Security Engineer Resume
PROFESSIONAL SUMMARY:
- Security Engineer Intern with entry - level experience in a fast-paced environment.
- Proficient with Nessus, computer networks, ethical hacking, and vulnerability assessments.
- A fast-learner who was successfully able to create the database for my team’s website project in under a week by quickly learning the SQL programming language and then implementing my learnings to achieve the goal.
- A great problem solver who leveraged his problem solving and researching skills to find a solution to enable monitor mode on the Raspberry Pi 3’s onboard Wi-Fi chip and create a mobile hacking module.
- Seeking to bring effective, efficient and intelligent solutions to your company.
TECHNICAL SKILLS:
Operating Systems: Kali Linux, Windows XP/Vista/7/8.1/10/Server 2008 R2 Datacenter, Mac OS X, Ubuntu
Cyber Security tools: Nmap, Nessus, Wireshark, Metasploit, Wifite, Aircrack-ng Suite, Cain & Abel, Burp Suite, OWASP ZAP, OWASP WebScarab, Nikto, w3af, Spiderfoot, AccessData FTK, AccessData Registry Viewer, ADS Spy, Low Orbit Ion Canon (LOIC)
Computer Networking: TCP/IP, DHCP, DNS, RIP, OSPF, IGRP, EIGRP, BGP, SSL, ARP, VLAN, Ethernet, 802.11, VPN, SNMP
Authentication/Authorization: Kerberos, 802.1x
IDS/IPS/Anti -Virus Software: Snort, McAfee Total Protection, Symantec Endpoint Protection, Sophos Mobile Security
Firewalls: pfSense
SIEM: Splunk
Network Simulation Applications: Riverbed Modeler Academic Edition
Programming/Scripting Languages: Python, SQL, MS SQL
Cloud infrastructure: Google Cloud Platform (Google Compute Engine)
Virtualization environments: VMware Workstation, VirtualBox
Microsoft Office: Word, PowerPoint, Visio
Relevant Coursework: Network Security, Networking Apps Windows NT, Computer Networks, Principles of Data Communication, Digital Forensics, Vulnerability Management, Ethical Hacking, Secure Programming Techniques, Advanced Software Engineering, Securing the Cloud, Intro to Cyber Security, Introduction to Programming Using Scripting
PROFESSIONAL EXPERIENCE:
Security Engineer
Confidential
Responsibilities:
- Performing periodic vulnerability testing, and assisting in remediation efforts.
- Formulating systems and methodologies as well as responding to security related events.
- Configuring, implementing and maintaining all security platforms and their associated software, such as routers, switches, firewalls, intrusion detection/intrusion prevention, anti-virus, and SIEM.
- Ensuring network security best practices are implemented through auditing router, switch and firewall configurations, and monitoring logs.
Class Learning Assistant
Confidential, CT
Responsibilities:
- Selected based on academic performance to guide graduate-level students through coursework, assignments and hands-on labs in Ethical Hacking, Computer Networks, and Introduction to Programming Using Scripting with Python as the scripting language.
- Helped undergraduate students improve their understanding of their coursework in Networking by providing them assistance, and supported graduate and undergraduate students in working on Riverbed Modeler Academic Edition.
- Responding to the queries of the Professors in charge and the students through email and in person.
Automation Systems Intern
Confidential
Responsibilities:
- Learned about various Automation Systems and acquired hands-on experience in operating them.
- Collaborated with a team of 4 and used the acquired knowledge and skills to create a working model of an Industrial Confidential System by using various electronic components such as relays, buzzers, variable resistances, Confidential .
Confidential
Responsibilities:
- Collaborated with a team of 3 and successfully created a mobile hacking station using a Raspberry Pi 3 Model B.
- Successfully demonstrated a proof-of-concept Man-In-The-Middle attack by leveraging the hacking module, and harvested user credentials in cleartext from the websites visited by a user.
- Used the Wi-Fi password cracking utility called Wifite and cracked a simple eight-digit WPA2 Wi-Fi password by leveraging a dictionary attack.
- Provided countermeasures against Man-In-The-Middle and wireless attacks.
Confidential
Responsibilities:
- Working in the Scrum framework of the Agile development model, collaborated with a team of 7 and successfully created a Business to Business (B2B) selling website.
- Successfully completed the documentation for the project.
- By quickly learning and adapting to advanced SQL topics, created the database for the website in less than a week’s time, and used Microsoft SQL Server Management Studio 17 for managing the database.
Confidential
Responsibilities:
- One high-resolution video conferencing application and one high load file transfer application were configured, and run in a simulated campus environment using Riverbed Modeler.
- The high load file transfer application was run on two WLAN workstations and a WLAN server.
- Video Conferencing application, was only run on the two WLAN workstations.
- The performance analysis of the routing protocols: RIP, OSPF, IGRP, and EIGRP was based on queuing delay, throughput, utilization, and global wireless LAN delay.