We provide IT Staff Augmentation Services!

Aws Cloud Computing / It Security Analyst Resume

4.00/5 (Submit Your Rating)

Laurel, MarylanD

SUMMARY:

  • an IT engineer Looking forward to landing a new position in the area of AWS Solution Architecture and Setup & Configuration of AWS - Cloud Infrastructure, Systems & Software IT Architecture, IT Infrastructure and Security Compliance activities to develop secure, scalable & reliable data solutions moving data across systems in real-time.
  • Extensive AWS Cloud-based Hosting Solution Architecture AWS- EC2, S3, RDS, ELB, SQS
  • Migration from on-premise to AWS Cloud platform
  • High-Availability, Fault Tolerance, Scalability, prediction, Database Concepts, Systems
  • Develop Deployment Architecture for Automated Systems Deployment within Amazon-AWS
  • Excellent customer facing skills & communication skills
  • Document System Security Plan (SSP), Security Assessment Report (SAR), Plan of Action & Milestone (POA&M), Configuration Management Plan, Contingency Plan, Privacy Impact Analysis (PIA), Privacy Threshold Analysis (PTA)
  • Oracle Database Administration, Database Design and Database Security
  • Familiarity with Docker Containers and Kubernetes containers

PROFESSIONAL EXPERIENCE:

AWS Cloud Computing / IT Security Analyst

Confidential, Laurel, Maryland

  • Launching Amazon EC2 Cloud Instances using Amazon Machine Images (Linux) and Configuring launched instances with respect to specific applications.
  • Migration to Cloud Platform
  • Installed application on AWS EC2 instances and configured the storage on S3 buckets.
  • Perform S3 buckets creation, policies and the IAM role based polices
  • Implemented and maintained the monitoring and alerting of production and corporate servers/storage using AWS Cloud watch
  • Build servers using AWS, importing volumes, launching EC2, RDS, creating security groups, auto-scaling, load balancers (ELBs) in the defined virtual private connection.
  • Identify vulnerabilities, recommend corrective measures and ensure the adequacy of existing information
  • Execute and support vulnerability assessments: vulnerability scanning, penetration testing, outcomes analysis, issues remediation.
  • Document deficiency findings in the remediation tracking spreadsheet.
  • Prepare detail practices and procedures on technical processes

AWS SOLUTION ARCHITECT / IT Security Analyst

Confidential, Beltsville, Maryland

  • Migration to AWS cloud platform
  • Launching Amazon EC2 Cloud Instances using Amazon Machine Images-AMIs (Linux) and Configuring launched instances with respect to specific applications.
  • Install application on AWS EC2 instances and configured on S3 bucket storage.
  • Perform S3 buckets creation, policies and the IAM role based polices
  • Implement and maintain the monitoring and alerting of production of corporate servers/storage using AWS Cloud watch
  • Build servers using AWS, importing volumes, launching EC2, RDS, creating security groups, auto-scaling, load balancers (ELBs) in the defined virtual private connection.
  • Conduct interview and examine documents to determine security controls implementation status and effectiveness using NIST 800-53a - assessment procedures.
  • Review organizational policies, procedures, plan addressing federal, state, laws and supporting mission and business functions.
  • Document security controls assessment in SAR, POA&M, SSP to obtain system ATO package.
  • Identify vulnerabilities, recommend corrective measures and ensure the adequacy of existing information security controls.
  • Use of Security Alert Systems - links and publications - such as US-CERT to maintain System good security posture
  • Execute and support vulnerability assessments: vulnerability scanning, penetration testing, outcomes analysis, issues remediation.
  • Review system security plan and implemented security controls in accordance with NIST 800-53 and 800-18 requirements
  • Document deficiency findings in the remediation tracking spreadsheet.
  • Prepare detail practices and procedures on technical processes
  • Conduct security assessment that includes SSP review, security controls verification/validation, vulnerability scan, and assessment documentation
  • Assess security controls to determine implementation, functionality, and effectiveness
  • Support the continuous monitoring effort through monthly vulnerability scan analysis, status reporting, and annual assessment. Scanning include (system scanning with Nessus and web scanning with Webinspect)
  • Participate in kick-off and close out meetings to summarize key findings and recommendations.

Database Administrator

Confidential, Silver Spring, Maryland

  • Collaborated with the System Administrator to configure any Hardware requirement and Software application that uses Oracle Database as background support.
  • Managed the Database users through profile, privileges and roles.
  • Collaborated with the analysis group and developer team to design optimal solutions of Oracle 9i, 10g, and 11g to provide High Availability (DATA GUARD, STREAMS, ASM, and RAC).
  • Designed and implemented sound backup policies (using RMAN, Operating System and, scripts) and recovery strategies (Flashback Technologies, Complete Recovery, incomplete recovery and standard RMAN recovery).
  • Migrated test environments to production environments (i.e. cloning, pointing to the production environment, or redeployment).

We'd love your feedback!