We provide IT Staff Augmentation Services!

Cloud Security Engineer Resume

4.00/5 (Submit Your Rating)

San Jose, CA

TECHNICAL SKILLS

  • AWS WAF
  • AWS Shield distributed denial - of-service (DDOS) service
  • Google Cloud Platform (GCP)
  • Google Cloud Armor cloud security
  • Google Cloud Armor WAF
  • Imperva Incapsula cloud WAF
  • Imperva SecureSphere WAF
  • Akamai Kona WAF Site Defender cloud security
  • Akamai Site Shield origin defense
  • Akamai Content Delivery Network (CDN) cloud environments
  • Akamai Luna Control Center cloud security management
  • F5 ASM WAF
  • Kubernetes
  • Bind & SSL Labs
  • Qualys vulnerability vulnerability scanning & threat management
  • Zed Attack Proxy Project (ZAP) web application security scanner load balancing, application delivery & application security
  • F5 LTM, GTM, Cisco, Nexus, Alteon, Juniper routing & switching
  • Cisco CSM and F5 migrations n prem and cloud public key infrastructure (PKI)
  • Cisco ASA, Pix, FWSM, Juniper SRX firewall, Arcsight, Splunk

PROFESSIONAL EXPERIENCE

Cloud Security Engineer

Confidential, San Jose CA

Responsibilities:

  • Configure AWS WAF web ACL’s
  • Configure AWS WAF conditions
  • Configure AWS WAF rules
  • Configure AWS WAF actions
  • Configure Google Cloud Platform
  • Configure Google Cloud Armor DDOS Defense
  • Configure Google Cloud Armor IP deny/allow lists
  • Configure Google Cloud Armor Rich Rules Language
  • Configure Google Cloud Armor Geo-based Access Control
  • Migrate cloud hosted web apps from Imperva Incapsula WAF to Akamai Luna CDN & Akamai Kona WAF
  • Test Akamai Luna changes using local host file entries prior to cutover from Imperva Incapsula
  • Configure Akamai Luna cloud property groups, cloud property hostnames & cloud edge hostnames
  • Configure Akamai Luna cloud CP codes
  • Activate Akamai Luna cloud staging & cloud production property group versions
  • Configure Akamai Luna cloud content compression
  • Configure Akamai Luna cloud static content criteria & behaviors
  • Configure Akamai Luna cloud dynamic content criteria & behaviors
  • Configure Akamai Luna cloud performance & behaviors
  • Configure Akamai Luna cloud custom rules
  • Create Akamai Kona Site Defender cloud security configurations
  • Tune Akamai Kona Site Defender WAF cloud security policies
  • Configure match target criteria for hostnames in Akamai cloud
  • Configure Akamai Kona Site Defender WAF DDOS mitigation

WAF Engineer

Confidential, Atlanta GA

Responsibilities:

  • Act as the lead F5 WAF architectural, engineering & operational subject matter expert for the Bank
  • Complete operational, engineering & architectural F5 ASM WAF changes
  • Direct application owners & software developers how to onboard their web apps into application firewalls
  • Analyze the application firewalls and their interactions inside and outside the Bank from all sides
  • Allay WAF related concerns posed by project management, executive management & technical staff
  • Make sure necessary conditions are in place to ensure successful application deployments into F5 ASM WAF
  • Provide incident response guidance for mitigating security incidents
  • Perform and communicate analysis of intrusion events
  • Provide threat analysis to application teams as requested
  • Notified the SOC whenever there was WAF functionality impact

Lead WAF Security Engineer

Confidential, Chicago IL

Responsibilities:

  • Migrated F5 ASM WAF policies to Imperva SecureSphere
  • Opened F5 ASM WAF & Imperva SecureSphere WAF technical support cases
  • Configured Imperva SecureSphere Operations Manager (SOM)
  • Configured Imperva SecureSphere Gateways
  • Reconfigured WAF devices to allow traffic blocked by false positives
  • Review F5 ASM security policy settings
  • Attend regular WAF operational, architectural & engineering meetings
  • Deploy web applications into Imperva SecureSphere
  • Tune Imperva SecureSphere WAF web application profiles
  • Remove applications from Imperva SecureSphere Management Server
  • Create Imperva SecureSphere MX server groups, profiles & web applications
  • Mitigated zero day attacks using Imperva SecureSphere & F5 ASM
  • Updated WAF attack signatures
  • Managed certificates for F5 and Imperva devices
  • Tuned F5 ASM WAF and Imperva SecureSphere WAF policies
  • Write environment specific F5 WAF operational documentation
  • Ensure the WAF protects against zero day vulnerabilities as they are discovered
  • Drive all technical aspects of the adoption of F5 ASM web application security
  • Taught Security Operations Center (SOC) engineers web application security log analysis
  • Define the WAF configuration standards, best practices, and approaches that should be taken
  • Configured payment card industry (PCI) web application security safeguards

F5 ASM WAF Engineer

Confidential, Atlanta GA

Responsibilities:

  • Provide training to F5 ASM WAF project management
  • Follow up with F5 ASM technical support staff for support issues
  • Create technical plans necessary for successful F5 ASM WAF deployment
  • Provide senior technical leadership regarding F5 ASM web application firewall engineering
  • Make recommendations to stakeholders regarding the varying WAF configurations possible
  • Trained security engineers how to operate WAF devices
  • Provide technical guidance to all levels and groups of leadership and technical staff
  • Suggest web application firewall process improvements
  • Explain advantages and disadvantages to stakeholders of the varying WAF configurations possible
  • Give direction to app owners regarding their app's F5 ASM onboarding
  • Direct application testing for comprehensive policy learning
  • Communicate with application owners and project management regarding potential F5 ASM issues

We'd love your feedback!