We provide IT Staff Augmentation Services!

Sr. Cyber Security Engineer Resume

2.00/5 (Submit Your Rating)

Springfield, VA

PROFESSIONAL SUMMARY:

Experienced, results - driven Security Professional with proven expertise in planning, implementing, and evaluating security controls. Hands-on experience in design, requirements definition, installation, support and testing of large, complex information systems. Outstanding project leader; able to coordinate and direct all phases of project-based efforts while managing, motivating, and guiding high performance teams.

PROFICIENCY SUMMARY:

  • Security Architecture
  • Technical Leadership
  • Security and Controls Development
  • Risk Management
  • Policy Development and Implementation
  • Investigation and forensics
  • IT audit
  • Incident Response
  • Certificate Management
  • Public Key Infrastructure

PROFESSIONAL EXPERIENCE:

Confidential, Springfield, VA

Sr. Cyber Security Engineer

Responsibilities:

  • Performing security control assessment activities in the design and development portion of system’s life cycle in accordance.
  • Conduct research and perform security analysis on the impacts of system designs, modifications and technological initiatives
  • Review security architecture design and configurations to include IDS, SEIM, firewall, and end point protection devices to determine their level of effectiveness and compliance
  • Perform manual verification of Confidential and other security benchmarks against web, database, operating systems and appliance configurations Conduct and mitigate vulnerability and compliance assessments on various web applications, databases, operating systems and various appliances.
  • Execute the source code analysis on developed applications and collaborate the remediation steps with software developers
  • Document the security posture in the prescribed security design deliverables: Security Plan, Security Assessment Reports and other documents.

Confidential, Alexandria, VA

Enterprise Security Architect

Responsibilities:

  • Development of documentation to support Systems Life Cycle Development
  • Moving the system through the review gates for management review and approval
  • Meeting with management and processing guidance into detail technical requirements
  • Capturing challenges and translating them into actionable status information for management
  • Monitoring project progress for quality and schedule performance
  • Provide guidance for integration with other security tools in the enterprise

Confidential, Alexandria, VA

Sr. Security Operations Center Engineer

Responsibilities:

  • Supported the DHS Science and Technology Directorate Chief Information Security Officer (CISO) and facilitated the complete configuration and implementation of the installed suite of security tools. Performed analysis of network and system behavior to identify weaknesses and non-compliant configurations.
  • Worked with Operations and Engineering to develop and deploy improved devices and configurations.
  • Represented the component in Cyber Command working groups to improve management and utilization of Indicators of Compromise from a wide range of sources.
  • Acted a liaison between the Compliance Office, Engineering and Operations groups to communicate the presence, impact and drive to successful mitigation of security weaknesses. Responsible for managing the day-to-day activities and security tools of the SOC and in charge of the Incident Response team, responsible to coordinating breach response, investigations, network forensics as well as containment, analysis, and remediation as a result of classified and PII spills.
  • Conducted assessments of security tool prototypes in support of the Homeland Security Advanced Research Projects Agency (HSARPA).
  • Integration all of current and future security tools in the SOC (Nessus, Nexpose, Juniper STRM, Tripwire)
  • Deployment and configuration the Data Loss Prevention (Monitor, Prevent, Manager, and Discover)
  • Implementation of active alerting and act as the incident response lead
  • Syslog, event log and Netflow log analysis (Splunk, Clique / Traffic Circle network traffic analysis from Pacific Northwest National Laboratories; pre-market operational testing)
  • Train Security personnel and Operations personnel on security tools
  • Develop Standard Operating Procedures (SOP) for the SOC
  • Determine additional tools, as necessary, to cover gaps in security tools
  • Evaluate, recommend, configure and install security tools
  • Develop security policies

Confidential, Manassas, VA

Sr. Security Analyst

Responsibilities:

  • Developed and implemented improved vulnerability management system
  • Generate and maintain secure baseline configurations
  • Create and maintain a vulnerability and remediation database
  • Perform vulnerability scans and penetration tests
  • Chair the ATF Vulnerability Management Program sessions
  • Monitor patch management services
  • Develop and manage secure configuration monitoring and reporting processes
  • Evaluate and recommend new security tools
  • Perform security impact assessments of new hardware, software and processes
  • Perform site security reviews of vendor support locations

Confidential, Reston, VA

Sr. Security Analyst

Responsibilities:

  • Developed and operationalized vulnerability management system for the Education and Training Administration
  • Participated in privacy breach investigations
  • Reviewed and updated agency security policies
  • Performed Security Assessments for product acquisitions
  • Provided support for Certification and Accreditation processes

Confidential, Washington, DC

Senior Systems Engineer

Responsibilities:

  • Developed and implemented service delivery framework and processes to support the deployment of an enterprise wide security tool for a very large, highly federated agency of the US government.
  • Coordinated the technical activities of geographically and organizationally dispersed agencies with those of the core infrastructure support groups to overcome technical and political (both real and perceived) obstacles to successful implementation.
  • Developed large scale rapid deployment methods for unix/linux and MacOS clients.
  • Managed unique patch requirements for RedHat and Solaris client community.

Confidential, Kansas City, MO

Network Security Programmer

Responsibilities:

  • Deployed Confidential Endpoint Manager endpoint security management solution to provide endpoint security and patch management for 180,000 endpoint devices.
  • Used LogLogic and Lasso log management software to collect and aggregate logs from primary infrastructure hosts.
  • Used Excel and Visio to generate pivot tables for the analysis of device topology and identify sub-optimial aspects of the Confidential Endpoint Manager self organizing mechanism.
  • Coordinated the technical activities of geographically and organizationally dispersed agencies with those of the core infrastructure support groups to overcome technical and political (both real and perceived) obstacles to successful implementation.

Confidential, Wichita, KS

Security and Privacy Consultant

Responsibilities:

  • Managed security of a major transition of client IT operation to outsourced environment.
  • Coordinated security audit activities and compliance management for many federal, state, and local governments outsourced IT facilities.
  • Developed comprehensive governance program for intranet operations by analyzing current IT management structure, participating in the development of a new governance structure, generating a gap analysis, and aiding the customers understanding by creating a series of mind maps to visualize the old and new structures along with the migration path. Created detailed policy, standard, guideline and process documentation for the implementation and operation of the new structure.
  • Developed short-term security credential system for an advanced building Emergency Response Information System which distributed low assurance credentials to non-affiliated responders via SMS.

Confidential, Wichita, KS

IT Security Advisor

Responsibilities:

  • Developed security metrics and deployed monitoring mechanisms, including Cisco Pix and Checkpoint firewalls, Snort IDS, reverse proxies, and various log analysis tools.
  • Performed regular vulnerability scans on installed hosts with the Nmap port scanner and the Nessus vulnerability scanner.
  • Conducted forensic examinations using Encase, Autopsy and the Coroners Tool Kit in support of investigations of both legal and policy violations.
  • Performed an extensive policy analysis and developed the regional security policy to support the global governance of Confidential while accommodating the requirements of United States law and respecting the local organizational culture.
  • Successfully implemented an effective security awareness program that has made significant improvements in the protection of corporate physical and intellectual property. Provided educational and implementation assistance with a focus on genuine understanding of security and privacy principles.
  • Conducted risk assessments for new projects and mission critical systems to identify systemic non-compliant conditions, analyze for root cause, establish the degree of risk to the corporation, and recommend corrective actions.
  • Performed regularly scheduled wireless assessments using Kismet and GPS to map all wireless access points, identify and decommission rogue access points, non-compliant communication channels between access points outside the perimeter and attached clients within the facilities. Prepared and presented detailed briefings with recommendations to executive management.

Confidential, Wichita, KS

Security Analyst/Information Assurance Lead

Responsibilities:

  • Managed information assurance devices for all assigned Confidential and Confidential Corp Reserve installations in the western US, including tcpdump logging and log management tools, network intrusion sensors, and firewalls.
  • Performed major software upgrade for network security devices for all remote Confidential and Confidential Corp Reserve sites from Oklahoma to North Dakota.
  • Performed Information System Security Officer duties.
  • Performed Local Registration Authority duties to include maintenance of secure ID card readers, issuance of cerficates, and training of LRA assistants at individual units.

We'd love your feedback!