We provide IT Staff Augmentation Services!

It Security Ops Engineer Resume

2.00/5 (Submit Your Rating)

SUMMARY

  • A solution - focused, resourceful and highly motivated System Security IT professional offering over 9 years of extensive experience, fulfilling in a variety of IT roles and delivering high-impact results through the effective combination of technical expertise, acute attention to details and interpersonal communication techniques.
  • History of serving at the helm of major projects within global IT infrastructures.
  • Seeking next-level advancement as an IT security professional within an organization to leverage comprehensive skill-set and proven aptitude.
  • Committed to bringing added values to enhance short and long-term objectives also able to grasp and adapt to new environment, procedures and technologies quickly.

AREAS OF EXPERTISE

  • AWS / Azure architecture
  • Complaint Handling
  • 24x7x365 System Security Center
  • Project Management
  • Hardware Configuration
  • Database Management
  • ITIL v3 Foundations
  • Network Management
  • Paperwork/Documentation
  • IDS/IPS
  • Technical/End User Support
  • PCI Compliance
  • Malware/Virus Analysis
  • Security Operations Center
  • Relationship Management

TECHNICAL SKILLS

  • IT Support
  • Cisco Technology
  • Tan
  • Norton Ghost
  • Ticketing Software
  • Citrix
  • Acronis True Image
  • Google App Suite
  • VMware
  • MAC Client Support
  • QRadar
  • SIEM
  • Hyper-V
  • WireShark
  • Varonis
  • GPO
  • SolarWinds
  • Cisco ASA
  • Splunk
  • Meraki

PROFESSIONAL EXPERIENCE

Confidential

IT SECURITY OPS ENGINEER

Responsibilities:

  • Manage multiple projects within the region configuring Meraki network hardware locally and remotely, based on member requirements and the standards.
  • Coordinate implementation with ISPs, MSPs, hardware vendors and member IT Teams.
  • Collaborate with other areas of the business to develop new products and services.
  • Provide solutions to members who have specific IT needs that need to be addressed also develop a handover checklist for operations to support.
  • Perform daily operation of monitoring client networks for security events/alerts for active threats, intrusions, and/or compromises
  • Analysis of security events from multiple sources including but not limited to events from Security Information and Event Monitoring tools (Splunk & QRadar)
  • Assist with the monitoring, detection, analysis, and investigation of threat activity for clients.
  • Provide off-hours support and problem resolution as directed by departmental requirements, service level agreements and internal support procedures.
  • Recognizes potential, successful and unsuccessful intrusion attempts and compromises through reviews and analyses of relevant event detail and summary information.

Confidential

NETWORK & SYSTEM SECURITY INFORMATION

Responsibilities:

  • Daily monitoring of event collection, security intelligence and emerging threat information sources including SIEM, vendors, researchers, websites, newsfeeds and other sources.
  • Maintain network systems and device configuration, document changes to design and configuration
  • Provide logistical support, assist with testing, assessment, diagnosis and resolution of network service outages and incidents
  • Respond to end user requests for network status information.
  • Implementation and support with: Cisco routers, switches, SD WAN/Cradle-point, Meraki Wireless/VPN concentrators, and telephony support.
  • Network cyber-security best practices (firewall configurations, ACLs, etc.)
  • Manage Symantec’s endpoint protection process and coordinate remediation efforts with Helpdesk.
  • Creation and renewal of server digital certificates.
  • Daily updating of security dashboard.

Confidential

CYBER SECURITY THREAT ANALYST

Responsibilities:

  • Create reports from various IT Security systems for the purpose of monitoring critical activities and providing security metrics to IT Security management.
  • Provides security analysis of IT activities to ensure that appropriate security measures are in place and are enforced.
  • Oversees the implementation of security on information systems and the generation of security documentation for system authorization and operation.
  • Manages information security projects (or security-related aspects of other IT projects) to ensure milestones are completed in the appropriate order, in a timely manner, and according to schedule.
  • Manages and coordinates response to SOC alerts, virus alerts, and handles remediation.
  • Conducts security risk and vulnerability assessments of planned and installed information systems to identify weaknesses, risks, and protection requirements.
  • Perform day to day administration required to ensure that security tools are effective at meeting overall company security objectives.
  • Perform a variety of Security Operations Functions such as alert triage, phishing investigation, and end user communications as needed.

Confidential

IT SYSTEM SECURITY/PROJECT MANAGER

Responsibilities:

  • Lead Client communication during lifecycle of project and communicate with various internal & external departments to ensure timely delivery of client requests and projects - this includes hardware, software, network and content delivery.
  • Produce reports and briefs to provide an accurate depiction of the current threat landscape and associated risk. Accomplish this using customer, community, and open source reporting.
  • Maintains records of security monitoring and incident response activities, utilizing case management and ticketing technologies.
  • Successfully handled computer networking, software updates, router/Wi-Fi installation, virus/spyware/adware removal and system troubleshooting for various technical issues; generates effective solutions to meet clients’ needs.
  • Coordination and attendance of project meetings, including production of meeting agendas & minutes, weekly Formal Project Updates for Management team and Clients and preparation of Project Documentation - Project Scopes, Schedule & Budget documents.
  • Continuous assessments and improvement of technology, policy, procedures, and standards.
  • Coordinates response, triage, and escalation activities for security events affecting the company’s information assets and activities with the incident response team as part of the security incident response lifecycle.
  • Maintain awareness of trends in security regulatory, technology, and operational requirements.
  • Performs analysis of all threat/vulnerability sources assessing any impacts to the company infrastructure and systems and provide an assessment, recommendations, and potential actions correlative to the security threat posture and matures the current vulnerability and scanning/assessment capabilities.
  • Daily monitoring of event collection, security intelligence and emerging threat information sources including SIEM, vendors, researchers, websites, newsfeeds and other sources.
  • Develop and provide guidance regarding cybersecurity policies, procedures and best practices for software development life cycle (SDLC), DevOps, networking, and server management
  • Recognizes potential, successful and unsuccessful intrusion attempts and compromises through reviews and analyses of relevant event detail and summary information.

Confidential, NEW YORK, NY

IT SUPPORT/ SYSTEM SECURITY ANALYST

Responsibilities:

  • Perform administrative tasks creating, customizing and removing user permissions in Active Directory, MS Exchange, Blackberry Enterprise Servers, INews and Digital Ardome Systems
  • Provide security events analysis and support to include identifying potential threat, anomalies, and infections, documenting findings, providing recommendations about incident.
  • Support third party broadcast and operation applications such as ENCO, Thomson Financial, Accellion, WebEx and iEncode, iPump.
  • Monitors and analyzes Intrusion Detection Systems (IDS) and Security Information and Event Management (SIEM) to identify security issues for remediation.
  • Generates end-of-shift reports for documentation and knowledge transfer to subsequent analysts on duty.
  • Perform advanced technical analyses, such as analysis of malicious code, network traffic, web log data, cyber intelligence, hard drives, and other storage and forensics media, to control exploitative activity.
  • Create procedures and customized configurations appropriate for the desired performance and accuracy of SIEM services, conduct ad-hoc and scheduled vulnerability scans, Assist in automating routine security tasks
  • System Administrator for JAMF Server: Create, update, maintain records of our field and producer inventory
  • Lead Tech for Shows “on the road” including Primaries, Presidential Debates, Presidential Elections, American Idol, 9/11 Memorial, NYC New Year’s Eve. This includes the configuration and supporting of VPN networks, VOIP phones, Site setup, Troubleshooting and breakdown of entire IT infrastructure.
  • Communicates alerts to clients regarding intrusions and compromises to their network infrastructure, applications and operating systems.
  • Generates end-of-shift reports for documentation and knowledge transfer to subsequent analysts on duty.
  • Follows pre-defined written procedures to troubleshoot security incidents.
  • Develop internal documentation: procedures, and operational metrics reports.

Confidential, JERICHO, NY

HELP DESK ANALYST

Responsibilities:

  • Onsite and telephone support to the end users having any issues throughout the migration
  • Ticket creation from Confidential Service Desk Manager
  • Providing first and second help desk level.
  • Changing Server on devices such as Android, iPhone and Blackberries

We'd love your feedback!