We provide IT Staff Augmentation Services!

Senior Security Engineer- Team Lead Resume

2.00/5 (Submit Your Rating)

TECHNICAL SKILLS

SECURITY: CISCO FIREPOWER | FIREEYE | ARCSIGHT | NETWORK INTRUSION DETECTION SYSTEMS (NIDS) | REDSEAL | BIGFIX | FORESCOUT COUNTERACT | NESSUS | ALIENVAULT | SYSLOG | BOMGAR (BEYONDTRUST REMOTE SUPPORT) | NIST 800 - 53 | F5-WAF | RSA ARCHER | MICROSOFT AZURE | MICROSOFT OFFICE 365 SECURITY CENTER| LDAP| AZURE AD| RSA| SSL AUTHENTICATION| SAML| IRONPORT | RBAC

ANALYTICS: SPLUNK | BOMGAR | VIRTUAL DESKTOP INFRASTRUCTURE (VDI) | WIRESHARK | WINSCP

OPERATING SYSTEMS & PROGRAMMING LANGUAGES: WINDOWS | MAC | UNIX | LINUX KERNEL | PUTTY | POWERSHELL | HTML | PYTHON

SERVERS: SQL SERVER 2008 R2 | SQL SERVER MANAGEMENT STUDIO | EXCHANGE SERVER | SHAREPOINT SERVER | SQL SERVER 2016 |

APPLICATIONS: JUNIPER NETWORKS | ORACLE SQL DEVELOPER | ITIL

SOFTWARE: SYSTEM CENTER CONFIGURATION MANAGER (SCCM) | SHAREPOINT DESIGNER (SPD) | MICROSOFT INFOPATH DESIGNER | NOTEPAD++ | MICROSOFT OFFICE SUITE | MS ACCESS | MS VISIO | MS PROJECT MS ACTIVE DIRECTORY | VMWARE | VDI | REMEDY TICKETING SYSTEMS | OFFICE 365

PROFESSIONAL EXPERIENCE

SENIOR SECURITY ENGINEER- Team Lead

Confidential

Responsibilities:

  • Build customer relationships with Department of Homeland Security, consulting to develop, deploy, support, and troubleshoot escalated security issues, ensuring reduced vulnerability and safety for 10K+ end users.
  • Reduce roadblocks and process inefficiency across projects, introducing strategic technical programs and initiatives to save $10K+ in operating costs.
  • Secure Applications by following NIST 800-53 and ISO 27001 protocols.
  • Perform vulnerability scans on all systems to determine vulnerabilities and to meet NIST 800-53 protocols.
  • Collaborate, and manage 6 providers and vendors to perform incident analysis, accelerate solutions-based product feature development, and deliver demo licenses to testing to determine reliability and product sustainability.
  • Manage, coach, and mentor 3 team members, training on status reporting, excellent service operations, and client relationship management.
  • Deploy 5 AWS applications on time and within budget, additionally performing daily system validation to check functionality.
  • Develop, Deploy, Deliver and Maintain Cloud Infrastructure platforms
  • Develop and maintain ForeScout CounterAct, Tanium, and CyberArk applications and develop SOPs for service operations, and overseeing compliance across 35+ member team.
  • Responsible for reviewing and modifying CIS and FedRamp benchmarks for each product to meet compliance standards for multiple systems and system owners.

CYBERSECURITY ANALYST- LEAD

Confidential

Responsibilities:

  • Owned system integrity and network protection for IT architecture, and applications, providing security and event management (SIEM) for 10K+ users and 10K+ devices.
  • Analyzed firewall security, intrusion prevention and detection, file integrity, and data loss prevention systems to ensure best practice utilization and reliable scalability planning.
  • Saved $50K by leading daily threat remediation practices, handling detection, analysis, and incident response.
  • Defined and delivered innovative process improvement, increasing productivity 75%+ across security operations, projects, and compliance.
  • Led migration to cloud-based data management, and deploying AWS applications
  • Create S3 buckets and manage EC2 instances, creating AWS Identity and Access Management (IAM) profile roles, confirming policy accessibility, and securing network connectivity.
  • Secured Web Browsers and applications by installing antivirus software, and following best practices to ensure web browsers are up to date.
  • Responsible for making implementing SOC2 to make sure systems are compliant.

SECURITY ANALYST

Confidential

Responsibilities:

  • Developed custom client security plans, security controls, assessments, and rules of engagement, successfully remediating 700+ security incidents and protecting customer systems, networks, and data.
  • Strengthened security by spearheading server rebuild of ForeScout CounterACT security application in partnership with vendor.
  • Performed ethical hacking penetration testing using tools such as Metasploit, and Kali Linux on client systems to identify vulnerabilities.
  • Performed Vulnerability scans using Nessus and remediated vulnerabilities upon findings.
  • Performed audits on systems and reporting the findings to executives to maintain risk and compliance.

We'd love your feedback!