We provide IT Staff Augmentation Services!

Systems Security Engineer Resume

Aberdeen, MD


  • Dynamic Information Systems Security Professional with demonstrated expertise in all phases of Information and network security issues including security strategy, architecture, firewalls, and operational services.
  • Diverse background consisting of positions encompassing the creation of innovative, technologically advanced security solutions for government agencies and private organizations.
  • Excellent analytical skills, with the critical ability to identify security issues and quickly apply effective resolutions, as well as establish and implement backup and recovery plans
  • . Expert organizational skills that include the ability to successfully manage complex projects and rapidly evolving requirements.
  • Strong knowledge of global Information security controls, and excellent assessment skills.
  • Adept at learning new skills and applying the knowledge to improve the security environment.


  • Security Management
  • Technology Architecture
  • Application Deployment
  • Software Configuration
  • Document Management
  • Risk Analysis
  • Network Communications
  • Performance Monitoring
  • Government Policies
  • Network Management


Operating Systems: NT Windows Server 4.0 Windows Server 2007, UNIX, RedHat Linux, SUSE Linux, and NT Workstation 4.0 (Windows 95, 98, 2000, 2003 and XP, Vista, Windows 7), Enterprise, HP UNIX, McAfee, IIS Servers

Programming: Microsoft Net, Microsoft C++

Network Products: Cisco Routers, Nortel Switches

Network Technologies: Wireless Network, T1 Circuits, Fast Ethernet, Fiber Circuits

Software: Legato, Outlook, MS Office 98, 2000, 2003 and 2007 Project 2003, Microsoft TCP/IP, Sybase Oracle, Omni Back, Trend, Fast Ethernet, PVCS, CVS, Microsoft Exchange 2000 and 2003, Visio 2003, Heat Helpdesk, MKS Toolkit, Access Data Forensics Toolkit, Password Recovery toolkit, XP Professional, Ghost 9.0, Norton’s Firewall, AutoCAD, Vulnerability Scanner, Golddisk Vulnerability Scanner, Vulnerability Scanner.


Confidential, Aberdeen, MD



  • Provide direction, support, performance monitoring, and scheduling of three staff members on a variety of security and communications systems.
  • Ensure compliance with military and government standards and regulations.
  • Maintained the Windows Server Active Directory and Exchange2000 and 2003, providing security patch management for critical updates.
  • Monitored network communications and performance and facilitate modifications to configurations as needed.
  • Maintain documentation of network and security systems, including software configuration changes, upgrades, rollout of test procedures, and security policies.
  • Confidential and Confidential vulnerability management software used for compliance monitoring, and threat detection for all systems.
  • Perform end - to-end release management, including all documentation, requirements gathering, and ensuring adherence to policies.
  • The following software’s are used to do Patch Management and Security Management with all government systems.
  • Document incidents in accordance with approved Incident Response Plan and forward for review and action.
  • Address IA Vulnerability Management (IAVM) for all IVA Alerts (IAVAs), IVA Bulletins (IAVB), IAV Technical Advisories (IAVTs), and Computer Tasking Orders (CTOs).
  • Support development and implementation of IA policies, procedures and guidelines.
  • Address system and network security violations and incidents. In coordination with the IAM, initiate protective or corrective measures when an IA incident or vulnerability is discovered.
  • Evaluate IA and IA-enabled software, hardware, and firmware for compliance with appropriate security configuration guidelines.
  • Provide security engineering designs and implementation in all aspects of Information Assurance and Information Security (InfoSec) Engineering.Assesses and mitigates system security threats/risks throughout the program life cycle; validates system security requirements definition and analysis establishes system security designs. Performs functions necessary to ensure the security of an enterprise network which includes Information Assurance Vulnerability Management (IAVM) and Risk Analysis assistance in the mitigation of security risks to operating systems and applications used within the network by using Confidential and Confidential and other tools needed to find Vulnerabilities.

Confidential, Princeton, NJ



  • Charged with all design, management, and support of the operations for a multi-platform LAN/WAN environment within the company’s Research and Development Laboratory.
  • Provided systems administration and support for more than 186 work notes, including RedHat Linux, HP UNIX, Microsoft Server 2000, 2003, XP Pro.
  • Performed security patch management for Exchange 2000 and provided remote and local desktop services for Microsoft Windows Active Directory.
  • Maintained and assigned various IP services, including DNS, Web Proxy, and Socks.
  • Maintained and configured Dynamic Host Configuration Protocol (DHCP) servers.
  • Provided administrate staff and interns with .
  • Charged with implementing and administering daily applications and provided network security access.
  • Provided management and administration to staff and interns.
  • Designed and delivered new policies and rules, providing updates, configuration, and troubleshooting.
  • Provided management and installation of TCIP/IP and UDP/IP networking for router configuration and setup.
  • Trained and supported end users of software, hardware, laptops, workstations, computer accessories, and peripherals.
  • Performed all scheduling and dispatching of resources for tracking and resoling network issues.
  • Met the needs of a rapidly expanding research laboratory, which went from 20 to 200 staff members while expanding the entire wireless and telephone network.

Hire Now