Security Consultant Resume
SUMMARY:
Principal Security position in a diverse Corporation where I can use my trouble - shooting and Networking skills effectively.
SKILLS:
Computer languages: C++, ADA, And HTML
Scripting Languages: Batch, Bash, VBS
Computer skills: Operating Systems Linux - Ubuntu/Debian, Red Hat, Windows NT, 2000/Advance Server, 2003, Terminal Server, Exchange 55, Active Directory
Virtual Technology: VMware, Virtual BOX, KVM
IDS/IPS/DLP: Snort/Source fire (IDS/IPS), Observer, Fidelis (XDS), EPO server
Vulnerability Software: Harris Stat, Retina, Nessus, MVM, Policy Auditor
Confidential: Confidential, Alien Vault SEIM, Arcsight SEIM, SplunkEnpoint Security Confidential, OSSEC (HIDS)
Network Monitoring tools: Nagios, Netcool, Mercury Interactive (Topaz)
Remote Technology: Tivoli, VNC, Sony TL 150 VTC, Tandberg VTC, Citrix Client
Other Security Software: Nmap, Centralized log management (Syslog), TCPdump, Wireshark, IPTABLES, SSH, Putty, Confidential 3000 VPN, Alcatel VPN Client, Netscreen VPN client, Smoothwall, PF firewall, Astaro firewall
General Networking Knowledge: TCP\IP, DNS, DHCP, WINS, SNMP, OSI Model
EXPERIENCE:
Confidential
Security Consultant
Responsibilities:
- Performed deployment of Confidential Security information and Event management systems ( Confidential ).
- Performed optimization of Confidential appliances and rule tuning.
- Improved security architecture of client’s enterprise by ensuring best practices are followed with product deployment.
- Performed preliminary incident response for customers
- Performed remote assistance for clients.
- Traveled on site to assist clients in deployment and configuration of Confidential products.
- Analyze technical/integration requirements and develop effective technical solutions for Customer review and consideration, and once approved, integrate into the Customer’s infrastructure
- Provide recommendations for policy refinement and best business practices to operation teams for consideration
- Prepare and deliver documentation that will allow for accurate implementation/operation of new capabilities supporting live operating environments
- Address all technical problems associated with Confidential software and provide proactive support with direct reach back into Confidential Technical Support and Confidential Labs
Confidential
Security Consultant
Responsibilities:
- Performed data migration for version 4.x to 5.x on Confidential series 2 and 3 appliances.
- Performed optimization of Confidential sensors and rule tuning
- Developed low level design documentation for clients
- Develop network implementation documentation for clients
- Performed stress test for Confidential sensors
- Performed high availability test on Confidential sensors
- Performed remote assists to clients
- Traveled on site to assist clients in deployment and configuration of Confidential products
- Provide input to other cross-functional departments pertaining to prospect requests and product enhancements as needed
Confidential
Sr Security Administrator
Responsibilities:
- Performed Arcsight log analysis
- Monitored SOC security devices with Solarwinds
- Performed ASA firewall administration and configuration
- Performed MacAfee security gateway administration and configuration
- Performed Microsoft ISA firewall administration and configuration
- Performed Symantec Security suite administration and configuration
- Remote assistance to VIP users for rapid resolution of software configuration errors
Confidential, MD
Senior Security Engineer
Responsibilities:
- Reviewed network security architecture made improvements to increase the integrity of the design
- Provided technical support for 100 windows 2008 servers for the deployment of Confidential across the enterprise
- Organized the TLA stack of hub sites across the enterprise Assisted with the DIACAP process
- Reviewed POAM’s, and assisted with policy creation such as incident handling, intrusion detection
- Reviewed hardware/software configurations to ensure best security practices are implemented
- Daily Confidential compliance checks
Confidential, MD
Principal Security Engineer (Team Lead)
Responsibilities:
- Lead five different initiatives to operationalize CND tools to support DISA information
- Team supervision and performance management of team members
- Staff training, ensured staff continued to elevate their technical skills
- Developed technical documentation such as TTP’s and SOP’s to clarify any gaps in implementation of CND tools
- Creating OPORDS to disseminate across the DISA enterprise to enforce Commanders
- Created Directives for IA initiatives
- Managed both weekly and monthly meeting with team members for status updates of projects
Confidential, Alexandria, VA
Senior Security Engineer (SOC Engineer),
Responsibilities:
- Configured and deployed Juniper IDS sensors to feed alerts into Syslog server
- Configured and deployed Confidential Security Confidential to consume alert data from Splunk
- Configured and deployed a distributed Splunk system
- Configured and deployed a centralized managed log server - Syslog
- Integrated Confidential alerts with Confidential Security appliance to centrally manage network alerts
- Performed architecture design of the SOC across the continental US
- Designed network topology of the SOC using Visio
- Developed Incident response policy
- Developed Intrusion detection policy
Confidential, Linthicum, MD
Senior Security Engineer
Responsibilities:
- Installed and configured Watch Guard firewall
- Installed and configured a centralized managed log server
- Installed and configured snort IDS
- Installed and configured Alien Vault’s Confidential
- Installed and configured the DMZ for corporate network
- Developed Incident response policy
- Developed Intrusion detection policy
- Developed Vulnerability management policy
- Assisted in the development of proposals
- Deployed a honey-net for research and development
Confidential, DC
Senior Network Security Administrator
Responsibilities:
- Administered Confidential across the enterprise
- Developed Incident response policy
- Developed Intrusion detection policy
- Developed log server policy
- Developed backup policy for VM ESX servers
- Retina stat to insure network continuity
- Ensured all network object were up to Confidential IAVA Standards and inputted
- Scanned the data center with Hercules vulnerability system
- Performed patch management with WSUS
- Supported over 500 users on a Microsoft 2000/XP network
- Managed batch to deploy across the network
- Created VBS scripts to more effectively administer the network
Confidential, Fort Belvoir
Network Administrator
Responsibilities:
- Scanned the network using Harris stat to insure network continuity
- Ensured all network object were up to Confidential ARMY IAVA Standards and inputted
- That data into AVATAR vulnerability management system
- Administrated the HQAMC TLOU in the NAE Forest for the Army
- Setup of Confidential VPN 3000 appliance
- Supported over 1200 users on a Microsoft 2000/XP network
- Managed GPO policies to deploy across the network
- Created VBS scripts to more effectively administer GPO’s
- Assisted with Netapps SAN administration with daily backups
- Responded to and fulfill customer service requests using Remedy ticketing system
- Created email accounts on Exchange 55 for internal users
- Created accounts for internal users on active directory
Confidential
Information Assurance Engineer
Responsibilities:
- Assist in management, development and advancement of Information Assurance Program
- Assist Information Assurance Manager (IAM) in meeting the duties and responsibilities outlined in applicable Department of Defense (DOD) policies, directives, and instructions
- Implemented and administered Confidential across the enterprise
- Developed a policy creation for both firewall and HIPS module deployed for Confidential
- Installed and administered REM/Retina Vulnerability management system
- Configure and administered Websense content filter server for both CIFA prime and north
- Configure and administered Gigastor/Observer full packet analyzer
- Configure and administered Fidelis extrusion detection system for insider threat monitoring
- Ensure that all users have the requisite clearances and authorizations and are aware of their IA responsibilities before being granted access to Confidential information systems
- Initiate protective or corrective measures when an IA incident or vulnerability is discovered Ensure that IA and IA-enabled software, hardware, and firmware comply with appropriate security configuration guidelines
- Ensure IA-related documentation is current and accessible to properly authorized individuals Implement and enforce all Confidential information system IA policies and procedures as defined by its security certification and accreditation documentation
- Assist Information Assurance Manager (IAM) in meeting the duties and
- Responsibilities outlined in applicable Department of Defense (DOD) policies, directives, and instructions
- Responsible for insuring CIFA is CND accredited
- Monitor network using Source Fire to identify any malicious packets coming across the GIG
- Performed packet analysis to identify any low profile network attacks
- Ensure that all users have the requisite clearances and authorizations and are aware of their IA responsibilities before being granted access to Confidential information systems
- Initiate protective or corrective measures when an IA incident or vulnerability is discovered
- Ensure that IA and IA-enabled software, Hardware and firmware comply with appropriate security configuration guidelines
- Ensure IA-related documentation is current and accessible to properly authorized individuals
- Implement and enforce all Confidential information system IA policies and procedures, as defined by its security certification and accreditation documentation
Confidential, Fort Belvoir
Senior Network Administrator
Responsibilities:
- Monitor the network using Harris Stat to insure network continuity
- Ensured all network object were up to Confidential ARMY IAVA Standards
- Administrated the USACIDC TLOU in the NAE Forest for the Army
- Supported over 300 users on a Microsoft 2000/XP network
- Supported in the Migration of 300 Computers and users from NT to 2000 for Criminal Investigation Lab in Ft Gillem, GA
- Redesigned Data Center with Visio for data center expansion
- Lead Siper net administrator for 200 users
- Configured Ghost Images to in corporate into new Desktops
- Responded to and fulfill customer service requests using Foot print ticketing system
- Created email accounts on Exchange 55 for internal users
- Created accounts for internal users on the Windows Server 2003/Windows XP network
- Setup Video Teleconference Systems for the Major General using Tandberg and Sony TL150
- Configured Black Berry devices for customers (subject matter expert)