We provide IT Staff Augmentation Services!

Security Engineer Resume

4.00/5 (Submit Your Rating)

Washington, DC

SUMMARY:

  • Talented results - oriented IT professional, with strong background based on in-depth training and experienced in applications and network security tools and technical skills in Windows Servers, Linux and Active Directory and LDAP. Solid knowledge of security scanning tools, policies, risks assessment and mitigating, troubleshooting, vulnerability management, event logs analysis, and best practices.
  • Proficiency in new technologies with over 12 years Information Technology experiences, in both medium and large government and private organizations.
  • Experienced and focused on customer satisfaction, analyzing their needs, and exceeding their expectations.

TECHNICAL SKILLS:

Identity Management, Authentication, Authorization, Encase, Access Control, Snort, Data Encryption, Web Inspect, Digital Certificates, TCP/IP, DNS, DHCP, LDAP,VPN, SSL, SSH, SFTP, PKI, Firewalls, Network IDS, FTK, Wireshark, Tripwire, Solarwinds, Nessus, McAfee FoundStone scanner, Tivoli Endpoint Manage (Big Fix) and Security Blanket.

PROFESSIONAL EXPERIENCE:

Confidential, Washington, DC

Security Engineer

Responsibilities:

  • Working at Confidential Enterprise SOC Division of Information Assurance ( Confidential ) providing immediate response to various security incidents, mostly the result of malware infections and investigating alerts created by SIEM tools such as QRadar, Splunk, and McAfee ePolicy Orchestrator through continuous monitoring, including malicious files uploads, compromised servers, workstations, keyloggers, SQL injections, unauthorized access and software. Investigated all compromised accounts, machines and audit logs review.
  • Prepared a full incident report, documenting all action, steps and procedure taken to contained the security incident, monitored security systems for any and all signs of hackers or fraudulent activity prepared after action report plan and create new security initiatives to prevent future incident.
  • Took all necessary preventive action to ensure security threats were not repeated.
  • Performed and coordinated change request, software certification, security assessment and identified any vulnerabilities and threats that may be introduced to the environment.
  • Performed day-to-day operation and maintenance on cyber engineering tools.
  • Initiate vulnerability scanning using Nessus Tenable Security Center for servers, host names, firewalls, routers and Confidential WebInspect for web application scanning.
  • Conducting and analyzing scan result and coordinate remediation plan with appropriate team.
  • Prepared enterprise weekly vulnerability status report on all assets, and identify missing security patches and compliance using Bigfix Web report.
  • Conducted technology evaluations, research and make recommendations.
  • Prepare risk assessment reports and provide recommendations to client.
  • Analyze penetration testing and vulnerability scan reports on all systems as required.
  • Create an incident ticket, document initial findings, from attacks including, malicious code, DoS and DDoS and monitor security events through Solarwind to detect an alert, and report all potential security incidents and event to prevent data lost.
  • Informed all departments on any potential new cyber threats and performed all necessary security patches and updates.

Confidential, Washington, DC

Information Security Specialist

Responsibilities:

  • Identified and tests vulnerabilities, analyze network traffic as well as conducts research, recommend corrective measure and ensure the adequacy of existing information security controls and standard operating procedure (SOPs).
  • Protecting critical infrastructures from physical and cyber threats. Conducting vulnerability assessments and identifying threats.
  • Continuous monitoring systems log files, Nodes, servers, IP addresses through Tripwire Enterprise 8.4.
  • Also uses Solarwinds network performance monitor to access and monitor Web application servers, SQL databases, and windows servers.
  • Coordinated findings, remedial solutions, and manage plans of action and milestones (POA&M), working with Confidential Cyber Security Assessment and Management (CSAM) with applications in compliance with relevant Federal guidance (e.g. Confidential SP 800-37, 800-53, etc.) and Federal Information Security Management Act (FISMA).
  • Provided technical assistance and systems support for clients.
  • Provide network, systems, and security experience, knowledge, and solutions in a system and network-diverse environment.
  • Using Security Blanket enterprise 4.1 to create security policies, schedule assessments, lockdowns and performs scanning and reporting on the Red Hat Linux and Solaris.
  • Using AECM Bigfix for patch deployment, security configuration and asset management.
  • Installed new software releases and system upgrades, evaluates and installs patches on servers, and resolves software related problems.
  • Performs system backups and recovery and group policy. Maintains data files and monitors system configuration to ensure data integrity.

Confidential, Arlington, Virginia

Computer Support Analyst

Responsibilities:

  • Provides functional technical support, troubleshooting and diagnosing hardware and software problems, for Confidential desktops and Confidential laptops and remote support systems.
  • Worked with Active Directory to add computers to domain in the OU container, creating user account and setting up group policy, disable term user within Active Directory. Managed several critical systems and updating security patches Window XP, encrypting client hard drive with Pointsec.
  • Worked with windows servers 2003 installation, configuration and applying patches and updates to servers.
  • Managed and maintaining accurate and complete up-to-date assets inventory records of all desktops, laptops scanners and other equipment. Assemble, deployed and troubleshoot Confidential printers in network environments. Using the Confidential Web Jet Admin tools.
  • Configured blackberry using Enterprise server for clients. Installed users application updating and resolving open tickets using Remedy 7.0
  • Support all Confidential Executive officers and chiefs.
  • Imaging, data backup and transfers user data using USMT. MacAfee Antivirus, Microsoft window update and service pack.
  • Configuring MS Outlook 2003 update for MS Exchange server personal folders and user profile.
  • Providing VPN support to users at remote locations, wireless supports services.

Confidential, Silver Spring, Maryland

Lead Lotus Notes Support Specialist

Responsibilities:

  • Performed systems configuration, migration using common migrating tool CMT managing numerous conversions and upgrading of e-mail platforms from Confidential GroupWise to Lotus Notes 6.5.2.
  • Extensive uses of Remedy 6.5 ticketing and remotely access users’ computer via Dameware.
  • Troubleshooting and achieving an excellent record of efficiently handling calls, documentation and providing solution and meeting deadline.
  • Troubleshoot and configured Lotus Notes for user connecting through Domino Server creating new and modifying user account, resetting password and setting archives database.
  • Installed Lotus Notes client on user PCs locate note id files and archived folder for user during configurations.

Confidential, Mclean, Virginia

IT Support Specialist

Responsibilities:

  • Performed higher degree of second-level support for all PC users, hardware and software issues for clients.
  • Responsible for receiving desk calls, emails, and voicemail with objective of resolving problems on initial contact via phone, remote access using Altiris carbon copy.
  • Worked with Novel Netware and Lotus Notes 6.5.5 complete set-up, remedy ticketing, troubleshooting and mapping user to network and share drives updates their personal profile. Performed data transfer, system backup and restore from user hard drive on timely manner.
  • Data transfer and e-mail account management, backup files and folder. Handle incoming call using remedy ticketing systems.
  • Connect network printers and other hardware. worked with Microsoft exchange server and outlook 2003 configuration.
  • Setting up VPN access to Confidential LAN for remote user using their secure id card for network connections.
  • Worked as many as 100 tickets per week achieving an excellent record of efficiently handling calls, providing solutions, and meeting company quotas.

We'd love your feedback!