We provide IT Staff Augmentation Services!

Consultant Resume Profile

5.00/5 (Submit Your Rating)

SUMMARY

  • 15 years of experience in the field of IT infrastructure and enterprise security architecture
  • CISSP Certified Professional. ISC 2
  • Certified Ethical Hacker CEH Certification from EC-Council
  • Offensive Security Certified Professional - OSCP
  • Experienced in IT security policy development and regulatory compliances, operational security, Business Continuity and Disaster Recovery planning.
  • Operating System hardening, Enterprise Security Architecture.
  • Experience in Access Control security models, administration, Single Sign on technologies.
  • Experience in Risk assessment and mitigation planning.
  • Experienced in white hat hacking - Network layers, shellcode generation, TCP/IP sockets, stack exploits development, sniffers, Wireless security auditing, Network API based tool development.

Technology SKILLS

Security Architecture Policies and processes as per NIST guidelines Infrastructure Security Database Security Network Security Mobile Security IT Risk Management and Governance Disaster Recovery Business Continuity Planning System development Life Cycle Project Management Penetration testing vulnerability assessment policy compliance Incident Response Plan Counter Measures Best Practices Ethical hacking Vulnerability testing Compliance management Risk assessment Policy adherence Technical design documentation Training C Programming Linux Kernel Programming libpcap/libnet APIs shell code creation Wireshark,Metasploit IPSec IPTables Veritas Cluster Server Linux Kernel Debugging/Developing Exploit Development Debugging tools - gdb,ollydbg,immunity,edb,protocol tunneling tools, Antivirus and Firewall bypassing tools.OS fingerprinting,Traffic Analysis,Port Scanning and enumeration tools, OpenVAS,Nessus,PHP scripting,Python,Perl,C Programming,Linux Kernel Debugging,ASM Programming for exploit and shell code generation,aircrack-ng,kismet,PHP.

EXPERIENCE

Confidential

  • Architecture and enterprise wide implementation of Symantec Data Loss Prevention Suite for mobile devices, desktop, network shares, storage systems within 3 months time.
  • Splunk Enterprise suite implementation for an environment with more than 2000 Servers.
  • Developed BCS/DR strategy for multiple projects.

Confidential

  • Architecture and implementation of FDA regulated BioArch System - A new computer system that gave the Red Cross ISBT 128 functionality. BioArch replaced National Blood Computer System NBCS and its underlying operational technology platform in compliance with HIPAA and many other health care regulations, standards in aggressive deadline of 1 year.
  • As a lead consultant worked with a team of System Administrators, DBAs, and Network Administrators in setting up new data center in Chicago for American RedCross and migrated 1500 Unix Servers, Storage arrays in 3 months time.
  • Audited, recommended and implemented identity management system in compliance with FISMA for a major US Government client.

Confidential

Implemented Business Continuity and Disaster Recovery Platform aligning with NIST standards for State of Ohio Job and Family Services.

Confidential

  • Consultant for Hewlett Packard - Delivered vulnerability detection and code validation services for HPUX Operating Systems.
  • Reverse engineering of network APIs - test vulnerabilities by exploit development.
  • Debugging of vulnerable codes.

Confidential

Minneapolis MN Business Continuity and Infrastructure Security architect

  • Assisting with testing and deployment plans for Symantec/VERITAS Storage and clustering products VERITAS Storage Foundation, VERITAS Cluster Server, Cluster Filesytem, VERITAS Volume Replicator, EMC SRDF, Hitachi TrueCopy solutions.
  • Symantec Data Loss Prevention Implementation.
  • Discovering and logging confidential information on web servers, databases and on end points.
  • Monitor the use of sensitive data types.
  • Built and deployed Enforce platform with DLP prevention policies meeting various best-practice and regulatory compliances including PCI,HIPAA and SOX
  • Implemented detection servers - Network monitor, Network prevent and Network Discover, End Point Discover Servers.
  • Designed response rules.
  • Centralized data and group profiling.
  • Created template based enforce policies
  • Deployed data monitoring and enforcement policies for: Data in motion monitor block FTP, HTTP/S, IM, SMTP and implemented Data Insight for protection Data in rest on NetApp filer volumes
  • Designed and implemented DLP solution for the data being accessed through Smartphones,Tablets and PDA and monitored mobile protocols like ActiveSync.
  • Implemented and integrated Symantec DLP and Data Insight for NetApp filers and enabled file and folder scanning in NetApp storage devices.
  • Consolidation of VERITAS Cluster Server
  • Auditing current deployments and suggesting best practices for risk mitigation.
  • Successfully preformed numerous Storage and server migration projects.
  • Designed high availability solutions for DB2/Oracle/Siebel/Sybase/NFS/WebSphereMQ.
  • Implemented Cluster Filesystem solutions using VERITAS Cluster Filesystem.
  • Installing Storage Foundation product bundles on newly built systems
  • Designed and implemented Multi data center high availability solutions for critical resources.
  • Delivered training to offshore and onshore team members on availability and data loss prevention products.
  • Performing acceptance testing of Storage Foundation products on newly built systems and clusters
  • Configuring and tested volume snapshots and file system checkpoints.
  • Developed custom high availability agents for integrating applications with VERITAS Cluster Server.
  • Implemented PKI Infrastructure services and key management.
  • Implemented IPSec solutions.
  • Design and architecture of Symantec PGP solutions and Symantec End Point Protection suite.
  • Implemented Symantec Data Insight solutions
  • Penetration testing - Web application penetration,Firewall evasion, Exploit development,Vulnerability research.

Confidential

Senior Consultant - Infrastructure Security

  • Implement security tools and products to routinely monitor for vulnerabilities, threats, alerts and attacks.
  • Recommend immediate and future corrective actions to protect information system assets
  • Worked with different organizational departments to recommend, develop and maintain policies, standards.
  • Identify existing security weakness and concerns and explain the potential risk to both internal and external customers and organizations.
  • Vulnerability scanning and penetration testing.Data center security architecture planning, design and implementation.
  • Implemented log monitoring solutions.
  • Implemented IPSEC encryption and authentication protocols.
  • Implemented IDS/IPS products.
  • Security monitoring, analyzing security alerts primarily from IDS, IPS, Firewall, Web Proxy, Antivirus, etc
  • Capture and analyze packets using ethereal, tcpdump.
  • Provided PKI implementation services - Design and planning, CA Authority installation, Certificate templates, SSL and Key archival, Key Management.
  • Provided consulting services for Identity Management and single sign on design and implementations.

Confidential

Consultant System Administrator

  • Consultant System Administrator for the State of Ohio Department of Information technology. The OIT hosts the many of the state government IT infrastructure like Ohio Department of Family and Jobs .
  • Installed 3 node Sun Cluster environment for Oracle 9i RAC
  • Provided 7 24 production support to the mission critical data center
  • Performed day to day Cluster administration tasks
  • Wrote UNIX shell scripts for automating many of the daily administration tasks
  • installed Solaris volume Manager for Sun Cluster 3.1 and non cluster nodes
  • Performed daily system health check up
  • Recommend proactive and corrective troubleshooting methods to the OIT
  • Monitored System performance using UNIX commands
  • Installed Oracle 9i RAC and corresponding data services for Sun Cluster 3.1
  • Installed, configured Sun Midrange servers
  • Performed Sun Cluster troubleshooting tasks

Environment: Sun Fire v880 servers, IBM Shark Storage system, VERITAS volume Manager, Solaris Volume Manager, Sun Cluster 3.1 update 3, Tivoli Enterprise Backup

Confidential

Technical Support Engineer/Sr Sun Administrator

  • APAC Product Technical Support - PTS Engineering.
  • Sun Microsystems India was a subsidiary of Sun Microsystems, USA. The India operation included India engineering center, Support services, and Sales.
  • Provided Level 3 support for critical escalations related to Midrange Servers, High End Server, Solaris Kernel, and High Availability products like Sun Cluster 2.2, 3.x, which are escalated from the field engineers and System Administrators on the client site.
  • Worked with Sun Services PTS teams also known as RSD for various escalations
  • As part of critical support visited client sites and assisted field engineers in complex hardware installations, Cluster configuration Troubleshooting, Performance Tuning and Recovery.
  • Performed root cause analysis by in-depth study of various system log files and core files from the crashed system and simulated the crashed events on the troubleshooting facility.
  • Was a team member from Sun Microsystems in the VERITAS Sun Oracle joint engineering team responsible for analysis, diagnose and trouble shooting of cross platform issues.
  • Troubleshooting of multi vendor Storage platform issues in Solaris.
  • Tested and implemented various Cluster agents on VERITAS Cluster and Sun Clusters.
  • Installed and Configured Midrange and High end servers as well as Sun Cluster 3.1.

Environment:Sun Fire 12K, 15K,20K,25K , Sun Fire 4800,6800 servers, Sun Enterprise 4500 servers, Solaris 8,9,10 Sun Cluster 3.1, Solaris Disk Suite, VERITAS Volume Manager, Sun Storedge 3510, 3310, T3 and 69xx series of Storage devices

Confidential

Senior Engineer UNIX System Engineering

  • CSC provides IT and professional services to Global Commercial customers in the United States, Europe and other international locations. Outsourcing activities include operating all or a portion of a customer's technology infrastructure and applications. Business process outsourcing IT and
  • Professional services include systems integration, consulting and other professional services and software system engineering, etc.
  • Linux kernel programming - Internal function, Schedulers, Memory management and I/O scheduler modules.
  • Testing custom kernels, white box testing, Integration testing and regression testing.
  • API testing
  • Debug kernel faults using debuggers likes gdb, kdb etc.
  • Testing Linux kernel, drivers on third party hardware solutions.
  • Reverse engineering of network APIs - test vulnerabilities by exploit development.
  • Debugging of vulnerable codes.

Confidential

Senior Customer Engineer in System Support Organization

  • Installed and configured HPUX 10.2 and 11i on HP 9000 servers including D,R,L and K class servers
  • Configured disk systems and SCSI disk arrays
  • Installed, configured line printers and serial printers on HPUX servers
  • Configured LVM managed disks and file systems including mirroring ,RAID configuration
  • Configured Mirroring of logical volumes including root logical volume
  • Performed routine user administration tasks
  • Installed backup devices in HPUX servers like DLTs and Tape Libraries
  • Configuring the intra-networking various platforms like Servers, PCs, diskless workstations
  • Configuration of Unix terminals VT100 using the serial terminal adapters, serial cards specialix , and terminal servers
  • Performed HPUX, Solaris, Linux system hardening
  • Responsible for Installing, Performance Tuning, online backup and recovery of Oracle Databases on HP PA-RISC servers
  • Configured HPUX servers for NFS, NIS as per the bank's requirements
  • OS Tuning on various tunable parameters using SAM System Administration Manager utility.

Confidential

  • Performed site planning, testing, installation, configuration and troubleshooting of SUN systems and storage systems and sub-systems
  • Installed, configured and Build servers from scratch Sun Fire 4800, 6800, 15K,20K and 25K using Jumpstart
  • Installation, Configuration and Administration of Qlogic SAN switches.
  • Installed and configured Sun StorEdge 3510FC fiber channel disk arrays and implemented RAID volumes RAID 0, 1 and 5 .
  • Gave production support to 100 servers Sun Fire 4800, 6800, 15K, 20K, 25K running Sun Solaris 8 and 9.
  • Installed and configured NIS, NFS, DNS, RARP, LDAP services.
  • Implemented No Single Point of Failure NSPOF for the hardware systems including the servers and storage systems.
  • Configured SSH/sudo policies on newly built Solaris and HPUX servers.
  • Configured IP multipathing and Storage multipathing using Sun MPxIO
  • Upgraded firmware patches in FCAL disk , storage controllers and Sun Fire Server system boards and HBAs
  • Installed Oracle databases, implementing the backup strategy
  • Interconnected different exchange offices with the data center using both WAN and LAN
  • Implemented Sun Cluster 3.1 for RAC and Oracle HA resources.
  • Configured hardware domains in SF 15K servers as cluster partners
  • Performed network analysis with netstat, snoop commands.
  • Designed, Implemented DR solutions including SF15K,Sun Storedge Arrays Brocade Switches
  • Provided basic system administration training to the client
  • Configured VERITAS Volume Manager for disks and mirroring is configured
  • Configured Solaris Volume Manager and Solaris DiskSuite on Sun Fire 4800 servers
  • Interacted with various vendors and OEMs during the project implementation process
  • Wrote scripts for user creation, backup scheduling, Filesystem clean up, monitoring of syslog events etc.

Environment:Sun15K servers, Sun Fire 6800 servers, Sun Fire v880 servers, Sun Storedge 3510FC storage arrays, Qlogic 8 port and 16 port 2GBPS fiber switches Solaris 8 /9, Solaris Volume Manager, VERITAS Volume Manager, Sun Cluster 3.1.

We'd love your feedback!