Security Analyst-pro. Lead Resume
Columbia, SC
SUMMARY:
- In light, of my prolonged experience in the information technology; I have managed employees and faced customers in and outside the boundaries of local operational outfit.
- I am looking for an Cyber Security Architect/Engineer/Consultant position as part of a consistently fast - paced organization with opportunities for personal and professional development.
- The environment I seek should equally present some challenge because I am highly motivated to solve problems.
- I have 8+ years of local and state-wide operation in this field and approximately 24 years of broad technical experience in Systems, Infrastructure, Security, Virtualization, Storage and Networking.
- Successfully designed and delivered secure, robust cloud solutions for small, medium and enterprise organizations.
- Multiple years of experience architecting and engineering of corporate business acquisitions and spinoffs.
- Years of Management expertise including people management, strategic planning, risk mitigation, business process improvement, business continuity and regulatory compliance including, SOX, PCI and HIPAA.
- Extensive technical experience in Microsoft Server Systems, SQL, Exchange, ADFS and Active Directory as well as Vmware& Microsoft virtualization technologies and EMC SAN/NAS technologies.
- High level of experience in network security, compliance and data governance including firewalls, IPS/IDS systems, Payment Card Industry (PCI) and Sarbanes-Oxley (SOX) compliance as well as familiarity withSAS 70 & SSAE 16 reporting standards and data governance practices including data security, retention and data management.
- J2EE application server stack for web (IIS 6 +)
TECHNICAL SYSTEMS OVERVIEW:
- Cloud Security / SaaS / PaaS Platforms
- Microsoft Azure/ AWS
- Software Development
- Java, Python
- C/C++
- Systems Architecture, Engineering and Administration
- VMware vSphere 5.x, 4.x, ESX 3.x
- Microsoft Server 2000, 2003, 2008, 2012& R2 versions
- Microsoft SQL Server 2000, 2005, 2008, 2012
- Microsoft Exchange 2003, 2007, 2010, 2013, O365
- Microsoft Active Directory Federation Services (ADFS)
- Microsoft IIS 5.0, 6.0, 7.5, 8.0, 8.5
- Microsoft Cluster Services, SQL Clustering
- Active Directory, DNS, DHCP, Group Policy
- Linux OS - Debian, Redhat, Ubuntu, Open Suse
- Kali Linux, HackLab VPN
- Network and Wireless Administration
- Cisco Access Switches 2960, 3560, 3750
- Cisco ISR Routers 800, 1900, 2600
- Cisco ASA 5505, 5510, 5520
- Sonic Wall NSA
- Riverbed Steelhead (Wan Optimization)
- Hardware Platforms
- HP ProLiant DL and BL Blade Systems
- Dell PowerEdge Physical and Blade Systems
- Scripting & Automation
- PowerShell v2, v3 & v4
- PERL, Jscript, VB Script,
- Security SIR-Assessment/Mitigation/Remediation
- Pentesting, Finding and Recommendations
- SIR, Mitigation and Remediation
- COBIT, ISO 27001/27002
- MARS-E, HIX, HIPPA,
PROFESSIONAL EXPERIENCE:
Confidential, Columbia, SC
Security Analyst-Pro. Lead
Responsibilities:
- Leading the solution implementation in assisting the DHEC CISO with security controls mitigation.
- Analyzed risk scores, impact, threat, GAP and proposed POA & M for mitigations for Confidential .
- Developed a secure coding life cycle as well as an IPT cooperation for Confidential .
- Built and Managed cloud user and VPC for AWS using EC2/ Glaciers -S3 with EBS.
- Cloud security thought leader; Google cloud, AWS and Azure
- Pentesting and report using Metasploit, NMAP and W3af (web application attack and audit framework)
- Coordinates and produces the Information Security Plan for DHEC through the CISO.
- Coordinates and produces the System Security Plan for DHEC through the CISO.
- Mentors and work with BITS SOC in maximizing business functionality and use-ability of DHEC services in light of IS.
- Work with Directors and Managers in various program areas totaling over 360 program and applications on O365 architecture.
- Writing various security policies and developed a plan with Application group for use in SharePoint and web portals.
- Security Software planning, design and prototype implementation using Agile methodology.
- Planned, Designed and built software (c++/java) for Risk/biz impact analysis, management (Cost-Benefit) and assessment.
Confidential, San Francisco, California
Security Solution Architect/Engineer
Responsibilities:
- Plan, design the architect (TOGAF), tooling and engineering of Distributed Ledger system for eTransaction - LokChain Platform
- Train developers on some of the code requirements and security features in the technology especially blockchain and DLT
- Performed extensive research on various blockchain consensus mechanism, created and algorithm for non-mineable consensus algorithm.
- Created a base technology for future tune-able symmetric key cryptography for IoT in progress
- Design, Plan, build and manage encryption application for Android mobile devices.
- Reverse engineered mobile application by converting DEX to jar to java . Working experience of Santoku linux . Clue traced obfuscated codes with Base64 or Eval.
- SAST and DAST analysis using veracode
- Managed offshore teams and communicated effectively for the development of the application.
- Used GitLab, Jire and Pagerduty to manage, share codes and notification.
- Centos Linux server (AWS EC2 instance or AMI ) VM to setup python 3+; apache 2.4, with mysql 5.7; django framework for backend code, AWS Security services (MFA etc,.), AWS IAM, AWS Security Groups, secure Amazon Route 53 DNS web services, the development of AWS Open API’s, cloudTrail and CloudWatch.
- Installed Barracuda NG cloud firewall in MS Azure environment.
- Managed user certificates in AWS PKI and used EC2/Glaciers -S3 with EBS.
- Performs penetration testing in the environment with full report provided to stake-holders.
Confidential, Columbia, SC
Security Solution Architect/Engineer
Responsibilities:
- Created a base technology for future tune-able symmetric key cryptography in the cloud
- Design, Plan, build and manage encryption application for Android mobile devices.
- Managed an offshore team and communicated effectively for the development of the application.
- Used GitHub, Jire and Pagerduty to manage and share codes.
- Centos Linux server (AWS EC2 instance or AMI ) VM to setup python 3+; apache 2.4, with mysql 5.7; django framework for backend code, AWS Security services (MFA etc,.), AWS IAM, AWS Security Groups, secure Amazon Route 53 DNS web services, the development of AWS Open API’s, cloudTrail and CloudWatch.
- Installed Barracuda NG cloud firewall in Azure environment.
- Managed user certificates in AWS PKI and used EC2/Glaciers -S3 with EBS.
- Performs penetration testing in the environment with full report provided to stake-holders.
Confidential, CA
Cyber Security Tech. Lead
Responsibilities:
- Design, Plan Deployment and administration Bit9: enterprise wide
- Pre-Deployment, architectural solution of provision for Bit9: enterprise wide
- Worked closely with Vendors, SOC, SIRT, Network operations, DB, system Engineers and Analyst (on info sec), network and infrastructure security.
- Direct communication with Information Security team and CISO
- Designing and implementing other project plans
- Technical/ report writing for the Enterprise
- WB subject matter expert for white-listing enterprise application
- SEPM (12.1.6), DDPE, CASPER and SCCM (packaging)
Confidential, MN
APT Design Engineer
Responsibilities:
- Deployed FireEye APT appliances (NX, EX, HX, AX, HXD and CMS) enterprise wide and currently owns the tools
- Pre-Deployment, deployment and administration Carbon Black enterprise wide
- Pre-Deployment, deployment and administration Bit9 enterprise wide
- Initiated meetings and determined business impact and solution to fit all aspect of governance and visibility
- LDAP integration of advanced persistent threat tools mentioned above
- Worked closely with Vendors, SOC, SIRT, Network operations, DB, system Engineers and Analyst (on info sec), network and infrastructure security.
- Raised Firewall, DNS request and other request on ServiceNow.
- Worked for intake in support issues related to these tools.
Confidential, Golden Valley, MN
Lead Security Incident Response
Responsibilities:
- Triage of escalated priority incoming security events, perform preliminary and secondary analysis, validate events, create war room to conduct incident management and event resolution with internal security and network engineering teams
- Documenting and generating reports on incidents and SIR productivity
- Experience with Firewalls, load balancing, and other various security technologies
- Experience working with event logging and monitoring (SIEM preferred) security analytics tools (Splunk preferred) and Akamai
- Strong written and verbal communication skills; escalating malware and DDOS attacks to war room.
- Experience with Symantec DLP: HIPPA, PII, PHI, SOX and GLB data ex-filtration matching policies for SMTP, HTTP/S protocols
- Understands Enterprise Governance Risk and Compliance (eGRC) and experience working in a regulatory environment
- Experience with, or knowledge of, Intrusion Detection/Intrusion Prevention Systems (IDS/IPS)
- Strong understanding of Windows and Unix/Linux low-level operating system functionality
- Using Symantec DLP, Security Aanalytics, Bit9, Fireeye (APT tool), SNOW, ICANN and Agilance.
Confidential, Golden Valley, MN
Sr. Security Engineer
Responsibilities:
- Determined the flow of all data in the internal (infrastructure) and external network (web).
- Verified egress and ingress data advances with respect to IRM Standards.
- Staged the necessary flows to make sure that they are proper for all ports and protocols.
- Implemented changes effecting rules in PaloAlto (panorama 6.0), Cisco, Juniper and Checkpoint firewalls.
- Researched on the latest attacks and the ports or protocols used for such.
- Used firemon, fastresolver for subnet issues resolution within network segments.
- Strong working knowledge of ITG ticketing system for fulfilling IRM standards.
- Assured policies affecting ITG requests by referencing eGRC and IRM standards
- Used ASM, Provider-1, NSM, AVS to fulfill firewall flow request and rule changes
- Use of Tufin for network analysis and reporting.
Confidential, Golden Valley, MN
Sr. Security Analyst
Responsibilities:
- Works as level 2 escalation point for tricare SOC war room monitoring
- Coordinated and used Fireeye, Zscaler, HPsm, RSA (analytics,enVision, IAM), PaloAlto network devices, and Splunk for granular analysis and visibility. Researched on tool like CyberArk, Websphere and Tivoli line of products
- Used tcpdump or Wireshark to sniff packets in TSHOOT: decipher incident and their contents with SIEM.
- Designed a severity rating for all incidents based on residual and inherent risks
- Coordinated Security Incident response procedure and its development
- Set up frame for SIRT and SOC outline for validating and reporting accurate incidence
- Developed an incident response Life Cycle including rules of engaging with incident
- Incorporating NIST, ISO, CERT guideline and ITIL/COBIT in all procedure to protect PII and PHI
- Analyze incidence with respect to business process and change management
- Works with other team members in a cooperatively in service and leadership
Confidential, Lake Elmo, MN
Sr. Security System Engineer
Responsibilities:
- Certificate Authority (CA) migration (Win2003 server to Win2012 server R2 (online and offline PKI)
- Websense Proxy integration
- Quest Reporter infra mod and design in a mutiple domains
- ChangeAuditor and Intrust integration (SIEM)
- Servicenow ticketing, incident and change management
- Presented power point of the design, used visio and ms project to manage this project
- IAM software and privilege monitoring (Stealth Bits)
Confidential, Brooklyn Park, MN
Data Security Protection Asset Owner
Responsibilities:
- Asset was pulled from U2, CMDB and Tenable Nessus.
- Developed methodology for reconciling asset inventory in the union.
- Identification, Verification, Validation and Reconciliation.
- All wrapped around the engineering problem solving process.
Confidential, Minneapolis, MN
Network Security Consultant
Responsibilities:
- Researched, Designed and Developed an encryption system which extends AES.
- Used Netbeans 7.3 to developed Java application for an encryption system using modern web designing technologies like HTML5, CSS and JavaScript
- Setup Web Server (IIS 8) and Application servers for forms and emails used by skcjju256 users.
- Installed, configured and managed Macfee Anti-virus and Endpoint protection solutions.
- Network/Internet Security Configuration and expert use of MBSA and PCI-DSS2.0 / SAQ tools.
- Conducted Network defense by applying network security devices e.g Firewall, NIDS/HIPS/HIDS, Bastion Host and Honeypots.
- Used Nmap scanner to identify networked computer, OS and enumerate open ports on the target:
- Used Nessus to discover and detect local computers, flaws, uninstalled patches and other weaknesses in the host.
- Performed Network protocol analysis using WireShark.
- Strong knowledge of vulnerability assessment, incident response and use of Superscan4 to detect security risk, system compromise and mitigation.
- Directed an encryption (symmetric key cryptography) geared toward network and internet security: Using Solaris and Linux development environment.( Confidential, Inc)
- Directed articles on ethics, internet and computer security. Consult with managers/owners and directed large scale projects in Information security for global real estate.
- Produced an android application encryption system called LokDon; with support for most hand held devices and social network/media integration. This uses a variant of symmetric key cryptography
- Designed, planned, implemented and maintained Linux servers of many distros (Fedora Core 6, Redhat Ent 6, OpenSuse, Ubuntu, Knoppix and Mandrake) in network and Wintel infrastructure for managed services cloud subscription provisioning with PCCS hardware.
- Installed, integrated and managed Arcsight 6.0 logger with Centos CMS in a windows domain environment
Confidential, Edina, MN
Web/Infrastructure Engineer/Manager
Responsibilities:
- Automation of processes and operations using Shell scripting, Scripts (WMI, WScript, Powershell 2.0/3.0/PowerCLI and WSH VBscript). Improved automation enterprise wide and tools for system management.
- Able to manage the projects life cycle from the project strategy to the close: Provided cost, labor and noted critical points of the project with the deliverables realized in a timely manner.
- Able to supervise two people in my team on support work across the globe overseeing Unix/Linux installation, configuration and administration involving support and 24/7 on call.
- Able to work with NetApp EF540 Storage Area Network system flash array (SANtricity management software) as a part of Data Center consolidation solution: Dell/EMC CX600 SAN using Navisphere management tool for Snapview (San Copy) and MirrorView software.
- Data Base installation, configuration and troubleshooting (worked with SSIS, ETL and adapters) server (AIX, Sun, Unix/Linux and WinServer 2k3, 2k8 and 2k12 OS) planning, designing, integrating, supporting and building IT infrastructural within corporate environment with ITIL methodology. This also involves managing, maintaining, improving IT infrastructure, audit, remediation, consolidation and decommissioning.
- Windows Failover Cluster implementation (HA) with Data Center server Core/Full 2012
- Win 2003 SP4 server migration to Win2008 R2/Win2013 R2
- Active directory migration windows server 2003 to windows server 2012
Confidential, Rochester, MN
Sr. Consultant- Ciber
Responsibilities:
- Developed process for inventory analysis in a fastpaced environment geared towards Security Audit and Planning (Windows, Solaris and Linux).
- Installed and configured SQL server 2010/12 (Full Version): Queried raw data in order to produce reports (useful data) for application owners.
- SQL server 2010/2012 update (ETL).
- Set WMI (for class checks), WHS script Used Powershell, Batch, VBscript with Powershell 2.0 console to call up functions.
- Automated tasks using scripts in Domain environment with many VMware ( Vsphere ESXi 5.1)-Host machines and Guest.
- Used ITSM tool like BMC Remedy as well Inventory systems like ITI, VCM, ECM, EEA, AMS, ITSR etc.,
- Handles Tier 1 or server support involving application owners and remediated vulnerabilities.
- Project management: Timeline, Scrum work and task scheduling
- Troubleshoot failed server backup using NetBackup 7.1.0.5
- Able to work with VNXe 3150 unified storage solution with management tool EMC UniSphere.
- Active directory migration windows server 2003 to windows server 2012
Confidential, Vadnais Heights, MN
Infrastructure Engineer
Responsibilities:
- Worked on MS Exchange 2007 (W2K3 & W2K8) migration to MEX 2010: On-Premise in an enterprise level: AD, AD DS, ADFS, SAML (SSO), Forefront 2010 (TMG & WEB pro).
- Constantly used VMware (Vsphere ESXi 4.2) host and client configuration. Installed and setup VMware Vsphere ESXI 5.1 vCenter for management.
- Built W2K3 R2/W2K8 R2 in on an enterprise level.
- Planned and designed labeling software (BarTender) deployment in an enterprise level.
- Managed BarTender project, purchased the license (Seagulls) for the labeling software.
- Built rapport with Operation User Registration, Network Services, Field Services and BA groups to tune up and integrate the project within WAN of operations.
- Took support calls, troubleshot and trained global users in H.B Fuller. Mostly Citrix XenApp5/6.5 was used to present workstation.
- Documented all project leads appropriately in collaboration with communication services for language translations.
- Used the best practice to maintain, clean, patch VCA and updated HPSIM for proper inventory of HP servers (Blade/Proliant) and non-HP devices. This was used to monitor thousands of servers.
- Reconciled HPSIM with Trend, CMDB, LDRPS, SCOM, WSUS, SCCM. Configured and supported Web Server (IIS 6.0/7.0,FTP and DB) on Windows W2K3/W2K8.
- Extensively setup, configured, managed and troubleshoot SIEM security tools like ArcSight, SecureMail Ver6.7.1, Snort, Nessus, Trend Micro 8.0, Tripwire 6/7 and Websense.