We provide IT Staff Augmentation Services!

Lead Security Engineer Resume

5.00/5 (Submit Your Rating)

Atlanta, GA

SUMMARY

  • Hands - on experience in developing threat models, security controls, threat analysis, creation of risk control matrices and risk mitigation strategies.
  • Experience in conducting IT Security Risk Assessments in accordance to NIST and FFIEC framework.
  • Experience in collaborating with various product management and development teams to ensure alignment between security and development practices.
  • IT Professional Security /Risk Analytic and Architectural skills, IT Governance and Security Operations expertise overseeing the alignment of enterprise
  • Hands-on with Penetration Testing, Source Code Review, DAST, SAST and manual ethical hacking.
  • Expertise with security practices related to network switches, routers, load balancers, servers, storage systems
  • IT Security Strategy in meeting the Company's IT Security efforts for dynamic Business Goals. Additionally, proficient in security policy write up, procedures and control review to attain optimal maturity level.
  • Expertise in Security assessment on the applications, web sites, and web applications to determine the security posture.
  • Experience in performing manual exploitation using different tools like NMAP and Kali Linux.
  • Expertise in Penetration Testing and established a formal vulnerability management process.
  • Experience in monitoring and recommended solutions for correcting issues related to security technologies such as to monitor viruses, malware, and intrusions.
  • Thorough knowledge on COBIT, OWASP, FFIEC, NIST, HIPAA regulations and frameworks.
  • Expertise in Highlighting Best Security Practices, Procedures and Metrics - KPIs, KRIs Enterprise-wide for effective Risk and Vulnerability Control Experience on maintaining better administer, secure and monitor user access privileges and activities using Oracle and AWS IAM (Identity Access Management) Tools like IDI, IDS, and ISAM.
  • Experience in Security Audit proactive mindset for Risk Mitigation and proven ability to using Information Technological Solutions and Tools to Optimized different Information Security Frameworks and approaches through Practical Application to evolving Business needs.
  • Experienced in Developing, Documenting and Deploying Security Controls against IT Cyber Threats such as Data Exfiltration, Security Non-Compliance Issues and Social Engineering Antics.
  • Experienced in Security Assessment tools: Nessus, Burp Suite, NMap, Netcat, and WireShark etc.
  • Experience and also have strong working knowledge on various information security standards and compliances such HIPPA, HITRUST, PCI-DSS, FISMA, GLBA, SOC2, NIST and other GRC's. Additionally, passionate in Enterprise Data Classification, Identity and Access Control management (IAM) deployment solutions, IT Risk Management, Governance, Security Compliance Methodologies.

PROFESSIONAL EXPERIENCE

Confidential, Atlanta, GA

Lead Security Engineer

Responsibilities:

  • Penetration testing based on OWASP Top 10 and SANS25. Analyze the results of penetrations tests, design reviews, source code reviews and other security tests.
  • Decide on what to remediate and what to risk accept based on security requirements. Highly analytical computer security analyst with success both defending and attacking large-scale enterprise networks.
  • Experience using a wide variety of security tools to include Kali-Linux, Metasploit, HP WebInspect, HP Fortify, Burp Suite Pro, Wireshark, L0phtcrack, Snort, Nmap, Nmap-NSE, Cain and Abel, Nitko, Dirbuster, IBM AppScan, OWASP ZAProxy, Nessus, Open Vas, W3AF, BeEF, Etthercap, Maltego, Wifi-Security, SIFT, SOAP UI, FOCA, Havij, Yersinia, Recon-ng, Aircracking suite
  • Involved in implementing and validating the security principles of minimum attack surface area, least privilege, secure defaults, avoiding security by obscurity, keep security simple, Fixing security issues correctly. Strong knowledge in Manual and Automated Security testing for Web Applications.
  • Implement and maintain the Passive Vulnerability Scanner.
  • Briefs the customer and other contractors on recommended solutions and designs.
  • Worked on security protocols such as TCP/IP, SNMP, SMTP, NTP, DNS, LDAP and NFS on implementation, maintenance and monitoring.
  • Worked on oracle and mainframe Databases and SafeNet DB.
  • Analyze network topologies and traffic and capacity requirements and provide recommendations and guidance through the secure lens of Tenable.
  • Create and maintain all the needed Security Center Dashboards.
  • Implement and maintain all of the needed LCE plug-ins.
  • Administered encryption, certificate management, key generation and implemented dual keys to address segregation of duties issue between DBAs and security admins.
  • Working knowledge of OWASP Top 10 and SANS Top 25 software guidelines, Federal Financial Institutions Examination Council's (FFIEC) regulations, including Payment Card Industry (PCI-DSS), HIPAA and Sarbanes-Oxley Section404 (SOX).
  • Performed security Risk analysis and gap analysis
  • Guides Cyber Delivery teams in adoption of NIST and COBIT IT Risk Framework Capabilities.
  • Analyzed the results of penetrations tests, design reviews, source code reviews and other security tests.
  • Participated in the implementation of AWS Cloud security for applications being deployed in the Cloud. Developed WACLS for AWS Web Application Firewalls (WAF) and configured the rules and conditions to detect security vulnerabilities in the Cloud Front.
  • Participated in the implementation of data tokenization in various environments to ensure compliance to regulations.
  • Developed AWS Security Groups to control traffic to various instances in the Cloud.
  • Performed Continuous Integration (CI) and Continuous Delivery (CD) of SAST scans using IBM AppScan Source for Automation.
  • Configured AWS Simple Storage Service (S3) to securely store the organization’s critical file systems. Implemented Access Control Lists (ACLs) and Bucket Policies for controlling access to the data.
  • Implemented Security Group Policies for Elastic Compute Cloud (EC2) instances within AWS. Developed AWS Service Roles to protect Identity Provider access.
  • Participated in the implementation of Virtual Private Cloud (VPC). Implemented multiple layers of security, including security groups, network access control lists, to control access to Amazon EC2 instances in each subnet.
  • Configured AWS Simple Storage Service (S3) to securely store the organization’s critical file systems. Implemented Access Control Lists (ACLs) and Bucket Policies for controlling access to the data.
  • Implemented Security Group Policies for Elastic Compute Cloud (EC2) instances within AWS. Developed AWS Service Roles to protect Identity Provider access.
  • Participated in the implementation of Virtual Private Cloud (VPC). Implemented multiple layers of security, including security groups, network access control lists, to control access to Amazon EC2 instances in each subnet.
  • Decide on what to remediate and what to risk accept based on security requirements.
  • SOX Compliance Audit experience on controls like User access management, Change Management, Incident Management.
  • Good Experience in exploiting the recognized vulnerabilities.
  • Experience in Threat Modeling during Requirement gathering and Design phases.
  • Experience with Security Risk Management with TCP-based networking.
  • Experience with TCP/IP, Firewalls, LAN/WAN. Experience in implementing Security.
  • Incident and Event Management System (SIEM) using HP ArcSight, Splunk.
  • Quick Learner, Committed team player with interpersonal skills and enjoy challenging environment with scope to improve self and contribute to the cause of the organization.
  • Excellent problem-solving and leadership abilities. Experience in Web UI Development implementing web development tools like HTML 4.0/5, XHTML, DHTML, CSS/CSS3, JavaScript, jQuery, AJAX, JSON and XML.
  • Knowledgeable about Document Object Model (DOM) and DOM Functions along with experience in Object Oriented Programming Concepts, Object Oriented JavaScript and Implementation.

Confidential, Oakland, CA

Sr. Security Engineer

Responsibilities:

  • Penetration testing based on OWASP Top 10 and SANS25. Analyze the results of penetrations tests, design reviews, source code reviews and other security tests.
  • Decide on what to remediate and what to risk accept based on security requirements. Highly analytical computer security analyst with success both defending and attacking large-scale enterprise networks.
  • Implemented Multifactor Authentication (MFA) for AWS root accounts, including password rotation policies. Set up Access Keys and Secret Assess Keys for newly created users.
  • Enabled threat detection for databases in the Azure portal. The security alerts generated in the Azure Security Center have been reviewed and remediated.
  • Implemented Azure Key Vault for storing secrets.
  • Developed security controls for implementing Azure storage security. The RBAC with Azure AD has been implemented for securing the storage account. The data transmission between applications and Azure has been secured by client-side encryption, HTTPS, SMB3.0.
  • Azure disk encryption has been implemented for encrypting OS and data disks
  • Develop security requirements for applications and infrastructure deployed in the Cloud. Ensured that Cloud security best practices have been followed.
  • Experience using a wide variety of security tools to include Kali-Linux, Metasploit, HP WebInspect, HP Fortify, Burp Suite Pro, Wireshark, L0phtcrack, Snort, Nmap, Nmap-NSE, Cain and Abel, Nitko, Dirbuster, IBM App Scan, OWASP ZAProxy, Nessus, Open Vas, W3AF, BeEF, Etthercap, Maltego, Wifi-Security, SIFT, SOAP UI, FOCA, Havij, Yersinia, Recon-ng, Aircracking suite
  • Involved in implementing and validating the security principles of minimum attack surface area, least privilege, secure defaults, avoiding security by obscurity, keep security simple, Fixing security issues correctly. Strong knowledge in Manual and Automated Security testing for Web Applications.
  • Working knowledge of OWASP Top 10 and SANS Top 25 software guidelines, Federal Financial Institutions Examination Council's (FFIEC) regulations, including Payment Card Industry (PCI-DSS), HIPAA and Sarbanes-Oxley Section404 (SOX).
  • Analyzed the results of penetrations tests, design reviews, source code reviews and other security tests.
  • Decide on what to remediate and what to risk accept based on security requirements. SOX Compliance Audit experience on controls like User access management, Change Management, Incident Management.
  • Good Experience in exploiting the recognized vulnerabilities.
  • Experience in Threat Modeling during Requirement gathering and Design phases.
  • Experience with Security Risk Management with TCP-based networking.
  • Experience with TCP/IP, Firewalls, LAN/WAN. Experience in implementing Security
  • Incident and Event Management System (SIEM) using HP ArcSight, Splunk.
  • Quick Learner, Committed team player with interpersonal skills and enjoy challenging environment with scope to improve self and contribute to the cause of the organization.
  • Excellent problem-solving and leadership abilities. Experience in Web UI Development implementing web development tools like HTML 4.0/5, XHTML, DHTML, CSS/CSS3, JavaScript, jQuery, AJAX, JSON and XML.
  • Knowledgeable about Document Object Model (DOM) and DOM Functions along with experience in Object Oriented Programming Concepts, Object Oriented JavaScript and Implementation.

Confidential, St Louis, MO

Security Analyst

Responsibilities:

  • Vulnerability assessments using HP Web Inspect, Acunetix scanners perform map and gap analysis on all systems, software, and network appliances Access vulnerability dataprepare reports and load scan data into database.
  • Discuss false positives and prepare a plan of action and milestones for mitigation Prepare incident reports for reported and unreported attacks APT hunting for Ransomware.
  • Performed Root Cause Analysis for the incidents reported at Security Operations Center. Performed Security event monitoring of heterogeneous networks such as Firewalls, IDS/IPS, Cisco ASA, DLP devices using Splunk.
  • Provided solution to many problems on a call with the best of my knowledge on the applications using event logs on the system/server and telemetry logs on the server, later started using Splunk for health monitoring, analysis, and reporting.
  • Reviewed Azure network security architecture and implemented security controls. Specifically, Azure virtual networks, including on-premise connectivity, traffic filtering, secure communication, point-to-site VPN etc.,
  • Implemented Network Security Groups (NSG) to control network traffic to various Azure network resources. Created NSG rules (inbound and outbound) and prioritized the rules based on the requirements. Associated NSGs to VMs, NICs, and subnets based on the deployment model.
  • Validated database security for SQL servers deployed in Azure Cloud environment. Implemented Integrated Windows authentication supported by Azure Active Directory.
  • Wrote scripts on servers using PowerShell on Windows Server 2008 in order to update servers with the latest patches and changes systems configurations at large.
  • Assisted in design and implementation of McAfee DLP solution companywide for the information systems. Collaborated with the team leaders to complete the implementation.
  • Designed and created policies, granted exceptions and exclusions for HIPS using Mcafee ePO. Provided support for ePO HIPS, VSE, DLP and ePO dependencies.
  • Provided assistance to management with administration and configuration of critical enterprise security systems and software like McAfee ePO, McAfee DLP, Complete Endpoint Protection, Proofpoint.
  • Used Remedy Information Technology Service Management (ITSM) tool for managing the incidents based on the priorities and solved issues which are in the security domain.
  • Experience in performing authenticated and unauthenticated testing.
  • Generated Vulnerability reports to monitor the health of the applications and also reported High, Medium and low vulnerabilities in this system.
  • Analyze attack patterns Build workflows to automatically analyze the samples
  • Determine what functionality attackers may have introduced and scan for malicious artifacts based on sandbox results Investigate endpoint attacks and replay attacks on systems.
  • Analyze JavaScript, PDFs, Office documents, and packet captures for signs of malicious activity SIEM implementation and analysis by writing rules and reference sets.
  • SIEM to determine attack vectors and source of incident Troubleshoot network application inbound/outbound connectivity utilizing Cisco WSA proxies and Wireshark.
  • Actively involved on Bridges in solving High / Severe incidents reported in the application or in the environment.
  • Ironport URL filtering for known bad URL content IronportMail.
  • Analysis and blocking for known bad emails Analysis of pcap files using FireEye and Wireshark System audit and analysis using DOD checklist for PA series Threat and virus scanning using Malwarebytes from centralized console.
  • Enforcement of policies and procedures for users, admins, and management Reverse engineering of malware using tools like malwr, process hacker and so on Incident response tabletop exercise by documenting and alerting necessary personnel.

Confidential

Java/J2EE Developer

Responsibilities:

  • Designed and created DAO using data modeling in the integration layer.
  • Exposed all the enterprise services to the clients using SOAP and REST based web services, and tested using SOAPUI.
  • Modified WSDL documents for the internal clients and deployed on WSRR.
  • Implemented request and response objects using SOAP web services and JAXB for converting WSDL to java classes.
  • Configured all dependencies with spring framework and various stateful and stateless beans in the application.
  • Used various spring features to deploy custom properties and static context in the application.
  • Exposed Stateless session beans as restful web services using Jersey JAX-RS.
  • Created virtual host and configured based on the IP configuration for all enterprise services.
  • Used JSON marshaller for marshaling and unmarshalling the JSON Objects and Dom manipulations with various SAX and Dom parsers
  • Worked and configured with MKS and RTC versioning tools for keep track of source code.
  • Used Jenkins for continuous integration with maven built in to generate the EAR files and sanity4j code quality testing reports.
  • Hands-on a service-oriented approach (SOA) using WebLogic for integration.
  • Worked on HP portfolio Management software to create the PPM packages and deploy the various environments.
  • Updated the WSDL in WSRR for the governance & storing, accessing and managing information.
  • Setup meeting to configure and understand the Data power for security, for accessing the application.
  • Used Log4j for logging for debugging, warnings, errors etc.
  • Created log back file based on time based triggering policy and application based triggering policy.
  • Used HPQC for defect tracking and working on the defects and created Triage process (Microsoft Visio) to track the defects in the application.
  • Migrated MKS Source control to RTC and created JENKINS builds for all enterprise services.
  • Worked closely with the infrastructure team to create the performance environment for enterprise services.

We'd love your feedback!