We provide IT Staff Augmentation Services!

Information Security Officer Resume

3.00/5 (Submit Your Rating)

SUMMARY

  • Highly skilled Information Technology professional with experience in information security, network administration, database administration and e - Commerce Security. Specialize in network security on public and private IP networks, managing entire lifecycle of planning, designing, implementing and auditing the security measures, policies and procedures, across the whole enterprise and data. Excellent systems analysis, project management, troubleshooting and problem solving skills.

PROFESSIONAL EXPERIENCE

Confidential

Information Security Officer

Responsibilities:

  • Develop policies and procedures to ensure information systems reliability and accessibility; and to prevent and safeguard against unauthorized access to automated information systems, networks, and data.
  • Conduct vulnerability analysis and risk assessment studies of planned and installed information systems to assure that local AIS security plans and policies established are adequate for protection needs and are in compliance by statute.
  • Control, review, and record of the station's information security program by performing internal control and security investigations, and review and documents the results and provide reports as required.
  • Investigate and report all information security incidents and provide updates until closed; and make recommendations to management for corrective action to ensure the integrity of IT systems and employees.

Confidential

Network Security Consultant

Responsibilities:

  • Performing network security audits with Nmap.
  • Providing Remote access support and troubleshooting for various clients.
  • Conducting budget analysis for all IT related purchases.
  • Creating BCP/DR plans for critical business process.
  • Work with clients to see if their servers are good candidates for virtualization
  • Advise clients on mobile management strategies

Confidential

Information Security Analyst

Responsibilities:

  • Performed network risk assessments using Nmap, Nessus and making recommendations to address the vulnerabilities for system enhancements.
  • Managed vulnerability assessment using IBM Internet Scanner to minimize business risk.
  • Responsible for performing risk assessments during the implementation of software applications and any new projects.
  • Monitoring the network for intrusions using IBM Proventia Intrusion Detection Systems and event logs from firewalls.
  • Participate in internal and external audits with external vendors to ensure compliance of internal security policies and Federal laws and regulations.
  • Analyze and evaluate the effectiveness of various IT policies and procedures.
  • Provided 24/7 on-call support for 3500 users for any security related incident.
  • Recommended and implemented new security solutions across the whole enterprise environment.

Confidential

Systems Analyst

Responsibilities:

  • Conduct information gathering scans. This allows proper development of security policies and systems configuration as well as asset documentation.
  • Used SMS, WSUS and Active Directory Group Policy for the standardization and centralization of network administration.
  • Monitor and analyze network, security and system events on a daily basis and resolve complex problems.
  • Perform operating system, network and application vulnerability assessments to identify and prioritize security exposures in the environment and reduce security breaches.
  • Part of the security committee involved in developing and implementing security policy and procedures.
  • Evaluate and research new security measures.

Confidential

Network Analyst

Responsibilities:

  • Implemented and administered Surf Control web filtering software in an enterprise environment. This service allowed the IT operations manager to identify network inefficiencies and bottlenecks within the enterprise and identified solutions.
  • Implemented security policy to protect internal network against unauthorized access, and to make provisions for disaster recovery in the event of successful intrusion/attack.
  • Participated as member of the systems migration team from a Novell environment to a Windows 2000 environment. This enabled a more user friendly environment for the entire enterprise.
  • Provided technical support for various desktop and network applications for over 500 students, faculties and administrators which reduced down time for faculty and staff.

We'd love your feedback!