Principal Security Engineer Resume
OBJECTIVE:
I am a highly skilled proactive IT Security Professional that perpetuates success for my team, organization, colleagues and clients and desire an opportunity to leverage this work ethic in achieving organizational, professional and personal Confidential for Confidential .
SKILLS SUMMARY:
- With over 21 years of total IT experience, beginning in the system / network administration and engineering roles and progressing forward into other IT disciplines, I have the following summary of skill sets:
- Expertise in NIST, ISO 27000, PCI DSS, FISMA, DISA DIACAP
- Policies, Procedures and Documentation
- System & Network Compliance (NIST, PCI etc.)
- Security Risk Assessment, Vulnerability Research
- Experience with GRC tools - RSAM
- Identifying and remediating vulnerabilities and working with key stakeholders to protect assets
- Disaster Recovery, Incident Response & BIA
- Secure Development Life Cycle (SDLC)
- Expertise in Firewalls Checkpoint and Sidewinder
- Expertise in UNIX (RHEL, SuSE, SOLARIS, FreeBSD)
- Expertise in MS Windows (Server / Workstation) & VMWare
- Expertise in Active Directory (AD), DNS, TCP/IP, IIS, GPO etc.
- Expertise in Blue Coat and Websense
- Expertise in RETINA, Qualys, NESSUS, BURP, Centrify, Tripwire, etc.
- Expertise in SIEM - Splunk & McAfee Nitro & Sentrigo DAM
Current Endeavors: I am currently learning Python, JavaScript and XML for scripting expertise. I am also learning about Governance Risk and Compliance tools such as Archer and RSAM.
EXPERIENCE:
Confidential
Position: Principal Security Engineer
- Created, managed and run the vulnerability and compliance program for all customer servicing assets / networks. Created a compliance program to minimize security gaps.
- Created, manages and run the customer facing incident response program. Conduct monthly table top exercises resulting in streamlining processes and educating personnel in preparation for real world IR.
- Protect critical assets, services and users from cyber threats. Respond to cyber security incidents and assess cyber security readiness continually looking for means and methods to improve that readiness.
- Research, disseminate and track vulnerabilities to systems to ensure due diligence in remediation and protection of assets
- Expertise (not an expert) in: HP Tipping Point, Qualys, Arbor DDoS, Splunk SIEM
Confidential
Position: Security Architect
- Lead for Blue Coat and Websense Proxy, HP Tipping Point, Symantec Mobile PKI, Mobile Iron, AV/Malware detection / removal, DDoS response team, log and database monitoring, McAfee NITRO SIEM with Sentrigo Database Activity Monitor (DAM)
- Implemented Ent’s next generation of mobility integrating certificate based access for wireless networks for all mobile devices (laptops, iPhones, iPads and tablets). Replaced pre-shared key wireless networks with certificate based networks resulting in higher security and easier access for authorized users.
- Conduct formal Security Risk Assessments for Enterprise Assets providing recommendations for secure utilization of assets. Further assisted in refining and implementing our Governance Risk and Compliance (GRC) tool RSAM
- Manage, maintain and configure security controls: FireEye, Blue Coat, Checkpoint FW, Tripwire, HP Tipping Point, Imperva WAF, and McAfee NITRO SIEM. Comfortable in both GUI and command line Confidential .
Confidential
Position: Information Assurance
- Managed and executed IA efforts including engineering and implementation of security remediation strategies given project scope, operational impact and budget. Management hailed efforts as “the most thorough and exhaustive security evaluation in the program’s 15 year history”. Compliance with DISA STIG (equivalent standard NIST 800, ISO 27000, COBIT)
- Conducted a Security Risk Assessment, in which over 1,189 deficiencies were identified across 17 systems, composed of 3 different operating systems (SOLARIS, RHEL and Windows 7) and CISCO network devices (ASA firewalls and Switches). These deficiencies were presented to the Configuration Control Board (CCB) and worked with team leads to develop and implement mitigation strategy for DISA compliance. Efforts resulted in award of a 3 year “authorization to operate” from the certification authority. Compliance with DISA STIG (equivalent standard NIST 800, ISO 27000, COBIT)
- Worked with a vendor through Service Level Agreement (SLA) to correct a system communication problem revolving around satellite communications that had been plaguing the program for nearly 6 months. Having little to no experience in this area, I volunteered as project engineers were stumped. After 1 week of evaluation to understand the technology and the problem, I coordinated with the vendor. We developed a viable fix action that was tested over a 72 hour period resulting in complete return of systems to fully operational status
Confidential
Position: IA Engineer
- Created and implemented policies and procedures that standardized the evaluation of assets and results, reducing overall time for evaluation by 50% and increased efficiency of risk / vulnerability identification for mitigation / remediation
- Research, disseminate and track vulnerabilities to systems to ensure due diligence in remediation and protection of assets
- Developed an Active Directory test environment (VMWare) that allowed the customization and capture of Active Directory (MS Server 2008 / 2012) group policy, eliminating the need to re-create group policy on a case base case basis increasing efficiency by over 100%
- Developed a test environment (VMWare) for development of McAfee Host Based Security System (HBSS) ePolicy Orchestrator (ePO) policy development. Efforts led to a standardized policies and application against all project work to ensure operational viability of project software and full compliance with regulatory body (DISA)
Confidential
Position: Chief Information Security Officer (projects)
- Developed initial IA service offering and business plan, allowing RTL to break into the IA market and customer base.
- Managed IA team, growing service offering into 2 full time employees (FTE)
- Discovered that laptops issued to each employee lacked anti-virus application and brought this risk / vulnerability to the attention of the IT department head and CEO of RTL. The issue was “deemed” not a threat despite my Business Impact Analysis of the threat / vulnerability. This issue resulted in the organization delivering customer systems infected with malicious logic (virus). After this event occurred my recommendations were implemented and no further incident occurred
- Worked with customer requirements such as integrating the CENTRIFY application and other security related applications such as Tripwire into the project. This implementation created a more robust and secure system with centralized (UNIX / Windows) logon credentials.
- Created over 30 standard operating procedures to ensure consistent and reliable security practices were applied across all project work. This decreased errors, improved efficiency and order to chaos.
Confidential
Position: Associate
- Created and implemented a Configuration Management library that organized and increased efficiencies in patch management, standard operating procedures, system updates, software versioning, etc. This library decreased the level of effort (LOE) for update, configuration and implementation from CCB through to implementation at customer site from 1 month down to 2 weeks.
- Wrote over 100 Tactics, Techniques and Procedures (TTP), creating standard, repeatable processes thereby increasing efficiency and baseline standardization.
- Updated disaster recovery planning through the implementation of NETAPP Network Attached Storage, replacing the aging and unreliable SDLTP tape backup system. Efforts created a fully redundant backup system and secure offsite storage of data.
- As the solitary client site contractor, managing a 300 + personnel AD site that was part of a 27 site AD Forest. Planned, designed and installed two new networks, upgrading from Windows NT to 2000 and eventually to Windows Server 2003.
Confidential
Position: Staff Sergeant / Communications Computer Systems Operator (3C071)
- Created and achieved United States Air Forces in Europe “Best Information Assurance (IA) Program” 1999
- First junior enlisted Air Combat Command Network Operations Security Center Crew Chief