOB applications using new z/OS features (SAML, two factor authentication, role based access control, centralized management of entitlements).
- Modernized information security policy and procedural standards for z/Linux file system hosting Websphere, application production and development software to maintain segregation of data for a major insurance company and CMS Medicare claims provider.
- Delivered written policy and standards, within technical spec.
- Incorporated SAML as an application security best practice for JAVA API used in line of business applications
- Recommended that all Confidential files, directories and resources be fully integrated with Confidential replacing Confidential protections.
- Recommended that Confidential applications integrate Confidential security standards for Confidential, encryption and secure file transfer.
Confidential
Base Access Control, New York, New York
Responsibilities:
- Symantec team Subject Matter Expert covering Confidential Mainframe for a review of infrastructure security, database, LOB application-level security and regulatory compliance procedures to outside federal and state agencies (IRS, SEC, CTC, CMS/HHS, State of North Carolina). Assessment project tasks included review of clients' computer hardware, offshore development, outsourcing provider(s), database environment, network topology (TCP/IP and SNA), key LOB applications, z/OS processor virtualization, disaster recovery, recovery, virtualization and security product configuration/controls. Project plan was incorporated focus on utilizing ISO27001 best practices for client management with suggested approach to mitigating risks and exposures by a remediation plan (including data center change control impact to technology platform and staffing). Written report content submitted to engagement's Executive Sponsor.
- Participated in technology focused audit targeting infrastructure security; examination of Sarbanes-Oxley compliance of client's technology. Examined compliance issues for PCI applications (incoming payment cards). Reviewed client's infrastructure and key LOB application security (all operating system platforms). Presented assessment SAS-70 Level 2 due diligence findings with executive sponsor and stakeholders. Remediation planning with client security staff for known issues requiring improvements. Recommended to client IT security staff using ISO27001 and Dept of Defense STIG as a checklist for enabling all possible controls by operating system, network and database platform. Identified exposures to potential information loss and data harvesting by internal users with a focus on mandating SFTP (Secure File Transfer Protocol) as a replacement for Confidential (default Confidential ).
- Examined data ownership assignments, inclusion of enterprise role base access entitlements, absence of role based access controls and service level users in production and development platforms. Examined industry-known risks and test controls associated with system-level and application data integrity. Develop/enhance audit plans, review programs and examinations to evaluate control areas for business processes and technology operations. Analyze findings and testing results; present findings in a formal report and conduct end of engagement meeting with executive sponsor.
- Independently identify and apply specialized industry best practice methodology (COBIT, ISO27001, NIST800-53, Confidential STIG) to achieve information assurance objectives. Take a leadership role during each engagement with identification of regulatory compliance issues related to enterprise computing.
- Examined compliance in operating system configuration files, parameters and reports with client technical stakeholders.
- Reviewed data center change control level of effort and impact with client management and technical stakeholders for remediation recommended actions.
- Prepare written work paper and executive summary content identifying client infrastructure findings, briefing papers, and other documentation supporting security findings and remediation steps for SAS70 level 1 or level 2 audit examination.