We provide IT Staff Augmentation Services!

It Security Engineer Resume

5.00/5 (Submit Your Rating)

Windsor, ConnecticuT

PROFESSIONAL SUMMARY:

  • Information Security Analyst/Engineer with experience in analyzing security incidents, Vulnerability and Penetration testing, Network Monitoring, Information Security & Network security functions.
  • Experience with industry recognized SIEM (Security Information and Event Management) solutions such as NITRO, Splunk, Forcepoint and many other tools.
  • Hands on experience with security consulting and research
  • Hands on experience with HP Arcsight, IBM QRadar, Rapid7, Forcepoint
  • Hands on Experience with RSA Authentication
  • Solid understanding of working with NIST framework
  • Hands on experience with Incident Handling, Documentation and log analysis
  • Experience and better understanding of scripting languages, command shells and regular expressions such as Python, Perl, visual basic
  • Assess and evaluate business and technology risks, internal controls which mitigate risks, and related opportunities for internal control improvement
  • Hands on Experience with Security frameworks such as NIST, HIPAA, PCI - DSS
  • Excellent consulting and partnership skills in a large organization
  • Experience on the technical delivery side of Governance Risk and Compliance (GRC) projects
  • Troubleshoot issues and perform many tasks related to technologies such as RSA Authentication
  • Hands on Experience with Rapid7 Nexpose, Metasploit and ForcePoint
  • Experience with identity and access management solutions such as LDAP, Active Directory, XAML, SAML and multi factor authentication
  • Worked withSymantecDLPAdministration andCASBCloudsecurity
  • Worked in SOC department to analyse security incidents and log analysis
  • Implementation of a GRC utility (from POC, through evaluation, selection, and implementation)
  • Solid understanding and implementation of Firepower and identity service engine for big organizations
  • Experience with 802.1x implementation and support
  • Solid Knowledge of Linux, RHEL, CentOS, Windows, Unix Operating systems
  • Identify the threat vectors and security events by analyzing signatures
  • Perform Risk Assessment, Gap analysis & create Risk Mitigation plan.
  • Experience configuring and deploying McAfee modules and products like McAfee ePO, McAfee VSE, McAfee HIPS, McAfee Endpoint Encryption, McAfee Network DLP, McAfee DLP Endpoint, McAfee SIEM.
  • Oversee Vulnerability assessment /penetration testing of scoped systems and applications to identify system vulnerabilities.
  • Working knowledge in installation and configuringSAMLFederatedsecurityservices and web services for enterprise applications.
  • Excellent knowledge of FISMA, HIPAA and NIST Compliance usage, rules and regulations
  • Hands on experience with creating Regular expressions for any signatures
  • Use Splunk Security Manager to identify threats and assigned category.
  • Solid Understanding of IBM QRadar, Palo alto NGFW
  • Provided technical security proposals, security presentation, installing and configuring Checkpoint and Palo Alto firewalls, VPN networks and redesigning customer security architectures
  • Researched, designed, and replaced aging Checkpoint firewall with new next generation Palo Alto appliances serving as firewalls and URL and application inspection
  • Familiar with SSAE 16, ISO27002, Safe Harbor, Privacy Shield, General Data Protection Regulation (GDPR)
  • Experience in setting up SSO Environment for PingFederate, and PingAccess. PF as Auth server and PA as Resource server protecting API
  • Performed upgradation of Palo Alto firewall from old platforms to new platforms 6.1.5 to 6.1.10
  • Configured Palo Alto Next-Generation Firewall mainly VSYS according to client topology
  • Specialist in Consulting of different security solutions for all phases of solution cycle: Planning, Architecture, Design, Implementation, Deployment, Troubleshooting & Support, Handover and Documentation.
  • Experienced in Python Scripting.
  • Strong understanding of DLP Architecture, Rules and Policies and its implementation
  • Hands on experience in administering and managing network and server infrastructure technologies and devices including firewalls, routers, switches, servers etc.
  • Knowledge & Experience of OWASP top 10 vulnerabilities experience inNetwork security design, proposal, solutions development and solutions architecture
  • Excellent Project Management skills and adaptable to work in any work environment
  • Assist in the creation of an end-to-end technology strategy for SIEM to address current and future security concerns, emerging threats, regulatory compliance and alignment with technology and the business
  • Strong understanding of communication protocols (SSL, TLS, IPSec)
  • Provide support in security architecture, design, developing, monitoring and supporting enterprise infrastructure environment
  • Excellent security management experience
  • Have solid auditing experience
  • Preparing for CISSP certification and will get it in November

SPECIALIZATION:

Governance, Risk & Compliance: GRC Archer, Risk Assessment, Compliance Tracking, Audits- ISO 27002, SSAE 16 PCI, GDPR, NIST, FISMANetwork Security: NIPS/NIDS, Firewall, VPN (IPSec, SSL), DLPEndpoint Security / Information Security: Antivirus, HIPS, Encryption, HDLP, Malware Analysis, Advance Threat Protection

Content Protection: Email Security, Web Security, Application Security

SIEM Tools: McAfee SIEM, Splunk SIEM, HP ArcSight

TECHNICAL SKILLS:

Platforms/Applications:

Continuous Monitoring: Vulnerability Management, Web Application Scanning, ThreatProtect, Policy Compliance, Cloud Agents, Asset Management, Governance, Risk Management and Compliance, Solarwinds, Nexpose, Forcepoint, Rapid7

Networking Protocols: FTP, SNMP, Telnet, HTTP, SSH, DNS, DHCP, DHCPv6, ICMP, ICMPv6, SMB

Event Management: RSA Archer, Blue Coat Proxy, Splunk, NTT Security, LogRhythm, HP Arcsight

PenTest Tools: Metasploit, NMAP, Wireshark and Kali

Security Software: Nessus, Ethereal, NMap, Metasploit, Snort, RSA Authentication

Frameworks: ISO27001, PCI-DSS, SSAE 16, FedRAMP, SOC 2, UEBA, ISAE 3000,HIPAA, NIST.

Security Intelligence: WhiteHat Web Security, iDefence, NTT Security, LogRhythm

SIEM: Splunk, Solarwinds, ArcSight, Nitro, IBM QRadar, Forcepoint, Rapid7 Nexpose

Switches: Cisco Catalyst VSS 1 50- X / 2960

Routers: Cisco Routers ASR / 2600

Firewalls: Check Point, ISA 2004/2006, Palo Alto PA 3000/5000

Networking: Conversant in LAN, WAN, Wi-Fi, FTP, SNMP, Telnet, HTTP, SSH, DNS, DHCP, DHCPv6, ICMP, ICMPv6, SMB, WINS, TCP/IP, ISCSI, Fiber, Firewalls/IPS/IDS

Routing: OSPF, EIGRP, BGP, RIP-2, PBR, Route Filtering, Redistribution, Summarization, Static Routing

Switching: VLAN, VTP, STP, PVST+, RPVST+, Inter VLAN routing & Multi-Layer Switching, Multicast operations, Layer 3 Switches, Ether channels, Transparent Bridging

Protocols: TCP/IP, L2TP, PPTP, IPSEC, IKE, SSL, SSH, UDP, DHCP, DNS

Hardware: Dell, HP, CISCO, IBM, SUN, CheckPoint, SonicWall, Barracuda Appliances, SOPHOS email appliances

VPN: ASA 5520, Cisco Concentrator 3030, Nortel Contivity Extranet 1500

NMS: NAM, Sniffer, Solarwinds NPM, Cisco Secure ACS 5.2, CiscoWorks

Operating Systems: Windows, Unix, MS-DOS, RHEL, CentOS, Kali Linux

PROFESSIONAL EXPERIENCE:

Confidential, Windsor, Connecticut

IT Security Engineer

Responsibilities:

  • Daily assessment of Vulnerabilities identified by Dell Secureworks Firewall and IDS/IPS System through RegEX
  • McAfeeePolicy Orchestrator,McAfeeVirusScan Enterprise, MCP and HIPSMonitoring and troubleshooting of security threat event, intrusion detection, Virus/Malware outbreaks.
  • Infrastructure upgrade and policies migration forSymantecDLPfrom version 12 to 15.
  • Configured and scheduled Qualys Scanner inQRadarto perform scan on regular intervals.
  • Configuration ofMcAfeeAntivirus products on end-points (Clients/Servers).
  • Hands on Experience with Metasploit exploit techniques
  • Solid understanding of RSA authentication and Rapid 7 technologies and ForcePoint
  • Architect/Design a new SSO infrastructure for external access using thePingIdentitycomponents.
  • Configured and manageHitachiPasswordManagement and Identity Management tool
  • CASBadministration to provide cloud applicationsecurityleveraging Shadow IT and creating and documenting the process of vetting cloud applications safe to use to the company and adding data protection.
  • Architect for Rapid7 Nexpose Vulnerability Management System and continue with scanning and reporting
  • Static Code analysis using HPFortifyto identify the vulnerabilities in the applications.
  • Frame works used ISO 27001 ISMS, PCI DSS, SSAE16, OWASP, SANS
  • Owned setup and deployment of Rapid7 InsightVM/Nexpose and all scanning appliances, documentation, process, reports, etc.
  • Worked on SOC department which runs 24*7 days and able to analyse all security incidents
  • Conducted network penetration tests and implemented vulnerability assessments
  • Have solid experience working with FireEye HX, NX, EX, AX series
  • Worked with GRC technology and have better understanding on it
  • Performed centric threat analysis on advanced SIEM technologies: ArcSight, Splunk ES, AlienVault,QRadar.
  • Worked with Embedded system technologies to remediate attacks on them
  • Participated in courses for password cracking and attack technologies
  • Solid understanding of OWASP top Vulnerabilities and other software security best practices
  • Familiarity with security andtesting tools such as Burp Suite, Nmap, Zenmap, OpenVAS, Nessus
  • Advise thePCIDSSDirector, Business Unit liaisons, andSecurityPrograms Project manager.
  • SymantecEndPoint infrastructure administration and support and assist the analyst with malware investigations and cleanup. create and manage documentation necessary to accelerate the RFP response process.
  • Deploy and AdministerSymantecEndpoint Protection (SEP) Antivirus across the enterprise
  • Resolve Incidents while investigate & troubleshoot root causes when escalated
  • Hands on experience with AWS and Azure cloud management
  • Used remediation techniques for all collected vulnerabilities and if it is very high severe vulnerability then ticket escalate to the higher authority
  • Responsibility for the planning and controlled execution of releases into the managed environment
  • Performed vulnerability scanning on web applications and databases to identify security threats and vulnerabilities.
  • Conduct FISMA complaint security control assessments to ascertain the adequacy of management, operational, technical and privacy controls.
  • Architect, implement and monitor Rapid7's InsightVM vulnerability scanner and InsightIDR SIEM solution.
  • Performed user provisioning in Identity Provider (IdP) site Service Provider(SP) site usingSAMLfor SSO
  • Conducted system security assessments based on FISMA, NIST and HIPPA/PCI DSS Compliance.
  • Excellent knowledge of Compliance documentation (FISMA, NIST, HIPPA etc.)
  • Perform Risk Assessment and drive the closures of identified risks.
  • Vulnerability Management: Configured Qualys, Nessus Guard Tool for Vulnerability Analysis of Devices and Applications. Monitored them constantly through the dashboard by running the reports all the time.
  • Conducting security workshops and presentations for the clients.

Confidential, Estero, FL

Cyber security Analyst

Responsibilities:

  • Configure, upgrade and fine tune the DLP policies to meet the changing needs & improve Security Metrics
  • Responsible for Monitoring and enforcing information security program and policies
  • Responsible for developing information security risk identification, classification, triaging and mitigation
  • Worked with the enterprise architecture team, Security Governance, and Policy team
  • Good understanding of administering and implementing SIEM, DLP, Web sense, Advance malware detection program, vulnerability assessment, and prevention,
  • Acted as the key escalation point for all technical issues and requests with regards toHitachiand Identity Access Management.
  • Run vulnerability scans using Rapid7 Nexpose to compile list of necessary patches
  • Configuring IdP initiated and SP initiatedSAMLprofiles with different bindings like POST, Artifact, Redirect as per the custom business andsecurityrequirements.
  • Maintaining Microsoft Active Directory, routers, switches, and Symantec backup
  • Set up Pingaccess to backend apps to work alongside pingfederate for seamless integration
  • Perform the upgrade forSymantecDLPfrom 12.5 to 14.5 for the back-end infrastructure and Endpoint agents.
  • Performed penetration testing on internal website usingOWASPtop 10 Vulnerabilities.
  • EntrustPKI andSecuritymanagement, penetration testing and website protection with mitigation and remediation of Intrusion Prevention Systems (IDS/IPS).
  • Executed thePCIDataSecurityStandards (PCIDSS) assessments for all controls, including communication of key milestones, gap remediation consulting/tracking, and guidance on compensating controls
  • Leading a project to deploy Revers Proxy and SMTP Proxy from SymantecCASB.
  • Worked with all Metasploit Exploitation techniques
  • Conducting security workshops and presentations for the clients.
  • Duties involves participation in managing technologies, evaluating new technologies, continuous improvement of SLA, customer meetings, implementing new solutions as asked by customer.
  • Performing Vulnerability Assessments and taking the required counter actions and measurements to ensure the security of the IT infrastructure / systems.
  • Analysis and documentation of network & information security requirements and define security policy for enterprise client and business critical servers.

Confidential

Security Engineer

Responsibilities:

  • Assessed and built a data protection program through data classification skills and a clear understanding of privacy standards and regulations
  • Data Loss Prevention suit, Symantec DLP Product - Implementation and deployment as the champion team
  • Generate vulnerability reports, executive summaries, and mitigation plans using Rapid7 Nexpose.
  • Deployment of Data loss prevention across the network - Data in motion, Data in Use & data at Rest servers
  • Reviewed encryption logs andDLPlogs to regulate use base technological risk violations
  • Gained experience with Symantec DLP Software: DLP Cloud Prevent for Microsoft Office 365, DLP Cloud Storage, Cloud File Sync and Share, and security product capabilities
  • Conducted risk and vulnerability assessments on systems and applications via Rapid7 Nexpose and Acunetix
  • DesignSAML2.0 and MFA utilizing Microsoft AD FS & Microsoft Azure, as well as managing Microsoft GPO.
  • Deployed in the cloud and on-premises using Amazon Web Services (AWS) and Single- Server support
  • Analyzed Symantec DLP events and reports
  • IntegratedPingAccess withPingFederate System to get authenticated byPingFederate and Authorized byPingAccess Servers using the Access Control Lists.
  • Lead and perform the annual SOX Audits andPCIassessments
  • Performed tuning of Symantec DLP to reduce false positives and improving detection rates
  • Network Access Control - Implementing a secure solution to identify network devices and profiling the Network devices to allow or disallow access based on the device type
  • Signature Updates Deployment on the Management Components and all the Individual IPS/IDS devices
  • Intrusion Prevention System - IDS/IPS Implementation and Upgrade for SiteProtector
  • Analyzed the Network Attack, blocks, detects and regular Health Checkups in the real environment
  • Prepared the Knowledge Transfer document of Process and Technical specifications guide for the Transition/Internal purpose
  • Implement, maintain, and administrate IT vulnerability management with Qualys and Rapid7/Nexpose.
  • Contributed to providing Secure environments for our clients regarding pci compliance. Specifically thru event log monitoring by hand as wellas utilizingpythonto compile large swathes of data for comparison.
  • Data Loss Prevention suit, Symantec DLP Product - Implementation and deployment as the champion team
  • Deployment of Data loss prevention across the network - Data in motion, Data in Use & data at Rest servers
  • Gained experience with Symantec DLP Software: DLP Cloud Prevent for Microsoft Office 365, DLP Cloud Storage, Cloud File Sync and Share, and security product capabilities
  • Deployed in the cloud and on-premises using Amazon Web Services (AWS) and Single- Server support
  • Performed tuning of Symantec DLP to reduce false positives and improving detection rates
  • Network Access Control - Implementing a secure solution to identify network devices and profiling the Network devices to allow or disallow access based on the device type
  • Signature Updates Deployment on the Management Components and all the Individual IPS/IDS devices
  • Intrusion Prevention System - IDS/IPS Implementation and Upgrade for SiteProtector
  • Refined IPS Policy and Creating Rules according to the Security Standard
  • Analyzed the Network Attack, blocks, detects and regular Health Checkups in the real environment
  • Prepared the Knowledge Transfer document of Process and Technical specifications guide for the Transition/Internal purpose
  • Experience in configuring and troubleshooting BGP, EIGRP

We'd love your feedback!