Security Analyst Resume
4.00/5 (Submit Your Rating)
Herndon, VA
SUMMARY
- I am a certified CIH, Network+, Security+ and soon to be Certified Ethical Hacker security professional, with proven ability to diagnose, troubleshoot and resolve security compromises.
- I am also a quick learner with strong working knowledge of security applications/platforms, software, hardware, and network processes.
- I possess outstanding communication and interpersonal skills: demonstrated background in working well with peers in a one - on-one and team setting environments.
- Also, I am analytical and problem-solving capable, with extensive experience in security operations.
- Experience in the maintenance and enforcement of Business Continuity Management policy.
- Experience with the management and enforcement of peripheral and soft access policy.
- Experience with the maintenance and enforcement of web use policy.
- Proficiency with the management and enforcement of corporate email policy.
- Experience with the management and enforcement of corporate internal information policy.
- Experience with the management and enforcement of user remote login/VPN policy.
- Experience with adherence to remote troubleshooting and/or investigation policy involving sof t ware such SecureCRT, EnCase, and TACACS.
- Experience with adherence to VMware use policy.
- Experience with the enforcement and practice of security incident handling policy.
- Experience with policies outlining the proper escalation of security teams such as CSIRT, ASOC, ART, ERT, and Forensics.
- Experience in participating in projects involving security applications utilization documentations.
- Proficiency with management of high level hacking incidents involving various security teams.
- Proficiency with management and remediation of phishing/social engineering attempts.
- Proficiency with security systems monitoring using event viewers.
- Highly familiar with network traffic analysis via Arbor Peakview event viewer.
- Extensive experience with searching and creating reports via Splunk.
- Proficiency with pulling data and configuring dashboards to visualize the data via Splunk.
- Experience with network penetration testing tools such as Qualys.
- Highly familiar with packet capture softwares such as Netwitness and Wireshark.
- Proficiency with IDS/IPS systems such as SourceFire.
- Extensive experience in encryption techniques and methods such as RSA, SHA, and MD5.
- Extensive experience in Host IDS/IPS systems such as McAfee.
- Proficiency with system wide access tools such as Encase and TACACS.
- Managed & Monitored performance tuning and capacity planning activities to enhance the performance of the network resources.
TECHNICAL SKILLS
- Networks:Software/OS:Firewalls:IDS/IPS:TCP/IP Implementation (subnetting, network design, and manual summarization); DNS, DHCP, NTP, and ICMP protocols; Layer 2 and layer 3 packet structure; packet header, payload and trailer contents.Cisco OS; Windows NT 2008 and 2013; Windows 7 and 8 Cisco ASA Firewalls, Juniper Firewalls Cisco, SourceFire, McAfee
PROFESSIONAL EXPERIENCE
Confidential, Herndon, VA
Security Analyst
Responsibilities:
- Trained new hires on security operations processes and security tools/platforms.
- Tasked with the management and maintenance of physical business continuity resources.
- Participated in projects with corporate business processes unit to document the use/function of several new enterprise security tools.
- Participated in quarterly internal social engineering projects to gauge user intelligence on social engineering attempts/vectors.
- Gathered information on attack vectors involving DDoS attacks, phishing, and hacking compromises when necessary.
- Routine malware analyses using VMware platforms such as Kali Linux and Remnux.
- Responsible for the initiation, monitoring, and termination of vulnerability scans as part of penetration testing the network with tools such as Qualys.
- Daily troubleshooting and remediation of network security compromises that involve hardware such as email, DHCP, DNS, and NTP servers.
- Monitored, Investigated, and escalated Sequel Injection and Brute Force attacks via portals provided by AlertLogic and Naviweb while collaborating with their security teams.
- Investigated malware such as ransomware, spyware, and other information collecting malware regularly while cross-collaborating with teams such as the Local-IT, hardware admins, CSIRT, and Forensics.
- Investigated and remediated network security vulnerabilities exploited by malware that have been identified by McAfee Host IDS/IPS system, and also processed the required system patch in conjunction with Local-IT and McAfee security team.
- Generated forensics reports via Arbor Peakview on unmitigated traffic while providing analysis of the traffic to various teams on behalf of the Cyber Defense Center.
- Tasked with collecting information on potential threat vectors passively from sources such as virustotal.com, IPvoid.com, domaintools.com, and other public malware analysis communities.
- Daily monitoring and mitigation of DDoS attacks utilizing various ports and traffic patterns via Arbor Peakview while also providing a summary report of the DDoS attack to upper management.
- Monitored and investigated access alerts involving numerous failed logins, and unknown SSH and Telnet attempts.
- Acquired vendor certifications in creating dashboards, panels, and reports in Splunk.
- Collaborated with security teams such as CSIRT, ART, ERT, and Forensics in investigating compromises and attacker TTP’s.
- Conducted reconnaissance with scanning and recon applications such as Nmap and pingsweep.
Confidential, Greenbelt, MD
Network Analyst
Responsibilities:
- Responsible for the monitoring and management of 100,000+ network devices.
- Provided Tier I incident response to the Security Operations Center.
- Tasked with the monitoring and troubleshooting of alerts and events on security devices such as Cisco and Juniper firewalls. collaborated with security teams on security compromises and their attack vectors.
- Extensive experience in collaborating with security engineers during forensic analyses.
- Daily monitoring and troubleshooting of network machines running both Windows and Linux systems.
- Monitored customer networks using programs such as Netcool, Zenoss and IRIS.
- Troubleshot routers, switches, servers and monitoring/collector devices.
- Maintained network functionality and up-time.
- Opened tickets when requested by customer or if down device/appliance mandated.
- Responded to alerts, alarms and events effectively and in a timely fashion.
- Kept customers accurately updated on all network events and device statuses.
- Escalated and logged tickets appropriately and with urgency.
- Maintained familiarity over various customer networks and topologies.
- Possess knowledge of the different types of alarms and their remedies.
- Process RMA’s and TAC cases when necessary with appropriate vendors.
- Maintain an open and effective line of communication with customer carriers.
- Kept team aware and updated on tickets that need special attention and any updates.
- Logged customer maintenance and upgrade windows and kept teams updated.
Confidential, Rockville, MD
Telecom Technician
Responsibilities:
- Monitor network activity and troubleshoot connectivity problems using ping, trace route, nslookup, & show commands.
- Collaborated and coordinated with security engineers on any system updates, installs, and patches.
- Implement new software and hardware to existing network.
- Installed and Configured Telecom equipment (Avaya, Nortel, PolyCom, Switches, Hubs).
- Installed and Traced Cables from TC to SR, or vice versa.
- Moved users or/and equipment to specified locations and reconfigured equipment.
- Tasks in inventory: Order/maintain/ship equipment to users/remote offices as necessary.
- Kept logging management and escalations as appropriate of technical trouble tickets.
- Coordinated with the NOC team on any System fixes/upgrades/patches.
- Configured and maintained ports for VOIP equipment.
- Built and configured 300 VOIP phones and 30 polycoms.
- Maintained VM accounts for over 1200 workforce using Nortel CallPilot.
- Built remote VPN VOIP phones using PBX.
- Configured ports and necessary telecom hardware for new hires.
- Assisted users with malfunctions or tickets using FootPrint.