Information System Security Manager Resume
SUMMARY:
Information technology security professional with over 23 years of experience in the industry. Department of Defense active Secret Security Clearance.
TECHNICAL SKILLS:
Hardware: Avaya PBX, Avaya Conversant, Dell & Compaq servers and workstations, Cisco ASA/Pix Firewall, Cisco AIP - SSM-10 module, Cisco IDS 4215, Cisco & Dell switches.
Networking: TCP/IP, VPN, SNMP, DNS, DHCP, LDAP, 802.11g.
E-Mail: Microsoft Exchange 2003, Novell GroupWise 5.x, 4.x.
Security: BackTrack, TriGeo SIEM, Snort, Retina, Nmap, Netcat, Hping, Syslog, SAV, Tcpdump, Ethereal, WireShark.
Software: Vmware, EtherPeek, AeroPeek, Backup-Exec, Ghost.
Systems: Ubuntu Linux Workstation, Redhat Linux Workstation, Windows 7, Novell Netware, Novell GroupWise, Microsft Exchange, Windows NT, Windows 2000 Server, Windows 2000 Professional, Windows SQL 2000 Server, Windows 2003 Server, Windows NAS, Windows XP, Windows 2000 Workstation, Windows 98, Windows 95, Windows 3.1, DOS, Mac OS 10.x.
PROFESSIONAL EXPERIENCE:
Confidential
Information System Security Manager
Responsibilities:
- Interface with internal and external NETCOM CSD customers on NETCOM owned/managed Information Systems undergoing RMF accreditation or FISMA Annual Security Control Reviews. Ensure all system undergoing accreditation in RMF are following the NETCOM Assessment & Accreditation TTP. Review of Controls/CCI in eMASS for self-assessment compliance. Review of STIG/SRG, Manual Checks, and ACAS scans for compliance.
- Review of system POA&M for compliance and validation requirements.
- Report written findings to Information System Owner of deficiencies in self-assessment.
- Assist NETCOM government ISSM and provide SME support as required.
- Serve as validator on assess only RMF packages. Analyze network architecture designs.
Confidential
Information Security Specialist
Responsibilities:
- Tracking Confidential data circuits. Working with eMass and the RMF process. W rking with databases.
Confidential
Network Forensic Analyst
Responsibilities:
- Analyze data traffic.
- Setup/Support routed data networks.
- Working with Cisco routers switches and network taps in a test center.
- Architect agency test network.
Confidential
Security Consultant
Responsibilities:
- Incident response analyst team in a MSSP SOC.
- Work to improve fidelity of SIEM incidents.
- Tune IDS/IPS to ensure customer satisfaction with alert data.
- Support PCI audits for SOC.
Confidential
Cyber Security Analyst
Responsibilities:
- Provide enterprise Information Assurance services in a very large Confidential data center.
- Provide support by conducting assessments of threats and vulnerabilities, determine deviations from acceptable configurations or enterprise or local policy, assess the level of risk, and develop and/or recommend appropriate mitigation countermeasures in operational and non-operational situations. Monitor the Information Assurance Vulnerability Alerts (IAVA), Information Assurance Vulnerability Bulletin (IAVB), Information Assurance Vulnerability Technical Advisory (IAVT) notices, Communication Task Orders (CTOs), and appropriate websites for new vulnerability and tasking order notices.
- Oversee, evaluate, and support the documentation, validation, and accreditation processes necessary to assure that new Information Technology (IT) systems meet the organization's Information Assurance (IA) and security requirements.
Confidential
Cyber Security Analyst
Responsibilities:
- Provide enterprise Information Assurance services in a very large Confidential data center.
- Provide support by conducting assessments of threats and vulnerabilities, determine deviations from acceptable configurations or enterprise or local policy, assess the level of risk, and develop and/or recommend appropriate mitigation countermeasures in operational and non-operational situations.
- Monitor the Information Assurance Vulnerability Alerts (IAVA), Information Assurance Vulnerability Bulletin (IAVB), Information Assurance Vulnerability Technical Advisory (IAVT) notices, Communication Task Orders (CTOs), and appropriate websites for new vulnerability and tasking order notices.
- Oversee, evaluate, and support the documentation, validation, and accreditation processes necessary to assure that new Information Technology (IT) systems meet the organization's Information Assurance (IA) and security requirements.
Information Technology Security Consultant
Confidential
Responsibilities:
- Hands on technical manager.
- Architect network and data systems. Provide technical support for end users via phone and desktop remote software.
- Servers include Novell Netware, Novell GroupWise, Microsoft Windows, Microsoft Exchange, Symantec Corporate Anti-virus, Bluecoat Proxy, TriGeo SIEM, Cisco Switches, Cisco ASA/Pix, Cisco ASA SSM.
- Review all sensor logs, snort & Firewall for intrusion attempts and anomalies.
- Configure offsite reporting via e-mail of any possible intrusions that trigger the security sensors.
- Manage I.T. budget and purchase all computer related equipment.
- Administrate data backups.
Private Consultant
Confidential
Responsibilities:
- Install/Support Cisco Pix at client sites.
- Monitor and analyze IDS detects and provide the relevant information to management and systems administrator.
- Ensure firewall is running current IOS release.
- Ensure intrusion detection system is patched at current level and signatures are up to date.
- Analyze data traffic on IDS detects to rule out false positives.
- Educate computer users on safe computing practices. Designed/Implemented a Network Address Translation solution on 5 computer networks.
- Designed/Implemented a client VPN solution for secure access to internal data systems. Serve as back-up Network Administrator
Department I.T. Manager
Confidential
Responsibilities:
- Hands on technical manager.
- Responsible for the initial setup of new state agency computer systems across the state.
- Provide technical support for end users via phone and desktop remote software.
- Servers include Novell Netware, Novell GroupWise, Microsoft Windows IIS, Symantec Corporate Anti-virus and Microsoft SQL 2000. Administer Novell user/e-mail accounts access privileges.
- Administer 2 Avaya Prologic phone switches.
- Perform weekly vulnerability scans of all computer systems. Maintain a TCP audit log of all data traffic.
- Review all sensor logs, snort & Firewall for intrusion attempts and anomalies.
- Configure offsite reporting via e-mail of any possible intrusions that trigger the security sensors.
- Manage I.T. budget and purchase all computer related equipment.
- Administrate data backups.
- Responsible for physical security of data processing assets.
Confidential
Systems Administrator
Responsibilities:
- Responsible for administering a Novell/NT network on the Confidential in Cheyenne, Wyoming.
- Effectively troubleshot problems at the desktop and on the servers.
- Upgraded software packages as needed. Preformed hardware maintenance on servers and workstations.
- Provided end-user support to over 100 users.
Confidential
Network Consultant
Responsibilities:
- Responsible for maintaining and upgrading approximately 20 company networks in Laramie and Cheyenne, Wyoming.
- Duties include performing hardware and software upgrades on various server and workstation computer systems.
- Provide end-user technical support on desktops and servers.
Confidential
Systems Engineer
Responsibilities:
- Provided pre-sales advice to business and sales people on current technologies.
- Provide design, installation of network equipment, servers, and desktops for business.
- Provide telephone and onsite technical support to business clients.