Cyber Security Defense Analyst Resume
Indianapolis, IN
SUMMARY:
Passionate Cyber Security professional with 21 years of technical experience. I have diverse knowledge from working across multiple IT disciplines and successfully managing several large projects, such as Y2K preparation, a full data - center migration and launching a 24×7 Cyber Security analyst and monitoring team.I bring a strong work ethic with the goal of continuous improvement to my security engineering skill sets, while building efficiencies within my team to complete the company mission.
CORE COMPETENCIES:
Vulnerability Scanning and Management | Risk Analysis | Incident Response | Threat Remediation | Endpoint Security | Process Improvement | Project Management | Training & Documentation | Windows, Linux, Cisco, IIS, Apache, Mcafee, ArcSight, Blue Coat, Nessus, Metasploit, Nmap, Burp Suite, Maltego, Wireshark, Powershell, Python, Ruby
CAREER EXPERIENCE AND HIGHLIGHTS:
Confidential, Indianapolis, IN
Cyber Security Defense Analyst
Responsibilities:
- Team lead for a 24×7 SOC with twelve junior analysts.
- Work both as an engineer and analyst for multiple security tools such as SIEM, Confidential and web filter proxies.
- Conducted vulnerability testing and validation with automated and manual testing tools.
- Maintain up-to-date knowledge of the security industry publications and forums for new and/or revised security solutions, processes, threat vectors and attacks.
- Delivered written risk analysis and process planning for emerging threats and vulnerabilities sourced from both Confidential and open source intelligence.
- Tracked, tuned, and compiled metrics from security devices and team member shift diaries for daily, weekly and monthly reports.
- Developed a 24×7 SOC team for security monitoring with Red team testing for internal applications and services
- Subject Matter Expert for web content filtering and proxy devices for the enterprise
Confidential, Fort Knox, KY
Cybersecurity Analyst
Responsibilities:
- Providing enterprise support for Confidential and Continuous Monitoring and Risk Scoring (CMRS).
- Provide SME level knowledge of Confidential for development of policies and Confidential 's.
- Report on vulnerability scoring for Command Cyber Readiness Inspection ( Confidential ) scoring.
- Respond to and track Confidential alerts, as well as provide artifacts and other documentation to the Confidential project management team.
- Investigate Indicators of Compromise (IOC) from multiple reporting tools and submit remediation actions.
Confidential
Information assurance analyst
Responsibilities:
- Responsible for enforcing Confidential Cyber Security posture in accordance with policy and procedures for secure and non-secure networks.
- Analyze system scans/audit results and assign task to owner groups.
- Maintain standards that all incidents are accounted for and communicated to leadership.
- Provide key government personnel with policy coordination and interpretation support as well as general security information guidance.
- Assisted with the development and implementation of the defensive security program that protects Information systems and documents.
- Verified Security Technical Implementation Guide ( Confidential ) applied per requirements.
- Provide daily reporting on findings with recommendations and follow-on written technical analyses.
- User account and configuration audits.
- Incident response across multiple networks for; malware, information leakage/spillage, data loss prevention, cross domain violations and account accreditation. All incidents required full identification, remediation, and documentation/reporting.
Confidential, Elizabethtown, KY
Systems & Network Sr. Administrator
Responsibilities:
- Completed OS and IIS web server version upgrades and P2V migration for production and SDLC environments
- Restructured web application configurations, including site certificate and domain registration management
- Vulnerability manager for 80+ production custom code issues over a one year period
- Managed transition testing for SSL to TLS protocol migration and SHA256 certificate migration
Confidential, Louisville, KY
Data Center Sr. Engineer
Responsibilities:
- Assisting colocation customers with rack layout, power planning, cooling configurations and LAN and WAN connectivity.
- Managed physical security for proximity card, RFID and bio-metric.
- Collaborated on the design, build and management for new data center facility.
- PM for data center migration involving 3000+ network and system devices with customer down time staying within projected outage SLA
- Authored operations run books for 24×7 operations.
- Primary escalation point for all data center issues
Confidential, Midway, KY
IT Consultant
Responsibilities:
- Responsibilities included the management and maintenance for Firewalls, DNS, DHCP, domain controllers, Active Directory, backup scheduling/testing, DR planning, antivirus and host security for multiple customers.
- Completed windows desktop/server upgrades and migrations.
- Documented design modification and procedures for client training and business continuity.
- Performed technology assessments and RFP‘ s to improve value of IT operations for potential clients.
Confidential, Louisville, KY
Site Service Desk Lead
Responsibilities:
- Managed image build and hardening for all workstation deployments for a Windows NT4/2000 and Novell environment.
- Authored and maintained custom scripts for unattended installation packages and software delivery packages with Microsoft SMS.
- Maintained McAfee ePO server and all end nodes.
- Developed and standardized centralized procurement process and inventory system for hardware assets and software licensing compliance for 2400 users.
- Supervised work flow for small support team, security specialists and multiple seasonal temps.
- Provided extensive support for LAN and remote worker dial-up and VPN connectivity. Blackberry server and end user support.
- Saved $100k+ in license management and compliance issues with BSA audits
- Managed and implemented upgrade paths for desktop hardware and software during Y2K project