Cyber Threat Operation Center Engineer Resume
SUMMARY:
- Certified CompTIA Security+ Analyst with a concentration on Certified Ethical Hacking experience.
- Information Technology expertise revolves around the protocols of networking components, end user hardware security management, end user security awareness training along with phishing exercises, analysis of ransomware/malware infections and port scanning detection alerts.
- Main objective is to focus more within the Cyber Security aspect of Information Technology within the web base environment along with additional concentration on SQL injections and preventing Brute Force attacks against organizations.
- The foresight plan is to join an organization that will assist in the development of the analysis aspect of forensic technology, which revolves around the IDS/IPS and Firewall Security (Fortinet, Juniper, Palto Alto, etc.) devices along with creating and writing rule configuration scripts for these devices to further my career path.
TECHNICAL SKILLS:
Networking: TCP/IP, Novell 4.5 & 5.5, Cisco VPN, Info Blocks, SafeGuard, Secure ID, Sophos, SMS, Citrix, Switches, Routers, Terminal Services, FTP, Telnet, PC Anywhere, UltraVNC, WINS, CAT - 5 Cables, Remote Access Norton Desktop, CA UniCenter, Access Points, RF Scanners, Wireless connectivity, Sonic Wall, ShoreTel, Infoblox, Etc.
Tools: Log Rhythm, Norton Firewall and Ghost, Check Point Firewall, McAfee/ Antivirus Utilities, Sophos Anti-virus software, Carbon Black End Point Protection, SafeGuard Management Encryption Software, Confluence, JIRA, LAN Management, ITSM, MS Office (Word, Excel, Power Point, Access, Project, Outlook), RAID, Lotus Notes R5 and R6, Remedy, WS FTP, Track-IT, Sysaid, Virtual Warehouse, Magic (Carousel Machines)TNG Advanced Help Desk, Quick Books, Quicken, Photoshop, ERP - Sage 500, People Soft (time tracking), HP Open view, SCCM, Active Directory, Avaya Enterprise Management (PBX), VERITAS Netback up, Etc.
PROFESSIONAL EXPERIENCE:
Confidential
Cyber Threat Operation Center Engineer
Responsibilities:
- Perform accurate and precise real - time analysis and correlation of logs/alerts from a multitude of client devices with a focus on the determination of whether said events constitute security incidents.
- Assisted clients whitelisting of IP addresses, blocking IP addresses, etc. as it relates to website access and incoming/outgoing of external email addresses and filtering.
- Maintained all security account administration for WS FTP along with FileZilla accounts and handled all FTP/FileZilla server related upgrade patches and service issues for clients within and outside of the organization.
- Familiar with Xmas and SPI port scan attacks and how to counter act against that in order to stop an attacker in their tracks.
- Participated in phishing exercises with clients for user awareness security training projects.
- Moderate understanding of web based SQL Injection and Brute Force attacks and how to remediate those issues.
- Assisted clients with gathering information for the health of the managed devices of the Confidential iSensors, Fortinet Firewalls and Inspector, 3rd Party device (Cisco IDS/IPS, Cisco FW, Palto Alto, etc.) in regards to being able to pull log file reports or to make sure that data was being reported from the devices along with the determination and ability to learn new technology and concepts very quickly.
- Utilize Carbon Black as a user endpoint protection software antivirus against ransomware, malware and phishing attacks.
- Utilize LogRythm for SIEM - Security Intelligence and Analytics platform for detecting abnormal activities, deep packet analytics functions, phishing attempts, Network monitoring logs, Beaconing traffic, Malware traffic anaylsis,etc.
- Familiar with Kerberos login authentication protocol method that allows for communication between non secure devices via a shared secret key which can be supplemented with private/public key pairs by using smart cards
- Well-known understanding of networking TCP/IP protocols and services (FTP, SFTP, HTTP/S, SSH, SSL,TLS, LDAP/AD Services, etc.).
- Setup and disablement of Qualys scanning and Portal account access.
- Assisted clients with running daily reports for Daily IDS/IPS Executive Summary, VPN Logs, FW/Router configuration changes, Adware/Spyware alerts, Event Analysis, Authentication and Logons Compliance events, IPS attack trend, Board Reports, etc.
- Remotely assisted technical support related issues by managing and monitoring customers network infrastructure. This support included; but not be limited to: assisting customers with the replacement of defective security devices, setting up read-only accounts to 3rd party management consoles, modifying customer portal account views and access requirements, etc.
- Analyzed and assess security incidents and escalation process of client issues to appropriate internal teams for additional assistance
- Excellent written and verbal communication skills, time management and organizational skills along with basic understanding of intrusion detection, firewall operations, and other general security practices.
Confidential
Senior Desktop Support Engineer/IT Technical Administrator
Responsibilities:
- Day to day Web Application security practices in regards to support issues: Back up often and we keep our backups physically secure (Iron Mountain), Run a virus checker that monitors inbound and outbound traffic (Sophos Anti - Virus), Established and enforced policies that forbids users from keeping their passwords written down in an easy-to-find location (Awareness/Security policies and procedures user training) and able to Secure the Web server computer and all computers on the same network with strong passwords (LDAP).
- Maintain and managed Sophos SafeGuard Security Encryption via the SCCM Management Console for hard drives.
- Experienced in administering creation of user accounts via Active Directory, syncing with LDAP, group policy administration and account lockouts, site containers and policy controls within AD as a security measure within the organizations infrastructure.
- Created Compliance Security Awareness documentation and training for users within our North America region (which includes all of our remote locations) to establish a security baseline for understanding breaches, potential threats and how they take place along with who is the potential victim.
- Creates all relevant documentation relating to projects, along with create and/or maintain documentation around all aspects of the infrastructure environment.
- Ensured all devices were protected at all times and updates were successful to eliminate potential security threats within those devices. Assess hardware needs, recommend purchases, and execute approved purchases of hardware and/or software.
- Provide input pertaining to employee s performance to IT Director for delivery.
- Assisted with project completion of Windows XP migration over to Windows 7 environment.
- Support MAC (Yosemite 10.10 and later) in regards to imaging and troubleshooting connectivity issues concerning connecting to the network. Installation and support of Parallels software for being able to transfer files, documents, application access, etc. on MAC s to house Windows 7 operating system which includes being able to access Vmware.
- Created Compliance Security Awareness documentation and training for users within our North America region (which includes all of our remote locations).
Confidential
Technical Support Analyst, Lisle, IL
Responsibilities:
- Installed and managed Sophos Anti - Virus software for all desktop and laptop machines
- Setup of all users personal and company mobile devices (iPad, Smart phones, Android, iPhone, etc.) Within Exchange Admin as a required encrypted security device in order to access pertinent network information.
- Performed Active Directory actions such as password resets, security account management, security GPO setup request and filtration requirements along with data entry standards, as required.
- Technical knowledge of Windows XP, Windows 7, Microsoft Office 2003/2007 products, Market Data Applications (ex. Bloomberg) and telephony environments.
- Solved issues of low complexity in any technical area for desktop hardware without assistance. For more complex issues, incumbent will collect data and escalate to more senior Service Desk or Desktop support staff and track those issues through completion. For any problem where the user is in the same location during periods of very high call volume, incumbent may forward the problem to a local desktop support technician.
- Performed project work as assigned under the supervision of a lead or manager Creates all relevant documentation relating to projects, along with create and/or maintain documentation around all aspects of the infrastructure environment.
- Made technical recommendations and decisions, supported by management, on behalf of the Help Desk.
- Ability to broaden knowledge in the functional areas of IT.
- Extremely proficient in troubleshooting desktop computer issues, both hardware and software.
Confidential
Technical Support Analyst, Bolingbrook, IL
Responsibilities:
- Performs root cause analysis and develops checklists for typical problems and security training protocols.
- Installed and managed Norton Anti - virus software for all desktop and laptop machines as a security measure for the end user community.
- Involved in the installation, configuration, creating and rollout of new software packages, OS, upgrades, patches and hot fixes with SCCM to provide a better security lockdown on APPROVED only application installations.
- Knowledge of SCCM application deployment (Advertised Programs and Console), Patch Management and Wise Packaging.
- Recommend security procedures and controls for problem prevention in regards to the user base community.
- Created and maintains SharePoint and VHD knowledge database and call tracking database to enhance quality of problem resolutions.
- Responsible for critical work and/or complex projects performed within a broader technical and business context.
Confidential
Technical Support Manager, Northlake, Illinois
Responsibilities:
- Maintained open communication with regards to all security related events along with IT training, application, infrastructure to local office managers, Directors, VP, etc. and solicited feedback regarding system wide upgrades, possible security loopholes and suggested remedial solutions for potential threats.
- Esttablished and maintained mechanisms for systematic review and prioritization of user feedback (security incidents, enhancement requests, and open technical issues) in order to in corporate a security baseline for immediate action procedures in case an security breach took place.
- Installed and managed Sophos anti - virus software as a security measurement for all desktops and laptops within the corporate environment.
- Facilitated all security related incidents and technical support issues for the organization into proper escalation events and/or resolutions.
- Maintained open communication with regards to all security related events along with IT training, application, infrastructure to local office managers, Directors, VP, etc. and solicited feedback regarding system wide upgrades, possible security loopholes and suggested remedial solutions for potential threats.