We provide IT Staff Augmentation Services!

Sr. Information Security Administrator Resume

Doylestown, PA


Network Security Professional - 17 years’ experience - looking for a position in security that allows me to utilize my knowledge, experience and skill set to further enhance a company’s security posture. Understanding of various issues involved with maintaining and administering corporate infrastructure has been a major aspect of my work experience.


Server Hardware: Dell, HP

Firewall: Palo Alto, Fortigate, Checkpoint, Juniper Netscreen & SRX, Sonicwall, and Cisco ASA

IPS systems: Dell Sonicwall, hp Tipping Point

Sandbox Technologies: FireEye

DNS Filtering: ThreatStop

Web App Firewall: Barracuda

Disk Encryption: Dell DDS, WinMagic

Routers: Cisco

Switches: Cisco, hp, 3com

Scanners: Tenable Nessus, Saint, nmap

Web Filtering systems: Palo Alto, Barracuda, McAfee Web Gateway, Sonicwall, Bluecoat

Operating Systems: Microsoft Server, Windows 10/7, Linux, VMware ESXi

Server Services: Active Directory, DNS, DHCP, IIS, Apache, MySQL, php, Microsoft SQL

Backup systems: Symantec NetBackup and BackupExec for backup policy and tape storage/archive

Endpoint Systems: BitDefender GravityZone, McAfee ePO, Symantec SEP, F-Secure, TrendMicro Deep Security

SIEM systems: Deployed Solarwinds LEM, Used Confidential QRadar

DLP systems: GTB, Symantec


Confidential, Doylestown, PA

Sr. Information Security Administrator


  • Responsible for the security of networks, servers, storage systems, workstations and applications documentation and implementation of security policy for all aspects of the network
  • Conducts routine assessment of equipment before and after implementation to ensure security policies are active and enforced
  • Evaluate and recommend improvements in security policy and tools
  • Responsible for Information security tools
  • Respond and triage incident response notifications
  • Lead incident response efforts and provides all appropriate documentation required during investigations
  • Evaluates hardware/software implementations to ensure proper security policies are implemented including but not limited to server hardening, restriction of service accounts, use of security groups, d Confidential loss prevention, log analysis configurations, firewall rules
  • Assist in the development of information security policies, standards, procedures and processes associated with strengthening the operational aspects for information security assets
  • Utilize project management processes and tools for communicating, planning, designing, documenting, and implementing, information security related projects
  • Provide first and second level support to the MIS helpdesk and Administrators


Security Integration Engineer


  • Deploy systems into the DSM (Deep Security Manager)
  • Ensure logging functions to the SIEM
  • Perform Quality Assurance and pass of to the SOC for Steady State
  • Coordinate troubleshooting for all systems as needed
  • Communicate with project management to ensure services are delivered on time

Confidential, Bala Cynwyd, PA

Security Administrator


  • Major: Deploying a new firewall model to all of our Asia-Pacific regional sites
  • Execute system changes as requested via the ticketing system
  • Support the Security Engineering team as needed
  • Work on various projects as they are assigned
  • Keep internal documentation updated
  • Take part in on-call rotation

Confidential, Hatboro, PA

Network Security Specialist


  • I joined the company when their hardware and software was very outdated.
  • Their security posture was based on a 10 year old technology.
  • I revamped the infrastructure of this company including redundant ISPs, new server and workstation hardware and software, IPS, DLP, AD-authenticated web filtering, SPAM filtering, SIEM and segmented network security zones, multifactor authentication for remote access.
  • A year into this position they opened a satellite office, which I handled all of the design in terms of IT infrastructure/security.
  • Major: Rebuilt the entire network both hardware, software and configurations
  • Ensure security and availability of all systems
  • Met and maintained PCI-DSS and ISO 27001 s by deploying new countermeasures as well as creating new policies and procedures. Also reviewed existing policies and procedures to ensure they were current and relevant. Worked with PSA auditors to achieve and maintain.

Confidential, Philadelphia, PA

Information Security Analyst


  • Maintain existing security infrastructure
  • Ensure security policy are followed throughout the network using various tools like the following: Saint vulnerability scanning, Tenable Nessus vulnerability scanning, MBSA (Microsoft Baseline Security Analyzer), Bluecoat web filtering, BigFix patch management, Symantec MessageLabs SPAM filters, F-Secure antivirus, hp Tipping Point IPS, Windows (XP, 2003 & 2008) and Linux (CentOS, RHES) operating systems management, Confidential, hp and Dell hardware.

Confidential, Horsham, PA

Network Security Engineer


  • Configure, install and manage lifecycle of Check Point firewalls, Cisco ASA firewalls and Cisco IPS devices managed via SSH CLI, Cisco CSM ASDM and Checkpoint Provider-1, and Juniper firewalls
  • Change control managed through hp OpenView ticketing system
  • Troubleshoot network issues on firewalls, routers, and switches
  • Risk analysis of existing services and change requests
  • Team Process/Procedure documentation managed with Microsoft SharePoint
  • RSA token support for remote access VPN users (one-time password system for multi-factor authentication)
  • On-call support rotation

Confidential, Huntingdon Valley, PA

Network Manager


  • As Network Manager I took part in middle management group meetings, planning, retreats and sessions
  • Technical network lead and trained network administrators
  • Break/fix for Blackberry smartphones.
  • Managed the phone system (Comdial), the fax system (FAXback NET SatisFAXtion), and the IVR system (Interactive Voice Response)
  • ISSO (Information Systems Security Officer) for the business unit, enforced local and Fiserv (parent company) information security policies
  • HIPAA compliance (hardening environment, examining network flows for clear text, hard drive encryption)
  • Hardware/software procurement through hp, CDW and others
  • Product testing, evaluations and recommendations
  • Break/fix for all hardware and software from server and client to network gear
  • Assisted with risk assessments, network documentation and licensing status when Confidential was purchased by Fiserv and Confidential Group
  • Desktop and Server refresh (hp, Confidential, Gateway)
  • On-call support

Hire Now