Senior Cyber Security Consultant Resume
CORE COMPETENCIES INCLUDE:
- Network Scanning and Remediation Risk Management/Incident Response
- Administrative / Technical Support System Accreditation
- Hardware & Software Maintenance Insider Threat and Behavior Analysis
TECHNICAL SKILLS:
Tools: /Applications ArcSight HBSS IPSonar Insider Threat Detections Software Imperva WAF Bluecoat Web Proxy Lancope Threatstream Bright point Sentinel Nexpose Wildfire Invincia Cisco IronPort SMS SCCM Retrieval Ware Invincia Absolute Phish - Me Triage e-Discovery Tools e-Discovery Oxygen Clearwell Exterro Encase FTK Imager P2Commander Aid4Mail Paladin
PROFESSIONAL EXPERIENCE:
Confidential
Senior Cyber Security Consultant
Responsibilities:
- Responsible for Conducting and reviewing security assessments of client networks.
- Responsible for all endpoint protection of local assets.
- Built an assessment package to harden the current Confidential security posture.
- Responsible for the Data Security and Compliance of local systems.
- Responsible for Ransomware analysis of affected client machine to determine the appropriate level of a breach.
- Responsible for the collection, review, and transfer of all electronic data.
- Imaged and conducted examinations of cell phones, servers, and computers.
- Worked with client Attorneys to locate, recover and report on legal matters related to cyber security and forensics.
- Provide expertise to establish two new company offices to include: networking, hardware, and security systems.
- Met with potential new clients to explain the benefits of cyber security.
- Responsible for information security: Vulnerability management, security updates, and remediation of all networked systems.
Confidential, NJ
Cyber Security Analyst
Responsibilities:
- Responsible for tracking insider threat alerts involving PHI/PII information.
- Performed risk analysis and led remediation efforts for threats and vulnerabilities in response to industry news and vulnerability assessment tool results.
- Responsible for information security: Vulnerability management, scanning and remediation of all networked systems.
- Tested and created the mobile hardening policy for all cellular devices; Company owned and BYOD.
- Researched and documented briefings on threat reports and assessments.
- Created the Security Operations Center “runbook”, a concise procedural guide to handling common security events.
- Assisted in the researching of new security toolsets to include: next generation firewalls, Endpoint protection, Security Automation and threat intelligence collection/collaboration tools.
- Designed and initiated Insider threat monitoring policies and procedures for databases containing PHI/PII.
- Assisted with Social media exercises including the coding and development of security applications.
- Assisted the Special Investigations Unit (SIU) with internal employee fraud and misconduct investigations.
- Conducted forensic investigations for both employee fraud and malware analysis.
- Proactively protected PHI/PII through use of Data Loss Prevention (DLP.)
- Monitored for access and exfiltration of sensitive data.
- Built active content and logic in SIEM for existing and emerging monitored applications.
- Assisted with Symantec DLP Operational alerts, policies, monitoring, investigations and creating Reporting.
- Delivered onboarding and security training to new employees.
- Delivered weekly and monthly Security Metrics for the CEO and IT Stakeholders.
Confidential, NJ
Forensic Examiner in Training
Responsibilities:
- Perform forensic examinations on Cell Phones.
- Coordinate with IT Departments for data access support to include: files shares, exchange mailboxes, physical assets, and SharePoint.
- Ensure standard procedures for electronic discovery and litigation support are consistently applied across the life cycle of the case.
- Interface with e - Discovery vendors and in-house resources to perform collection, processing, review, and productions.
- Create Statistical report on collections for both internal and outside counsel to review.
- Manage the electronic data that is requested with the intent of using as evidence in civil and criminal legal cases.
- Responsible for the collection, review, and transfer of all electronic data.
Confidential
Information Systems Security Analyst
Responsibilities:
- Provided computer security incident response support to the Confidential bureau of Confidential .
- Collaborated with the Computer Technology Officer (CTO) to maintain and operate HBSS, which includes generating custom reports, host system monitoring, configuration, and maintenance.
- Established and maintained safeguards against unauthorized access, destruction, and loss or alteration of data.
- Researched and documented briefings on threat reports and assessments.
- Established network software parameters used for insider threat analysis; e.g., ArcSight security authorization tables, configuration definitions, and file access tables.
- Assist staff in defending assets from unauthorized and malicious activity & provide knowledge/expertise in personnel transfers.
- Monitored and evaluated system's compliance with IT security requirements in accordance with Intelligence community Directives (ICDs) 502/503, Committee on National Security Systems Instruction (CNSSI) 1253, and National Institute of Science and Technology (NIST.
- Configured and monitored Intrusion Detection Systems (IDS): read, interpret and analyze network traffic and related log files.
- Correlated data from multiple sources (IDS, IPS, HIDS, HIPS, ArcSight Logger & ESM, HBSS, DMZ logs), data acquired through computer forensics & situational awareness data sources, vulnerability repositories, cyber threat reports & prioritizes events for incident handling.
- Created network diagrams based on site topologies for use in identifying security flaws.
- Implemented policy and procedural controls covering physical security, application and data security, system software security, contingency planning, and compliance with personnel clearance procedures.
Confidential
Network Security Engineer
Responsibilities:
- Support the State Departments Hardware/Software/Network.
- Assisted the security team in monitoring using tools such as ArcSight.
- Responsible for maintaining, analyzing, and repairing all IT equipment in the Confidential space. This includes following NIST and DISA guidelines on hardening systems.
- Responsible for all cloned PCs; to include installation, patching, configuration and testing of the appropriate image for the specified DoS/ Confidential network.
- Upgraded all client machines and ensured that end client software “insider threat” software was installed and updated as per State Department security requirements.
- Supported State Department continuous monitoring efforts through administration and configuration of exchange and admin policies.
- Ensured insider threat software is properly communicating back with home server from end client image.
- Responsible for the Destruction of all equipment leaving the State Department Space to ensure data sanitation.
- Participated in soft network penetrations tests which entailed network sweeps, port discovery and light testing.
Confidential
Senior Network Technician
Responsibilities:
- Supported continuous monitoring efforts through administration and configuration of exchange and admin servers.
- Administered patch management of security suite of products to ensure compliance with security policy and accreditation standards.
- Support the Confidential ’s tier two Helpdesk for the Hoover building and external offices.
- Provide computer hardware support for Confidential clients in a Microsoft Networking environment, to include hardware and software problems on XP/2000.
- Support Confidential Facilities) with hardware relocation support for all internal/external Bureau offices in the DC/Northern Virginia area.
- Responsible for the Setup, configuration, management and maintenance of all HP, Cannon, and Xerox network printers.
- Install, configure, and support a variety of software packages to include: Microsoft Office, McAfee, Adobe Acrobat, Encryption Software, and Confidential required programs.
Confidential
Systems Engineer
Responsibilities:
- Supported the Office of the Inspector General’s Helpdesk.
- Provided computer hardware support for all clients in a Microsoft Networking environment, to include hardware and software problems on XP/VISTA/WINDOWS 7
- Responsible for the Setup, configuration, management and maintenance of all HP, Cannon, and Xerox network printers.
- Provided Asset Management for Confidential helpdesk, making sure all property is accounted and distributed to the correct client.
- Managed the tape backup of local and remote network servers: Generate daily reports that detail the status of daily and weekly backup successes and failures using the Backup Exec Utility.
- Managed the tape backup to protect the integrity of Confidential data by changing and storing tapes for purposes of restoring data. This includes management of the ninety day offsite storage and pickup.
- Configured and provided support for all BlackBerry handheld devices using the BlackBerry Enterprise server.
- Responsible for all cloned PCs; to include installation, patching, configuration and testing of the appropriate image for the specified Confidential /OJP network.
- Responsible for the creation, maintenance, and removal of network accounts and exchange mail accounts throughout the Confidential using Active Directory and exchange services.
- Install configure, test, and support a variety of software packages to include: Microsoft Office, McAfee, Adobe Acrobat, Encryption Software, and specific Confidential required programs.
- Install configure, and test system boards, networks interface cards (NICs), Printer and workstations Random Access Memory (RAM), disk and CD/DVD drives, and assorted peripherals.
Confidential
Technical Case Manager
Responsibilities:
- Responsible for supporting the International Terrorism Victim Expense Reimbursement Program ( Confidential )
- Assist claimants attempting to recover expenses incurred by terrorist acts.
- Communicated programs policies and processes to claimants and organizations.
- Responsible for performing quality assurance reviews of claimant applications and files.
- Corresponded with claimants, medical providers and law enforcement to verify all case information for assurance purposes.
- Implemented tracking system to track and document all communications with claimants for auditing and reporting for both electronic and hardcopy.
- Documented and created the standard policies and procedures used to process all claimant cases.
- Responsible for the creation and maintenance of all claim case files both electronic and hard copy.
- Responsible for mentoring coworkers in computer and software related problems.
- Responsible for the creation and submission of monthly technological progress reports.
- Responsible for the creation and submission of monthly Financial Reports.
- Responsible for processing all customer requests through General Dynamics Information Technology
- Responsible for the Development of all new documentation to be used in daily activities as requested by the Customer.