We provide IT Staff Augmentation Services!

Security Consultant Resume

4.00/5 (Submit Your Rating)

SUMMARY:

Principal Security position in a diverse Corporation where I can use my trouble - shooting and Networking skills effectively.

SKILLS:

Computer languages: C++, ADA, And HTML

Scripting Languages: Batch, Bash, VBS

Computer skills: Operating Systems Linux - Ubuntu/Debian, Red Hat, Windows NT, 2000/Advance Server, 2003, Terminal Server, Exchange 55, Active Directory

Virtual Technology: VMware, Virtual BOX, KVM

IDS/IPS/DLP: Snort/Source fire (IDS/IPS), Observer, Fidelis (XDS), EPO server

Vulnerability Software: Harris Stat, Retina, Nessus, MVM, Policy Auditor

Confidential: Confidential, Alien Vault SEIM, Arcsight SEIM, SplunkEnpoint Security Confidential, OSSEC (HIDS)

Network Monitoring tools: Nagios, Netcool, Mercury Interactive (Topaz)

Remote Technology: Tivoli, VNC, Sony TL 150 VTC, Tandberg VTC, Citrix Client

Other Security Software: Nmap, Centralized log management (Syslog), TCPdump, Wireshark, IPTABLES, SSH, Putty, Confidential 3000 VPN, Alcatel VPN Client, Netscreen VPN client, Smoothwall, PF firewall, Astaro firewall

General Networking Knowledge: TCP\IP, DNS, DHCP, WINS, SNMP, OSI Model

EXPERIENCE:

Confidential

Security Consultant

Responsibilities:

  • Performed deployment of Confidential Security information and Event management systems ( Confidential ).
  • Performed optimization of Confidential appliances and rule tuning.
  • Improved security architecture of client’s enterprise by ensuring best practices are followed with product deployment.
  • Performed preliminary incident response for customers
  • Performed remote assistance for clients.
  • Traveled on site to assist clients in deployment and configuration of Confidential products.
  • Analyze technical/integration requirements and develop effective technical solutions for Customer review and consideration, and once approved, integrate into the Customer’s infrastructure
  • Provide recommendations for policy refinement and best business practices to operation teams for consideration
  • Prepare and deliver documentation that will allow for accurate implementation/operation of new capabilities supporting live operating environments
  • Address all technical problems associated with Confidential software and provide proactive support with direct reach back into Confidential Technical Support and Confidential Labs

Confidential

Security Consultant

Responsibilities:

  • Performed data migration for version 4.x to 5.x on Confidential series 2 and 3 appliances.
  • Performed optimization of Confidential sensors and rule tuning
  • Developed low level design documentation for clients
  • Develop network implementation documentation for clients
  • Performed stress test for Confidential sensors
  • Performed high availability test on Confidential sensors
  • Performed remote assists to clients
  • Traveled on site to assist clients in deployment and configuration of Confidential products
  • Provide input to other cross-functional departments pertaining to prospect requests and product enhancements as needed

Confidential

Sr Security Administrator

Responsibilities:

  • Performed Arcsight log analysis
  • Monitored SOC security devices with Solarwinds
  • Performed ASA firewall administration and configuration
  • Performed MacAfee security gateway administration and configuration
  • Performed Microsoft ISA firewall administration and configuration
  • Performed Symantec Security suite administration and configuration
  • Remote assistance to VIP users for rapid resolution of software configuration errors

Confidential, MD

Senior Security Engineer

Responsibilities:

  • Reviewed network security architecture made improvements to increase the integrity of the design
  • Provided technical support for 100 windows 2008 servers for the deployment of Confidential across the enterprise
  • Organized the TLA stack of hub sites across the enterprise Assisted with the DIACAP process
  • Reviewed POAM’s, and assisted with policy creation such as incident handling, intrusion detection
  • Reviewed hardware/software configurations to ensure best security practices are implemented
  • Daily Confidential compliance checks

Confidential, MD

Principal Security Engineer (Team Lead)

Responsibilities:

  • Lead five different initiatives to operationalize CND tools to support DISA information
  • Team supervision and performance management of team members
  • Staff training, ensured staff continued to elevate their technical skills
  • Developed technical documentation such as TTP’s and SOP’s to clarify any gaps in implementation of CND tools
  • Creating OPORDS to disseminate across the DISA enterprise to enforce Commanders
  • Created Directives for IA initiatives
  • Managed both weekly and monthly meeting with team members for status updates of projects

Confidential, Alexandria, VA

Senior Security Engineer (SOC Engineer),

Responsibilities:

  • Configured and deployed Juniper IDS sensors to feed alerts into Syslog server
  • Configured and deployed Confidential Security Confidential to consume alert data from Splunk
  • Configured and deployed a distributed Splunk system
  • Configured and deployed a centralized managed log server - Syslog
  • Integrated Confidential alerts with Confidential Security appliance to centrally manage network alerts
  • Performed architecture design of the SOC across the continental US
  • Designed network topology of the SOC using Visio
  • Developed Incident response policy
  • Developed Intrusion detection policy

Confidential, Linthicum, MD

Senior Security Engineer

Responsibilities:

  • Installed and configured Watch Guard firewall
  • Installed and configured a centralized managed log server
  • Installed and configured snort IDS
  • Installed and configured Alien Vault’s Confidential
  • Installed and configured the DMZ for corporate network
  • Developed Incident response policy
  • Developed Intrusion detection policy
  • Developed Vulnerability management policy
  • Assisted in the development of proposals
  • Deployed a honey-net for research and development

Confidential, DC

Senior Network Security Administrator

Responsibilities:

  • Administered Confidential across the enterprise
  • Developed Incident response policy
  • Developed Intrusion detection policy
  • Developed log server policy
  • Developed backup policy for VM ESX servers
  • Retina stat to insure network continuity
  • Ensured all network object were up to Confidential IAVA Standards and inputted
  • Scanned the data center with Hercules vulnerability system
  • Performed patch management with WSUS
  • Supported over 500 users on a Microsoft 2000/XP network
  • Managed batch to deploy across the network
  • Created VBS scripts to more effectively administer the network

Confidential, Fort Belvoir

Network Administrator

Responsibilities:

  • Scanned the network using Harris stat to insure network continuity
  • Ensured all network object were up to Confidential ARMY IAVA Standards and inputted
  • That data into AVATAR vulnerability management system
  • Administrated the HQAMC TLOU in the NAE Forest for the Army
  • Setup of Confidential VPN 3000 appliance
  • Supported over 1200 users on a Microsoft 2000/XP network
  • Managed GPO policies to deploy across the network
  • Created VBS scripts to more effectively administer GPO’s
  • Assisted with Netapps SAN administration with daily backups
  • Responded to and fulfill customer service requests using Remedy ticketing system
  • Created email accounts on Exchange 55 for internal users
  • Created accounts for internal users on active directory

Confidential

Information Assurance Engineer

Responsibilities:

  • Assist in management, development and advancement of Information Assurance Program
  • Assist Information Assurance Manager (IAM) in meeting the duties and responsibilities outlined in applicable Department of Defense (DOD) policies, directives, and instructions
  • Implemented and administered Confidential across the enterprise
  • Developed a policy creation for both firewall and HIPS module deployed for Confidential
  • Installed and administered REM/Retina Vulnerability management system
  • Configure and administered Websense content filter server for both CIFA prime and north
  • Configure and administered Gigastor/Observer full packet analyzer
  • Configure and administered Fidelis extrusion detection system for insider threat monitoring
  • Ensure that all users have the requisite clearances and authorizations and are aware of their IA responsibilities before being granted access to Confidential information systems
  • Initiate protective or corrective measures when an IA incident or vulnerability is discovered Ensure that IA and IA-enabled software, hardware, and firmware comply with appropriate security configuration guidelines
  • Ensure IA-related documentation is current and accessible to properly authorized individuals Implement and enforce all Confidential information system IA policies and procedures as defined by its security certification and accreditation documentation
  • Assist Information Assurance Manager (IAM) in meeting the duties and
  • Responsibilities outlined in applicable Department of Defense (DOD) policies, directives, and instructions
  • Responsible for insuring CIFA is CND accredited
  • Monitor network using Source Fire to identify any malicious packets coming across the GIG
  • Performed packet analysis to identify any low profile network attacks
  • Ensure that all users have the requisite clearances and authorizations and are aware of their IA responsibilities before being granted access to Confidential information systems
  • Initiate protective or corrective measures when an IA incident or vulnerability is discovered
  • Ensure that IA and IA-enabled software, Hardware and firmware comply with appropriate security configuration guidelines
  • Ensure IA-related documentation is current and accessible to properly authorized individuals
  • Implement and enforce all Confidential information system IA policies and procedures, as defined by its security certification and accreditation documentation

Confidential, Fort Belvoir

Senior Network Administrator

Responsibilities:

  • Monitor the network using Harris Stat to insure network continuity
  • Ensured all network object were up to Confidential ARMY IAVA Standards
  • Administrated the USACIDC TLOU in the NAE Forest for the Army
  • Supported over 300 users on a Microsoft 2000/XP network
  • Supported in the Migration of 300 Computers and users from NT to 2000 for Criminal Investigation Lab in Ft Gillem, GA
  • Redesigned Data Center with Visio for data center expansion
  • Lead Siper net administrator for 200 users
  • Configured Ghost Images to in corporate into new Desktops
  • Responded to and fulfill customer service requests using Foot print ticketing system
  • Created email accounts on Exchange 55 for internal users
  • Created accounts for internal users on the Windows Server 2003/Windows XP network
  • Setup Video Teleconference Systems for the Major General using Tandberg and Sony TL150
  • Configured Black Berry devices for customers (subject matter expert)

We'd love your feedback!