We provide IT Staff Augmentation Services!

Security Architect Resume

5.00/5 (Submit Your Rating)

SUMMARY:

  • 18 Yrs Information Security Experience ITIL Foundations and GSLC Certified - 8 Yrs Project Management Experience Confidential Experience
  • Unique combination of extensive public and private IT expertise, security experience and communication skills.
  • Team player with outstanding technical, management and administrative knowledge.
  • Enterprise IT Security Management, Computer Forensics, Counterintelligence, Project Management, Federal Law Enforcement, Manager

SUMMARY OF KNOWLEDGE:

O/S: Windows Server 2000 / 2003 / 2008 / 2012 , Windows NT / XP / 7 / 8 / 10, Linux

Applications: SQL Server, IIS, Apache, Exchange, Microsoft Office Products, BackTrack, Metasploit, Wireshark, Encase, Scripting (PowerShell, Perl, VBScript), Remedy, Altiris, Active Directory, Forensic Toolkit (FTK), Archer, Splunk

Services: C&A, Auditing & Compliance, Firewall (Sidewinder), IDS/IPS, Endpoint Protection (Trend Micro, McAfee & Symantec), Proxy (Bluecoat, Ironport, Websense), Virtualization (VMware), Routers/Switches/VPN (Cisco & Avaya), PKI, Risk & Vulnerability Assessment (Nessus, Qualys, ISS), Boundary Protection, Intrusion Detection, Data Loss Prevention (DLP), PKI, eGRC, Cloud Security (Azure & O365)

EXPERIENCE AND JOB HISTORY:

Confidential

Security Architect

Responsibilities:

  • Coordinate with relevant management teams and vendors to advance security posture and mitigate environmental threats to the organization and its customers.
  • Identify gaps in the security architecture and develop solutions to best address and mitigate.
  • Evaluate security solutions and provide recommendations and best practices for implementation to best meet organizational goals and business mission.
  • Actively monitor and research cyber threats with a direct or indirect impact to the Confidential brand, business operations, or technology infrastructure.
  • Participate in cyber security incident response activities, including investigation, coordination, and reporting of security events with root cause analysis.
  • Build, staff and manage 24/7 Security Operations Center.

Confidential

IT Controls Specialist

Responsibilities:

  • Design, implement and manage a firm wide Certification and Accreditation (C&A) plan in compliance with Confidential 800-53.
  • Define requirements including evidence, retention, threat modeling, and applicability of software and IT systems.
  • Perform procurement, architecture review, gap and annual risk assessments on IT systems, identifying required risk or compensating controls.
  • Track and manage mitigation efforts.
  • Actively monitor, evaluate and research cyber threats with a direct or indirect impact to Confidential brand, business operations, or technology infrastructure.
  • Participate in cyber security incident response activities, including investigation, coordination, and reporting of evolving threat event data and malicious activity.
  • Publicize and maintain security directives, policies and procedures.

Confidential

Information Security Analyst

Responsibilities:

  • Assess daily, weekly, and monthly report vectors to provide expert analysis, and assessments of current compliance, malicious activity and risk of IT environment.
  • Perform administration of global Anti-Virus and Data Leak Prevention servers and services.
  • Develop and support briefings to Security management as a cyber-forensic subject matter expert.

Confidential

Information Security Manager

Responsibilities:

  • Performed, managed, and reported on vulnerability and penetration testing applications.
  • Responsible for timely implementation, compliance, and validation of patch management.
  • Provided guidance and ensured process and controls in place across IT met compliance, incorporated regulatory changes, and mitigated risk in line with business requirements.
  • Designed and administered the production environment including infrastructure architecture, systems and services, authentication and encryption, and boundary protection.
  • Maintained the IT certification and accreditation documents ensuring all systems, services, and risks were identified, met compliance, and received business approval.
  • Primary incident responder who monitored logs, automated sensors, and intrusion detection systems to identify and handle malicious events including intrusions and illegal activity.
  • Additional duties included; Server administration, Helpdesk support, PKI/certificate management, Tier 3 technical troubleshooting, vendor review, scripting (automation).
  • Individually recognized by name by the Inspector General team during a major inspection in which my team received an “Excellent”.
  • Identified as an Information Assurance subject matter expert, and assigned to provide overall guidance and IA support to 15 other bases within the Air National Guard.

Confidential

Information Security Analyst

Responsibilities:

  • Supported 8-12 projects while performing Information Assurance related duties (C&A).
  • Engineered solutions and processes to identify and assess risks in the current environment.
  • Educated employees, contractors, and vendors of newest threats and best practice to keep the network environment in a high state of readiness, operational, and safe state of use.

Confidential

Special Agent

Responsibilities:

  • Planned and conducted investigations of significant criminal violations, allegations, or fraud against the government and matters affecting national security.
  • Developed comprehensive threat assessments that detailed new techniques, technologies, and preventive measures while correctly assessing the current level of risk.
  • Performed Computer Forensics including collection and interpretation of digital evidence.

Confidential

Network Security Specialist

Responsibilities:

  • Managed, monitored, and analyzed organization boundary tools including firewalls, proxy servers, mail gateways, routers, switches, traffic analysis monitors, event management systems, VPNs, and intrusion detection devices in a global IT organization.
  • Directly responsible for the security and availability of over 6,000 users and network nodes across multiple internal, external, and DMZ networks including over 500 remote users.

We'd love your feedback!