We provide IT Staff Augmentation Services!

Information System Security Manager Resume

5.00/5 (Submit Your Rating)

SUMMARY:

Information technology security professional with over 23 years of experience in the industry. Department of Defense active Secret Security Clearance.

TECHNICAL SKILLS:

Hardware: Avaya PBX, Avaya Conversant, Dell & Compaq servers and workstations, Cisco ASA/Pix Firewall, Cisco AIP - SSM-10 module, Cisco IDS 4215, Cisco & Dell switches.

Networking: TCP/IP, VPN, SNMP, DNS, DHCP, LDAP, 802.11g.

E-Mail: Microsoft Exchange 2003, Novell GroupWise 5.x, 4.x.

Security: BackTrack, TriGeo SIEM, Snort, Retina, Nmap, Netcat, Hping, Syslog, SAV, Tcpdump, Ethereal, WireShark.

Software: Vmware, EtherPeek, AeroPeek, Backup-Exec, Ghost.

Systems: Ubuntu Linux Workstation, Redhat Linux Workstation, Windows 7, Novell Netware, Novell GroupWise, Microsft Exchange, Windows NT, Windows 2000 Server, Windows 2000 Professional, Windows SQL 2000 Server, Windows 2003 Server, Windows NAS, Windows XP, Windows 2000 Workstation, Windows 98, Windows 95, Windows 3.1, DOS, Mac OS 10.x.

PROFESSIONAL EXPERIENCE:

Confidential

Information System Security Manager

Responsibilities:

  • Interface with internal and external NETCOM CSD customers on NETCOM owned/managed Information Systems undergoing RMF accreditation or FISMA Annual Security Control Reviews. Ensure all system undergoing accreditation in RMF are following the NETCOM Assessment & Accreditation TTP. Review of Controls/CCI in eMASS for self-assessment compliance. Review of STIG/SRG, Manual Checks, and ACAS scans for compliance.
  • Review of system POA&M for compliance and validation requirements.
  • Report written findings to Information System Owner of deficiencies in self-assessment.
  • Assist NETCOM government ISSM and provide SME support as required.
  • Serve as validator on assess only RMF packages. Analyze network architecture designs.

Confidential

Information Security Specialist

Responsibilities:

  • Tracking Confidential data circuits. Working with eMass and the RMF process. W rking with databases.

Confidential

Network Forensic Analyst

Responsibilities:

  • Analyze data traffic.
  • Setup/Support routed data networks.
  • Working with Cisco routers switches and network taps in a test center.
  • Architect agency test network.

Confidential

Security Consultant

Responsibilities:

  • Incident response analyst team in a MSSP SOC.
  • Work to improve fidelity of SIEM incidents.
  • Tune IDS/IPS to ensure customer satisfaction with alert data.
  • Support PCI audits for SOC.

Confidential

Cyber Security Analyst

Responsibilities:

  • Provide enterprise Information Assurance services in a very large Confidential data center.
  • Provide support by conducting assessments of threats and vulnerabilities, determine deviations from acceptable configurations or enterprise or local policy, assess the level of risk, and develop and/or recommend appropriate mitigation countermeasures in operational and non-operational situations. Monitor the Information Assurance Vulnerability Alerts (IAVA), Information Assurance Vulnerability Bulletin (IAVB), Information Assurance Vulnerability Technical Advisory (IAVT) notices, Communication Task Orders (CTOs), and appropriate websites for new vulnerability and tasking order notices.
  • Oversee, evaluate, and support the documentation, validation, and accreditation processes necessary to assure that new Information Technology (IT) systems meet the organization's Information Assurance (IA) and security requirements.

Confidential

Cyber Security Analyst

Responsibilities:

  • Provide enterprise Information Assurance services in a very large Confidential data center.
  • Provide support by conducting assessments of threats and vulnerabilities, determine deviations from acceptable configurations or enterprise or local policy, assess the level of risk, and develop and/or recommend appropriate mitigation countermeasures in operational and non-operational situations.
  • Monitor the Information Assurance Vulnerability Alerts (IAVA), Information Assurance Vulnerability Bulletin (IAVB), Information Assurance Vulnerability Technical Advisory (IAVT) notices, Communication Task Orders (CTOs), and appropriate websites for new vulnerability and tasking order notices.
  • Oversee, evaluate, and support the documentation, validation, and accreditation processes necessary to assure that new Information Technology (IT) systems meet the organization's Information Assurance (IA) and security requirements.

Information Technology Security Consultant

Confidential

Responsibilities:

  • Hands on technical manager.
  • Architect network and data systems. Provide technical support for end users via phone and desktop remote software.
  • Servers include Novell Netware, Novell GroupWise, Microsoft Windows, Microsoft Exchange, Symantec Corporate Anti-virus, Bluecoat Proxy, TriGeo SIEM, Cisco Switches, Cisco ASA/Pix, Cisco ASA SSM.
  • Review all sensor logs, snort & Firewall for intrusion attempts and anomalies.
  • Configure offsite reporting via e-mail of any possible intrusions that trigger the security sensors.
  • Manage I.T. budget and purchase all computer related equipment.
  • Administrate data backups.

Private Consultant

Confidential

Responsibilities:

  • Install/Support Cisco Pix at client sites.
  • Monitor and analyze IDS detects and provide the relevant information to management and systems administrator.
  • Ensure firewall is running current IOS release.
  • Ensure intrusion detection system is patched at current level and signatures are up to date.
  • Analyze data traffic on IDS detects to rule out false positives.
  • Educate computer users on safe computing practices. Designed/Implemented a Network Address Translation solution on 5 computer networks.
  • Designed/Implemented a client VPN solution for secure access to internal data systems. Serve as back-up Network Administrator

Department I.T. Manager

Confidential

Responsibilities:

  • Hands on technical manager.
  • Responsible for the initial setup of new state agency computer systems across the state.
  • Provide technical support for end users via phone and desktop remote software.
  • Servers include Novell Netware, Novell GroupWise, Microsoft Windows IIS, Symantec Corporate Anti-virus and Microsoft SQL 2000. Administer Novell user/e-mail accounts access privileges.
  • Administer 2 Avaya Prologic phone switches.
  • Perform weekly vulnerability scans of all computer systems. Maintain a TCP audit log of all data traffic.
  • Review all sensor logs, snort & Firewall for intrusion attempts and anomalies.
  • Configure offsite reporting via e-mail of any possible intrusions that trigger the security sensors.
  • Manage I.T. budget and purchase all computer related equipment.
  • Administrate data backups.
  • Responsible for physical security of data processing assets.

Confidential

Systems Administrator

Responsibilities:

  • Responsible for administering a Novell/NT network on the Confidential in Cheyenne, Wyoming.
  • Effectively troubleshot problems at the desktop and on the servers.
  • Upgraded software packages as needed. Preformed hardware maintenance on servers and workstations.
  • Provided end-user support to over 100 users.

Confidential

Network Consultant

Responsibilities:

  • Responsible for maintaining and upgrading approximately 20 company networks in Laramie and Cheyenne, Wyoming.
  • Duties include performing hardware and software upgrades on various server and workstation computer systems.
  • Provide end-user technical support on desktops and servers.

Confidential

Systems Engineer

Responsibilities:

  • Provided pre-sales advice to business and sales people on current technologies.
  • Provide design, installation of network equipment, servers, and desktops for business.
  • Provide telephone and onsite technical support to business clients.

We'd love your feedback!