We provide IT Staff Augmentation Services!

Cyber Security Consultant Resume

2.00/5 (Submit Your Rating)

PROFILE:

Presented here is an adept, educated and highly experienced computer professional with over ten solid years experience in the computer industry. My experiences have exposed me to emerging and cutting - edge technologies, from applications to networks and various systems . Today, I am a seasoned Network/Security Consultant with a major emphasis on TCP/IP, Security Policies, and Network Infrastructure Systems.

PROFESSIONAL EXPERIENCE:

Confidential

Cyber Security Consultant

Responsibilities:

  • Enterprise Risk Assessment
  • Refinery Network Site Survey
  • Petroleum Retail Network Site Survey
  • DCS Network Vulnerability Assessments
  • Splunk Enterprise Network Design
  • IDS/IPS DCS Netowrk Design
  • Industrial Control Systems Firewall Design
  • NIST/ C2M2 Framework Assessment of ICS Network
  • Security Operations Center Traffic Analysis
  • CheckPoint, Cisco ASA, Palo Alto, Fortinet Firewalls Analysis & Management
  • Claroty IDS POC Testing and Rollout
  • FireEye endpoint Rollout and Monitoring
  • Linux Penetration Testing and Vulnerability assessment.
  • Cisco Switch to Hirschmann Switch cutover
  • Symantec Backup Exec VM Design
  • Solarwinds Monitoring Design and Implementation

Confidential

Telecom Architect /Technical Manager/ Network Consultant

Responsibilities:

  • Network Digital Infrastructure Solution Proposals
  • Network & Collaboration Technology Review
  • Vendor & Solutions Integration Lead
  • AWS Cloud Solutions Architecture & Research
  • Voice/Video/Unified Collaboration Consultant
  • IoT/ Cloud Solution Services Consultant
  • Network & Security Consultant/Architect
  • Cisco Wireless Controller and AP Rollout
  • Nexus Switch Vlans and Trunking Solutions
  • OSPF/BGP Routing protocol troubleshooting
  • Cisco Router BGP and MPLS Configurations
  • Telco Router Customer Premise connectivity
  • Windows 2012 R2 and 2016 Administration
  • Vmware Installations and Administration
  • Raising Infrastructure Change Requests
  • F5 Loadbalancer Service Requests fulfillment
  • CheckPoint Firewall Rule Base Requests
  • CheckPoint Firewall Application Troubleshoot
  • MDF & IDF Infrastructure Cabling Audit
  • NetBackup Infrastructure Rollout
  • Cisco UCS Infrastructure Rollout
  • Delta V Infrastructure Rollout
  • Solarwinds Infrastructure Rollout
  • HP ALM Change Management Tool
  • Voice & Video Troubleshooting
  • Powershell Command line manipulations
  • Active Directory Design Manipulations
  • Rockwell Thin Manager & Client Setups
  • SDN/NFV & Automation Solution Architecture
  • Location Based Services Consultant

Confidential, Houston, Texas

Governance & Risk Consultant

Responsibilities:

  • Security Solution Proposals
  • Customer Security Review
  • Penetration Testing
  • SAP Plugin Assessment
  • AWS Cloud Assessment
  • Microsoft Azure Security
  • Skype Meeting Broadcast
  • POC Security Assessments
  • Drill Rig Plugin DMZ Scan
  • Splunk/Palo Alto Analysis
  • XenMobile Enterprise Risk
  • AirWatch POC Risk Analysis
  • Intune POC Risk Analysis
  • Cloud Security Risk Scoring
  • Apache Service Analysis
  • DMZ side Solution Design
  • SAAS Security Assessments
  • Security Process Definition
  • CheckPoint Rules Remediation
  • Nexpose Vulnerability Scanning
  • Palo Alto Firewall Rules Audit
  • Application Security Scanning
  • Blue Coat Proxy PAC File Setup
  • Service Now Ticket and Risk Audit
  • SAP Risk Assessment and Design
  • High Level Design Documentation
  • Low Level Design Documentation
  • Blue Coat AV Endpoint Remediations
  • Whitepaper and Best Practices Guide
  • Vulnerability Scanning & Remediation
  • SailPoint IAM Risk Assessment & Testing
  • ISO 27001/27002 , NIST, Methodology Guidance
  • Security Risk Assessments & Cloud Risk Assessments
  • Client Discussions about Solution Security Designs
  • Palo Alto Firewall Rules design and Implementation
  • Hive Meeting Broadcast Security Assessment and Mitigation Des ign

Confidential, Houston, Texas

Enterprise Security Architect

Responsibilities:

  • Security Solution Proposals
  • Customer Security Review
  • Penetration Testing
  • NIST Methodology
  • Arcsight SIEM Tuning
  • Cisco ISE Access Mgt
  • Cisco ISE 802.1x Configs
  • Team Security Manager
  • NFV Security Assessments
  • Wireless Survey and Testing
  • Cisco ISE from NAC Migration
  • Endpoint Client and Posturing
  • Cisco ISE Enterprise Migration
  • High Level Des ign Documentation
  • Low Level Des ign Documentation
  • TOGAF Framework Methodology
  • SAML & RBAC System Integration
  • FIPS 140 - 2 Level Encryption Implement
  • Mcafee SSO & Cloud IAM HLD Proposals
  • Microsoft Active Directory ID Access Management
  • Security Risks Assessments & Cloud Ris k Assessments
  • Customer Presentation and Round Table Discussions with external Vendors
  • Customer Network Refresh and Re-Design with Cisco Team and Microsoft Team

Confidential

Lead Technical Design Architect

Responsibilities:

  • Tender Documents & Bid Proposal Review
  • Security Template Design and Review
  • BGP Design and Implementation
  • Customer Stakeholder Requirements Review
  • TOGAF/NIST Framework Methodology
  • Customer Acceptance Strategy Proposal
  • Proof of Concept Design and Implementation
  • High Level Design Documentation
  • Low Level Design Documentation
  • Junos OS proficiency and Application firewall
  • Firewall Traffic Flow Analysis for secure lockdown
  • Customer Presentation and Round Table Discussions
  • Juniper Firewall Des ign & Implementation
  • CheckPoint Firewall Application rules Audit
  • ISO 27001/27002 Standards Implementation
  • IPV4 & IPV6 Route Table Address Translations
  • Various analysis and troubleshoot of Route injection
  • Implementation of Deep Level Packet Ins pection
  • BGP and MPLS Integration and Migration Design
  • PKI Encryption using a hardware encryptor
  • Bid Security Document Translation and Documentation
  • OSPF Routing Design and Implementation
  • IDS/IPS Design and Implementation in POC & HLD
  • RiverBed Wan Optimisation implementation

Confidential

Senior Network Security Consultant

Responsibilities:

  • Baracuda WAF implementation and Troubleshoot
  • Cisco Ironport Proxy Implementation and Troubleshoot
  • Tipping Point IPS Implementation and Troubleshoot
  • Infoblox/Arcsight Implementation and Troubleshoot
  • Cisco Wireless AP Configuration for Office Extend Service
  • Juniper SSL VPN’s Implementation and Troubleshoot
  • Arista Networks Design, Implementation and Troubleshoot
  • Checkpoint Firewall Design, Implementation and Troubleshoot
  • Juniper Security Design, Implementation and Troubleshoot
  • Cisco Security Design, Implementation and Troubleshoot
  • F5 LTM/GTM Implementation and Troubleshoot
  • RSA & DLP Installation and configurations
  • Confidential Vendor Migration from External to Internal
  • Citrix Netscaler Installation and configurations
  • HP & DELL Switch and Pass-Through Module Configurations
  • Opnet SPAN sessions Troubleshoot and Implementation
  • Rapid 7 Scanning Implementation and Troubleshoot

Confidential

Senior Network Security Consultant

Responsibilities:

  • Bank Security Policy and Standards Revisions
  • Checkpoint Firewall Design, Implementation and Troubleshoot
  • Juniper (Junos) Security Design, Implementation and Troubleshoot
  • Bluecoat Proxy Design, Implementation and Troubleshoot
  • Cisco Security Design, Implementation and Troubleshoot
  • LDAP & Active Directory Authentication Analysis
  • Project Consultation with Timescales and Workstreams

Confidential

Lead Network Architect

Responsibilities:

  • VPN Des ign
  • Radius Design
  • Traffic Analysis
  • Sandbox Design
  • Cisco ASA Design
  • Cisco VRFs Design
  • Cisco Works Design
  • Security Policy Models
  • Juniper Firewall Design
  • Checkpoint VSX Design
  • Equipment Procurement
  • Multicast Traffic Security
  • Nokia Splat/IPSO Analysis
  • SNMP Traps /Alerts Design
  • Cisco Nexus Fabric Extenders
  • Cisco Nexus 5000/7000 Switch
  • Solaris Jumpstart Configuration
  • High level and Low Level Design
  • Enterprise DMZ Management Design
  • Network DMZ Security Design and Management

Confidential

Principle Architect

Responsibilities:

  • Radius Des ign
  • Project Scoping
  • SSL VPN Design
  • Provider 1 Analysis
  • FW1 Migrations to NG
  • Solaris /Linux Jumpstart
  • Solaris System Migration
  • Linux DNS Manipulations
  • Nokia Firewall installation
  • Checkpoint NGX Rulebase
  • Linux Kickstart auto install
  • Solaris /LinuxShell Scripting
  • Solaris NFS Mount fileshare
  • Nokia Firewall Implementation
  • Solaris /LinuxIPtraf Monitoring
  • Solaris /LinuxPatch management
  • Linux IP Masquerading IPChains
  • High level and Low Level Design
  • Oracle and Perl Design Document
  • CRON and Daemon Management
  • Checkpoint SPLAT Troubleshooting
  • Nokia Firewall High/Low level Design
  • Solaris Memory and Performance Tuning
  • Foundary GSLB High and Low Level Des ign

Confidential

Network Infrastructure Consultant

Responsibilities:

  • Implementation of Cisco 6509 Switches
  • Implementation of Cisco 6500 Switch
  • Sun Solaris F15 and Oracle Database Clusters
  • Nokia Firewall Implementation and Configuration
  • Multilayer MSFC Configurations Intervlan routing
  • VMWare Switch Trunking with Cisco 6509 (802.1Q)
  • Windows 2003 and Windows NT PDC Implementation
  • Implementation of Vlans and Cisco VPN Concentrator
  • Implementation of Cisco Content Switching CSS 11503
  • CSS 11503 and CSS 11501 Configuration and Software upgrade

Confidential

Architect/ Technical Manager

Responsibilities:

  • Network IDS/IPS Design
  • Vendor Product Testing
  • Security Documentation
  • Enterprise Security Architecture
  • Cisco Multilayer Switching/Routing
  • Network Infrastructure Architecture
  • Ethereal Packet and Protocol Analysis
  • Architectural Design Documentation
  • Cisco /SecGo/Checkpoint VPN Design
  • Application Relocation and Integration
  • Firewall Flows and Policy Comparison
  • BlueCoat Proxy Design and Architecture
  • Banking Applications Migrations Design
  • Design of Ebusiness Application Integration.
  • Firewall rulebase implementation and tcpdumps
  • Lead Architect for Internet Solution for Bank Datacentre
  • Design of Enterprise ECommerce Application Integration.
  • Architecture of a solution for over 50,000 Enterprise users
  • Design of Internet and Remote Access (PKI) Infrastructure
  • Nokia/Checkpoint and Juniper/Netscreen firewall Implementations
  • Cisco 11000 Series Content Switching/Load Balancing Architecture

Confidential

Security Integration Engineer

Responsibilities:

  • Management of Huge Confidential Data Centre Integration Project( Site Engineer)
  • Management of Sun, HP, EMC, HDS, Phillips Installation Te am.
  • System Infrastructure Testing
  • Network Infrastructure Testing
  • Disaster Recovery
  • DWDM Link failure and failover testing
  • XP 12000 Disk Array SAN Testing
  • Storage Tek Tape Library Testing
  • HP SAN Switch and Brocade Switch Testing
  • Rack Mounting of Phillips Webservers
  • Cisco Content Services Switch (CSS) configurations and Testing
  • Sun Solaris 9 Security Hardening
  • Windows 2000/ 2003 Security Hardening
  • Cisco MDS 9509 Configurations and Testing
  • Green Side and Red Side Firewall Testing
  • Nokia IP Series Firewall Testing
  • Cisco Router Configurations and Testing
  • Cisco Switch and VLan Configurations and Testing
  • Ensuring that all Project deadlines via MS Project Timelines are met.
  • Radia Patch delivery testing
  • Citrix Server testing
  • Jumpstart Server configurations and testing
  • NFS Server configurations and testing

We'd love your feedback!