Lead Security Engineer Resume
4.00/5 (Submit Your Rating)
Chicago, IL
SUMMARY
- Hands - on experience in developing threat models, security controls, threat analysis, creation of risk control matrices and risk mitigation strategies.
- Experience in collaborating with various product management and development teams to ensure alignment between security and development practices.
- IT Professional Security /Risk Analytic and Architectural skills, IT Governance and Security Operations expertise overseeing the alignment of enterprise
- Hands-on with Penetration Testing, Source Code Review, DAST, SAST and manual ethical hacking.
- IT Security Strategy in meeting the Company's IT Security efforts for dynamic Business Goals. Additionally, proficient in security policy write up, procedures and control review to attain optimal maturity level.
- Expertise in Security assessment on the applications, web sites, and web applications to determine the security posture.
- Experience in performing manual exploitation using different tools like NMAP and Kali Linux.
- Expertise in Penetration Testing and established a formal vulnerability management process.
- Experience in monitoring and recommended solutions for correcting issues related to security technologies such as to monitor viruses, malware, and intrusions.
- Thorough knowledge on COBIT, OWASP, FFIEC, NIST, HIPAA regulations and frameworks.
- Expertise in Highlighting Best Security Practices, Procedures and Metrics - KPIs, KRIs Enterprise-wide for effective Risk and Vulnerability Control Experience on maintaining better administer, secure and monitor user access privileges and activities using Oracle and AWS IAM (Identity Access Management) Tools like IDI, IDS, and ISAM.
- Experience in Security Audit proactive mindset for Risk Mitigation and proven ability to using Information Technological Solutions and Tools to Optimized different Information Security Frameworks and approaches through Practical Application to evolving Business needs.
- Experienced in Developing, Documenting and Deploying Security Controls against IT Cyber Threats such as Data Exfiltration, Security Non-Compliance Issues and Social Engineering Antics.
- Experienced in Security Assessment tools: Nessus, Burp Suite, NMap, Netcat, and WireShark etc.
- Experience and also have strong working knowledge on various information security standards and compliances such HIPPA, HITRUST, PCI-DSS, FISMA, GLBA, SOC2, NIST and other GRC's. Additionally, passionate in Enterprise Data Classification, Identity and Access Control management (IAM) deployment solutions, IT Risk Management, Governance, Security Compliance Methodologies.
PROFESSIONAL EXPERIENCE
Confidential, Chicago, IL
Lead Security Engineer
Responsibilities:
- Penetration testing based on OWASP Top 10 and SANS25. Analyze the results of penetrations tests, design reviews, source code reviews and other security tests.
- Decide on what to remediate and what to risk accept based on security requirements. Highly analytical computer security analyst with success both defending and attacking large-scale enterprise networks.
- Experience using a wide variety of security tools to include Kali-Linux, Metasploit, HP WebInspect, HP Fortify, Burp Suite Pro, Wireshark, L0phtcrack, Snort, Nmap, Nmap-NSE, Cain and Abel, Nitko, Dirbuster, IBM AppScan, OWASP ZAProxy, Nessus, Open Vas, W3AF, BeEF, Etthercap, Maltego, Wifi-Security, SIFT, SOAP UI, FOCA, Havij, Yersinia, Recon-ng, Aircracking suite
- Involved in implementing and validating the security principles of minimum attack surface area, least privilege, secure defaults, avoiding security by obscurity, keep security simple, Fixing security issues correctly. Strong knowledge in Manual and Automated Security testing for Web Applications.
- Administered encryption, certificate management, key generation and implemented dual keys to address segregation of duties issue between DBAs and security admins. Developed Security Operations Centre (SOC) policies and proceedings for reviewing and monitoring security events.
- Participated in analyzing security incidents as part of the SOC detection and response team activity.
- Worked exclusively with the forensics team with the SOC in investigating security incidents.
- Working knowledge of OWASP Top 10 and SANS Top 25 software guidelines, Federal Financial Institutions Examination Council's (FFIEC) regulations,
- Analyzed the results of penetrations tests, design reviews, source code reviews and other security tests.
- Good Experience in exploiting the recognized vulnerabilities.
- Experience in Threat Modeling during Requirement gathering and Design phases.
- Experience with Security Risk Management with TCP-based networking.
- Experience with TCP/IP, Firewalls, LAN/WAN. Experience in implementing Security.
- Incident and Event Management System (SIEM) using HP ArcSight, Splunk.
- Quick Learner, Committed team player with interpersonal skills and enjoy challenging environment with scope to improve self and contribute to the cause of the organization.
- Excellent problem-solving and leadership abilities. Experience in Web UI Development implementing web development tools like HTML 4.0/5, XHTML, DHTML, CSS/CSS3, JavaScript, jQuery, AJAX, JSON and XML.
- Knowledgeable about Document Object Model (DOM) and DOM Functions along with experience in Object Oriented Programming Concepts, Object Oriented JavaScript and Implementation.
Confidential, Chicago, IL
Sr. Security Engineer
Responsibilities:
- Penetration testing based on OWASP Top 10 and SANS25. Analyze the results of penetrations tests, design reviews, source code reviews and other security tests.
- Decide on what to remediate and what to risk accept based on security requirements. Highly analytical computer security analyst with success both defending and attacking large-scale enterprise networks.
- Analyzing suspicious web or email files for malicious code discovered through the CSOC's own analysis or reported to the CSOC.
- Experience using a wide variety of security tools to include Kali-Linux, Metasploit, HP WebInspect, HP Fortify, Burp Suite Pro, Wireshark, L0phtcrack, Snort, Nmap, Nmap-NSE, Cain and Abel, Nitko, Dirbuster, IBM App Scan, OWASP ZAProxy, Nessus, Open Vas, W3AF, BeEF, Etthercap, Maltego, Wifi-Security, SIFT, SOAP UI, FOCA, Havij, Yersinia, Recon-ng, Aircracking suite
- Involved in implementing and validating the security principles of minimum attack surface area, least privilege, secure defaults, avoiding security by obscurity, keep security simple, Fixing security issues correctly. Strong knowledge in Manual and Automated Security testing for Web Applications.
- Categorized support problems, and responded with the appropriate level of urgency.
- Collect and provide intelligence from many different sources of information.
- Working knowledge of OWASP Top 10 and SANS Top 25 software guidelines, Federal Financial Institutions Examination Council's (FFIEC) regulations, including Payment Card Industry (PCI-DSS), HIPAA and Sarbanes-Oxley Section404 (SOX).
- Analyzed the results of penetrations tests, design reviews, source code reviews and other security tests. Define and update security standards and checklists.
- Work with various departments to improve detection of security threats and breaches.
- Decide on what to remediate and what to risk accept based on security requirements. SOX Compliance Audit experience on controls like User access management, Change Management, Incident Management.
- Good Experience in exploiting the recognized vulnerabilities.
- Experience in Threat Modeling during Requirement gathering and Design phases.
- Experience with Security Risk Management with TCP-based networking.
- Experience with TCP/IP, Firewalls, LAN/WAN. Experience in implementing Security
- Incident and Event Management System (SIEM) using HP ArcSight, Splunk.
- Quick Learner, Committed team player with interpersonal skills and enjoy challenging environment with scope to improve self and contribute to the cause of the organization.
- Excellent problem-solving and leadership abilities. Experience in Web UI Development implementing web development tools like HTML 4.0/5, XHTML, DHTML, CSS/CSS3, JavaScript, jQuery, AJAX, JSON and XML.
- Knowledgeable about Document Object Model (DOM) and DOM Functions along with experience in Object Oriented Programming Concepts, Object Oriented JavaScript and Implementation.
Confidential, New York, NY
Security Analyst
Responsibilities:
- Vulnerability assessments using HP Web Inspect, Acunetix scanners perform map and gap analysis on all systems, software, and network appliances Access vulnerability dataprepare reports and load scan data into database.
- Discuss false positives and prepare a plan of action and milestones for mitigation Prepare incident reports for reported and unreported attacks APT hunting for Ransomware.
- Performed Root Cause Analysis for the incidents reported at Security Operations Center. Performed Security event monitoring of heterogeneous networks such as Firewalls, IDS/IPS, Cisco ASA, DLP devices using Splunk.
- Provided solution to many problems on a call with the best of my knowledge on the applications using event logs on the system/server and telemetry logs on the server, later started using Splunk for health monitoring, analysis, and reporting.
- Wrote scripts on servers using PowerShell on Windows Server 2008 in order to update servers with the latest patches and changes systems configurations at large.
- Used Remedy Information Technology Service Management (ITSM) tool for managing the incidents based on the priorities and solved issues which are in the security domain.
- Experience in performing authenticated and unauthenticated testing.
- Generated Vulnerability reports to monitor the health of the applications and also reported High, Medium and low vulnerabilities in this system.
- Analyze attack patterns Build workflows to automatically analyze the samples
- Determine what functionality attackers may have introduced and scan for malicious artifacts based on sandbox results Investigate endpoint attacks and replay attacks on systems.
- Analyze JavaScript, PDFs, Office documents, and packet captures for signs of malicious activity SIEM implementation and analysis by writing rules and reference sets.
- SIEM to determine attack vectors and source of incident Troubleshoot network application inbound/outbound connectivity utilizing Cisco WSA proxies and Wireshark.
- Actively involved on Bridges in solving High / Severe incidents reported in the application or in the environment.
- Ironport URL filtering for known bad URL content IronportMail.
- Analysis and blocking for known bad emails Analysis of pcap files using FireEye and Wireshark System audit and analysis using DOD checklist for PA series Threat and virus scanning using Malwarebytes from centralized console.
- Enforcement of policies and procedures for users, admins, and management Reverse engineering of malware using tools like malwr, process hacker and so on Incident response tabletop exercise by documenting and alerting necessary personnel.
