We provide IT Staff Augmentation Services!

Senior Vulnerability Remediation Engineer, Lead Resume

4.00/5 (Submit Your Rating)

Columbus, GA

SUMMARY:

  • Contribute to success by bringing my experience to the table in the technical & management domains and staying current by learning & improving my skills
  • In - depth knowledge of Vulnerability management.
  • In-depth knowledge of Qualys.
  • In-depth knowledge of Certificate & Key management.
  • In-depth knowledge of Content Delivery Network (CDN).
  • In-depth knowledge of Identity and Access Management (IAG).
  • In-depth knowledge of RBAC.
  • In-depth knowledge of SailPoint Identity IQ.
  • In-depth knowledge of CheckPoint Firewall and policy management.
  • In-depth knowledge of Tufin (Firewall Policy Management system).
  • In-depth knowledge of Mobile Device Management (MDM) and Bring Your Own Device (BYOD).
  • In-depth knowledge of AirWatch.
  • In-depth knowledge of Unicenter.
  • In-depth knowledge of eTrust Identity Manager.
  • In-depth knowledge of eTrust Single Sign On.
  • In-depth knowledge of Access and Identity Management.
  • In-depth knowledge of Active Directory.
  • In-depth knowledge of Scripting with Probe.
  • Intense knowledge of Identity Management (IDM).
  • Intense knowledge of NetIQ IDM solution.
  • Intensive knowledge of Information Systems design and management.
  • Intensive knowledge of Project Management.
  • In-depth knowledge of Banking systems as well as regulatory requirements.
  • In-depth knowledge of the Telecommunication infrastructure for Internet via VSAT and wireless technologies.
  • Solid understanding and experience in information system design and implementation.
  • Technically proficient in MS Office, MS Project, Windows NT, Windows 2000, Windows XP, Windows 7, Novell Netware, SQLBASE, 4GL.

EMPLOYMENT HISTORY / PROFESSIONAL EXPERIENCE:

Confidential, Columbus, GA

Senior Vulnerability Remediation Engineer, LEAD

Responsibilities:

  • Build the new Vulnerability Remediation team and define the priorities and objectives to fulfill.
  • Define objectives Define roles Interview candidates Assign candidates to roles
  • Put in place the initial processes of Vulnerability Remediation:
  • Define vulnerability assessment process (internal and public feeds)
  • Define vulnerability remediation testing process (patches, configuration modification, specific applications ... )
  • Define patch deployment process (automated with SCCM, manual ...)
  • Define reporting
  • Build a solid relationship with the stake holders:
  • Build liaison with the administrators Build vulnerability remediation awareness with the administrators Build liaison with the SCCM/patching team (desktop & server) Build liaison with key departments and functions Build liaison with the Qualys/Vulnerability Assessment team.
  • Facilitate patching with vulnerability analysis (patchable and non-patchable)
  • Work in attaining the goals defined for the first year
  • Build a test lab Define targets and bring down our numbers bring down the low-hanging fruits (known easy patches) work on the vulnerabilities found on the perimeter systems work on vulnerabilities found on mission critical systems

Senior Information Security Engineer

Confidential

Responsibilities:

  • Key Management / HSM deployment
  • Migration of SafeNet Key Secure servers from AWS to on-premises
  • Building and configuration of SafeNet Key Secure server (150v)
  • Building and configuration of SkyHigh Key Agent
  • Connection to SalesForce for field level encryption
  • Maintenance and fine-tuning of the system
  • Resilient - Security Incident Management/ticketing system
  • Building and configuration of Resilient platform
  • Maintenance and fine-tuning of the platform
  • Certificate Management
  • Trust Protestion Platform management (SSL/TLS certificates & SSH Keys life cycle management, SHA-1 to SHA-256 migration, Certificate request process, Policy implementation, Auto-provisioning)
  • Microsoft Internal CA
  • Comodo Certificate Manager (Governance, Certificate LCM, Certificate deployment support)
  • Symantec Certificate Manager (Governance, Certificate LCM, Certificate deployment support)
  • Venafi POC.
  • Discovery and documentation of certificates and owners (certificate inventory)
  • Akamai (CDN) Relationship Management
  • Managing the Akamai relationship
  • Site configuration management
  • Policy Management
  • Change Control Management
  • Security reviews and remediation
  • Site optimization based on Akamai reviews
  • Reporting
  • Corporate Proxy Management
  • Websense installation and maintenance
  • Policy management
  • Access request processing
  • Alert management
  • Reporting
  • Managing the IAG (Identity and Access Governance) project - SailPoint IIQ solution
  • Proof of Concept
  • Due diligence
  • Review of existing and design of new processes associated to the IAG process.
  • Design, architecture and installation of SailPoint IIQ solution.
  • Management and fine-tuning of SailPoint IIQ.
  • Running access certifications for key SOX applications with SailPoint IIQ.
  • Role mining exercise for branch level access
  • Information Security key representative to the MDM - Confidential
  • Proof of concept
  • InfoSec success criteria review
  • Installation
  • Compliance and security review
  • Information Security key representative to DLP project
  • Proof of concept
  • InfoSec analysis of the solution
  • Managing the Firewall monitoring and reporting process
  • Building the firewall access request process
  • Building the firewall access request review process
  • Building the firewall report review process
  • Defining the firewall reports from Tufin
  • Contribution to the following:
  • Risk assessment
  • Risk review of projects and information security services evaluation
  • Information Security general processes.
  • Building processes and procedures for security controls deployed in the network.
  • Access control review for all security controls

Confidential, Salt Lake City, UT

Information Security Engineer

Responsibilities:

  • Design of roles and profiles based on standardized roles.
  • Linking the eTrust Identity Manager to Active Directory for automated provisioning of users.
  • Maintenance of roles and management of the provisioning system
  • Installation of Single Sign On services
  • Writing scripts for application single sign on.
  • Designing role based and department based groups
  • Designing and configuring Active Directory groups and rights based on profiles

Confidential

IT Consultant

Responsibilities:

  • Lead project team. Develop security blueprint. Run the gap analyses between Confidential banking system and Management requirement/regulatory board.
  • Advised management on IT orientation, IT projects and strategy, project problems and IT security. Interface between the technical team and management.
  • Maintained the banking systems

Confidential

Technical Manager

Responsibilities:

  • Managed the NOC (VSAT gateway and Wireless local loop, Customer Service)
  • Services offered: broadband connection, IP telephony, Call termination, Enterprise VPN, IT systems.
  • Managed the Service Engineers
  • Designed communications systems
  • Documented all procedures
  • Wrote and advocated proposals
  • Advised General Management on technical issues

Confidential

Chief MIS Officer

Responsibilities:

  • Managed the MIS department
  • Ovation Client/Server Banking System running on a heterogeneous network composed of Novell Netware and Windows Server 2000 and DOS platform
  • Developed / maintained /handled production of the Ovation banking system
  • Wrote all procedures and trained both technical staff (system maintenance) and upper Management (EIS and analysis)
  • Designed and generated reports required by the regulatory board using scripting to extract data and Probe C to program the reports.

Confidential

Assistant Manager

Responsibilities:

  • Managed the Computer Department (A team of 5 Technicians and Engineers)
  • Developed software using Delphi
  • Provided computer training
  • Designed and implemented multiple information systems
  • Managed the Telephony Department

We'd love your feedback!