We provide IT Staff Augmentation Services!

Information Security Cyber Threat Principal Analyst Resume

2.00/5 (Submit Your Rating)

SUMMARY:

  • I am a security technology professional with over 20 years of Information Technology experience with a proven ability to provide quality results that fully supported the departmental and corporate objectives.
  • I enjoy working in a team atmosphere, as well as, embracing opportunities that allow me to take ownership of solutions that help obtain departmental and corporate goals.
  • I have experience with helping provide and execute on the IT Security Strategic Direction.
  • I have worked with the Security Awareness Program, the Identity and Access Management Program, and currently with the Data Loss and Security Analytics Program.
  • I have provided insight on various security operational activities and have developed multiple, demand intake, processes that have helped streamline the activities that Information Security supports.
  • I am a big - picture focused, process-oriented IT Security Professional.

TECHNICAL EXPERIENCE:

Information Security Cyber Threat Principal Analyst

Confidential

Responsibilities:

  • Created Demand Intake Process for multiple Information Security Departments using Sharepoint and Nintex forms and Workflows
  • Administrator of the Securonix UEBA Enterprise and SNYPR applications.
  • Responsible for creating and maintaining CYBER and DLP policies and Threat Models
  • Created process to monitor current health of SYSLOG feeds.
  • Administrator of the Banana Data Visualization Application.
  • Created Operational and Administrative Dashboards in Tableau
  • Instrumental in the implementation in the User and Entity Behavioral Analytics program
  • Lead the implementation of Operational Dashboards utilizing data in Solr Indexes
  • Assisted the ingestion of logs from various sources: Proxy logs, Asset logs, Associate HR data etc.
  • Provided timely direction and support to ensure the Insider Threat project was completed on time.
  • Setup and Installed, multi-node, Elasticsearch system.
  • Setup and Installed single/node Hadoop server in the Test Environment.
  • Created and Maintained, up-to-date, documentation on currently internal processes.

Information Security Relationship Manager

Confidential

Responsibilities:

  • Acts as a single interface for internal and external audit and regulatory exams for Information security questions directed to the respective subsidiary.
  • Acquired a thorough knowledge of LOB applications, including 3rd party-hosted, to ensure they are compliant with required security standards

Information Security Technologist

Confidential

Responsibilities:

  • Administrator of the Oracle Enterprise Single Sign-on and Password Reset Applications.
  • Data mined the Access Management application to create enterprise, compliance and operational reports..
  • Created and customized internal operational metrics/ dashboards on both Oracle and SQL databases
  • Managed implementation of enterprise password reset applications

Storage Engineer

Confidential

Responsibilities:

  • Administrator of the Aptare, Storage reporting application
  • Creator and Administrator of the SAN/NAS/and Backup Request process application.
  • Improved insight to storage utilization through the use of Hitachi Capacity Report (Aptare) for reporting of our Confidential and backup systems
  • Saved the company thousands of dollars of professional service fees by creating custom Aptare, storage reports. Improved insight to the daily cloning process by creating reports that showed % of savesets cloned and % of data cloned.

Cyber Threat Data Scientist/Manager

Confidential

Responsibilities:

  • Administrator of the CIS, SharePoint server
  • Improved internal process for the Information Security risk acceptance process
  • Created a new, improved internal process for Firewall Service requests
  • Created the Third-Party Risk Assessment Application
  • Consulted with the different teams within Information Security to learn about internal processes
  • Created business efficiencies by creating SharePoint workflows of varying complexity. Workflows were custom made through SharePoint Designer.
  • Improved insight to operational processes by creating customized KPI dashboards for multiple CIS departments

IT Business Consultant

Confidential

Responsibilities:

  • Responsible for the maintenance of the Confidential & Confidential IT Three-year Strategic Plan
  • Database Administrator for the PSAG database; this database is used to keep up with the progress of all of the strategy’s and policies currently implemented or in the development pipeline.
  • Department underwent a RIF

Systems Engineer

Confidential

Responsibilities:

  • Responsible for researching, documenting and maintenance of Asset Management’s Test and Disaster
  • Recovery platform for the Portfolio Accounting and Trading application, including internal and external connections and interfaces.
  • Responsible for researching, evaluating, and recommending personal computer and server operating systems, related utilities, hardware, back-office systems or new technologies.
  • Published all Advent Product applications onto Citrix Environment
  • Designed and created an application to match current client names with the names on the Specially
  • Designated Nationals List by the US Treasury Department ( Confidential Matching Application) currently in use

Regional Systems Administrator

Confidential

Responsibilities:

  • Created business efficiency tools for the administration of the AD environment
  • Infrastructure Team Lead (10-member team)
  • Original member of the Active Directory domain administrators team
  • Team leader for Server Acceptance
  • Assure Daily backups (Full and Differential) Legato Networker
  • Charter member of the IT Backup Team.
  • Provide 3rd level desktop support to contracted support technicians
  • Experienced with PERL Scripting

We'd love your feedback!