Security Operations Analyst Resume
2.00/5 (Submit Your Rating)
SUMMARY:
- Experienced Information systems professional with over 20 years of Information Technology experience in analysis, development and delivery of high performance technology solutions.
- Readily adapt to new technology via education and implementation experience.
- Extensive experience supporting clients on - site.
- Exceptional relationship-building skills in communicating with all levels, front line to
- CEO.
- Self-motivated team player and problem solver with strong analytical, organizationalwritten and oral communication skills.
- Proven track record of building and maintaining professional customer relations.
PROFESSIONAL EXPERIENCE:
Security Operations Analyst
Confidential
- Assigned to conduct C&A activities according to Risk Management Framework (RMF) for continued security evaluation to include, but not limited to, reviewing, updating, creating, maintaining, and/or testing system documentation (SSP, Risk Assessment Reports, Security Test &Evaluation Reports, Security Assessment Reports) for annual assessments/continuous monitoring.
- Provide Information System (IS) security oversight of FISMA systems utilizing Windows and Solaris platforms.
- Participate in change advisory boards to review proposed system changes for Information Technology (IT) security risks and recommended compensating controls when applicable.
- Develop, implement, and maintain a secure environment for connected program IS using weekly, monthly, and quarterly vulnerability scans to mitigate system risk.
- Coordinate with system administrators to mitigate vulnerabilities identified in scan reports using best practices for reviewing, auditing, analyzing, and resolving technical and operational problems.
- Responsible for tracking identified system weakness using Plan of Action and Milestones (POA&Ms) for the system and among team members.
- Responsible for maintaining and reviewing documents and tracking POA&Ms entered into the Cyber Security Assessment and Management (CSAM) System.
- Prepare formal presentations to brief key stakeholders on associated C&A continuous monitoring and assessment activities.
Operation Engineer
Confidential
- Maintained the internal CMI network.
- Responsible for maintaining sales programs (Strata, Novar, and Salesminder).
- Administered and maintained Seachange hardware used to encode TV commercials.
- Maintained all PC’s, printers and copier equipment.
- Worked on major network upgrades, migrations and integrations.
- Performed system maintenance on Confidential Avid production equipment.
HSI Tech
Confidential
- Troubleshot customer’s high speed internet problems on Windows/Mac boxes.
- Created, managed and troubleshot customers email accounts and logins.
- Analyzed trends in customer problems for possible outages.
- Generated trouble tickets using Remedy software.
- Assisted customers with the self installation process for high speed service.
- Provisioned customer equipment and email addresses.
,Network Administrator
Confidential
- Created and maintained user and group accounts and policies.
- Performed routine server backups for Windows, Novell, and UNIX (Solaris) systems.
- Implemented upgrades and policies regarding network security.
- Performed network monitoring.
- Created and managed shared folders.
- Maintained all servers, PC’s, workstations and printers.
Network Administrator
Confidential
- Maintained Confidential ’s internet access, services, and web sites.
- Managed and created all user accounts.
- Monitored server performance.
- Managed disaster recovery using Veritas Volume Manager.
- Performed MS Outlook email administration.
Network/Systems Administrator
Confidential
- This project was supporting a lab environment for SECRET/TOP SECRET Army/Navy modeling and simulation environment.
- Configured a network of Sun SPARCstation, SGI Indigo2, and NT Servers.
- Installed operating systems, support application and model upgrades on each platform.
- Managed a mixed HP-Unix and Windows NT network in a secure lab environment.
- Installed WebLogic servers.
Medical Information Systems Manager
Confidential
- Maintained the medical computer system supporting the hospital.
- Responsible for the Composite Health Care System (CHCS), two Novell Servers, and two Microsoft Servers, which comprises the Office Automation System and one IBM AS400 serving the Greater Dayton Area Hospital Association.
- Performed routine server backups, managed user accounts, and troubleshot workstation problems for hospital users.
- Uploaded systems/applications (NT and 95), worked on software/hardware upgrades, and performed the 74th Medical Groups hospital network migration.
- Worked with Novell ManageWise and GroupWise software for administration.
- Performed routine server backups, gateway backups/checks, and various software/hardwareupgrades associated with medical operating system.
Telecommunications System Administrator
Confidential
- Managed the hospital video teleconferencing, voice-mail, telephone/cellular phone and paging systems.
- Setup and conducted numerous VTC calls for various doctors in the medical center.
- Granted accesses and user functions for new voice-mail and telephone accounts.
- Processed new phone line requests and managed telephone billing for the medical center.
- Monitored and maintained the Motorola Modex 1000 paging system which supported the 600 plus pagers throughout the hospital.
Information Systems Manager
Confidential
- Managed the real time computer accesses for over 600 remote terminals on a LAN/WAN.
- Monitored the operation of the Distribution Communication Processor 40 mainframe.
- Coordinated between the Base Network Control Center customers and system monitors at Kelly Air Force Base.
- Participated in base-wide system migration.
- Assisted customers in setup and configuration of computer hardware and software.
TECHNICAL SKILLS:
Databases: Microsoft SQL Server 2000, Microsoft Access.
Operating Systems: Windows Server 2003, Windows 7, Linux, Sun Solaris, HP-UNIX
Software: Microsoft Systems Management Server (SMS), Norton Antivirus, Norton Ghost, Veritas Volume Manager
Hardware: Dell Servers, Sun Servers