We provide IT Staff Augmentation Services!

Senior Security Engineer Resume

2.00/5 (Submit Your Rating)

Manchester, CT

SUMMARY

  • Senior Security and Network Architect and Engineer with expert knowledge in mitigating IT Risks by selecting and implementing various security solutions such as Check Point, Fortinet, Email Spam filters, Palo Alto, WildFire ForeScout, zScaler.
  • Led and implemented Identity and Access Management policies and procedures for various organizations.
  • Strong experience with implementing Policy Management (Tufin), Security Compliance (CSPA) in accordance with Security Best Practices. Expertise with configuring SSL VPN with Active Directory and 2 - factor authentication. Strong general knowledge of common networking and security protocols and applications such as TCP/IP, HTTP, SMTP, FTP, DNS, IPSec, BGP, OSPF and VLANs.
  • Dynamic problem solver with the ability to critically evaluate information gathered from various sources, reconcile conflicts, decompose high-level information into details and apply sound business knowledge into crafting solutions and creative new ideas. Ability to learn quickly, evaluate, understand and interpret business processes.
  • Excellent interpersonal skills with the ability to work with all levels of personnel in an organization.

TECHNICAL SKILLS

  • Firewalls
  • VPN
  • Cloud
  • SIEM
  • Check Point (R65 to R80.10)
  • Check Point IPSec and SSL
  • AWS
  • IBM QRadar
  • Fortinet 5.2 to 5.4.10
  • Fortinet IPSec
  • Azure
  • Splunk
  • Palo Alto 8.1 to 9.1
  • Palo Alto GlobalProtect
  • Cisco FirewPower zScaler ZPA
  • Proxies
  • Policy Management
  • Malware Analysis zSclaler
  • Tufin
  • BlueCat
  • Palo Alto WildFire
  • NAC
  • Email Filter
  • Privacy Management
  • ForeScout
  • Barrracuda Email Spam Filter
  • Daptiv
  • OneTrust
  • Compliance
  • IAM
  • Antivirus
  • Network Monitoring
  • CCPA
  • Okta
  • CrowdStrike
  • What’s Up Gold
  • Carbon Black
  • LANGuardian

PROFESSIONAL EXPERIENCE

Confidential - Manchester, CT

Senior Security Engineer

Responsibilities:

  • Reported directly to the VP of Operations and Security
  • Managed and upgraded Palo Alto and Cisco Firewall clusters and firewall policies
  • Implemented and Barracuda Email Spam Filter
  • Mitigate users from GlobalProtect VPN to zScaler ZPA to improve VPN performance
  • Implemented and managed ForeScout to provide network access control (NAC)
  • Using Splunk Enterprise, developed dashboards to monitor networks, servers, and threats
  • Engaged OneTrust to manage and document CCPA compliance

Network and Communications Architect

Confidential

Responsibilities:

  • Responsible for the security of 2 productions networks and DMZs: Corporate and SCADA
  • Responsible for 78 sites along the pipeline that use satellite and cellular modem communications
  • Upgraded the network infrastructure at 9 locations to meet increasing business requirements
  • Replaced aging Nortel phone systems at 9 locations with Avaya IP Office 500v2
  • Manage and review cell phone and data usage of company employees
  • Deployed and manage 120 Meraki switches and 40 Meraki Wi - Fi access points
  • Proactively monitored all network and WAN communications with What s Up Gold
  • Investigated and responded to all communications outages
  • Researched and proposed upgrading WAN from bonded T1s to a Fortinet SD WAN solution
  • Estimated cost savings of WAN upgrade is $20,000 per month when completed
  • Perform network maintenance and system upgrades including patches and security configuration
  • Maximize network performance through monitoring, troubleshooting, and system resource utilization
  • Track network usage and trends for capacity planning
  • Perform research to identify potential vulnerabilities in, and threats to, existing and proposed technologies

Senior Network Security Engineer

Confidential

Responsibilities:

  • Maintained documentation and diagrams of each firewall location.
  • Configured and maintained Check Point Firewall - 1VPN connections to external companies.
  • Managed and maintained two Provider-1 servers running Solaris 8.

We'd love your feedback!