Information Security Cyber Threat Principal Analyst Resume
2.00/5 (Submit Your Rating)
SUMMARY:
- I am a security technology professional with over 20 years of Information Technology experience with a proven ability to provide quality results that fully supported the departmental and corporate objectives.
- I enjoy working in a team atmosphere, as well as, embracing opportunities that allow me to take ownership of solutions that help obtain departmental and corporate goals.
- I have experience with helping provide and execute on the IT Security Strategic Direction.
- I have worked with the Security Awareness Program, the Identity and Access Management Program, and currently with the Data Loss and Security Analytics Program.
- I have provided insight on various security operational activities and have developed multiple, demand intake, processes that have helped streamline the activities that Information Security supports.
- I am a big - picture focused, process-oriented IT Security Professional.
TECHNICAL EXPERIENCE:
Information Security Cyber Threat Principal Analyst
Confidential
Responsibilities:
- Created Demand Intake Process for multiple Information Security Departments using Sharepoint and Nintex forms and Workflows
- Administrator of the Securonix UEBA Enterprise and SNYPR applications.
- Responsible for creating and maintaining CYBER and DLP policies and Threat Models
- Created process to monitor current health of SYSLOG feeds.
- Administrator of the Banana Data Visualization Application.
- Created Operational and Administrative Dashboards in Tableau
- Instrumental in the implementation in the User and Entity Behavioral Analytics program
- Lead the implementation of Operational Dashboards utilizing data in Solr Indexes
- Assisted the ingestion of logs from various sources: Proxy logs, Asset logs, Associate HR data etc.
- Provided timely direction and support to ensure the Insider Threat project was completed on time.
- Setup and Installed, multi-node, Elasticsearch system.
- Setup and Installed single/node Hadoop server in the Test Environment.
- Created and Maintained, up-to-date, documentation on currently internal processes.
Information Security Relationship Manager
Confidential
Responsibilities:
- Acts as a single interface for internal and external audit and regulatory exams for Information security questions directed to the respective subsidiary.
- Acquired a thorough knowledge of LOB applications, including 3rd party-hosted, to ensure they are compliant with required security standards
Information Security Technologist
Confidential
Responsibilities:
- Administrator of the Oracle Enterprise Single Sign-on and Password Reset Applications.
- Data mined the Access Management application to create enterprise, compliance and operational reports..
- Created and customized internal operational metrics/ dashboards on both Oracle and SQL databases
- Managed implementation of enterprise password reset applications
Storage Engineer
Confidential
Responsibilities:
- Administrator of the Aptare, Storage reporting application
- Creator and Administrator of the SAN/NAS/and Backup Request process application.
- Improved insight to storage utilization through the use of Hitachi Capacity Report (Aptare) for reporting of our Confidential and backup systems
- Saved the company thousands of dollars of professional service fees by creating custom Aptare, storage reports. Improved insight to the daily cloning process by creating reports that showed % of savesets cloned and % of data cloned.
Cyber Threat Data Scientist/Manager
Confidential
Responsibilities:
- Administrator of the CIS, SharePoint server
- Improved internal process for the Information Security risk acceptance process
- Created a new, improved internal process for Firewall Service requests
- Created the Third-Party Risk Assessment Application
- Consulted with the different teams within Information Security to learn about internal processes
- Created business efficiencies by creating SharePoint workflows of varying complexity. Workflows were custom made through SharePoint Designer.
- Improved insight to operational processes by creating customized KPI dashboards for multiple CIS departments
IT Business Consultant
Confidential
Responsibilities:
- Responsible for the maintenance of the Confidential & Confidential IT Three-year Strategic Plan
- Database Administrator for the PSAG database; this database is used to keep up with the progress of all of the strategy’s and policies currently implemented or in the development pipeline.
- Department underwent a RIF
Systems Engineer
Confidential
Responsibilities:
- Responsible for researching, documenting and maintenance of Asset Management’s Test and Disaster
- Recovery platform for the Portfolio Accounting and Trading application, including internal and external connections and interfaces.
- Responsible for researching, evaluating, and recommending personal computer and server operating systems, related utilities, hardware, back-office systems or new technologies.
- Published all Advent Product applications onto Citrix Environment
- Designed and created an application to match current client names with the names on the Specially
- Designated Nationals List by the US Treasury Department ( Confidential Matching Application) currently in use
Regional Systems Administrator
Confidential
Responsibilities:
- Created business efficiency tools for the administration of the AD environment
- Infrastructure Team Lead (10-member team)
- Original member of the Active Directory domain administrators team
- Team leader for Server Acceptance
- Assure Daily backups (Full and Differential) Legato Networker
- Charter member of the IT Backup Team.
- Provide 3rd level desktop support to contracted support technicians
- Experienced with PERL Scripting
