Senior Security Engineer- Team Lead Resume
TECHNICAL SKILLS
SECURITY: CISCO FIREPOWER | FIREEYE | ARCSIGHT | NETWORK INTRUSION DETECTION SYSTEMS (NIDS) | REDSEAL | BIGFIX | FORESCOUT COUNTERACT | NESSUS | ALIENVAULT | SYSLOG | BOMGAR (BEYONDTRUST REMOTE SUPPORT) | NIST 800 - 53 | F5-WAF | RSA ARCHER | MICROSOFT AZURE | MICROSOFT OFFICE 365 SECURITY CENTER| LDAP| AZURE AD| RSA| SSL AUTHENTICATION| SAML| IRONPORT | RBAC
ANALYTICS: SPLUNK | BOMGAR | VIRTUAL DESKTOP INFRASTRUCTURE (VDI) | WIRESHARK | WINSCP
OPERATING SYSTEMS & PROGRAMMING LANGUAGES: WINDOWS | MAC | UNIX | LINUX KERNEL | PUTTY | POWERSHELL | HTML | PYTHON
SERVERS: SQL SERVER 2008 R2 | SQL SERVER MANAGEMENT STUDIO | EXCHANGE SERVER | SHAREPOINT SERVER | SQL SERVER 2016 |
APPLICATIONS: JUNIPER NETWORKS | ORACLE SQL DEVELOPER | ITIL
SOFTWARE: SYSTEM CENTER CONFIGURATION MANAGER (SCCM) | SHAREPOINT DESIGNER (SPD) | MICROSOFT INFOPATH DESIGNER | NOTEPAD++ | MICROSOFT OFFICE SUITE | MS ACCESS | MS VISIO | MS PROJECT MS ACTIVE DIRECTORY | VMWARE | VDI | REMEDY TICKETING SYSTEMS | OFFICE 365
PROFESSIONAL EXPERIENCE
SENIOR SECURITY ENGINEER- Team Lead
Confidential
Responsibilities:
- Build customer relationships with Department of Homeland Security, consulting to develop, deploy, support, and troubleshoot escalated security issues, ensuring reduced vulnerability and safety for 10K+ end users.
- Reduce roadblocks and process inefficiency across projects, introducing strategic technical programs and initiatives to save $10K+ in operating costs.
- Secure Applications by following NIST 800-53 and ISO 27001 protocols.
- Perform vulnerability scans on all systems to determine vulnerabilities and to meet NIST 800-53 protocols.
- Collaborate, and manage 6 providers and vendors to perform incident analysis, accelerate solutions-based product feature development, and deliver demo licenses to testing to determine reliability and product sustainability.
- Manage, coach, and mentor 3 team members, training on status reporting, excellent service operations, and client relationship management.
- Deploy 5 AWS applications on time and within budget, additionally performing daily system validation to check functionality.
- Develop, Deploy, Deliver and Maintain Cloud Infrastructure platforms
- Develop and maintain ForeScout CounterAct, Tanium, and CyberArk applications and develop SOPs for service operations, and overseeing compliance across 35+ member team.
- Responsible for reviewing and modifying CIS and FedRamp benchmarks for each product to meet compliance standards for multiple systems and system owners.
CYBERSECURITY ANALYST- LEAD
Confidential
Responsibilities:
- Owned system integrity and network protection for IT architecture, and applications, providing security and event management (SIEM) for 10K+ users and 10K+ devices.
- Analyzed firewall security, intrusion prevention and detection, file integrity, and data loss prevention systems to ensure best practice utilization and reliable scalability planning.
- Saved $50K by leading daily threat remediation practices, handling detection, analysis, and incident response.
- Defined and delivered innovative process improvement, increasing productivity 75%+ across security operations, projects, and compliance.
- Led migration to cloud-based data management, and deploying AWS applications
- Create S3 buckets and manage EC2 instances, creating AWS Identity and Access Management (IAM) profile roles, confirming policy accessibility, and securing network connectivity.
- Secured Web Browsers and applications by installing antivirus software, and following best practices to ensure web browsers are up to date.
- Responsible for making implementing SOC2 to make sure systems are compliant.
SECURITY ANALYST
Confidential
Responsibilities:
- Developed custom client security plans, security controls, assessments, and rules of engagement, successfully remediating 700+ security incidents and protecting customer systems, networks, and data.
- Strengthened security by spearheading server rebuild of ForeScout CounterACT security application in partnership with vendor.
- Performed ethical hacking penetration testing using tools such as Metasploit, and Kali Linux on client systems to identify vulnerabilities.
- Performed Vulnerability scans using Nessus and remediated vulnerabilities upon findings.
- Performed audits on systems and reporting the findings to executives to maintain risk and compliance.