We provide IT Staff Augmentation Services!

Security Analyst Resume

4.00/5 (Submit Your Rating)

Herndon, VA

SUMMARY

  • I am a certified CIH, Network+, Security+ and soon to be Certified Ethical Hacker security professional, with proven ability to diagnose, troubleshoot and resolve security compromises.
  • I am also a quick learner with strong working knowledge of security applications/platforms, software, hardware, and network processes.
  • I possess outstanding communication and interpersonal skills: demonstrated background in working well with peers in a one - on-one and team setting environments.
  • Also, I am analytical and problem-solving capable, with extensive experience in security operations.
  • Experience in the maintenance and enforcement of Business Continuity Management policy.
  • Experience with the management and enforcement of peripheral and soft access policy.
  • Experience with the maintenance and enforcement of web use policy.
  • Proficiency with the management and enforcement of corporate email policy.
  • Experience with the management and enforcement of corporate internal information policy.
  • Experience with the management and enforcement of user remote login/VPN policy.
  • Experience with adherence to remote troubleshooting and/or investigation policy involving sof t ware such SecureCRT, EnCase, and TACACS.
  • Experience with adherence to VMware use policy.
  • Experience with the enforcement and practice of security incident handling policy.
  • Experience with policies outlining the proper escalation of security teams such as CSIRT, ASOC, ART, ERT, and Forensics.
  • Experience in participating in projects involving security applications utilization documentations.
  • Proficiency with management of high level hacking incidents involving various security teams.
  • Proficiency with management and remediation of phishing/social engineering attempts.
  • Proficiency with security systems monitoring using event viewers.
  • Highly familiar with network traffic analysis via Arbor Peakview event viewer.
  • Extensive experience with searching and creating reports via Splunk.
  • Proficiency with pulling data and configuring dashboards to visualize the data via Splunk.
  • Experience with network penetration testing tools such as Qualys.
  • Highly familiar with packet capture softwares such as Netwitness and Wireshark.
  • Proficiency with IDS/IPS systems such as SourceFire.
  • Extensive experience in encryption techniques and methods such as RSA, SHA, and MD5.
  • Extensive experience in Host IDS/IPS systems such as McAfee.
  • Proficiency with system wide access tools such as Encase and TACACS.
  • Managed & Monitored performance tuning and capacity planning activities to enhance the performance of the network resources.

TECHNICAL SKILLS

  • Networks:Software/OS:Firewalls:IDS/IPS:TCP/IP Implementation (subnetting, network design, and manual summarization); DNS, DHCP, NTP, and ICMP protocols; Layer 2 and layer 3 packet structure; packet header, payload and trailer contents.Cisco OS; Windows NT 2008 and 2013; Windows 7 and 8 Cisco ASA Firewalls, Juniper Firewalls Cisco, SourceFire, McAfee

PROFESSIONAL EXPERIENCE

Confidential, Herndon, VA

Security Analyst

Responsibilities:

  • Trained new hires on security operations processes and security tools/platforms.
  • Tasked with the management and maintenance of physical business continuity resources.
  • Participated in projects with corporate business processes unit to document the use/function of several new enterprise security tools.
  • Participated in quarterly internal social engineering projects to gauge user intelligence on social engineering attempts/vectors.
  • Gathered information on attack vectors involving DDoS attacks, phishing, and hacking compromises when necessary.
  • Routine malware analyses using VMware platforms such as Kali Linux and Remnux.
  • Responsible for the initiation, monitoring, and termination of vulnerability scans as part of penetration testing the network with tools such as Qualys.
  • Daily troubleshooting and remediation of network security compromises that involve hardware such as email, DHCP, DNS, and NTP servers.
  • Monitored, Investigated, and escalated Sequel Injection and Brute Force attacks via portals provided by AlertLogic and Naviweb while collaborating with their security teams.
  • Investigated malware such as ransomware, spyware, and other information collecting malware regularly while cross-collaborating with teams such as the Local-IT, hardware admins, CSIRT, and Forensics.
  • Investigated and remediated network security vulnerabilities exploited by malware that have been identified by McAfee Host IDS/IPS system, and also processed the required system patch in conjunction with Local-IT and McAfee security team.
  • Generated forensics reports via Arbor Peakview on unmitigated traffic while providing analysis of the traffic to various teams on behalf of the Cyber Defense Center.
  • Tasked with collecting information on potential threat vectors passively from sources such as virustotal.com, IPvoid.com, domaintools.com, and other public malware analysis communities.
  • Daily monitoring and mitigation of DDoS attacks utilizing various ports and traffic patterns via Arbor Peakview while also providing a summary report of the DDoS attack to upper management.
  • Monitored and investigated access alerts involving numerous failed logins, and unknown SSH and Telnet attempts.
  • Acquired vendor certifications in creating dashboards, panels, and reports in Splunk.
  • Collaborated with security teams such as CSIRT, ART, ERT, and Forensics in investigating compromises and attacker TTP’s.
  • Conducted reconnaissance with scanning and recon applications such as Nmap and pingsweep.

Confidential, Greenbelt, MD

Network Analyst

Responsibilities:

  • Responsible for the monitoring and management of 100,000+ network devices.
  • Provided Tier I incident response to the Security Operations Center.
  • Tasked with the monitoring and troubleshooting of alerts and events on security devices such as Cisco and Juniper firewalls. collaborated with security teams on security compromises and their attack vectors.
  • Extensive experience in collaborating with security engineers during forensic analyses.
  • Daily monitoring and troubleshooting of network machines running both Windows and Linux systems.
  • Monitored customer networks using programs such as Netcool, Zenoss and IRIS.
  • Troubleshot routers, switches, servers and monitoring/collector devices.
  • Maintained network functionality and up-time.
  • Opened tickets when requested by customer or if down device/appliance mandated.
  • Responded to alerts, alarms and events effectively and in a timely fashion.
  • Kept customers accurately updated on all network events and device statuses.
  • Escalated and logged tickets appropriately and with urgency.
  • Maintained familiarity over various customer networks and topologies.
  • Possess knowledge of the different types of alarms and their remedies.
  • Process RMA’s and TAC cases when necessary with appropriate vendors.
  • Maintain an open and effective line of communication with customer carriers.
  • Kept team aware and updated on tickets that need special attention and any updates.
  • Logged customer maintenance and upgrade windows and kept teams updated.

Confidential, Rockville, MD

Telecom Technician

Responsibilities:

  • Monitor network activity and troubleshoot connectivity problems using ping, trace route, nslookup, & show commands.
  • Collaborated and coordinated with security engineers on any system updates, installs, and patches.
  • Implement new software and hardware to existing network.
  • Installed and Configured Telecom equipment (Avaya, Nortel, PolyCom, Switches, Hubs).
  • Installed and Traced Cables from TC to SR, or vice versa.
  • Moved users or/and equipment to specified locations and reconfigured equipment.
  • Tasks in inventory: Order/maintain/ship equipment to users/remote offices as necessary.
  • Kept logging management and escalations as appropriate of technical trouble tickets.
  • Coordinated with the NOC team on any System fixes/upgrades/patches.
  • Configured and maintained ports for VOIP equipment.
  • Built and configured 300 VOIP phones and 30 polycoms.
  • Maintained VM accounts for over 1200 workforce using Nortel CallPilot.
  • Built remote VPN VOIP phones using PBX.
  • Configured ports and necessary telecom hardware for new hires.
  • Assisted users with malfunctions or tickets using FootPrint.

We'd love your feedback!