Cloud Security Engineer Resume
2.00/5 (Submit Your Rating)
OBJECTIVES
- Skilled Cloud security engineer with extensive knowledge of physical and cloud security.
- Experience in Amazon Web Services to work on a challenging organization that would leverage my technical experience to the fullest potential and contribute to the development with impressive performance with a proven track record of success leading complex project while managing cross - functional resources to drive efficiency in enterprise technology operations.
TECHNICAL SKILLS
- Lambda,IAM, Docker, KMS, S3 Encryption, CloudFormation, CloudFlare, CloudFront, PCI cloud architectures, application security, API Gateway, domain segmentation, authentication, data protection, and automation of processes.
- Enterprise Apps Oracle, MySQL and MS SQL backends
- EC2, VPC(NAT, VPC Peering and VPN), Identity and Access Manager (IAM), EC2 Container Service, Elastic Beanstalk, Lambda, S3, CloudFront, Glacier, RDS, DynamoDB, ElastiCache, Redshift, Direct Connect, Route 53, Cloud Watch, Cloud Formation, CloudTrail, OpsWorks, Amazon Elastic Map Reduce(EMR), AWS IoT, SNS, API Gateway, SES, SQS,SWF, Workspaces, WorkDocs.
- AWS Amazon Web Services, IAM, Python Boto, ASG, SNS/SQS, EC2
- Linux, Python, Bash, PowerShell
- Jenkins Hudson/Jenkins Continuous Integration, Builds, Master Slave Config
- PostGres, MySQL, Oracle, SQL Server
- AWS, Microsoft Azure
- VMware, KVM, Hypervisor bash, powershell, perl
- Cisco Router Configuration/Installation, TCP/IP Configuration, Ethernet, Firewall, VPN, Wireless Networking, Hyper-V, Virtualization, Cloud storage, Clustering
- IPsec, VPN, Load Balancing, Iperf, MTR, Routing Protocols, SSH, Network Monitoring / Troubleshooting tools
PROFESSIONAL EXPERIENCE
Confidential
Cloud Security Engineer
Responsibilities:
- Worked as IAM admin, creating new IAM users & groups, defining roles and policies, Identity providers and KMS.
- Creating cloud-based programs, performing threat simulations to detect possible risks, and providing security recommendations
- Enabled and configured cloudtrail logs for all VPC's in AWS accounts
- Created Lambda function to automate inspector scans in 15 AWS accounts
- Provides security expertise for cloud-based DevOps development and deployment
- Ensures adequate security solutions and controls are in place of Cloud platform, services, and solutions
- Automate cloud security solutions and controls
- Part of a team of DevOps engineer for infrastructure support on AWS cloud. Creating cloud formation scripts for hosting software on AWS cloud. Automating the installation of softwares through powershell scripts
- Understanding of secure-cloud configuration, (CloudTrail, AWS Config, etc), cloud-security technologies (VPC)
- Security Groups, etc.) and cloud-permission systems (IAM).
- Have expert knowledge of Data Loss Prevention principles and apply that knowledge in their daily cloud security work
- Guide the cloud security group, identifying opportunities for improvement and then driving those improvements through the enterprise
- Closely collaborate with security architects in developing cloud security frameworks for the enterprise
- Hands on experience with IAM to set up user roles with corresponding user and group policies using JSON.
- Used DevOps and commonly used DevOps tools to implement a CI/CD model, such as Jira, Jenkins, etc.
Confidential
Cloud Engineer
Responsibilities:
- Worked with application / platform hardening especially on public cloud platforms.
- Enabled AWS configured to monitor cahnges in company AWS account. Develop AWs config rules to monitor unecycrepted volumes and untagged resources in all accounts
- Testing on WEB based applications; Mobile based application and Infrastructure penetration testing.
- Worked in large and small teams as well as independently
- My experience with SDN, and SDI tooling such as Teraform and CloudFormation yielded a positive result
- Implementation and reviewing of security controls across SDLC.
- Ingenuity and strong problem-solving skills in order to swiftly and creatively deal with threats or flaws in networks.
- Broad knowledge of hardware, software, and networking technologies to provide a powerful combination of analysis, implementation, and support.
- Experience as a Security Engineer supporting software architecture development environments
- Strong understanding and passion for CI/CD methodologies and supporting tooling just as Jenkins
- Strong experience with cloud security strategy, cloud provider ecosystems (Amazon AWS/ Microsoft Azure) & migrating Enterprise from traditional data center Infrastructure, Application and Data designs to hybrid or fully-cloud enabled practices
Confidential
Network Support Engineer
Responsibilities:
- Developed, implemented and operate controls to secure cloud-based systems
- Utilized cloud-based APIs when appropriate to write network/system level tools for securing cloud environments
- Recognized, adopt, utilized and teach best practices in cloud security engineering
- Participated in efforts to promote security throughout the project and build good working relationships within the team and with others in the organization
- Participated in efforts that tailor the company’s security policies and standards for use in cloud environments
- Defined, assess, and communicate security risk to product owners
- Developed reference architectures and proof of concept implementations of cloud security environments
- Knowledge of micro-service development using Java, and Node.js.
Confidential
Network Technician
Responsibilities:
- Monitoring network performance to determine if adjustments need to be made.
- Conferring with network users about solving existing system problems.
- Operating master consoles to monitor the performance of networks and computer systems.
- Coordinating computer network access and use.
- Designing, configuring and testing networking software, computer hardware, and operating system software.
- Configuring firewalls, routing and switching to maximize network efficiency and security
- Maximizing network performance through ongoing monitoring and troubleshooting
- Arranging scheduled upgrades
- Investigating faults in the network
- Updating network equipment to the latest firmware releases
- Reporting network status to key stakeholders