Information Security Systems Engineer Resume
2.00/5 (Submit Your Rating)
SUMMARY
- A curious mind, hands - on technical skills, and a willingness to learn in this competitive industry has allowed me several information security accomplishments in various sectors of industry including critical infrastructure, finance, information security, education, and healthcare.
- Successfully navigated the deployment of multiple solutions-oriented security platforms and incident response lifecycles.
- Exceptional business acumen and comprehension of organizational risk tolerance, providing the ability to engineer appropriate information security systems and solutions.
TECHNICAL SKILLS
- Information Security | Digital Forensics | Incident Response | SIEM technologies | Next Gen Firewalls | TippingPoint IPS | Endpoint Security | Vulnerability Scanning & Management | Risk Management & Remediation | Blue Coat Security Analytics | EnCase | FTK| Sourcefire | FireEye | AlienVault USM | Duo | CyberArk | LogRhythm | Palo Alto Traps | CrowdStrike Falcon | FortiSIEM | Drarktrace | Rapid7 InsightVM | Metasploit Pro | UNIX/Linux | Windows | macOS | Active Directory | TCP/IP | NMAP | Wireshark | PowerShell | Bash | Python | VMware | NIST 800-53 | NIST CSF | NIST 800-61r2 | NIST 800-171
PROFESSIONAL EXPERIENCE
Confidential
Information Security Systems Engineer
Responsibilities:
- Emphasis in Application Security (AppSec) by sound engineering and deployment of DAST and SAST solutions for the Confidential Architecture, Development, and DevOps teams
- Integrated vulnerabilities found from DAST and SAST into JIRA tickets for remediation by project Development Teams reducing overall risk by timely resolution of vulnerabilities in approx. 7.2-million-line codebase
- Engineered the Forensics Area Network (FAN), redeployed and upgraded the EnCase Forensics and eDiscovery v6.02 environment to accommodate in-house forensics, e-Discovery, and litigation support for Legal teams and Information Security groups
- Architected and engineered the EnCase Endpoint Security Ecosystem to aid SOC operations in swift investigations on endpoints brought to attention by various security solutions in the environment
Confidential
Sr. Information Security Analyst
Responsibilities:
- Delivered security information and event monitoring and incident response services via our custom SIEM deployment to existing enterprise customers
- Contributed to the innovation, enhancement, and create custom rule sets for SIEM operations, conduct active threat hunting across various log sources and endpoints in customer environments
- Respond to and triage alerts and events during a shift across all customer environments, follow up with notifications to proper teams at customer locations
- Collaborated with and mentored other analysts, devise and construct ongoing learning activities such as DFIR and intrusion detection tabletop exercises, SIEM tips and tricks, and author runbooks
Confidential
Cybersecurity Engineer - Consultant
Responsibilities:
- Provided ongoing network/perimeter security, endpoint security, systems infrastructure security and make recommendations to mitigate risk while enhancing Confidential information systems security posture
- Contributed to the documentation of information security organizational policies, processes, and procedures, as well as review violations to help prevent future occurrences strictly adhering to the NIST SP800-53r5 and the NIST CSF
- Planned and participated in ongoing security assessments of new projects and programs, conducted proof-of-concepts (PoC) on hardware, software, and ease of deployment
- Collaboration with various stakeholders from networking teams, infrastructure teams, and business analysis teams to establish a highly secure environment
Confidential
Information Technology Specialist
Responsibilities:
- Active participation as Systems Engineer in a windows environment across all Information Technology programs and initiatives to ensure a healthy IT infrastructure
- Performed an Office365/Azure migration, ensuring the migration of all windows servers to Azure Cloud, all company email accounts and mailboxes, provided end user training and support
- Full deployment of Kaspersky Enterprise Antivirus to all servers and endpoints in the environment, created an endpoint management program to eradicate system infections
- Incident Response/Computer Forensics investigation centered on IP theft, misuse of computing resources, and possible IT infrastructure sabotage (Confidential)
Confidential
Cybersecurity Consultant - Consultant
Responsibilities:
- Delivered security services including HIPAA and PCI assessments, ISO and NIST security framework evaluations, operational security assessments, and security program creation
- Directly interacted with clients and their project managers, operations teams, vendors and other stakeholders to identify, develop, and obtain complete information for addressing risks and vulnerabilities in the client’s information technology environment
- Contributed to and developed best practices, strategies, methodologies and documentation/templates suitable for use by other consultants and associate consultants
- Maintained a high level of Customer Satisfaction on all consulting engagements by executing to achieve client project expectations set by technical leads and project managers and develop strong customer relationships and trust to secure future business
Confidential
Cybersecurity Analyst
Responsibilities:
- Active participation and Computer Security Incident Response activities for an enterprise organization, coordinates with other government agencies to record and report incidents. Protection of the business with products and technology such as AccelOps SIEM analyzing incidents and events, conduct proactive investigations into possible emerging threats, system vulnerabilities, and build remediation strategies
- Dynamic monitoring and analysis of Intrusion Detection Systems (IDS) to identify security issues for remediation. Analyze, recognize, correlate, and report any potential, successful, and unsuccessful intrusion attempts and compromises thorough reviews and analyses of relevant event detail and summary information from AccelOps SIEM, Snort Logs and Checkpoint FW logs
- Ensure the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies, through use of vulnerability scanning devices and aggressively participate in remediation efforts through cross functional security/risk management teams and information technology units within Unisys Information Technology Services
- Assists with implementation of countermeasures or mitigating controls by carrying out vulnerability scanning and assessment services providing periodic and on-demand system audits and vulnerability assessments, including user accounts, application access, file systems, and external Web integrity scans to determine compliance
Confidential
Network Operations Specialist
Responsibilities:
- Created, investigated, resolved and/or escalated trouble tickets for issues received via network monitoring systems, support calls, email and client portals for various network issues across multiple clients and accounts to maintain SLAs
- Managed server and network alerts, remote Access (VPN) connectivity using LogMeIn, TeamViewer, VNC, Cisco VPN and Microsoft RDP
- Performed network connectivity troubleshooting using tools such as nmap, Wireshark, angry-ip scanner and open source tools
- Specialized expertise in much of the following technologies and protocols: TCP/IP, UDP, MPLS, OSPF, BGP, T1/E1, T3/E3, Ethernet, HTTP/HTTPS, SSL, NAT, DNS, DHCP, ICMP, SMTP, POP, IMAP, NFS, SMB/CIFS, FTP, SFTP, SSH, IPsec, VPNs, Firewalls, 802.1x, wireless, IT security and best practices
Confidential
HP Engineer
Responsibilities:
- Complete systems refresh and upgrade installation of 11 MacBook Pros’ and 5 iMac systems for Senator Al Franken’s offices in Saint Paul, MN.
- New system setup with OS X and BootCamp for (Win7) with stringent security protocols in place as defined by the Department of Justice (DOJ) by working closely with centralized I.T. management department in Washington D.C.
- Decommissioning of old systems, backing up all user data and migration of that data to new user laptops and desktop workstations
- Remapping network resources to each user, verifying that each user is properly joined to active directory (AD) services, US senate intranet, network file shares, and printing services