We provide IT Staff Augmentation Services!

Security Analyst Resume

2.00/5 (Submit Your Rating)

TECHNICAL SKILLS

  • Solaris 2.x, 8.x,9.x, 10.x; Unix/Linux: AIX, Kali, Backtrack 4.2 R 2, 5.x, Cent OS, Debian, Free BSD, RHEL, SCO, Suse; Mac OS X 6.x, System 7.x, 6.x, 5.x
  • Microsoft Windows 7, Windows Vista, Windows XP, Windows 2000 workstation, Microsoft Windows Server 2016
  • Microsoft Windows 2012 32 and 64 bit, Windows Server 2008, Windows Server 2003, Windows Server 2003 R2, Windows Server 2000
  • Linux Distributions: Kali, Backtrack versions 4.2, 5.x, Damnvulnerable Linux, Pen Test Suites: Metasploit and Core Impact (EnCase), Qualys
  • Scanning Tools: Nexpose, Nessus (Tenable) Nmap, Netscan,
  • Banner Grabbing: Telnet Vulnerability Scanning: Nessus and Core Impact Proxy, Anonymizers: Anonymizer
  • Enumeration: PSTools, SuperScan, SNMP Scanner, User2Sid/Sid2User
  • Password Hacking Tools: John the Ripper, Ophcrack, Aircrack, Rainbow crack, Brutus
  • Sniffing: Wireshark (ethereal), tcpdump, NetWitness
  • Hashing Tools: MD5 Hash
  • Wireless: Kismet and Netstumbler
  • IDS/IPS: Snort. Juniper IDP 50, Barracuda WAF
  • Forensic Analysis and Incident Response: SAN SIFT workstation, Blacklight (Black Bag)
  • Multi Factor Authentication (Safenet, DUO)
  • Anti Virus / Anti Malware (Trend Micro, ESET, Kaspersky, Symantec)
  • SEIM: EM7, Splunk

PROFESSIONAL EXPERIENCE

Confidential

Security Analyst

Responsibilities:

  • Working contracted security positions including firewall installations, configuration management, Pen Testing and Vulnerability Analysis including mobile web application.
  • DAST / SAST on customer applications
  • Application Security Assessments and remediation planning if applicable
  • Work with customers and their SLA’s to provide expectations and better coverage in the case of an outage.
  • Redesigned Cisco and Checkpoint firewall environments to provide HA in accordance with Cisco /Checkpoint best practices.
  • Performed upgrades on outdated Checkpoint, Cisco, and Fortinet environments to provide vendor support.
  • In process of ISACA accreditation for CRISC and CGEIT training

Confidential

Engineer \ Security Analyst

Responsibilities:

  • Running Vulnerability and Pen Testing on mobile devices.
  • Analyze and respond to security threats from Firewall (FW), Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), Antivirus (AV), Network Access Control (NAC) and other security threat data sources.
  • Conduct Security Monitoring activities to provide Security in Depth visibility into potential known and unknown threats that may pose risk to the customer environment.
  • Participate in security incidents and technical analysis during significant security incidents.
  • Utilize analytics to identify potential threats to the environment.
  • Detect, respond, mitigate, and report on cyber threats/incidents that may impact the environment.
  • Collaborate with technical leads: Engineering, Operations, Service Desk, Applications and BISOs on matters related to security monitoring across global footprint.
  • Collaborate and serve as liaison to Managed and/or Unmanaged Security Service providers.
  • Conduct Operations surrounding cyber security incident response technologies including network logging and forensics, security information and event management tools, security analytics platforms, log search technologies, and network / host based forensics as applicable.
  • Design and implement security controls that provide the appropriate level of security and functionality in a variety of Internet of Things (IOT) devices.
  • Develop primary and secondary security controls to protect against vulnerabilities as well as current and emerging security threats.
  • Conduct regular system tests and ensure continuous monitoring of network security tools.
  • Experience implementing security standards such as the NIST 800 - series and the ISO 27001 & 27002 guidelines.
  • Implement, develop, test, support, and evaluate security-based tools and services.
  • Internal and external Information Security as design of projects, daily operations, maintenance and troubleshooting.
  • Application Security Assessments and remediation planning
  • Installation and support of PKI certificates: issuance, revocation, app signing API
  • DAST / SAST (Dynamic and Static Application Security Testing) on internal and customer applications
  • Working knowledge of NIST framework.
  • Managed helpdesk.
  • Designed and Deployed Cisco Unified Communications Manager in multiple sites
  • Designed and Deployed Cisco Contact Center Express
  • Installation and support of Checkpoint environments for multiple customers, firewall installations, configuration management
  • Working knowledge of ITIL and Agile best practices.
  • Root Cause Analysis documented and sent to management in high level support issues.
  • Penetration Testing for external customers in accordance for audit purposes
  • Penetration testing on internal network/servers.
  • Perform Application Penetration Testing for external customers in accordance with a SOW.
  • Use of Sniffer and/or Sniffer type devices to troubleshoot network and/or applications.
  • Participate in security compliance efforts.
  • Identify security issues and risks, and develop mitigating plans.
  • Work with NIST and SANS standards within organization for customer environments.
  • SecureID configuration and support.
  • Deployed Microsoft System Center Configuration Manager (SCCM) and Systems Management Server (SMS) in multiple enterprises
  • Installation and support of firewalls from multiple vendors.
  • Install and maintain SSL certificates for company and other customers.
  • Install, configure, and maintained Intrusion Detection System (IDS) and Intrusion Prevention Systems (IPS)
  • Serve as a key point of contact for all information security incident response activities.
  • Support security monitoring or network security projects as needed.
  • Design, Install, and support email application filter appliances for various customer facing environments.
  • Design, Install, and support web application filter appliances for various customer facing environments.
  • Installed and designed Multi-factor Authentication product for customers requiring secured access to managed systems.
  • Design, Implement, and support Cloud Anti Virus and Anti-malware for customers in VM environments.
  • Implement and support Multi Factor Authentication for external customers.
  • Install/maintain Symantec Anti-Virus Corporate software for internal and external customers.
  • Use Security defense in depth as a Design principle which includes using Confidentiality, Integrity, Availability
  • Implement the Biba Security model which provides integrity in our data that is key to our billing systems and our customers
  • Installed, configured, maintained, and troubleshooting firewalls
  • Worked with programmers to promote a secure Software Development Life Cycle (SDLC) environment.
  • Apply Secure Software Concepts using confidentiality during communications from or to other companies.
  • Problem Management (Root Cause Analysis) using 5 Whys and RCA based corrective action.
  • Work with Operational staff to implement tested solutions and aid in KTLO tasks.
  • Work to get PCI and ISO compliance for customers.
  • Work with customers to provide PCI compliance within our Data Center(s).
  • Backup and recovery management of Windows/UNIX/Linux/Solaris servers.
  • Network Engineering of internal network which includes redundant / High Availability of vendor network connections.
  • Design, test, and implement Microsoft Clustering Services in High Availability Enterprise environments.
  • Design, test, and implement Solaris and Linux Clustering Services in High Availability Enterprise environments
  • Managing web services for external customers including Apache, IIS and Managed PKI.
  • SAN hardware, firmware, and fabric connections for Solaris and Windows Server 2003 / 2008
  • Monitoring networks including hosts, reporting, and auditing tools for external customers.
  • Installed email and web servers in DMZ for internal and external customers.
  • Creating and maintaining scripts using Perl, WMI and VB script.
  • Serve as an escalation point of contact for the Service Desk and other organizations to ensure open channels of communication are effective for resolution of incidents.
  • Provide technical investigative support to Corporate and Financial Investigations, Labor and Employee Relations, Corporate Compliance or any other department as required.
  • Maintain current knowledge of threats and vulnerabilities applicable to IT infrastructure and application landscape.
  • Manage program data retention procedures and ensure compliance with enterprise standards.
  • Software / OS Patch Management
  • Test for Quality Assurance Functional testing of various environments
  • Installed, configured, maintained, and troubleshooting Cisco routers for various sites.
  • Constantly working with vendors supporting data circuits
  • Microsoft Active Directory deployment and administration
  • Backup primary firewall engineers during off - hours.
  • Install and configure firewalls at various client sites.
  • Manage switches, servers, and data for internal and external customers.
  • Server performance / capacity planning using Vantage Suite applications.
  • Install and assist in support of SQL Server 2000.
  • Installed and maintained the AD environment.
  • 3rd level support for web hosting customers.
  • Installed cluster environment for web hosting customers.
  • Use of WMI for application for desktop management.
  • Troubleshooting of Network issues involving DNS, TCP/IP routing, firewalls, VPN, etc.
  • Design, installation, and support of SAN for Novell and Windows 2000 servers.
  • Design and test Disaster Recovery plans for internal use and customers in various environments.
  • Manage internal web, FTP, and clustered servers.
  • Configured/maintain remote connectivity through Lantronics and Cyclade console servers using ssh2 via Ethernet connections.
  • Maintain Cisco VPN for internal and external customers.
  • Install, support, and manage multiple SAN’s.
  • Installation and Support of Veritas Cluster Services.
  • Installed, configured, and maintain Veritas netbackup.
  • Installed, configured, and maintain clients using EMC powerpath
  • Manage Air Conditioning, 3 phase power, and UPS systems.
  • Install/manage/support of Vantage suite (Server/Client/Application monitoring)
  • Constantly work overtime/off hours to support a 365/24/7 business.
  • Installed, configured, maintain, and troubleshoot Microsoft/ Linux/Netware Servers.
  • Monitor / troubleshoot system through SNMP and Vantage Suite.
  • Install and support Linux FTP servers for phone switch data.
  • Implemented Off-hours maintenance windows for 365/24/7 environments.
  • Worked with IT developers to perform and test change control. Also developed test environment.
  • Support external / hosted and internal customers.
  • Wrote IT Operations/Security documentation, Disaster Recovery program, and Standands & Procedures for internal tech support staff.
  • Support of Email (Exchange/Qmail/GroupWise).
  • Install and run CAT5, CAT6, single mode and multi mode fiber cables for various hosts including firewalls, servers and SAN’s.
  • Troubleshoot multiple data circuits such as T1, T3, Ethernet, and Frame Relay for infrastructure from MCI, AT&T, and Sprint.
  • Install and configure Paxfire DNS caching servers.
  • Test Recovery methods through restores that are performed twice a year and optimize as needed.

Confidential, Auburn Hills, MI

Adjunct Professor / Teaching Assistant

Responsibilities:

  • Created Presentations and Labs for every week I taught.
  • Use of EnCase for various lab work.
  • Use Cisco 642-618 Deploying Cisco ASA Firewall Solutions as main source material.
  • Taught material 8 out of 10 weeks when existing professor left for another position.
  • Created an enthusiastic and energetic environment for the students.
  • I had students participate in current topics for each class.
  • Assisted students as requested on labs and discussions.

We'd love your feedback!