We provide IT Staff Augmentation Services!

Certified Security Analyst Resume

3.00/5 (Submit Your Rating)

Auburn Hills, MI

SUMMARY:

  • Information security / Cyber security Analyst with system engineering background and Linux / network security background.
  • Performed System Administration for Linux Red Hat and SUSE Servers.
  • Managed a cluster of 2 Juniper SSG 550 firewalls (Was installed as replacement of Checkpoint NGFP3) and Managed the Juniper Confidential Server based on Linux RHEL 4.0.
  • Installed and configured VMware ESX 3.0 on HP BL20 Blade servers and NetApp Filer 250 Including converting the physical servers to VM’s.
  • Configured Samba on SLES server and used it as file server.
  • Install and maintain MySQL on SLES, Patching the server and keeping it up and running.
  • Monitor SEIM and other Systems for anomalous events and respond in a timely manner.
  • Identify, verify, and respond to anomalous activity or security events on NAFTA network.
  • Managed different flavors of firewalls: Juniper, Checkpoint, Palo alto, PIX.
  • Local in MI available for the Metro Detroit area.
  • AND many others………See technical skills and experience in the sections below

TECHNICAL SKILLS:

  • DameWare Remote Administration
  • Dell Blade M600/M610
  • Dell EqualLogic PS5000E and MD3000
  • Dell PowerEdge 2950 Servers
  • FAS250/FAS270
  • Hyper V
  • IBM QRadar
  • Splunk
  • Cylance AV
  • Symantec DLP
  • Symantec ATP
  • Cisco Source Fire
  • Cisco AMP
  • Fire Eye Threat Analysis Platform
  • Linux RHEL 4, 5, 6, 7
  • Linux SLES 11
  • MS Exchange Servers
  • NetApp Filer Storage
  • Confidential Servers
  • Symantec Backup Exec Software
  • Symantec Ghost Solution
  • VMware ESX 3.0 running on HP BL20P
  • VMware vSphere 4.0
  • Windows Server, 2000, 2008R2, 2012R2
  • Windows Server NT
  • Windows Terminal Servers 2003, 2008.
  • Palo Alto Firewall.
  • Juniper Firewall
  • Checkpoint Firewall.
  • Windows Client XP,7, 8.1, 10

PROFESSIONAL EXPERIENCE:

Confidential, Auburn Hills, MI

Certified Security Analyst

Responsibilities:

  • Monitor SEIM and other Systems for anomalous events and respond in a timely manner.
  • Identify, verify, and respond to anomalous activity or security events on NAFTA network.
  • Monitor, review, and respond to Content Management alerts and logs.
  • Review and respond to firewall and IPS security alerts.
  • Analyze, verify, and respond to AV and Malware events on NAFTA workstations and servers.
  • Respond appropriately to security events. Coordinate with other NAFTA teams for investigation and remediation.
  • Analyze, verify, and respond to AV and Malware events on NAFTA workstations and servers.
  • Monitor and respond to Data Loss Prevention events and escalate where necessary
  • Identify, coordinate, and correct users in security policy violations.
  • Documenting security procedures.
  • Respond appropriately to security events.
  • System Abuse monitoring and management.
  • Coordinate with other NAFTA teams for investigation and remediation.
  • Using the following systems / tools to accomplish what’s mentioned above: Cisco SourceFire IPS/IDS, IBM QRadar, Splunk, Symantec DLP, Infoblox / IPAM DNS/DHCP Management Console, Cisco Prime Infrastructure, FireEye, Cartographer, NetScout nGinues, Symantec SEP, Symantec ATP (Advance Threat Protection), Cisco AMP (Advance Malware Protection).

Confidential, Detroit, MI

Information Security Engineer

Responsibilities:

  • Analyze information to evaluate the effectiveness of controls, determine the accuracy of reports, and monitor the efficiency and security of operations.
  • Participate in the domain’s architecture governance process.
  • Review exceptions and make recommendations to architectural standards at a domain level.
  • Analyze the current architecture to identify weaknesses and develop opportunities for improvements.
  • Consult with domain/project/program teams to ensure compatibility with existing solutions, infrastructure and services.
  • Consult on business - facing projects and maintain knowledge of their progress.
  • Ensure the conceptual completeness of the technical solution.
  • Work closely with project management to ensure alignment of plans with what is being delivered.
  • Provide recommendations based on business relevance, appropriate timing and deployment.
  • Recommend expenditures based on the size, scope, and cost of hardware and software components.
  • Working on design, architecture, integration and implementation of Cylance (Next-Generation Antivirus).

Confidential, Farmington Hills, MI

Information Security Analyst

Responsibilities:

  • Administered Symantec Messaging Gateway Email environment including SPAM filtering, compliance policies and email security 10.5 including building new servers plus responding and investigating virus infections.
  • Managed secure web gateway services using Blue Coat Proxy SG appliance + installation and preforming appliance upgrades.
  • Managed Symantec PGP Universal encryption infrastructure supporting Web Messenger, Whole Disk Encryption and Net Share (securing shared folders), including upgrading the env to new versions.
  • Installed, configured and administered Symantec Endpoint Protection providing Anti-Virus services for clients and servers. Including upgrading the env from version 11 to version 12.1.4.
  • Supported an internal Certificate Authority infrastructure using Active Directory Certificate Services based on Windows server 2008 R2 servers.
  • Supported privileged access management solution using Cyber-Ark Privileged Identity Management Suite.
  • Supported Juniper SA remote access infrastructure using Juniper SA 4500 in a cluster and RSA two factor authentication technologies.
  • Analyzed and understand security threats and to assist with incident investigations and remediation using SSIM (Symantec Security Information Manager).
  • Provided on-call support for Information Security technologies.
  • Managed Juniper SRX firewall (SRX 650) using Juniper Confidential .
  • Managed Palo Alto Firewalls (PA 5020), creating and deleting rules, configured interfaces, zones, security policies, worked with PA Panorama and troubleshooting + setting up the Lab environment.
  • Managed Qualys: Preformed vulnerability scans and created vulnerability reports.

Confidential

Enterprise Administrator, Warren, Michigan

Responsibilities:

  • Studied the MCITP Enterprise Administrator on Windows Server 2008 at Confidential .
  • Followed Hands-on training to renew my VCP certification from VCP 4.0 to VCP 5.0, Practiced in my virtual environment at home.
  • Studied Microsoft Exchange 2010 in my home lab.
  • Followed Cisco CCNA security training using Cisco ASA 5505.
  • Followed SRX training on Juniper SRX210h firewall.

Confidential

Network Security Analyst

Responsibilities:

  • Installed, managed, troubleshoot Microsoft ISA 2006 Firewalls.
  • Managed, monitored Sophos Antivirus environment on Windows clients and servers.
  • Responded on a daily- bases to all security events (ex: Infected systems).
  • Monitored Outpost24 vulnerability scanner appliance.
  • Managed Bluecoat Web filtering appliance and troubleshoot internet access issues.
  • Installed, configured and Managed Microsoft SCOM 2007R2 environment and deploying monitoring agents to Windows 2008, 2008R2 servers.
  • Developed, customized and applied Active directory group polices (Server hardening).
  • Installed and configured virtualization environment based on Microsoft Hyper-V on Windows 2008/2008R2, Creating VM templates and deploying VM’s using SCVMM 2008 (System Center Virtual Machine Manager).
  • Installed and configured new Blade servers and added them to the virtual environment.
  • Managed and monitored Dell EqualLogic Storage boxes.

Confidential

Network Security Engineer / System Admin

Responsibilities:

  • Performed System Administration for Linux Red hat RHEL 4.0 servers (installation, configuration, patching, deploying MySQL 5.0 servers on RHEL 4.0
  • Daily management of Juniper SA 2000 for remote access (Replaced the Cisco VPN Concentrator 3000).
  • Managed a cluster of 2 Juniper SSG 550 firewalls (Was installed as replacement of Checkpoint NGFP3) and Managed the Juniper Confidential Server based on Linux RHEL 4.0.
  • Installed and configured VMware ESX 3.0 on HP BL20 Blade servers and NetApp Filer 250 Including converting the physical servers to VM’s.
  • Configured Samba on SLES server and used it as file server.
  • Install and maintain MySQL on SLES, Patching the server and keeping it up and running.
  • Managed day to day operation of remote access solution (Cisco VPN Concentrator 3000).
  • Preformed vulnerability scan for the Windows env using LAN Guard Network Security Scanner.
  • Installed, configured Microsoft WSUS 2.0 for Patch deployments, and later upgraded it to WSUS 3.0.
  • Deployed Microsoft Windows patches services packs and hotfixes to the Windows Clients.
  • Installed, configured and managed Microsoft Proxy Server 2.0.
  • Installed, configured and monitored Snort IDS/IPS.
  • Deployed, managed and upgraded Confidential Corporate Edition 8.0 plus upgraded to version 9.0 and later to 10.0.
  • Administered (day to day operation) Bluecoat Proxy (replaced the Microsoft Proxy server 2.0).
  • Daily operation of managing Cisco Pix firewalls 506e and 515e for the daughter companies.
  • Migrated, configured and administered the Company Windows NT 4.0 PCS’s and BDC’s to Windows 2000 Active Directory.
  • Migrated, configured and managed 2 separate Exchange 5.5 Servers to Exchange 2003 in a cluster based on Windows Server 2003 Enterprise.
  • Installed and configured plus daily management for Backup solution based on Veritas Backup Exec 9.0.
  • Daily Administration of: Windows 2000 Print servers, Application Servers and Terminal server.
  • Acted as 3rd level support for user incidents.

We'd love your feedback!