We provide IT Staff Augmentation Services!

Security Engineer Resume

2.00/5 (Submit Your Rating)

PROFESSIONAL SUMMARY:

  • Security Engineer Intern with entry - level experience in a fast-paced environment.
  • Proficient with Nessus, computer networks, ethical hacking, and vulnerability assessments.
  • A fast-learner who was successfully able to create the database for my team’s website project in under a week by quickly learning the SQL programming language and then implementing my learnings to achieve the goal.
  • A great problem solver who leveraged his problem solving and researching skills to find a solution to enable monitor mode on the Raspberry Pi 3’s onboard Wi-Fi chip and create a mobile hacking module.
  • Seeking to bring effective, efficient and intelligent solutions to your company.

TECHNICAL SKILLS:

Operating Systems: Kali Linux, Windows XP/Vista/7/8.1/10/Server 2008 R2 Datacenter, Mac OS X, Ubuntu

Cyber Security tools: Nmap, Nessus, Wireshark, Metasploit, Wifite, Aircrack-ng Suite, Cain & Abel, Burp Suite, OWASP ZAP, OWASP WebScarab, Nikto, w3af, Spiderfoot, AccessData FTK, AccessData Registry Viewer, ADS Spy, Low Orbit Ion Canon (LOIC)

Computer Networking: TCP/IP, DHCP, DNS, RIP, OSPF, IGRP, EIGRP, BGP, SSL, ARP, VLAN, Ethernet, 802.11, VPN, SNMP

Authentication/Authorization: Kerberos, 802.1x

IDS/IPS/Anti -Virus Software: Snort, McAfee Total Protection, Symantec Endpoint Protection, Sophos Mobile Security

Firewalls: pfSense

SIEM: Splunk

Network Simulation Applications: Riverbed Modeler Academic Edition

Programming/Scripting Languages: Python, SQL, MS SQL

Cloud infrastructure: Google Cloud Platform (Google Compute Engine)

Virtualization environments: VMware Workstation, VirtualBox

Microsoft Office: Word, PowerPoint, Visio

Relevant Coursework: Network Security, Networking Apps Windows NT, Computer Networks, Principles of Data Communication, Digital Forensics, Vulnerability Management, Ethical Hacking, Secure Programming Techniques, Advanced Software Engineering, Securing the Cloud, Intro to Cyber Security, Introduction to Programming Using Scripting

PROFESSIONAL EXPERIENCE:

Security Engineer

Confidential

Responsibilities:

  • Performing periodic vulnerability testing, and assisting in remediation efforts.
  • Formulating systems and methodologies as well as responding to security related events.
  • Configuring, implementing and maintaining all security platforms and their associated software, such as routers, switches, firewalls, intrusion detection/intrusion prevention, anti-virus, and SIEM.
  • Ensuring network security best practices are implemented through auditing router, switch and firewall configurations, and monitoring logs.

Class Learning Assistant

Confidential, CT

Responsibilities:

  • Selected based on academic performance to guide graduate-level students through coursework, assignments and hands-on labs in Ethical Hacking, Computer Networks, and Introduction to Programming Using Scripting with Python as the scripting language.
  • Helped undergraduate students improve their understanding of their coursework in Networking by providing them assistance, and supported graduate and undergraduate students in working on Riverbed Modeler Academic Edition.
  • Responding to the queries of the Professors in charge and the students through email and in person.

Automation Systems Intern

Confidential

Responsibilities:

  • Learned about various Automation Systems and acquired hands-on experience in operating them.
  • Collaborated with a team of 4 and used the acquired knowledge and skills to create a working model of an Industrial Confidential System by using various electronic components such as relays, buzzers, variable resistances, Confidential .
Security Engineer

Confidential

Responsibilities:

  • Collaborated with a team of 3 and successfully created a mobile hacking station using a Raspberry Pi 3 Model B.
  • Successfully demonstrated a proof-of-concept Man-In-The-Middle attack by leveraging the hacking module, and harvested user credentials in cleartext from the websites visited by a user.
  • Used the Wi-Fi password cracking utility called Wifite and cracked a simple eight-digit WPA2 Wi-Fi password by leveraging a dictionary attack.
  • Provided countermeasures against Man-In-The-Middle and wireless attacks.
Security Engineer

Confidential

Responsibilities:

  • Working in the Scrum framework of the Agile development model, collaborated with a team of 7 and successfully created a Business to Business (B2B) selling website.
  • Successfully completed the documentation for the project.
  • By quickly learning and adapting to advanced SQL topics, created the database for the website in less than a week’s time, and used Microsoft SQL Server Management Studio 17 for managing the database.
Security Engineer

Confidential

Responsibilities:

  • One high-resolution video conferencing application and one high load file transfer application were configured, and run in a simulated campus environment using Riverbed Modeler.
  • The high load file transfer application was run on two WLAN workstations and a WLAN server.
  • Video Conferencing application, was only run on the two WLAN workstations.
  • The performance analysis of the routing protocols: RIP, OSPF, IGRP, and EIGRP was based on queuing delay, throughput, utilization, and global wireless LAN delay.

We'd love your feedback!