We provide IT Staff Augmentation Services!

Senior Cyber Security Consultant Resume

3.00/5 (Submit Your Rating)

CORE COMPETENCIES INCLUDE:

  • Network Scanning and Remediation Risk Management/Incident Response
  • Administrative / Technical Support System Accreditation
  • Hardware & Software Maintenance Insider Threat and Behavior Analysis

TECHNICAL SKILLS:

Tools: /Applications ArcSight HBSS IPSonar Insider Threat Detections Software Imperva WAF Bluecoat Web Proxy Lancope Threatstream Bright point Sentinel Nexpose Wildfire Invincia Cisco IronPort SMS SCCM Retrieval Ware Invincia Absolute Phish - Me Triage e-Discovery Tools e-Discovery Oxygen Clearwell Exterro Encase FTK Imager P2Commander Aid4Mail Paladin

PROFESSIONAL EXPERIENCE:

Confidential

Senior Cyber Security Consultant

Responsibilities:

  • Responsible for Conducting and reviewing security assessments of client networks.
  • Responsible for all endpoint protection of local assets.
  • Built an assessment package to harden the current Confidential security posture.
  • Responsible for the Data Security and Compliance of local systems.
  • Responsible for Ransomware analysis of affected client machine to determine the appropriate level of a breach.
  • Responsible for the collection, review, and transfer of all electronic data.
  • Imaged and conducted examinations of cell phones, servers, and computers.
  • Worked with client Attorneys to locate, recover and report on legal matters related to cyber security and forensics.
  • Provide expertise to establish two new company offices to include: networking, hardware, and security systems.
  • Met with potential new clients to explain the benefits of cyber security.
  • Responsible for information security: Vulnerability management, security updates, and remediation of all networked systems.

Confidential, NJ

Cyber Security Analyst

Responsibilities:

  • Responsible for tracking insider threat alerts involving PHI/PII information.
  • Performed risk analysis and led remediation efforts for threats and vulnerabilities in response to industry news and vulnerability assessment tool results.
  • Responsible for information security: Vulnerability management, scanning and remediation of all networked systems.
  • Tested and created the mobile hardening policy for all cellular devices; Company owned and BYOD.
  • Researched and documented briefings on threat reports and assessments.
  • Created the Security Operations Center “runbook”, a concise procedural guide to handling common security events.
  • Assisted in the researching of new security toolsets to include: next generation firewalls, Endpoint protection, Security Automation and threat intelligence collection/collaboration tools.
  • Designed and initiated Insider threat monitoring policies and procedures for databases containing PHI/PII.
  • Assisted with Social media exercises including the coding and development of security applications.
  • Assisted the Special Investigations Unit (SIU) with internal employee fraud and misconduct investigations.
  • Conducted forensic investigations for both employee fraud and malware analysis.
  • Proactively protected PHI/PII through use of Data Loss Prevention (DLP.)
  • Monitored for access and exfiltration of sensitive data.
  • Built active content and logic in SIEM for existing and emerging monitored applications.
  • Assisted with Symantec DLP Operational alerts, policies, monitoring, investigations and creating Reporting.
  • Delivered onboarding and security training to new employees.
  • Delivered weekly and monthly Security Metrics for the CEO and IT Stakeholders.

Confidential, NJ

Forensic Examiner in Training

Responsibilities:

  • Perform forensic examinations on Cell Phones.
  • Coordinate with IT Departments for data access support to include: files shares, exchange mailboxes, physical assets, and SharePoint.
  • Ensure standard procedures for electronic discovery and litigation support are consistently applied across the life cycle of the case.
  • Interface with e - Discovery vendors and in-house resources to perform collection, processing, review, and productions.
  • Create Statistical report on collections for both internal and outside counsel to review.
  • Manage the electronic data that is requested with the intent of using as evidence in civil and criminal legal cases.
  • Responsible for the collection, review, and transfer of all electronic data.

Confidential

Information Systems Security Analyst

Responsibilities:

  • Provided computer security incident response support to the Confidential bureau of Confidential .
  • Collaborated with the Computer Technology Officer (CTO) to maintain and operate HBSS, which includes generating custom reports, host system monitoring, configuration, and maintenance.
  • Established and maintained safeguards against unauthorized access, destruction, and loss or alteration of data.
  • Researched and documented briefings on threat reports and assessments.
  • Established network software parameters used for insider threat analysis; e.g., ArcSight security authorization tables, configuration definitions, and file access tables.
  • Assist staff in defending assets from unauthorized and malicious activity & provide knowledge/expertise in personnel transfers.
  • Monitored and evaluated system's compliance with IT security requirements in accordance with Intelligence community Directives (ICDs) 502/503, Committee on National Security Systems Instruction (CNSSI) 1253, and National Institute of Science and Technology (NIST.
  • Configured and monitored Intrusion Detection Systems (IDS): read, interpret and analyze network traffic and related log files.
  • Correlated data from multiple sources (IDS, IPS, HIDS, HIPS, ArcSight Logger & ESM, HBSS, DMZ logs), data acquired through computer forensics & situational awareness data sources, vulnerability repositories, cyber threat reports & prioritizes events for incident handling.
  • Created network diagrams based on site topologies for use in identifying security flaws.
  • Implemented policy and procedural controls covering physical security, application and data security, system software security, contingency planning, and compliance with personnel clearance procedures.

Confidential

Network Security Engineer

Responsibilities:

  • Support the State Departments Hardware/Software/Network.
  • Assisted the security team in monitoring using tools such as ArcSight.
  • Responsible for maintaining, analyzing, and repairing all IT equipment in the Confidential space. This includes following NIST and DISA guidelines on hardening systems.
  • Responsible for all cloned PCs; to include installation, patching, configuration and testing of the appropriate image for the specified DoS/ Confidential network.
  • Upgraded all client machines and ensured that end client software “insider threat” software was installed and updated as per State Department security requirements.
  • Supported State Department continuous monitoring efforts through administration and configuration of exchange and admin policies.
  • Ensured insider threat software is properly communicating back with home server from end client image.
  • Responsible for the Destruction of all equipment leaving the State Department Space to ensure data sanitation.
  • Participated in soft network penetrations tests which entailed network sweeps, port discovery and light testing.

Confidential

Senior Network Technician

Responsibilities:

  • Supported continuous monitoring efforts through administration and configuration of exchange and admin servers.
  • Administered patch management of security suite of products to ensure compliance with security policy and accreditation standards.
  • Support the Confidential ’s tier two Helpdesk for the Hoover building and external offices.
  • Provide computer hardware support for Confidential clients in a Microsoft Networking environment, to include hardware and software problems on XP/2000.
  • Support Confidential Facilities) with hardware relocation support for all internal/external Bureau offices in the DC/Northern Virginia area.
  • Responsible for the Setup, configuration, management and maintenance of all HP, Cannon, and Xerox network printers.
  • Install, configure, and support a variety of software packages to include: Microsoft Office, McAfee, Adobe Acrobat, Encryption Software, and Confidential required programs.

Confidential

Systems Engineer

Responsibilities:

  • Supported the Office of the Inspector General’s Helpdesk.
  • Provided computer hardware support for all clients in a Microsoft Networking environment, to include hardware and software problems on XP/VISTA/WINDOWS 7
  • Responsible for the Setup, configuration, management and maintenance of all HP, Cannon, and Xerox network printers.
  • Provided Asset Management for Confidential helpdesk, making sure all property is accounted and distributed to the correct client.
  • Managed the tape backup of local and remote network servers: Generate daily reports that detail the status of daily and weekly backup successes and failures using the Backup Exec Utility.
  • Managed the tape backup to protect the integrity of Confidential data by changing and storing tapes for purposes of restoring data. This includes management of the ninety day offsite storage and pickup.
  • Configured and provided support for all BlackBerry handheld devices using the BlackBerry Enterprise server.
  • Responsible for all cloned PCs; to include installation, patching, configuration and testing of the appropriate image for the specified Confidential /OJP network.
  • Responsible for the creation, maintenance, and removal of network accounts and exchange mail accounts throughout the Confidential using Active Directory and exchange services.
  • Install configure, test, and support a variety of software packages to include: Microsoft Office, McAfee, Adobe Acrobat, Encryption Software, and specific Confidential required programs.
  • Install configure, and test system boards, networks interface cards (NICs), Printer and workstations Random Access Memory (RAM), disk and CD/DVD drives, and assorted peripherals.

Confidential

Technical Case Manager

Responsibilities:

  • Responsible for supporting the International Terrorism Victim Expense Reimbursement Program ( Confidential )
  • Assist claimants attempting to recover expenses incurred by terrorist acts.
  • Communicated programs policies and processes to claimants and organizations.
  • Responsible for performing quality assurance reviews of claimant applications and files.
  • Corresponded with claimants, medical providers and law enforcement to verify all case information for assurance purposes.
  • Implemented tracking system to track and document all communications with claimants for auditing and reporting for both electronic and hardcopy.
  • Documented and created the standard policies and procedures used to process all claimant cases.
  • Responsible for the creation and maintenance of all claim case files both electronic and hard copy.
  • Responsible for mentoring coworkers in computer and software related problems.
  • Responsible for the creation and submission of monthly technological progress reports.
  • Responsible for the creation and submission of monthly Financial Reports.
  • Responsible for processing all customer requests through General Dynamics Information Technology
  • Responsible for the Development of all new documentation to be used in daily activities as requested by the Customer.

We'd love your feedback!