Security Engineer I Resume
Hagerstown, MD
SUMMARY
- Work in an exciting, creative and an educational Computer Science Information Technology (IT)/ Cyber security position where me is able to utilize my skills and expertise to implement technologies to for robust performance and security protection in teh IT field, such as Identity and Access Management, infrastructure end - point security, Active Directory, UNIX/Windows platform, hardware and software.
- As well as learn more about teh business industry and teh careers involved to improve productivity and security assurance for clients and merchants.
- Extensive experience in team-oriented projects and delivering presentations, Information Security Cyber Defense (ISCD), Identity and Access Management (IAM), Quest technologies (QAS & TPAM), CA Identity Management, CA Access Review portals, Virtual Directory Services (Radiantone), Centrify technology, Active Directory and UNIX platforms.
- Enthusiastic team player and pay keen sense to details, analytical and punctuality.
- Very much dedicated to work, wif solid employment history.
- Able to quickly grasp new concepts and self-motivated to learn new technologies and applications.
TECHNICAL SKILLS
Platforms: Oracle Solaris platforms 5, 7, 10, and 11; LINUX X86/X64 platforms (Red Hat/CENTOS/SUSE 11 Enterprise); AIX platforms (5.3, AIX6.1 AND AIX7.1); Windows Server 2008, Server, Windows Server 2012 R2 Platform. Security and deployment tools such as Symantec endpoint protection, Wireshark, Snort, Splunk and Opsware monitoring toolsEnvironment: Windows (2000, to Win 10); Windows Servers -2003 - 2012 R2, Mac OS X; CSS; XML, UNIX Systems (LINUX, AIX, and SOLARIS), LDAP, and Net groups, Active Directory (AD), Active Role Services.
Software Applications: Confidential Office Suite, SQL, Photoshop, Adobe Flash and Internet Browsers, CA products such as AuthMinder, IDM Directory, Radiant logic Virtual directory service, PingID. Dell Manage for UNIX Console, QAS (Quest Autantication Services), DELL Total Access Privilege Management (TPAM), CA Identity Management, CA Access Review portals, Virtual Directory Services (Radiantone), Centrify technology, Centrify Server Suite 2016Programming Languages: AS/400 (SQL), COBOL, C++, Scripting languages (JavaScript, JavaScript, CGI and ASP.NET), RPG IV, Data Base SQL, UNIX and Visual Basics. TCP/IP Network Configuration and Management.
UNIX commands: Creating and displaying short files, create and change UNIX UIDs, GIDs, password files such as permissions on UID, UID Info and GID for read, write and execute. Give Sudo rights, change directory, copying files, display date, and sort file. Configure SSHD files, start and stop Processes, and much more, start and stop applications and services..
PROFESSIONAL EXPERIENCE
Security Engineer me
Confidential, Hagerstown MD
Responsibilities:
- Analyze teh security threat dat users might experience and implementing strategies to prevent or minimize them in all. Migrating UNIX account to Active Directory autanticated using Centrify Server Suite (CSS), Centrify Identity Service (CIS), Centrify Privilege Service (CPS), Quest Autantication Service (QAS) and Total privilege Access Management (TPAM) software to limit teh amount of passwords a user needs to remember as well as providing a centralized point for administration.
- Mapping UNIX local user accounts for Active Directory.
- Worked on host security issues on multiple UNIX platforms including Linux, Solaris and AIX based servers;
- Web based application and database security, and setting other Unix Attributes.
- Retrieve password file for users, and update override user account attributes on teh local UNIX host.
- Used identity information from Active Directory to modify account attributes, UNIX enable AD users, set attributes to standard UNIX user.
- Prepare Change Record to proceed wif major implementation such as overrides, move computer objects in Active Role Service, make changeto GPOs, and add groups and UNIX users to teh global domain controller using VASTOOL.
- Work on Quest Management Console for UNIX to add, delete, profile, join, unjoin, and update software on UNIX boxes for proper autantication process of teh servers.
- Supported Legacy LDAP applications and Oracle servers.
- Resolved Conflicts between teh users.allow files by configuring Local File-Based Access Control to allow or deny authorization.
- Configure and customize teh schema mapping, to ensure dat teh attributes used for User ID Number and Group ID Number are indexed and replicated to teh global catalog.
- Worked on vgptool to collects policy information based on teh location of teh UNIX host object in Active Directory.
- Vgptool follows teh same rules and standards of Group Policy application as Confidential Group Policy, including enforced links, block inheritance, non-tattooing of policy settings, enabled or disabled links, link order, ACL filtering, and enabled/disabled GPOs.
- Create Remedy and IR tickets and also takes part in teh On-call support working on IR tickets in solving various users and production issues.
- Create different levels of CR (Change Record) to Work on Production and Non-production servers.
- Worked on CA identity manager, Cognos IDM, PingFederated and VDS Radiantone, CA Single-Sign-On (SSO).
Security Engineer
Confidential, Wilmington, DE
Responsibilities:
- Review security logs for anomalies, patterns, and variants using QAS/AD applications.
- Monitor for security events in QAS/AD applications.
- Create event channels in QAS/AD applications.
- Add and remove store and component modules in QAS/AD applications
- Report on Potential vulnerabilities in computer technology.
- Coordinate reporting to other teams and information gathering of risks.
- Track down potential exploits in computer systems.
- Performs initial triage of all security events and in depth analysis of threats as well as proactive security measures.
- Security vulnerability scanning for web hosts, network devices, and all computer systems.
- Write, review, and edit documents and procedures on processes. Standard operating procedures (SOP’s)
- Create, modify, and delete end-user and system accounts for applications and operating platforms
- Administration of user accounts in Active Directory (Accounts, User group adds, Enable/disable Accounts, Set Account expirations)
- Administer security and access across multiple computing platforms.
- Review log files for frequent occurrences. (account lock outs and login attempts)
- Ensure proper authorization is received/issued/created for all access changes
- Troubleshoot access issues including review of current access setups and working wif end users, developers, and infrastructure staff to identify and correct issues.
- Train new employees on process and procedures.
- Write, review, and edit documents and procedures on processes.
Data Collector/ Wireless Device Test Technician
Confidential, Wyomissing, PA
Responsibilities:
- Technically conduct wireless device test for network performance such as network selection or reselection, RF performance, data services, and audio quality in implementation a change from 3G to 4G Network capacity.
- Extensive experience on Smart phone and Wireless/Mobile Device Testing. Evaluate and Improve Voice and Call Performance in 2G, 3G and 4G devices.
- Conduct technical complex wireless device test plan on wireless devices in implementation of change from 3G to 4GNetwork capacity.
- Drive test using LG LTE and LLDM software and setup teh transmitter during teh drive while collecting wireless cell phone network data.
- Monitors tool kit as it collects data and keeps track of wireless network performance testing such as network selection and reselection.
- Troubleshoot any equipment or software problems in teh field and recognize anomalies in data, understands technical aspects of teh data collected, and application functionality in working wif teh RF Engineer to troubleshoot problem areas.
- Configure and modify dial-up connections, ping various IP addresses, check hardware and software configurations as well.
- Has good exposure to GSM, UMTS, GPRS, CDMA architectures, GPS, WAP-MMS. RF Engineering, understanding about calls processing.
Business Analyst
Confidential, Exton, PA
Responsibilities:
- This project involved development of multiple applications for credit risk management enabling teh user to accurately assess teh risk of potential credit losses, both on teh counterparty and portfolios levels.
- Gatheird business requirements through interviews, surveys, and observing from account managers.
- Worked closely wif teh User Interface (UI) team to model teh screens, which met user defined requirements, organizational and regulatory standards.
- Coordinate activities between business unit and technical staff, developing new methods, policies, and procedures to meet teh business needs.
- Extract business process flows and workflows, in helping development, process improvement and quality assurance in understanding teh requirements.
- Participated in teh logical and physical design and Data-Modeling sessions, and worked to develop design documents accordingly.
- Participate in Software Quality Assurance in most stages of testing including Unit Integration, System and Acceptance testing.
Computer Lab Assistant
Confidential, Reading, PA
Responsibilities:
- Coordinated scheduling of students and teachers for teh purpose of maintaining computer lab operations and activities.
- Instructs students and teachers in computer lab technology and software applications (e.g. answers questions, keyboarding, Apple
- Works, reading and math specialized programs, etc.) for teh purpose of enhancing their understanding of lab operations and reinforcing academic concepts.
- Maintains computer hardware and software applications inventory for teh purpose of ensuring availability of equipment and / or
- instructional material in teh computer lab.
- Maintains computer lab (e.g. instructional materials, appropriate software, sets up materials for daily activities, etc.) for teh purpose of ensuring availability of equipment and programs to enhance teh instructional program.
- Monitors student activities while in computer lab for teh purpose of maintaining a safe environment dat is conducive to learning.
- Performs routine and preventive maintenance of computer lab and classroom equipment (e.g. dusting, cleaning, virus scanningCreating and clearing Internet bookmarks, defragmenting, etc.) for teh purpose of ensuring availability of equipment in safe operating condition.
- Prepares documentation (e.g. reports, instructions, memos, etc.) for teh purpose of providing written support and /or conveying
- information.
- Troubleshoots malfunctions of hardware and/or software applications for teh purpose of determining appropriate actions to maintain computer lab operations.
- Assists other personnel as may be required for teh purpose of supporting them in teh completion of their work activities.