We provide IT Staff Augmentation Services!

Security Analyst Resume

2.00/5 (Submit Your Rating)

SUMMARY

  • Good understanding of policy definitions, procedural descriptions and practical control implementation Driven for continuous improvement
  • Creative and innovative; able to provide solutions that result in improved cyber security for the company;
  • Good verbal communication skills
  • Professional in appearance and demeanor;
  • Self - reliant to maintain appropriate skills required to perform the job;
  • Team player, making decisions based on what is best for the company;
  • Ability to lead key initiative efforts and tasks critical to the success of projects
  • Detail oriented, organized and able to comprehend and explain difficult technician concepts to end users and co-workers;
  • Organized and committed to administrative tasks required to perform the job;
  • High professional ethics and respect administrative policies;
  • Committed to deliver IT world class security;
  • English spoken and
  • Technical Writing experience.

TECHNICAL SKILLS

  • McAfee ePO
  • Norton Ghost/Explorer
  • Monitoring tools: Orion,
  • McAfee EEM
  • PXE
  • Xymon
  • McAfee VSE
  • Microsoft OST/MDT/WAIK
  • Palo Alto (PA-4.0) Panorama
  • McAfee EEPC
  • SCCM
  • Firewall
  • QualsysGuard
  • Windows XP
  • Cisco Catalyst 355048
  • Digital Guardian
  • Professional/Windows 7 Enterprise
  • Solarwinds Orion (Network
  • IronKey
  • OS Administration monitor)
  • Safeboot/Wintech
  • Sysprep
  • Juniper EX8200
  • BartPE
  • Linux/Unbuntu
  • Aventail EX-1600
  • Symantec Endpoint
  • Mac OSX Mountain Lion
  • Websense
  • Tripwire iPad/iPhone
  • VoIP
  • RSA Envision
  • Remote Desktop
  • Virtual Instruments TAPS
  • Sophos AV
  • Virtual Box
  • Sophos Enterprise
  • Console
  • 2010 Exchange Server
  • Altiris
  • Windows 2003/2008 Server
  • Adobe Creative Suite
  • PC Anywhere
  • SQL
  • Visual Studio
  • PSExec
  • Active Directory
  • C++
  • Windows MSI
  • Group Policy
  • PHP
  • Group Shield
  • ASP.NET
  • IIS v5.0/6.0/7.0
  • Javascript
  • Microsoft .Net Framework
  • XML/DHTML
  • BES
  • Microsoft CRM
  • FTP
  • Panduit cabinets
  • Networking Cabling
  • Supervised vendor installation of Blade/SAN/AIX Servers
  • Dell
  • HP
  • Dell desktops/Laptops
  • HP desktops/X800 Workstations/Laptops
  • Lenovo Desktops/Laptops
  • Mac desktops/laptops iPAD and other thin clients
  • Catalyst Routers/Switches
  • F5 Load Balancing
  • Cisco routers/Switches
  • Juniper routers
  • Fluke tools
  • Liebert UPS

PROFESSIONAL EXPERIENCE

Confidential

Security Analyst

Responsibilities:

  • Coordinates and executes risk assessments on operating systems, networks, databases, middleware and devices.
  • Responsible for providing expertise in the areas of compliance and IT Security audit risk management.
  • Responsible for risk assessment and resolution follow-up to assure compliance with applicable internal regulatory and legal requirements.
  • Configures enterprise vulnerability assessment tools, performs internal/external scans, analyzes detected vulnerabilities, identifies the relevant threats and eliminates false positives through manual validation.
  • Conducts formal risk analysis and self-assessments program for various Information Services systems and processes.
  • Contributes expertise to help determine requirements and functional specifications for entire organization.
  • Generates reports on assessment findings and summarizes them to facilitate remediation tasks for other operational teams.
  • Works effectively with cross-functional and/or global teams, readily shares information with others. Qualifications:
  • Possesses strong security/risk/legal knowledge.
  • Information Technology audit practices
  • Solid working experience and knowledge of *nix operating systems (admin skill in Linux/AIX a plus).
  • Knowledge of Windows networking, windows domains and active directory, GPOs and end-point security
  • Knowledge of various compliance regulations - PCI, HIPAA, SOX, NIST, and PHI
  • Knowledge of risk assessment design and delivery
  • Knowledge of governance, risk, and compliance systems. Problem solving skills.
  • Experience in preparing reports and metrics on the status of completed assessments, progress of remediation actions and performance of the assessment tools.
  • Excellent communications and collaboration skills
  • Process analysis skills

Confidential

Provisioning Technician

Responsibilities:

  • Data Implementation Department TCP/IP routing and subnetting IP security principles
  • Internet Application protocols (ssh, pop/imap/smtp, http, dns, radius/tacacs)
  • Advanced IP topics (MLPS, QOS, VOIP, OSPF)
  • Command Line operation of Cisco, Juniper, Alcatel or Adtran network elements IPERF Testing Route Bleeding
  • Involved in the provisioning of core IP network including MPLS, BGP and other routing protocols, as well as troubleshooting and programming CPE (customer premise equipment).
  • The Data Implementation Department has the responsibility for all Frame Relay, Asynchronous Transfer Mode (ATM), and iQ Enhanced Port services, Dedicated Internet Access (DIA), Virtual Private Network (VPN), Data Backbone circuits, and CPE (Router Configuration) services. These responsibilities include but are not limited to the layer 2 and 3 testing, building and activation of these services. We provide service to internal and external Qwest customers including Wholesale, Partner Channels, Major Accounts, Government, International, BellSouth/QC Network to Network Interface and Domestic customers. The team offers customer service at every level for new installation activities, circuit upgrades and regrooms, and disconnects by working closely with Sales/Account Teams, the customer, and customer representatives.
  • Tier 2 IP production support for field network engineers and special projects.

Confidential

Network Security Analyst

Responsibilities:

  • Create firewall policy rules
  • Convert rules from IP-based to Application-based filtering
  • Create firewall zones
  • Apply Zone-based Firewall policies
  • Capture and analyze packets/Packet Capture
  • Create custom App-ID
  • Report new Apps to Palo Alto/Applopedia
  • Modify existing firewall rules
  • Analyze and research existing traffic patterns
  • Create Traffic Baseline and GAP Analysis documents
  • Provide performance, compliance, security violation and other reports (number of probes/penetration attempt metrics, web access reports, etc.) for network security components (if/when requested)
  • Perform network traces (packet captures) and query/mine logging infrastructure to investigate and/or troubleshoot performance issues, security incidents, etc. (if/when requested)
  • Use security tools to audit infrastructure, detect issues and coordinate remediation of any issues: Wireshark McAfee SIEM, CounterACT NAC ORION-Solarwinds Deploy, maintain, and troubleshoot firewalls, Intrusion Detection, VPN appliances, vulnerability assessment tools, event and log analysis, security change tracking and other network security systems and devices. o Research and design solutions to technical and business problems. o Follow, develop and improve network and security configuration procedures. o Stay abreast of security concerns/issues and regularly update network engineering and operations

Confidential

OPERATIONS SUPPORT SPECIALIST

Responsibilities:

  • Support of all field personnel of the Business Class team
  • Routing of daily customer appointments (work orders),
  • Advance calls to customers confirming appointments,
  • Managing technician routes,
  • Balancing work order assignments using various resources or computerized workforce management applications for coordination in a fast-paced, changing commercial service environment.
  • The position also requires overseeing customer appointment timeframes.
  • Responsibilities include the creation, tracking and reporting of work activities by the field technicians; Collecting and reporting GPS status, programming and testing customer routers for proper operation; and the collecting, recording and reporting various information that may include tool lists, test equipment assignments, vehicle inspection reports, CPE inventory status, etc. o Will input, revise or complete work orders in the billing system.
  • Develops, completes and maintains forms, reports and schedules tracking department activities. o Collects data and calculates the progress of multiple work activities for video, digital, high-speed data and Business Class Phone (BCP) services.
  • Knowledge on the operation of phone, video and data networks, including computer hardware and OS required.
  • Will assist in the troubleshooting of phone, video and data services with field personnel and customers.
  • Experience with: ICOMS/CSG Microsoft Excel, Word, Outlook and Office skills.ATG/Peakview, OMSe, IssueTrak, IPMT, TACACS SalesForce.
  • High Speed Data trouble shooting Data networking Digital phone

Confidential

Systems Engineer/ Manager

Responsibilities:

  • Audit clients to ensure security software is installed/enabled (hard disk, ePO, and DG)
  • Iron Key - Create new users and invitations / Recommission device and accounts
  • Iron Key - L2 support for problems
  • EEPC - L2 support for system data recovery
  • EEPC - L2 support for systems experiencing problems
  • EEPC - Remove records for "retired" / "non valid" clients
  • EEPC - Remove records for renamed/reimaged clients
  • EEPC - Run duplicate GUID query and remediate
  • EEPC - Create and distribute Compliance Reports ePO - Remove records for "retired" / "non valid" clients ePO - Audit groups for OS and move to proper groups ePO - DAT verification ePO - Validate "pull tasks" are running ePO - Move Lost & Found computer to correct groups ePO - Monitor for "rogue systems" and resolve ePO - Verify VSE for storage activity ePO - Run duplicate records query and delete duplicate records ePO - Fix systems no longer compliant (out of date DAT or not communicating properly) ePO - Monitor for malware and take action when necessary
  • VSE - Monitor for malware and take action when necessary

Confidential

SME Network Administrator

Responsibilities:

  • Basic Knowledge in Configuring and Troubleshooting CISCO Routers & Switches
  • Basic knowledge of SNMP, telnet, SMTP and TCP/IP
  • Palo Alto Firewall - administration as well as advanced tasks like designing policies, updating NAT rules, log reporting.
  • Good knowledge in all various Protocols like static Routing, EIGRP, OSPF, HSRP, RIP, SNMP etc.
  • Basic knowledge with security equipment such as Checkpoint firewalls, ASA 5500
  • Hands on experience with AAA server like RADIUS
  • Strong technical support background includes LAN and WAN troubleshooting, administration and support
  • Working knowledge of Zone based firewall and classic IOS Firewalls
  • Proficient oral and written communication skills to effectively communicate with operations and other technical groups for troubleshooting and problem resolution
  • Hands on experience on working with Helpdesk ticking system to track troubleshooting issues
  • Involved in Setting-up Router and switches IOS Configurations as per the Design Layout
  • Monitor and manage network work performance with SNMP.
  • Designed policies and set up basic configurations on ASA Firewall such as configuring object groups and ACL's as per the business requirement
  • Provided assistance for 3rd Party/On-site Contact/Vendor management
  • Prioritized & Analyzed alerts generated on a day-to-day basis
  • Maintained existing Network Design using Visio & other office tools

Confidential

Systems Engineer/Administrator

Responsibilities:

  • L2 Support for software, image and hardware problems
  • Participate in Client Update activities
  • Support Infrastructure Client Management with managing standard matrix (configurations, images, lifecycle)
  • Support and participate in projects related to client management (OS, Software upgrades, Hardware changes, etc)

Confidential

SME Image Administrator

Responsibilities:

  • Image deployment - experienced in Norton Ghost, Windows WAIK-MDT.OST and SCCM
  • Image Standard and Configuration
  • Manage Image Matrix
  • Maintain Image Repository
  • PStart Configuration and Maintenance
  • L2 Support for Image Problems

Confidential

SME Blackberry Administrator

Responsibilities:

  • Monitor and track status of Blackberry server(s)
  • Support Blackberry server events (failures, alerts/notifications, poor performance)
  • Level 2 user support for Blackberry Devices (Hardware, Software, How To)
  • Account creation
  • Account deletion
  • Participate and support project activities impacting Note(s) servers and Client environment
  • Account management through Spring Wireless Manager for supporting and testing problem to identify resolution
  • Blackberry device break/fix

Confidential

Support Engineer

Responsibilities:

  • Hardware and software support in a total Microsoft environment.
  • Support and maintain 250+ servers, 1000 client desktops Add new users and change user profiles in Active Directory Create, change and add functions to Group Policy Monitor server log and events 2010 Exchange Server troubleshooting Blackberry Exchange Server (versions 4, and 5) Firewall maintenance and troubleshooting Remote desktop administration Setup VPN
  • Administer Blackberry and Droid devices iPad Administration and networking

Confidential

IT Support Analyst

Responsibilities:

  • Blend of hardware and software troubleshooting
  • Support VM services
  • Support users experiencing issues with .PHP and metadata, examine and solve PHP errors
  • Debug xml coding
  • Authentication problems
  • FTP and HTTP uploading issues
  • Supporting proprietary software utilized specifically by libraries around the world.

Confidential

Support Engineer

Responsibilities:

  • Banking office hardware refresh project
  • Managed tech contractors during afterhours de-installation of legacy hardware and deban of HDDs for computer recycling via Regency. Removed old hardware and printers. Installed new hardware, preconfigured with OS and Huntington proprietary software.

Confidential

IT Administrator and Web Development

Responsibilities:

  • Supported 20 workstations, and four servers.
  • Windows 2003 server environment and worked daily in active directory, Exchange and group policy purchase and implementation of VoIP solution and handled user issues
  • Supported company website collaborated on the implementation of new websites
  • Developed in action script, VB, ASP.Net and html/xml

Confidential

Consultant, Technical Support Specialist

Responsibilities:

  • Assisted in the technical conversion of Sky Bank branches to Confidential branches.
  • Created a 40 page documentation process that vendor techs used in installing new workstations in bank branches imaged with the Virtual Huntington desktop via Altiris.
  • Assisted vendor teams in setting up new HP workstations in an MPLS Circuit (WAN)
  • Troubleshooting installation of 48 port Cisco Catalyst Switches and Cisco Routers, including VoIP configuration assistance and troubleshooting
  • Assisted in the installation of new Windows 2003 Servers and NETOP into workstations to correct virtual machine setup errors
  • Troubleshooting VLAN problems of multiple subnets.
  • Troubleshooting DHCP issues
  • Decommissioning servers and deinstalling servers to be absorbed either into Huntington or for sale. Transfer of SAN.
  • Responsible for deinstalling training room computer equipment and created the process flow of returning equipment to a facility to be reimaged and then redeployed.
  • Oversaw the physical deinstallation of equipment via vendor teams and redeployment process
  • Worked closely with Project Management and project Statement of Work.

Confidential

Technical Support Agent

Responsibilities:

  • Assist in DSL setup for all OS systems, including Vista and Mac OS
  • Troubleshoot TCP/IP
  • Assist in establishing a wireless network, installing wireless routers and wireless ethernet adapters
  • Troubleshooting basic hardware issues
  • Troubleshooting customer computer software configurations
  • Used Remedy ticket system.
  • Unresolved network issues are escalated to MCO after determining no sync/no route issues

We'd love your feedback!