Security Architect Resume
2.00/5 (Submit Your Rating)
Columbus, OH
SUMMARY:
To obtain a challenging position in the Information Technology field with the possibility of career advancement.
WORK EXPERIENCE:
Confidential, Columbus, OH
Security Architect
Responsibilities:
- Designing, developing, implementing and maintaining security infrastructure to provide highly - complex, reliable, and scalable security solutions and systems to meet the organization’s objectives and requirements.
- Assistance in keeping Security software of all types up to date, including browser tools, Websense, Symantec Endpoint Encryption, McAfee ePO, AppScan, etc.
- Reduce vulnerabilities using Qualys scans
- Monitor and manage AIX servers via Tripwire
- Work with Taxation employees to plan and execute product upgrades and patches.
- Defining security systems and architecture and providing vision, problem anticipation, and problem solving ability to ISD.
Confidential, Cincinnati, OH
Sr Security Analyst Consultant
Responsibilities:
- Experience with information security best practices and security frameworks, firewall log knowledge, Intrusion Detection, knowledge in Enterprise Log Management and SIEM (QRadar) tools
- Primary analysts to reduce false positives and white noise from QRadar offense and alerting
- Successfully demonstrates the ability to provide guidance on incident analysis, root cause and technical problem resolution
- Participate in the ongoing management of security review of network, application and system activity, security investigations and audits, incident handling, user, change management, vendor security reviews, security operation center activities, network alert monitoring and event management, virus response, password vaulting and remote session management
- Recommend best practices in the design, implementation, and maintenance of controls and procedures to ensure the integrity of the logical security for computer - based systems
Confidential, Dayton, OH
Perimeter Security Engineer
Responsibilities:
- Specialized in Network Security technologies
- CheckPoint Firewall and Web Content Filtering,
- IPS\IDS support of SourceFire and Snort alerting
- Develop security policies, procedures, and standards for networks, operating systems, applications, databases, firewalls, and all web sites
- Perform security risk assessments
- Implement, monitor and report security metrics
- Initiated incident handling procedures to isolate and investigate potential information system compromises
- Support and lead security initiatives to achieve/maintain compliance with relevant security standards, including PCI, GLB, FISMA,SOX, State privacy laws and HIPAA
- Support and maintain file integrity monitoring systems.
- Review security event log data and investigate anomalies.
- Identified vulnerabilities, recommend corrective measures and ensure the adequacy of existing information security controls
- Utilize various toolsets from Qradar , Solutionary
- I mplementation of servers including Enforce, Netmon, Discover, Email Prevent and Web Prevent servers
- Create and tune Data Loss Prevention policies
- Configure all components to effectively detect and report incidents
- Expertise on applying the definitions to the SEP12 console and monitoring for completion
- Technical leader on the team, driving engineering best practices and maintaining high quality, highly maintainable code
- Provide policy guidance on deploying, configuring and upgrading a SEP system
- Strong knowledge of PKI concepts, patterns and practices
- General understanding of cryptographic concepts: symmetric/asymmetric cryptography, secure hash, digital signatures
- Safenet Management, deployment of soft token and hard token infrastructure
- Microsoft Azure MFA, management of isolated Authorized Boundary MFA
Confidential, Dayton, OH
IT Network Security Analyst and Identity Management
Responsibilities:
- Novell Identity Manager
- Handle all request to change, delete, or create all Novell Netware, Active Directory and Google Mail accounts
- Sustained engineering, maintenance, and operations of Identity Vault and driver infrastructure; resolve duplicate ID creation from SAP HR source.
- Troubleshoot any password synch issues from provisioned objects
- Subject matter expert for Novell Storage Manager
- Experience with performing problem management which includes identifying and documenting the root cause of problems and suggesting corrective actions that will eliminate the root cause and resolve complicated problems related to IDM environment.
- Create and modify request for Active Directory ACL groups, assigning the trustee and attributed rights to folders
- GPO policy administration and maintenance
- Windows server rollout and support
- 3rd level support for SEP v11 managing all policies for endpoints, client and server
- Managed migration from Symantec Antivirus v10 to Symantec Endpoint Protection v11
- Submit monthly metrics and reports from Symantec Endpoint Protection to Executive Governance Board
- Manage web content filters and privileged internet access groups
- Manage the purchasing, renewal and installation of all SSL s
- Review and investigate alerts from Snort Intrusion Detection System
- Monito r and remediate Critical Watch vulnerability scans
- Process all Short-term and long term disability claims.
- Be the liaison between the customer and their Case Manager.
- Resolve any issues, plan information, payment inquiries, or give status to any existing claims.
Confidential, Kettering, OH
Sales and Service Specialist
Responsibilities:
- Advertising and PR Services
- R eceive incoming purchase calls from clients.
- Answer any questions about merchandise, sizing, and fabric care.
- Apply client service procedural knowledge to appropriately resolve client issues.