We provide IT Staff Augmentation Services!

Senior Information Security Analyst Resume

4.00/5 (Submit Your Rating)

Atlanta, GA

SUMMARY:

IT Security Analyst with notable success in directing a broad range of corporate IT security initiatives while participating in planning, analyzing, and implementing solutions in support of business objectives. Excel at providing comprehensive secure network design, systems analysis, and full lifecycle project management. Hands - on experience leading all stages of system development efforts, including requirements definition, design, architecture, testing, and support. Outstanding project and program leader; able to coordinate and direct all phases of project-based efforts while managing, motivating, and guiding teams.

AREAS OF EXPERTISE:

  • Developing strategies to enhance overall cyber security program
  • Cyber Security Forensic (malware analysis/ identifying intelligence related activity)
  • Network and Systems Security Architecture
  • Cyber Security (FISMA) for US Government DoD (DIACAP) and Civilian (NIST)
  • Research and Development
  • Audit and Regulatory Compliance
  • Advanced cyber intrusion analysis/detection/forensic (rootkit, malware, etc.)
  • Maintaining and improving security posture for IT governance.
  • Infrastructure and Web Vulnerability Assessment.
  • Mixed-Platform Environments (Linux & Windows)
  • Malware Reverse Engineering
  • Advanced Persistent Threat (APT)/ Cyber CI (Counterintelligence)
  • Penetration Testing.
  • Secure SDLC
  • OWASP Top 10 & CWE/SANS top 25
  • PCI-DSS, ISO 27001/27002 , CIS
  • Cost Benefits Analysis
  • Policy Planning / Implementation
  • Virtualization & Cloud Technologies
  • Data Integrity / Disaster Recovery
  • Risk Assessment / Impact Analysis
  • Technical Specifications Development
  • Team & Project Leadership
  • Business Analysis and Project Management

TECHNICAL KNOWLEDGE & SKILLS:

  • Antivirus Software
  • Network Scanning
  • Vulnerability Scanning
  • Penetration Testing
  • Web App Assessments
  • Network and Host- based IDS/IPS
  • Tipping Point IDS/IPS
  • Cisco PDM/Works
  • ISS Real Secure
  • Snort
  • Virtual Private Networks Firewalls
  • Public-Key Infrastructure
  • Kerberos
  • Cryptography
  • Policy Enforcement Applications
  • Data Loss Prevention (DLP) Governance Risk and Compliance (GRC) Solutions Centralized Security Information Management Solutions (SIMs)
  • Forensic Analysis Tools
  • Active Directory
  • LDAP Policies
  • Identity Management
  • Access Control Lists (ACLs)
  • SSL/TLS
  • SSH
  • Hashing
  • NetSparker
  • Nessus
  • Zed Attack Proxy (ZAP)
  • Retina
  • Nmap
  • Nagios
  • OpenVAS
  • IBM AppScan
  • OWASP DirBuster
  • OWASP Zap
  • Veracode
  • Sqlninja
  • Metasploit
  • Wireshark
  • CORE Impact
  • BackTrack
  • W3af
  • Arachni
  • Burp Proxy
  • AppScan
  • TrustKeeper
  • NetSparker
  • Metasploit
  • GetMantra
  • BackTrack
  • Sqlmap
  • CounterAct
  • ForeScout
  • NTOSpider
  • QualysGuard
  • Snort, etc
  • ScanGuard Security Suite
  • Symantec Endpoint Protection
  • Avast Endpoint Protection Suite Plus Bitdefender
  • GravityZone
  • McAfee Complete Endpoint Protection
  • HIPS and SiteAdvisor
  • Sophos Endpoint Protection
  • Dr Web for Linux
  • AVG Antivirus for Linux
  • ESET Endpoint Antivirus
  • Norton Small Business
  • Cisco ASA Firepower/PIX
  • FortiGate
  • Juniper SSG/SRX
  • Sonicwall
  • Palo Alto Networks
  • WatchGuard
  • IPFire
  • FireEye
  • SRX
  • Sourcefire
  • XTM pfSense
  • Checkpoint
  • Imperva
  • Sophos
  • IPCop

TECHNOLOGIES:

Platforms: Linux (Centos, Fedora, RHEL), Mac OS X, UNIX, AIX, Windows and DOS

Servers: (web, file, proxy, app, cloud, etc.) Windows Server (03/08/12/R), IIS (7/7.5/8/8.5), Terminal Server

Other: Exchange (07,10, 13), WDS, Active Directory Basic, Apache, Tomcat, Oracle, Lotus, Dreamweaver, etc

Virtualization: VMware Confidential /ESXi, Citrix Confidential, Sun xVM (VirtualBox), Hypervisor, Microsoft Hyper-V, Emulation, QEMU, Linux KVM, Kernel-Level, User-Mode Linux (UML), Shared Kernel, Solaris Containers (Zones), Open VZ, Guest OS/Host OS

Networking: TCP/IP, LAN, WAN, VLAN, DNS, HTTP/HTTPS, EIGRP, OSPF, RIP, STP, VPN, Firewalls, Cisco Switches, Cisco Routers, Wireshark, tcpdump, SSH, SSL/TLS

Programming: Java, JavaScript, Perl, PHP, Python C, C++, SQL, XHTML/HTML, Bash Shell Scripting, and Powershell

Backup Utilities: Acronis True Image, Windows Server Backup, Basic knowledge of Commvault, Simpana

PROFESSIONAL EXPERIENCE:

Confidential

Senior Information Security Analyst, Atlanta, GA

Responsibilities:

  • Perform audits by assessing web application threats, vulnerabilities and defense programming as well as provide technical expertise in desi gning, implementing, and monitoring enterprise network security systems, including internal and edge implementations, and to ensure compliance to departmental standards.
  • Evaluate firewall protection against hackers and entrust to find vulnerabilities.
  • Install, implement and troubleshoot firewall issues.
  • Create company policies & procedures governing corporate security, email & Internet usage, access control, and incident response.
  • Configure; manage monitor and analyzed IDS/IPS signature attacks, firewalls log, systems, applications and security event logs for comprehensive security monitoring and vulnerability management.
  • Lead in deploying new technologies to data center/branch offices including firewall, NAC, wireless & switching technologies.
  • Implement and configure serial failover for redundancy purposes for PIX/ASA firewalls, checkpoint clustering and load balancing features.
  • Write proposals for new implementations, and contact vendors to setup demos and POCs installs and deployments.
  • Assist in creating new information-security departments for risk assessment, vulnerability, penetration testing, and security engineering services.

Confidential

Senior Systems Security Engineer, Atlanta, GA

Responsibilities:

  • Led other Engineers in design, build and implementation of the CareRadius Software in new or existing production, disaster recovery, test, development, or alpha environments.
  • Installed, upgraded, and configured the CareRadius Software Suite on different OS (Windows 2008, Windows 2010, Windows 2012, AIX, HP-UX, RedHat Linux, Sun Solaris, Unix, Confidential ), Oracle 11g, Oracle 12c, Java Platforms/Application Servers (JBoss, Apache, Tomcat, Websphere), PHPs, .Net Frameworks, Web Servers (Apache HTTP, IIS, Tomcat, Oracle), Proxy Servers, Scaleout, Database Servers, SQL Servers and or State Servers.
  • Led comprehensive security infrastructure upgrades (e.g., firewall/VPN upgrades, intrusion detection, token-based authentication and remote management) for various midsize and large company clients.
  • Installed and maintain security infrastructure on new and existing servers, including IPS, IDS, log management, and security assessment systems.
  • Designed, developed, and recommended integrated security system solutions that ensured proprietary/confidential data and systems protection.
  • Assessed threats, risks, and vulnerabilities from emerging security issues in different environments as well as compiled data on vulnerabilities and presented monthly briefings to system administrators and senior management on current threats, trends, incidents, and current security posture.
  • Provided other advanced level systems analysis including infrastructure development, backup policies, maintenance, upgrades, troubleshooting, and user account administration. Developed information security policies and ensured that risks were reduced.
  • Analyzed various information security threats and ensured that they were not repeated by taking necessary preventative actions. Ensured that all security policies were enforced on network.
  • Designed and updated information security system, related practices and prepared associated technical documents.
  • Evaluated various proposals for improvements of information system such as intranets, firewalls, databases and various or databases.
  • Performed and create procedures for system security audits, penetration-tests, and vulnerability assessments.
  • Developed scripts to maintain and backup key security systems.
  • Applied strategic security planning and defined process that allowed the integration of business requirements into securing existing and future solutions.
  • Created and modified company policies and procedures governing corporate security, email and Internet usage, access control, and incident response.
  • Selected 4 employees from the IT Info Sec. Dept. to build risk assessments team charged with analyzing all critical systems, developing reports to document system vulnerabilities, and recommending appropriate solutions.

Confidential

Senior Systems Engineer, Atlanta, GA

Responsibilities:

  • Assisted in the development and launch of secure, recoverable and fault-tolerant systems for data access and identity management for dozens of federal government agencies’ servers.
  • Performed regular review of security system to ensure cost effectiveness & recommended changes to improve process.
  • Designed network & restricted access, ensured that there were backup of work and a strong intrusion detection system.
  • Created change controls & implemented application integrations with SSO to tune the applications for performance.
  • Created and configure connections to directory server & web agents by creating host & agent configuration objects with respect to IIS and Apache web server requirements.
  • Monitored directory server file systems, disk space, server processes and perform server tuning.
  • Researched and investigated any information security related issues, handle all assigned customer requests within the agreed service level agreement, keep records of backup of systems' configuration files, as well as maintain the maximum level of security to Confidential and its customers’ servers.
  • Troubleshoot and debug network failures and p erform periodic network assessments and vulnerability scanning.
  • Worked with the System Admin Internal Department to implement Endpoint Encryption and Enterprise Email Encryption with PGP.
  • Implemented user access profiles defined by the production system and data owners (Federal Clients) and provide auditing reports to them indicating what access has been granted to their servers.

Confidential

Senior Systems Engineer, Norcross, GA

Responsibilities:

  • Lead other Engineers in design; build and implementation of new or existing environments such as Production, Disaster Recovery, Test, and Develop IT architecture, using a wide range of highly complex features and systems, analyze requirements, and define enterprise standards.
  • Built new VM Server in SCCM, Physical Servers, and IVRs/VRUs. Upgrade servers from System Center 2007 to 2012 and create software automation packages using SCCM.
  • Installed, support and configure applications, agents and management packs related to SCOM, and maintain and troubleshoot advanced infrastructure monitoring with SCOM.
  • Developed information security policies and ensured that risks were reduced within the newly built environments.
  • Worked on Access Management for providing authentication, authorization, scalability and accountability for the new server applications. Serve as a systems expert for the assigned project during all phases of the Project’s Lifecycle.
  • Determined the long term needs for the BU and acquisition requirements, conduct analysis and make recommendations to the BU, and ensure that all the network and security systems are functional and secure.
  • Created FW Rules, create new user RDP Access, configure IPs, setup Ports and Proxies, and design Visio diagrams of the new or upgraded environment.
  • Lead the implementation of Forefront Identity Manager 2010 that handled identity resolution, identity synchronization and integration with several key authentication and authorization repositories at Confidential .
  • Installed and configured of Access Management Web Agents with IIS v5/6 and Apache v2 web servers.
  • Implemented high availability and fault tolerant strategies, implemented replication strategies for HA and failover using MMR, write failover and load balancing.
  • Assisted in the performance of Operational Readiness Testing (ORT) to validate infrastructure is built and sustainable.
  • Decreased one of the migration project time line from 8 months to 6 months by creating automated scripts, which was implemented into the SCCM system to help auto transfer data to new or existing servers rather than using the old manual transfer methods.

Confidential

Senior Security Engineer, Hartford, Connecticut

Responsibilities:

  • Provided implementation, management, and troubleshooting support for file transfers in both Linux and Windows infrastructures.
  • Investigated arising incidents caused by malicious activities and identified false positives.
  • Implemented authentication and cryptographic technologies as appropriate to protect certain types of sensitive data in other to meet company guidelines.
  • Served as last-resort contact for critical outages on production systems running on Windows Platforms, as well as Apache web and application servers running Red Hat 3 & 5, on physical and virtualized under VMware Confidential .
  • Troubleshoot SSO Websphere Applications, CA Siteminder Policy Servers & CA SiteMinder Login Servers.
  • Mentored junior security engineers to increase their understanding of complex security engineering.
  • Trained all internal employees and external Confidential Customers how to send and receive files using ftp, sftp, pgp, etc.
  • Ensured remediation solutions are identified, tested and made available for vulnerability remediation; and works on improving business vulnerability remediation processes.
  • Developed information security strategies, conduct security assessments, and implement security solutions to assist business with the assessment and improvement of their applications.
  • Coordinate application and infrastructure vulnerability assessments with vendors, clients, and internal groups.
  • Completed complex server migrations from both Linux\Unix (Solaris to RHEL) and Windows Server (2003 to 2008) Environments six weeks ahead of schedule.
  • Avoided $30,000 in addition to labor costs by applying Java & scripting expertise to customize an upgrade to Axway secure transport’s newer version.
  • Provided quality assurance support by creating documentation to educate the secure FTP administrators on file transfer types such as PGP, AS2, and SFTP.
  • Eliminated high volume help desk calls by training Confidential account representatives on SFTP processes and procedures.

Confidential

Systems Engineer, Duluth, Georgia

Responsibilities:

  • Configure RAID 1 for all three servers
  • Installation of RHEL6 on IBM server x3690/x3550
  • Installation of KVM.
  • Create file system partitions and LVM configuration.
  • Network configuration (Bonding and bridging), H/w Troubleshooting etc.
  • Confidential Linux server 11 installation on HP servers.
  • Confidential installation on Confidential, Install Virtual machine on each server.
  • Networking configuration (Bonding & bridging), Hardening of Confidential servers.
  • Provided system administration functions for local and remote systems including user administration, automation, patch management, backup and restore, capacity/log monitoring, clustering, and replication.
  • Installed and maintained server-class hardware, VMware, VSphere & Confidential setup, configuration and general management.
  • Performed backup on all the Windows Servers that needed to be migrated to RHEL Servers.
  • Completed the Exchange migration project 3 weeks ahead of schedule avoiding labor costs to recruit additional resources.
  • Created a project status report wizards using Visual FoxPro and MySQL that cut reporting time from one hour to less than 5 minutes.

Confidential

Security Systems Administrator, Atlanta, Georgia

Responsibilities:

  • Performed and lead the development and integration of Single Sign on and Authentication Services utilizing CA Siteminder and Oracle LDAP software into a diverse set of web applications.
  • Built and maintained collaborative working relationships with Information Technology and Business personnel to design and assist in the execution of risk assessments .
  • Responsible for system quality assurance and consistency with installation and security policy and standards.
  • Assessed the various information technology risks that the business faces in its operations and implement action plans, policy and procedural changes for risk avoidance and mitigation.
  • Participated in IT security related projects such as application version upgrades, user or process remediation efforts, role or group changes, and security administration functionality testing.
  • Managed DBMS, operational units permissions, and group policy objects permissions.
  • Developed SSO Solution in compliance with security policies and audits.
  • Configured and supported LDAP groups and role, developed scripts in Java, and used LDAP utilities to query directory and perform bulk updates.
  • Decreased the migration project time line from 12 months to 9 months by creating syntax/command lines in JavaScript to auto transfer customer data to new or existing servers instead of manually transferring it.

Confidential

Information Security Analyst, Columbus, Ohio

Responsibilities:

  • Assessed incoming threats and developed plans to close loopholes.
  • Established and maintained all log-on identifications and access rules, defining specific access, privileges, and policy rights of data transmissions, files, and database management systems.
  • Used encryption technology, penetration, and vulnerability analysis to check for security threats or breaches with money file transfers.
  • Examined and evaluated computer software and hardware to uncover access attempts.
  • Identified and evaluated potential threats and vulnerabilities.
  • Monitored live systems to discover real-time threats.
  • Demonstrated effectiveness of security controls.
  • Created a new SharePoint Wiki to track and resolve common issues such as file transfer error messages.

Confidential

Network Administrator, Boston, Massachusetts

Responsibilities:

  • Solved production problems related to Siteminder, LDAP, internal applications, systems errors, and other support related issues.
  • Designed, installed, configured, and maintained Microsoft SQL Server databases on Windows platforms.
  • Monitored and tune servers to increase performance and reliability.
  • Designed desktop deployment strategies and update policies for desktop OS and antivirus software.
  • Decreased average customer call time by creating and programming scripts to test for common computer issues.
  • Improved network infrastructure by recommending appropriate network addressing systems, layouts for various network configurations, and suitable connection devices.

Confidential

IT Consultant, Columbus, Ohio

Responsibilities:

  • Set up, secured, and maintained wireless networks including TCP/IP routing and firewall configuration.
  • Troubleshoot issues with PCs, mobile devices, printers, check scanners, cash dispensers, and other device issues including connectivity, email setup, and new user training.
  • Maintained office PC systems, including configuration, software updates, and patches to keep equipment in compliance with company standards.
  • Completed complex infrastructure migration of JPMC & Washington Mutual in 6 months (4 months sooner than planned projected date)

We'd love your feedback!