Security Analyst Resume
2.00/5 (Submit Your Rating)
TECHNICAL SKILLS
- Solaris 2.x, 8.x,9.x, 10.x; Unix/Linux: AIX, Kali, Backtrack 4.2 R 2, 5.x, Cent OS, Debian, Free BSD, RHEL, SCO, Suse; Mac OS X 6.x, System 7.x, 6.x, 5.x
- Microsoft Windows 7, Windows Vista, Windows XP, Windows 2000 workstation, Microsoft Windows Server 2016
- Microsoft Windows 2012 32 and 64 bit, Windows Server 2008, Windows Server 2003, Windows Server 2003 R2, Windows Server 2000
- Linux Distributions: Kali, Backtrack versions 4.2, 5.x, Damnvulnerable Linux, Pen Test Suites: Metasploit and Core Impact (EnCase), Qualys
- Scanning Tools: Nexpose, Nessus (Tenable) Nmap, Netscan,
- Banner Grabbing: Telnet Vulnerability Scanning: Nessus and Core Impact Proxy, Anonymizers: Anonymizer
- Enumeration: PSTools, SuperScan, SNMP Scanner, User2Sid/Sid2User
- Password Hacking Tools: John the Ripper, Ophcrack, Aircrack, Rainbow crack, Brutus
- Sniffing: Wireshark (ethereal), tcpdump, NetWitness
- Hashing Tools: MD5 Hash
- Wireless: Kismet and Netstumbler
- IDS/IPS: Snort. Juniper IDP 50, Barracuda WAF
- Forensic Analysis and Incident Response: SAN SIFT workstation, Blacklight (Black Bag)
- Multi Factor Authentication (Safenet, DUO)
- Anti Virus / Anti Malware (Trend Micro, ESET, Kaspersky, Symantec)
- SEIM: EM7, Splunk
PROFESSIONAL EXPERIENCE
Confidential
Security AnalystResponsibilities:
- Working contracted security positions including firewall installations, configuration management, Pen Testing and Vulnerability Analysis including mobile web application.
- DAST / SAST on customer applications
- Application Security Assessments and remediation planning if applicable
- Work with customers and their SLA’s to provide expectations and better coverage in the case of an outage.
- Redesigned Cisco and Checkpoint firewall environments to provide HA in accordance with Cisco /Checkpoint best practices.
- Performed upgrades on outdated Checkpoint, Cisco, and Fortinet environments to provide vendor support.
- In process of ISACA accreditation for CRISC and CGEIT training
Confidential
Engineer \ Security Analyst
Responsibilities:
- Running Vulnerability and Pen Testing on mobile devices.
- Analyze and respond to security threats from Firewall (FW), Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), Antivirus (AV), Network Access Control (NAC) and other security threat data sources.
- Conduct Security Monitoring activities to provide Security in Depth visibility into potential known and unknown threats that may pose risk to the customer environment.
- Participate in security incidents and technical analysis during significant security incidents.
- Utilize analytics to identify potential threats to the environment.
- Detect, respond, mitigate, and report on cyber threats/incidents that may impact the environment.
- Collaborate with technical leads: Engineering, Operations, Service Desk, Applications and BISOs on matters related to security monitoring across global footprint.
- Collaborate and serve as liaison to Managed and/or Unmanaged Security Service providers.
- Conduct Operations surrounding cyber security incident response technologies including network logging and forensics, security information and event management tools, security analytics platforms, log search technologies, and network / host based forensics as applicable.
- Design and implement security controls that provide the appropriate level of security and functionality in a variety of Internet of Things (IOT) devices.
- Develop primary and secondary security controls to protect against vulnerabilities as well as current and emerging security threats.
- Conduct regular system tests and ensure continuous monitoring of network security tools.
- Experience implementing security standards such as the NIST 800 - series and the ISO 27001 & 27002 guidelines.
- Implement, develop, test, support, and evaluate security-based tools and services.
- Internal and external Information Security as design of projects, daily operations, maintenance and troubleshooting.
- Application Security Assessments and remediation planning
- Installation and support of PKI certificates: issuance, revocation, app signing API
- DAST / SAST (Dynamic and Static Application Security Testing) on internal and customer applications
- Working knowledge of NIST framework.
- Managed helpdesk.
- Designed and Deployed Cisco Unified Communications Manager in multiple sites
- Designed and Deployed Cisco Contact Center Express
- Installation and support of Checkpoint environments for multiple customers, firewall installations, configuration management
- Working knowledge of ITIL and Agile best practices.
- Root Cause Analysis documented and sent to management in high level support issues.
- Penetration Testing for external customers in accordance for audit purposes
- Penetration testing on internal network/servers.
- Perform Application Penetration Testing for external customers in accordance with a SOW.
- Use of Sniffer and/or Sniffer type devices to troubleshoot network and/or applications.
- Participate in security compliance efforts.
- Identify security issues and risks, and develop mitigating plans.
- Work with NIST and SANS standards within organization for customer environments.
- SecureID configuration and support.
- Deployed Microsoft System Center Configuration Manager (SCCM) and Systems Management Server (SMS) in multiple enterprises
- Installation and support of firewalls from multiple vendors.
- Install and maintain SSL certificates for company and other customers.
- Install, configure, and maintained Intrusion Detection System (IDS) and Intrusion Prevention Systems (IPS)
- Serve as a key point of contact for all information security incident response activities.
- Support security monitoring or network security projects as needed.
- Design, Install, and support email application filter appliances for various customer facing environments.
- Design, Install, and support web application filter appliances for various customer facing environments.
- Installed and designed Multi-factor Authentication product for customers requiring secured access to managed systems.
- Design, Implement, and support Cloud Anti Virus and Anti-malware for customers in VM environments.
- Implement and support Multi Factor Authentication for external customers.
- Install/maintain Symantec Anti-Virus Corporate software for internal and external customers.
- Use Security defense in depth as a Design principle which includes using Confidentiality, Integrity, Availability
- Implement the Biba Security model which provides integrity in our data that is key to our billing systems and our customers
- Installed, configured, maintained, and troubleshooting firewalls
- Worked with programmers to promote a secure Software Development Life Cycle (SDLC) environment.
- Apply Secure Software Concepts using confidentiality during communications from or to other companies.
- Problem Management (Root Cause Analysis) using 5 Whys and RCA based corrective action.
- Work with Operational staff to implement tested solutions and aid in KTLO tasks.
- Work to get PCI and ISO compliance for customers.
- Work with customers to provide PCI compliance within our Data Center(s).
- Backup and recovery management of Windows/UNIX/Linux/Solaris servers.
- Network Engineering of internal network which includes redundant / High Availability of vendor network connections.
- Design, test, and implement Microsoft Clustering Services in High Availability Enterprise environments.
- Design, test, and implement Solaris and Linux Clustering Services in High Availability Enterprise environments
- Managing web services for external customers including Apache, IIS and Managed PKI.
- SAN hardware, firmware, and fabric connections for Solaris and Windows Server 2003 / 2008
- Monitoring networks including hosts, reporting, and auditing tools for external customers.
- Installed email and web servers in DMZ for internal and external customers.
- Creating and maintaining scripts using Perl, WMI and VB script.
- Serve as an escalation point of contact for the Service Desk and other organizations to ensure open channels of communication are effective for resolution of incidents.
- Provide technical investigative support to Corporate and Financial Investigations, Labor and Employee Relations, Corporate Compliance or any other department as required.
- Maintain current knowledge of threats and vulnerabilities applicable to IT infrastructure and application landscape.
- Manage program data retention procedures and ensure compliance with enterprise standards.
- Software / OS Patch Management
- Test for Quality Assurance Functional testing of various environments
- Installed, configured, maintained, and troubleshooting Cisco routers for various sites.
- Constantly working with vendors supporting data circuits
- Microsoft Active Directory deployment and administration
- Backup primary firewall engineers during off - hours.
- Install and configure firewalls at various client sites.
- Manage switches, servers, and data for internal and external customers.
- Server performance / capacity planning using Vantage Suite applications.
- Install and assist in support of SQL Server 2000.
- Installed and maintained the AD environment.
- 3rd level support for web hosting customers.
- Installed cluster environment for web hosting customers.
- Use of WMI for application for desktop management.
- Troubleshooting of Network issues involving DNS, TCP/IP routing, firewalls, VPN, etc.
- Design, installation, and support of SAN for Novell and Windows 2000 servers.
- Design and test Disaster Recovery plans for internal use and customers in various environments.
- Manage internal web, FTP, and clustered servers.
- Configured/maintain remote connectivity through Lantronics and Cyclade console servers using ssh2 via Ethernet connections.
- Maintain Cisco VPN for internal and external customers.
- Install, support, and manage multiple SAN’s.
- Installation and Support of Veritas Cluster Services.
- Installed, configured, and maintain Veritas netbackup.
- Installed, configured, and maintain clients using EMC powerpath
- Manage Air Conditioning, 3 phase power, and UPS systems.
- Install/manage/support of Vantage suite (Server/Client/Application monitoring)
- Constantly work overtime/off hours to support a 365/24/7 business.
- Installed, configured, maintain, and troubleshoot Microsoft/ Linux/Netware Servers.
- Monitor / troubleshoot system through SNMP and Vantage Suite.
- Install and support Linux FTP servers for phone switch data.
- Implemented Off-hours maintenance windows for 365/24/7 environments.
- Worked with IT developers to perform and test change control. Also developed test environment.
- Support external / hosted and internal customers.
- Wrote IT Operations/Security documentation, Disaster Recovery program, and Standands & Procedures for internal tech support staff.
- Support of Email (Exchange/Qmail/GroupWise).
- Install and run CAT5, CAT6, single mode and multi mode fiber cables for various hosts including firewalls, servers and SAN’s.
- Troubleshoot multiple data circuits such as T1, T3, Ethernet, and Frame Relay for infrastructure from MCI, AT&T, and Sprint.
- Install and configure Paxfire DNS caching servers.
- Test Recovery methods through restores that are performed twice a year and optimize as needed.
Confidential, Auburn Hills, MI
Adjunct Professor / Teaching Assistant
Responsibilities:
- Created Presentations and Labs for every week I taught.
- Use of EnCase for various lab work.
- Use Cisco 642-618 Deploying Cisco ASA Firewall Solutions as main source material.
- Taught material 8 out of 10 weeks when existing professor left for another position.
- Created an enthusiastic and energetic environment for the students.
- I had students participate in current topics for each class.
- Assisted students as requested on labs and discussions.