We provide IT Staff Augmentation Services!

Cybersecurity Specialist Resume

2.00/5 (Submit Your Rating)

Lanham, MD

SUMMARY

  • Self - motivated with excellent attention to detail and meticulous documentation skills
  • Hands-on experience in Network and Systems Administration
  • Experience with, and working knowledge of, security standards, best practices, and protocols.
  • Knowledge of information security principles, NAC, NAP, DLP, identity and access management
  • In depth knowledge of IPSEC VPN, SSL VPN
  • Understanding of advanced network routing protocols, sniffer packet capture and analysis.
  • Familiarity with event logging applications and SIEM solutions- QRadar, McAfee
  • Network Access Control solutions such as Cisco ISE, ForeScout
  • Identity and Access Management Solutions such as CyberArk
  • Knowledge of Intrusion Prevention\Detection technologies and management
  • Experience with Web-filtering tools (i.e., Websense, etc)
  • Broad knowledge of Windows patch and vulnerability management and anti-virus\anti-malware\endpoint protection software
  • Working knowledge of Windows Active Directory and Windows authentication (2008 and later)
  • Firewall concepts, configuration and administration:
  • Working understanding of Web Server technologies, configurations, best practices, and vulnerabilities (IIS required)
  • Experience in the management of both physical and logical information security systems
  • Strong technical skills (application and operating system hardening, vulnerability assessments, security audits, TCP/IP, intrusion detection systems, firewalls, etc.)Strong technical knowledge of frameworks and standards such as FIPS and NIST SP800 Series, ISO-27001, PCIDSS, SOX-404, COBIT, FFIEC, HIPAA, FISCAM, FedRAMP, and Basel.
  • Strong knowledge of the design and testing of controls and security measures across diverse IT and business environments.
  • Knowledge of current and emerging trends in IT security, risk m security technologies and practices including machine learning, cloud security, big data, and analytics.
  • Ability to leverage data analytics, metrics and other risk indicators to analyze business and cyber risks.
  • Experience reviewing documentation such as security policies and procedures, security plans, risk assessment reports, operating procedures and schematics.
  • Experience in the review of enterprise network and cloud infrastructure, operating systems and databases.
  • Effective report writing, communication and presentation skills.
  • Strong problem solving, analytical and critical thinking abilities
  • Provide the necessary support to monitor and ensure compliance with information security policies, procedures and regulatory requirements including assistance with internal auditing, technical reviews and identification of security risks
  • Directly assist in the testing, selection, design, implementation, documentation, operation, and maintenance of security technologies and security vendors
  • Develop Information Security end-user communication and training materials
  • Security architecture design, documentation and diagrams for applications and systems
  • Conduct vulnerability assessments and provide recommendations for remediation
  • Exhibit excellent organizational skills to work in a multi-task, fast-paced environment with minimal supervision.
  • Excellent troubleshooting skills
  • Ability to interact with multiple levels of personnel within the organization and externally.

TECHNICAL SKILLS

  • ISO-27001
  • PCIDSS
  • SOX-404
  • COBIT
  • FFIEC
  • HIPAA
  • FISCAM
  • FedRAMP
  • Basel
  • IPSEC VPN
  • SSL VPN

PROFESSIONAL EXPERIENCES

Confidential, Lanham MD

Cybersecurity Specialist

Responsibilities:

  • Deliver best in class information security trainings such as CAP, Security+, CISSP, ISO 27001, CISM SSCP, CISA and Networking
  • Developed, reviewed and updated Information System Security Policies, System Security Plans (SSP), and Security Baselines in accordance with ISO-27001, NIST SP 800-18, and NIST SP 800-37 Risk Management Framework (RMF) towards FISMA compliance; strengthen enterprise cybersecurity and improved regulatory compliance.
  • Apply appropriate information security control for specific clients based on NIST SP 800-37 rev 1, NIST SP 800 53 rev 4, NIST SP 800-60, FIPS 199, FIPS 200, and OMB A-130 Appendix III.
  • Conduct independent security analysis of specific client’s information and information systems, review security logs of all network devices, key applications and other risk metrics in order to identify and remediate inherent and potential cyber risk to the organization.
  • Perform security testing of specific client’s network firewalls, applications, cloud infrastructure, and operating systems by utilizing penetration and vulnerability scanning tools; analyzed threats identified by the vulnerability scanning, reporting to the client on severity, exposure, likelihood of compromise and potential consequences.
  • Recommend mitigating actions to increase protection of key information assets, improve security incident response by increasing the value proposition of managed security services.
  • Implement seminars and workshops for individual clients to attain knowledge and skills in cybersecurity, DOD-8750 information assurance training and other ANSI-approved commercial certifications; trained over 30 participants quarterly.

Confidential

Practice Lead - IT Security Technical Specialist

Responsibilities:

  • Requirement gathering, analysis and implementation of security solutions such as SIEM, Network access Control, Security Operation Centre, Network Tool Optimizer, File Integrity Monitoring, DLP, Firewall Analyzer, Endpoint Protection, Vulnerability Assessment, Two Factor Authentication.
  • Develop Security designs and architecture
  • Engage in technical presales and proof of value.
  • Perform gap assessment and control recommendations
  • Product Management and Business Development
  • Achieve and maintain advanced partnership level with Original Equipment Manufacturers (OEMs) through continuous improvement and certification.

Confidential

Policy and Standard Analyst

Responsibilities:

  • Responsible for the management of access to the network, monitoring of security incidence and events and manage the Security Operations Centre
  • Reviewed and accredited newly developed applications and implement security solutions for the bank.
  • Ensured conformance to regulatory compliance bodies such as PCI DSS and ISO 27001.
  • Deployment and management of FireEye Advance Persistent Threat (APT) Solution
  • Evidence gathering and spot check for Payment Card Industry Standard Data Security Standard (PCI DSS)
  • Evidence gathering, spot check and lead auditor for ISO 27001 ISMS Standard
  • Implementation of File Integrity Monitoring Solution
  • Deployment of Vulnerability Management Suite
  • Security Incident and Event Management
  • Deployment and management of Network Access Control Solution
  • Vulnerability assessment and penetration testing
  • Database activity monitoring
  • Development of Security awareness programs
  • Security Policy review
  • Card Scanning
  • Data security and degaussing of data decommissioned hard drives
  • Change management representative
  • Development of hardening standards for Windows, Linux and Solaris
  • Fraud investigation
  • Coordination of Information Security Incident Response Team
  • Development of Business continuity Planning
  • Ensure secure coding by including security testing in the Business Requirement Specification and ensuring that controls have been implemented by testing them.

Confidential

Head, Network Security

Responsibilities:

  • Responsible for network review, technical sales and implementation of security solutions.
  • Requirement gathering, analysis and implementation of security solutions such as SIEM, Network access Control, Security Operation Centre, Network Tool Optimizer, File Integrity Monitoring, DLP, Firewall Analyzer, Endpoint Protection, Vulnerability Assessment, Two Factor Authentication.
  • Delivering technical briefings and project plans to management
  • Business Development
  • Project management
  • Writing of SLA, Pricings and Proposal
  • Conduction of interviews and recruitment of staffs
  • Procurement and Negotiations
  • Provision of IT Security support for solution deployed
  • Identification of threats and attempted security breaches

We'd love your feedback!