We provide IT Staff Augmentation Services!

Cyber Security Consultant Resume

2.00/5 (Submit Your Rating)

Reston, VirginiA

OBJECTIVE:

To obtain employment in Information Technology/ Cyber Security related position where training and skills will be used

SUMMARY:

  • Cyber Security Consultant/Cyber Security Analyst / Security Administrator /
  • Certified in CompTIA Security+ CE and now working on my CISSP
  • Certified in COMSEC account management (IAEC - 2112)
  • Certified in Information Assurance policy and technology course
  • Experienced Disaster recovery, DIACAP or RMF, C&A processing of DOD
  • Experience with COBIT, NIST 800-53, HIPAA Frameworks
  • Cryptography & Mail Security Applications (PKI, GPG, IPsec, ICMP, & IPX)
  • Windows Server 2012 and 2008 R2 (Active Directory, Microsoft Exchange)
  • N. Security and vulnerability scanning and Auditing tools (Nessus, Wireshark, Metasploit, and Air cracker, Back-box, N-stealth, Acunetix, N-map, and Check Point)

TECHNICAL SKILLS:

Experience in: Java, Oracle-PeopleSoft HCM security administration, & Microsoft.net ap Adobe Software (Acrobat, Pro, Photoshop, Flash, Illustrator, InDesign, & PageMaker)

Management: (Administration, Customer service, and Sales and Marketing experience)

Operating Systems: Solaris, Windows XP/Vista/7-10/ Jun, Cisco, and Linux OS

Networking: WAN/LAN protocols, servers, administration, and configuration, TCP/IP, FTP, DNS, SM, HTTPS setup, firewall configuration, VPN, AD domain registration network applications.

IT Service Management: (Remedy, Citric, and Bomgar)

Hardware: Dell, HP servers, desktop and laptop

Microsoft Office: (Word, Outlook, Excel, Access, PowerPoint, Publisher)

PROFESSIONAL EXPERIENCE:

Cyber Security Consultant

Confidential, Reston, Virginia

Responsibilities:

  • Worked as senior security consultant to clients implementing security systems
  • Installed Aunigma security software on client system as CIA verification process
  • Used a Windows and Linux OS to design a network architecture
  • Used PCI -DSS requirements implementation on client's system's structure
  • Worked on Stealth Cyber security product on Confidential VM environment
  • Conducted security risk and compliance assessments by linking legal & regulatory status
  • Worked in cloud security and management in cross -functional environment
  • Analyzed evaluated and recommend technical security solutions ISO 27002 standers
  • Implicated network security design of a system by making invisible from attack

Security Analyst/ ISSO

Confidential, Reston, Virginia

Responsibilities:

  • Worked on reviewing and remediating items found during vulnerability scanning
  • Used Checkpoint Firewalls to conduct network and system configuration including (firewall, proxy, content filtering, reverse-proxy, load balancing, network IPS/IDS, VPN, vulnerability scanning)
  • Configured multifactor authentication service for application such as VPN
  • Used security monitoring operation, methodology, and coordination tools.
  • Maintained security compliance with DISA Security Technical Implementation Guides (STIG)
  • Used ACAS and Nessus Vulnerability scanning tool to monitor potential security threat
  • Worked as Information Systems Security Officer (ISSO) as subject matter experts
  • Reviewed a threat in compliance with the information assurance vulnerability (LAVM) to DOD
  • Certified and worked as Alternate COMSEC custodian for the project
  • Experienced with the NIST Risk Management Framework in a complete work environment
  • Used Solaris, Redhat Linux, Windows in a virtualized environment
  • Experienced in designing IDS/IPS, firewall, and cryptographic devices for secure network
  • Used Windows event manage auditing tools to monitor system security activities.
  • Deployed patches on servers to configure on Solaris OS
  • Used ASA firewalls applications and McAfee Web Gateway for filtering network traffic
  • Worked on DISA and C&A configuration to DSS standards of Windows/Linux OS
  • Designed and implicated Patch Management Security Policy of the project

PKI Security Consultant/ Information Assurance Analyst

Confidential, Alexandria, VA

Responsibilities:

  • Developed and provided input on existing documentation in compliance with Confidential security policy and agency guidance and Federal Public Key Infrastructure ( FPKI )
  • Worked managing enterprise risk and NIST special publications
  • Assessed security program compliance, support program briefs, and coordinate and compile application security-related documentation for various applications
  • Created, maintained and updated A&A documentation and audited existing policy
  • Maintained System Security Plan (SSP), Plan of Action & Milestones (POA&M), Security Procedures, Implementation Guides, and other security documentation when necessary

Computer Security Specialist

Confidential, Washington DC

Responsibilities:

  • Worked with BCP (Business Continuity Plan) project management for disaster recovery
  • Worked as primary team lead in hardware and computer security
  • Implemented Winmagic encryption technology on computers and mobile devices.
  • Designed enterprise LAN network connectivity and configured security policies
  • Programmed telegram and voice over IP telephone and monitored users’ connectivity issues
  • Re-imaged and sanitized computer's hard drive and set to the original manufacturer program
  • Diagnosed government electronics devices and mapped to designated network group
  • Worked on data recovery including backup, offsite storage, and remote Journaling
  • Troubleshoot Windows and Mac OS hardware on client side

Enterprise System/Desk Support Specialist

Confidential, Washington DC

Responsibilities:

  • Assisted Headquarter Marine Corp in the administration of mission critical infrastructure.
  • Configured PKI certificate issues and managed access privileges authentication.
  • Responded PKI service tickets and assisted in the resetting of PKI certificate
  • Provided call support for AD and PKI services
  • Managed users to access DOD applications by connecting to classified & unclassified network
  • Remotely troubleshoot network connectivity issues and track using Remedy ticketing system
  • Was responsible for installing and uninstalling software applications using CIA trend.
  • Managed user's profile and changed customers rank and personal info in the GAL.
  • Assisted users using Outlook - Exchange Server and Internet Explorer technical issues.
  • Updated software applications and deployed system backup
  • Worked IP phones and fixed network connectivity issue using security parameters.
  • Escalated tickets to higher level IT service and provided resolutions
  • Used Active Directory and Microsoft Exchange services to enforce group and user's policy
  • Worked on account management by modifying DOD user’s profile
  • Used full Admin rights to restrict or allow software updates.

Computer & Security System Technician

Confidential, Gaithersburg, MD

Responsibilities:

  • Migrated new application and documents from laptop to a host station.
  • Configured iHubs, routers, and modems by configuring the devices to work with Confidential system
  • Troubleshoot printers, Fax machines, phone, and CCTV
  • Installed physical IDS, Motion detectors, and Sensors.
  • Set up emails encrypted using PKI and PGP
  • Implemented network security system parameters using active directory
  • Used Remedy tracking system to track networking technical issues.
  • Trained employee usage of electronic devices such as (laptops, iPods, and PDA’s)
  • Installed CCTVs and Alarm system (Motion Detectors, Fire, and Carbon monoxide)
  • Used VPN to access to the Confidential network using Citrix
  • Used Cisco VLan trunking to configure network security

Help Desk Analyst

Confidential, Falls Church VA

Responsibilities:

  • Used Remedy to assist Agents to solve technical difficulties regarding Health Care enrollment
  • Supported Agent/ brokers by resetting the password, unlocking account, and walking through the CMS (Center for Medicare and Medicaid) portal to complete the registration process.
  • Provided phone support in compliance with established policies and procedures by obtaining contractual Service Level Agreement (SLA) metrics.
  • Assisted bilingual clients by addressing their difficulties and helped with technical issues.
  • Used Five9 phone application system to monitor phone calls
  • Assisted the administrators and remote user workstations and resolution of remote connectivity issues
  • Provided helpdesk and email support for local and off-site users.
  • Reported and escalated potential problem cases to the Level II technicians or supervisors.

Cyber Security Analyst

Confidential, Philadelphia, PA

Responsibilities:

  • Configured and maintained security equipment and software including firewalls,Intrusion Detection Systems (IDS) and proxy servers using checkpoint software.
  • Utilized web security scanning tools such as (N-stealth, Acunetix,) to identify vulnerabilities
  • Used auditing tools such as SIEM (Security information Event Management)
  • Assisted in performing penetration testing with Senior Security Analyst and used social engineering techniques to find a weakness of the company.
  • Reported and escalated potential problem cases to the Level III Cybersecurity seam leads
  • Created and submitted detailed call logs by documenting TCP connectivity.
  • Performed customer support related projects assigned by management
  • Effectively communicated with the help desk supervisor regarding helpdesk related issues
  • Configured vulnerability assessment tools (Nmap)to perform vulnerability scanning on enterprise network
  • Used Splunk security controlling means to control database applications

Computer Technician & Graphics Designer

Confidential, Washington, DC

Responsibilities:

  • Provides telephone support in-person and remote support to end-users.
  • Worked in Java and PeopleSoft process
  • Liaised with clients to determine their requirements and budget
  • Integrated and migrated applications from development to operational environment.
  • Assembled computers and peripheral electronic devices.
  • Converted and Designed client proposals into complete design for print and production
  • Developed concepts of graphics and layouts for product illustrations, and company logos.
  • Assisted clients in advising proposals and formats by providing quality of service
  • Used remedy to follow-up and escalation the issue on a timely manner.

Computer Technician

Confidential, Bethesda, MD

Responsibilities:

  • Monitored and troubleshoot laptop & desktop computers.
  • Migrated document, files, and application from Windows 2000, XP to Windows 7
  • Upgraded software problems and settled up computer security measures
  • Installed software and applications on customer’s personal computer
  • Assisted with complaints, orders, errors, account questions, billing, cancellation, & other queries.
  • Ensure customer satisfaction through processing calls and customer service needs
  • Repaired computers by replacing LCD screens, motherboards, and keyboards, etc
  • Experienced into configuring and fixing printers of HP and Xerox printer models
  • Installed computers, TVs, smartphones, tablets, home phones, & electronic accessories.
  • Used vendor's website to order home accessories and unique custom made furniture's.
  • Results included consistently meeting sales goals and requirements for new credit card accounts; awarded cash bonus for performance and excellent customer service.

Education System Coordinator

Confidential

Responsibilities:

  • Coordinated educational sector and facilitate educational a projects successfully
  • Trained elementary instructors to familiarize with new technological of educational system
  • Created and implemented college teaching curriculum
  • Coordinated 3000 distance educating students
  • Provided classroom instruction to college students graphics design and information technology
  • Installed and repaired computer hardware and software.
  • Provided networking technical support to facilitate educational system
  • Developed, implemented, and maintained policies, procedures, and associated training plans for network administration and usage.
  • Operated and maintained LAN/WAN/MAN network infrastructure.
  • Provided maintenance and incident/problem resolution for network-related issues

We'd love your feedback!