Cyber Security Consultant Resume
Reston, VirginiA
OBJECTIVE:
To obtain employment in Information Technology/ Cyber Security related position where training and skills will be used
SUMMARY:
- Cyber Security Consultant/Cyber Security Analyst / Security Administrator /
- Certified in CompTIA Security+ CE and now working on my CISSP
- Certified in COMSEC account management (IAEC - 2112)
- Certified in Information Assurance policy and technology course
- Experienced Disaster recovery, DIACAP or RMF, C&A processing of DOD
- Experience with COBIT, NIST 800-53, HIPAA Frameworks
- Cryptography & Mail Security Applications (PKI, GPG, IPsec, ICMP, & IPX)
- Windows Server 2012 and 2008 R2 (Active Directory, Microsoft Exchange)
- N. Security and vulnerability scanning and Auditing tools (Nessus, Wireshark, Metasploit, and Air cracker, Back-box, N-stealth, Acunetix, N-map, and Check Point)
TECHNICAL SKILLS:
Experience in: Java, Oracle-PeopleSoft HCM security administration, & Microsoft.net ap Adobe Software (Acrobat, Pro, Photoshop, Flash, Illustrator, InDesign, & PageMaker)
Management: (Administration, Customer service, and Sales and Marketing experience)
Operating Systems: Solaris, Windows XP/Vista/7-10/ Jun, Cisco, and Linux OS
Networking: WAN/LAN protocols, servers, administration, and configuration, TCP/IP, FTP, DNS, SM, HTTPS setup, firewall configuration, VPN, AD domain registration network applications.
IT Service Management: (Remedy, Citric, and Bomgar)
Hardware: Dell, HP servers, desktop and laptop
Microsoft Office: (Word, Outlook, Excel, Access, PowerPoint, Publisher)
PROFESSIONAL EXPERIENCE:
Cyber Security Consultant
Confidential, Reston, Virginia
Responsibilities:
- Worked as senior security consultant to clients implementing security systems
- Installed Aunigma security software on client system as CIA verification process
- Used a Windows and Linux OS to design a network architecture
- Used PCI -DSS requirements implementation on client's system's structure
- Worked on Stealth Cyber security product on Confidential VM environment
- Conducted security risk and compliance assessments by linking legal & regulatory status
- Worked in cloud security and management in cross -functional environment
- Analyzed evaluated and recommend technical security solutions ISO 27002 standers
- Implicated network security design of a system by making invisible from attack
Security Analyst/ ISSO
Confidential, Reston, Virginia
Responsibilities:
- Worked on reviewing and remediating items found during vulnerability scanning
- Used Checkpoint Firewalls to conduct network and system configuration including (firewall, proxy, content filtering, reverse-proxy, load balancing, network IPS/IDS, VPN, vulnerability scanning)
- Configured multifactor authentication service for application such as VPN
- Used security monitoring operation, methodology, and coordination tools.
- Maintained security compliance with DISA Security Technical Implementation Guides (STIG)
- Used ACAS and Nessus Vulnerability scanning tool to monitor potential security threat
- Worked as Information Systems Security Officer (ISSO) as subject matter experts
- Reviewed a threat in compliance with the information assurance vulnerability (LAVM) to DOD
- Certified and worked as Alternate COMSEC custodian for the project
- Experienced with the NIST Risk Management Framework in a complete work environment
- Used Solaris, Redhat Linux, Windows in a virtualized environment
- Experienced in designing IDS/IPS, firewall, and cryptographic devices for secure network
- Used Windows event manage auditing tools to monitor system security activities.
- Deployed patches on servers to configure on Solaris OS
- Used ASA firewalls applications and McAfee Web Gateway for filtering network traffic
- Worked on DISA and C&A configuration to DSS standards of Windows/Linux OS
- Designed and implicated Patch Management Security Policy of the project
PKI Security Consultant/ Information Assurance Analyst
Confidential, Alexandria, VA
Responsibilities:
- Developed and provided input on existing documentation in compliance with Confidential security policy and agency guidance and Federal Public Key Infrastructure ( FPKI )
- Worked managing enterprise risk and NIST special publications
- Assessed security program compliance, support program briefs, and coordinate and compile application security-related documentation for various applications
- Created, maintained and updated A&A documentation and audited existing policy
- Maintained System Security Plan (SSP), Plan of Action & Milestones (POA&M), Security Procedures, Implementation Guides, and other security documentation when necessary
Computer Security Specialist
Confidential, Washington DC
Responsibilities:
- Worked with BCP (Business Continuity Plan) project management for disaster recovery
- Worked as primary team lead in hardware and computer security
- Implemented Winmagic encryption technology on computers and mobile devices.
- Designed enterprise LAN network connectivity and configured security policies
- Programmed telegram and voice over IP telephone and monitored users’ connectivity issues
- Re-imaged and sanitized computer's hard drive and set to the original manufacturer program
- Diagnosed government electronics devices and mapped to designated network group
- Worked on data recovery including backup, offsite storage, and remote Journaling
- Troubleshoot Windows and Mac OS hardware on client side
Enterprise System/Desk Support Specialist
Confidential, Washington DC
Responsibilities:
- Assisted Headquarter Marine Corp in the administration of mission critical infrastructure.
- Configured PKI certificate issues and managed access privileges authentication.
- Responded PKI service tickets and assisted in the resetting of PKI certificate
- Provided call support for AD and PKI services
- Managed users to access DOD applications by connecting to classified & unclassified network
- Remotely troubleshoot network connectivity issues and track using Remedy ticketing system
- Was responsible for installing and uninstalling software applications using CIA trend.
- Managed user's profile and changed customers rank and personal info in the GAL.
- Assisted users using Outlook - Exchange Server and Internet Explorer technical issues.
- Updated software applications and deployed system backup
- Worked IP phones and fixed network connectivity issue using security parameters.
- Escalated tickets to higher level IT service and provided resolutions
- Used Active Directory and Microsoft Exchange services to enforce group and user's policy
- Worked on account management by modifying DOD user’s profile
- Used full Admin rights to restrict or allow software updates.
Computer & Security System Technician
Confidential, Gaithersburg, MD
Responsibilities:
- Migrated new application and documents from laptop to a host station.
- Configured iHubs, routers, and modems by configuring the devices to work with Confidential system
- Troubleshoot printers, Fax machines, phone, and CCTV
- Installed physical IDS, Motion detectors, and Sensors.
- Set up emails encrypted using PKI and PGP
- Implemented network security system parameters using active directory
- Used Remedy tracking system to track networking technical issues.
- Trained employee usage of electronic devices such as (laptops, iPods, and PDA’s)
- Installed CCTVs and Alarm system (Motion Detectors, Fire, and Carbon monoxide)
- Used VPN to access to the Confidential network using Citrix
- Used Cisco VLan trunking to configure network security
Help Desk Analyst
Confidential, Falls Church VA
Responsibilities:
- Used Remedy to assist Agents to solve technical difficulties regarding Health Care enrollment
- Supported Agent/ brokers by resetting the password, unlocking account, and walking through the CMS (Center for Medicare and Medicaid) portal to complete the registration process.
- Provided phone support in compliance with established policies and procedures by obtaining contractual Service Level Agreement (SLA) metrics.
- Assisted bilingual clients by addressing their difficulties and helped with technical issues.
- Used Five9 phone application system to monitor phone calls
- Assisted the administrators and remote user workstations and resolution of remote connectivity issues
- Provided helpdesk and email support for local and off-site users.
- Reported and escalated potential problem cases to the Level II technicians or supervisors.
Cyber Security Analyst
Confidential, Philadelphia, PA
Responsibilities:
- Configured and maintained security equipment and software including firewalls,Intrusion Detection Systems (IDS) and proxy servers using checkpoint software.
- Utilized web security scanning tools such as (N-stealth, Acunetix,) to identify vulnerabilities
- Used auditing tools such as SIEM (Security information Event Management)
- Assisted in performing penetration testing with Senior Security Analyst and used social engineering techniques to find a weakness of the company.
- Reported and escalated potential problem cases to the Level III Cybersecurity seam leads
- Created and submitted detailed call logs by documenting TCP connectivity.
- Performed customer support related projects assigned by management
- Effectively communicated with the help desk supervisor regarding helpdesk related issues
- Configured vulnerability assessment tools (Nmap)to perform vulnerability scanning on enterprise network
- Used Splunk security controlling means to control database applications
Computer Technician & Graphics Designer
Confidential, Washington, DC
Responsibilities:
- Provides telephone support in-person and remote support to end-users.
- Worked in Java and PeopleSoft process
- Liaised with clients to determine their requirements and budget
- Integrated and migrated applications from development to operational environment.
- Assembled computers and peripheral electronic devices.
- Converted and Designed client proposals into complete design for print and production
- Developed concepts of graphics and layouts for product illustrations, and company logos.
- Assisted clients in advising proposals and formats by providing quality of service
- Used remedy to follow-up and escalation the issue on a timely manner.
Computer Technician
Confidential, Bethesda, MD
Responsibilities:
- Monitored and troubleshoot laptop & desktop computers.
- Migrated document, files, and application from Windows 2000, XP to Windows 7
- Upgraded software problems and settled up computer security measures
- Installed software and applications on customer’s personal computer
- Assisted with complaints, orders, errors, account questions, billing, cancellation, & other queries.
- Ensure customer satisfaction through processing calls and customer service needs
- Repaired computers by replacing LCD screens, motherboards, and keyboards, etc
- Experienced into configuring and fixing printers of HP and Xerox printer models
- Installed computers, TVs, smartphones, tablets, home phones, & electronic accessories.
- Used vendor's website to order home accessories and unique custom made furniture's.
- Results included consistently meeting sales goals and requirements for new credit card accounts; awarded cash bonus for performance and excellent customer service.
Education System Coordinator
Confidential
Responsibilities:
- Coordinated educational sector and facilitate educational a projects successfully
- Trained elementary instructors to familiarize with new technological of educational system
- Created and implemented college teaching curriculum
- Coordinated 3000 distance educating students
- Provided classroom instruction to college students graphics design and information technology
- Installed and repaired computer hardware and software.
- Provided networking technical support to facilitate educational system
- Developed, implemented, and maintained policies, procedures, and associated training plans for network administration and usage.
- Operated and maintained LAN/WAN/MAN network infrastructure.
- Provided maintenance and incident/problem resolution for network-related issues