We provide IT Staff Augmentation Services!

Information Security Engineer Resume

4.00/5 (Submit Your Rating)

Herndon, VA

PROFESSIONAL EXPERIENCE

Information Security Engineer

Confidential, Herndon, VA

Responsibilities:

  • Responsible for managing and delegating access to Tripwire Enterprise console.
  • Deploy Tripwire agents to all systems subject to monitoring for Sox Compliance (Windows, Linux/UNIX & AWS).
  • Conduct disaster recovery exercises with engineering teams to verify that systems replicate appropriately across production and DR site for SOx Compliance purposes.
  • Conduct meetings with vendor (Tripwire) to ensure that console performs as expected and schedule necessary training.
  • Troubleshoot agent connectivity issues in production environment, this ranges from modifying firewall rules to modifying agent configuration files as necessary.
  • Upgrade Tripwire console versions as necessary per vendor specifications (Quarterly)
  • Responsible for configuration, migration and deployment of Tripwire console server into production enterprise environment.
  • Adjust monitoring rules as necessary to ensure proper monitoring of systems and residing application directories.
  • Align all changes within monitored systems to appropriate change requests within Servicenow (Change Management).
  • Report and escalate unauthorized changes to monitored systems within 24 hours of discovery to system and or application owners.
  • Responsible for processing change requests specific to SOx applications and validate documentation (User Acceptance Testing and Quality Assurance) prior to deployment.
  • Develop and document standard operating procedures specific to administration of SOx Applications.
  • Coordinate and host annual meetings with system and business stakeholders of applications to ensure all proper systems and directories are monitored that are subject to Sox compliance (Sarbanes - Oxley)
  • Generate and disseminate reports to internal auditing teams on as needed basis.
  • Conduct monthly internal audit of changes against monitored systems and generate reports that are delivered to management.

IT Security Operations Engineer

Confidential, Sterling, VA

Responsibilities:

  • Assist with management of Confidential System asset inventory.
  • Develop and document SOP’s for vulnerability management and wireless scanning at Inova facilities.
  • Assisted with implementation and testing of Center for Internet Security’s policy compliance tool (CIS CAT) at an enterprise level.
  • Review quarterly vulnerability reports for external systems and report findings to system owners using CVSS model.
  • Responsible for configuring and managing Qualys Express vulnerability scanning tool, on premise.
  • Assist system owners with validating that high risk vulnerabilities are mitigated.
  • Successfully completed multiple assessments of hosts using Kali Linux penetration testing tool using the following software: Metasploit, Armitage, Nmap, Kismet)
  • Conducted internal vulnerability assessments of Inova data centers using Tenable Nessus, delivered findings via pdf reports to system owners.
  • Conduct discovery scans and identify new unauthorized systems on production network using Tenable Nessus.
  • Responsible for management of T ripwire Enterprise console this includes agent updates and installations as well as console updates (FIM).
  • Responsible for coordinating and conducting PCI compliance scanning with 3 rd party vendor Sword & Shield.
  • Conduct Wireless scanning using Kismet Wi-Fi sniffing tool to detect unauthorized devices (Rogue AP’s)
  • Conduct Web Application scanning and deliver reports to requesting personnel using Arachni & HP Web Inspect tools.
  • Assist management personnel with RFP’s for services at Inova.
  • Assist Inova with resolution of internal audit findings in order to meet HIPAA compliance.
  • Responsible for overseeing implementation of Tripwire IP 360 vulnerability management tool.

Security Operations Engineer

Confidential, Washington, D.C.

Responsibilities:

  • Respond to IDS alerts via Verizon services, investigate and validate reports to ensure systems integrity.
  • Rule set Management of Cisco ASA Firewalls devices.
  • Enterprise management of Carbon Black Bit9 parity console, policies and rules.
  • Assisting agency in adhering to standards for minimum security requirements (FISMA).
  • Collaborate with multiple personnel within GSA to mitigate high priority threats to network infrastructure.
  • Management of HP Assessment Management Platform (AMP) for application security testing.
  • Conduct risk assessments of web services and architecture using HP Web inspect.
  • Conduct vulnerability assessments of infrastructure and Amazon cloud services using Tenable Nessus scanning tool.
  • Completed database application scanning & hardening using AppDetective Pro.
  • Submit and review changes to agency firewalls to allow traffic as necessary using Verizon Fed Security system portal.
  • Maintenance of security operations division servers (Linux/Windows)
  • Management of McAfee Nitro Security monitoring tool.
  • Responsible for collaborating with agency ISSO’s and ISSM’s to resolve Windows and Linux/Solaris based authentication issues (PKI/LDAP).
  • Monitor Source Fire Defense Center for malicious activity and sensor health status.
  • Perform agency wide scanning of assets for vulnerability and risk assessment using TripWire IP360.
  • Prepare and deliver vulnerability reports for agency using Tripwire Security Intelligence Hub (SIH).
  • Develop procedures to assist agency meet Continuous Diagnostics and Mitigation (CDM) program as designated by DHS.

Information Security Engineer

Confidential

Responsibilities:

  • Respond to IDS alerts via Verizon services, investigate and validate reports to ensure system integrity.
  • Management of Cisco ASA Firewall devices both internal and external (public) facing.
  • Collaborate with multiple personnel within GSA to mitigate high priority threats to network infrastructure such as OpenSSL.
  • Risk assessment of web services and architecture using HP Web inspect.
  • Vulnerability assessment of hosts such as but not limited to Windows/Linux using Tenable Nessus network security application.
  • Submit and review changes to agency firewalls to allow traffic as necessary using Verizon Fed Security system portal.
  • Maintenance of security operations division Windows 2008 R2 servers.
  • Manage cloud based scanners for Amazon hosting environment.
  • Monitor SF Defense Center (DC) for malicious activity and sensor health status.
  • Perform agency wide discovery scanning and report metrics using Tripwire IP360.
  • Management of unauthenticated hosts on LAN using Tripwire Intelligence Hub.
  • Develop procedures to assist agency meet Continuous Diagnostics and Mitigation (CDM) program as designated by DHS.

Information Technology Specialist

Confidentia, Fairfax, VA

Responsibilities:

  • Assisted GSA NOC in determining and resolving LAN outages.
  • Developed SOPs for GSA approved client software on Win 7 platform.
  • Configured and deploy wireless & handheld devices as per GITGO directives.
  • Assisted GSA NOC with maintenance of Cisco Catalyst 6000/5000 series switches and replaced parts as necessary.
  • Assisted and planned site equipment refresh projects.
  • Troubleshot and repaired general hardware failures with devices such as laptops, desktops, network printers and scanners and network connectivity.
  • Created and managed Virtual Private Network accounts using Cisco Secure.
  • Managed CA Unicenter ticketing system.
  • Ensured Service Level Agreements as per GITGO contract are maintained.
  • Provided active directory account and resource management using NetlQ tool.
  • Supported Lotus Notes 6+ client administration.
  • Installed and supported GSA Citrix applications.
  • Assisted with agency cloud email migration (Google).
  • Tested and deployed software packages on enterprise level using CA Unicenter.
  • Supported new hardware deployments.
  • Coordinated technology refresh projects with government personnel.
  • Responsible for installation and support of GSA approved licensed software.

Senior Desktop Management

Confidential

Responsibilities:

  • Configured and managed Lotus Notes client 6.5.
  • Responsible for creation and support of VTC client sessions.
  • Configured and supported management of handheld devices such as blackberry and Palm devices.
  • Provided Blackberry Enterprise Server management.
  • Created and edited user Active Directory accounts via NetlQ administration
  • Troubleshot and repaired hardware problems with desktops, laptops, and network printers.
  • Developed and maintained archiving solution for Lotus Notes client.
  • Provided port management via Cisco devices and switches.
  • Installed and supported Microsoft licensed products.
  • Provided support for inventory management.

We'd love your feedback!