We provide IT Staff Augmentation Services!

Sr. Information Security Analyst Resume

4.00/5 (Submit Your Rating)

Atlanta, GA

CAREER OBJECTIVE:

Results - driven professional with specified experience in Vulnerability Management, Access Management, andInformation Security. Effective skills to proactively complete projects and special assignments on time while working self-sufficiently within a fast-paced environment, all while promoting team solidarity and promoting a strong and positive environment.

PROFESSIONAL SUMMARY:

  • Experienced in Vulnerability management and remediation.
  • Hands on experience withQualysGuardvulnerability management tool.
  • Scanning the network and provide the scan reports to operational teams.
  • Worked on McAfee VSE product for Stop worms, spyware, and viruses, get high-performance security, Lessen damage from outbreaks.
  • Implemented and managedSplunkfor log management and analytics.
  • Worked on McAfee HIPS product for Get the broadest IPS coverage, Safeguard against malicious threats, Get automatic security updates, Protection around the clock.
  • Knowledge of IDS-IPS.
  • Experience in supporting, operation and troubleshooting the problems.
  • Automated the centralized detection of security vulnerabilities with scripts for Vulnerability assessment tools likeQualysguardand Splunk.
  • Diverse background with fast learning skills and creative analytical skills.
  • Developed communication interpersonal skills, team coordination and versed with software processes.
  • Scanning Data and in-coming alerts/false positives to recognize red flags and patterns in theDLPconsole - Data Loss Prevention (Symantec system) perform basic service request based on standard operating procedures, follow quality security process defined for the engagement.
  • Experienced in Vulnerability management and remediation.
  • Scanning the network and providing the scan reports to technical teams.
  • Analyze and document client requirements and solution design for howMcAfeesolutions can meet these requirements now and in the future.
  • Hands on experience with Qualys Guard vulnerability management tool.
  • Design DLP architecture.
  • Expert in installing SPLUNK logging application for distributed environment
  • Strong grasp of TCP/IP and common Internet fundamentals such as DNS, DHCP, NTP, SMTP, HTTP, etc.
  • Extensive knowledge of information security principles and practices, understanding of security protocols, standards and defense in depth.

TECHNICAL SKILLS:

Qualys Continuous Monitoring: Vulnerability Management, Web Application Scanning, ThreatProtect, Policy Compliance, Cloud Agents, Asset Management, Governance, Risk Management and Compliance.

Event Management: RSA Archer, Blue Coat Proxy, Splunk, Alienvault.

PenTest Tools: Metasploit, NMAP, Wireshark and Kali.

Security Software: Nessus, Ethereal, NMap, Metasploit, Snort.

Forensic Tools: FTK, Encase

Frameworks: NIST SP, ISO 27001/31000 , HIPPA, HITRUST CSF, PCI DSS.

Security Technologies: McAfee Nitro (SIEM). McAfee ePO, McAfee Endpoint Protection Suite

Firewalls: Palo Alto PA 3000/5000.

Networking: Conversant in LAN, WAN, Wi-Fi, DNS, WINS, DHCP, TCP/IP, ISCSI, Fiber, Firewalls/IPS/IDS.

Routing: OSPF, EIGRP, BGP, RIP-2, PBR, Route Filtering, Redistribution, Summarization, Static Routing.

Switching: VLAN, VTP, STP, PVST+, RPVST+, Inter VLAN routing & Multi-Layer Switching, Multicast operations, Layer 3 Switches, Ether channels, Transparent Bridging.

Protocols: TCP/IP, L2TP, PPTP, IPSEC, IKE, SSL, SSH, UDP, DHCP, DNS.

Hardware: Dell, HP, CISCO, IBM, SUN, CheckPoint, SonicWall, Barracuda Appliances, SOPHOS email appliances

Nexus: Nexus 48 UP / 32 PP / 2248 TP / 1000 V.

Operating Systems: Windows, NT, Windows 98/XP/ 2000/2003/2007 , MS-DOS, Linux.

PROFESSIONAL EXPERIENCE:

Confidential, Atlanta, GA

Sr. Information Security Analyst

Responsibilities:

  • Provided leadership in architecting andimplementingsecuritysolutions towards Qualys and SIEM tools like Splunk, Solutionary and LogRhythm.
  • Manually Installed Mcafee NDLP Prevent 10.x ISO.file and configured in mcafee epo server.
  • Utilize McAfee ePO and Microsoft SCCM for endpoint management.
  • Good experience in buildingSplunkSecurity Analytics. Lead logging enrollments from multi-tier applications into the enterprise logging platforms.
  • Manage enterprise security systems, identifying key security risks, reporting risks to management with recommendations for corrective action utilizing NIST frameworks.
  • Responsibilities for CSIRT included SIEM, Context Filtering, Web Security, Incident Tracking, IPS/IDS and Malware Analysis.
  • Generate security reports utilizing enterprise security systems such as McAfee ePO
  • Formulating systems and methodologies as well as responding to security related events.
  • Expert in installing SPLUNK logging application for distributed environment.
  • Use McAfee Real Time Command along with other tools such as CoreImpact and orQualysto respond, isolate, and respond, isolate, and resolve network incidents resolve network incidents
  • Documentation regarding DLP administration, scanning, reporting, and remediation.
  • Symantec DLP and RSA DLP architecture and implementation for enterprise level companies.
  • Vulnerability Management: Configured Qualys Guard Tool for Vulnerability Analysis of Devices and Applications. Monitored them constantly through the dashboard by running the reports all the time.
  • Installed, configured and administered Splunk Enterprise Server and Splunk Forwarder on Redhat Linux and Windows servers
  • Configuration, troubleshooting, and management of Websense Data Security (DLP).
  • Implementation of DLP.
  • Monitoring of Multiple Security Incidents using McAfee SIEM, Symantec MSS and Absolute
  • Responsible for internalQualysWAS services and WhiteHat Security scans.
  • Performing Cyber security incident response, event analysis and investigations
  • Network and System Security, Protocols, Penetration Testing
  • Performing periodic vulnerability testing and assisting in remediation efforts.

Confidential, Dallas, Tx

Splunk Engineer/Security Specialist

Responsibilities:

  • Execute the vulnerability assessment process, event monitoring using McAfee SIEM and incident response using predefined policies and rules.
  • Implement common security exploitation techniques and mitigations using Sqlmap, Burpsuite and others.
  • Early informer of critical vulnerabilities and exposures relevant to safeguarding the company's Information assets.
  • Good experience in buildingSplunkSecurity Analytics. Lead logging enrollments from multi-tier applications into the enterprise logging platforms.
  • In depth experience with internal, external, network, & application vulnerability assessments utilizing QualysGuard and FireEye.
  • Strong knowledge on Vulnerability Management using QualysGuard and Nexpose .
  • Conceptualize and implementDLPProgram and policies.
  • MaintainMcAfeeePOenvironment in optimum performance and compliance standards.
  • End to End Vulnerability Management services - Qualys tool.
  • Oversee the execution of the Cyber Security Incident Response Playbook by the Security Operations Center and others for minor security incidents.
  • Drive complex deployments ofSplunkdashboards and reports while working side by side with technical teams to solve their integration issues.
  • Doing Policy compliance using Qualys Guard.
  • Analyze new forms of malware and design countermeasures to protect the enterprise from their impact.
  • Lead the deployment, installation, and configuration of SymantecDLP, as well as Enforce, Network Monitor, Network Discover, Web Prevent, Email Prevent, and Endpoint Agent
  • Investigation for false positives for issues with Qualys with the help of support.
  • ManagingePOversion 5.3 and VSE 8.8 for large enterprise network.
  • Installing and configuring newePOserver.
  • MonitoringMcAfeedashboard for updated DAT versions in all the client.
  • Monitoring and updating the Stores Closing details inMcAfeeand Bit9 console.
  • Handled the compatibility issues that arise due to Qualys scans.
  • Vulnerability Management by scanning, mapping and identifying possible security holes using Qualys Guard and Nessus scanner.
  • Designing and maintaining production-qualitySplunkdashboards, Data gathering from onsite and coming up with an implementation plan.
  • Responsible for resolve issues of QRADAR.
  • Performed SymantecDLPenvironments management and support configuration as well as data security environments used in testing and configuring client sites prior to installation.
  • Designing and maintaining production-quality Splunk dashboards.
  • Monitor Threats and Security events onMcAfeeand Bit 9.
  • Vulnerability Assessment and patch validation through Qualys guard express.
  • Developed security metrics dashboards to illustrate trends in security events and situational views over time.
  • Operations - Security Incidents and Vulnerabilities by OS.

Confidential

Information Security Analyst

Responsibilities:

  • Created, designed and documented SIEM Implementation.
  • In-depth expertise in the implementation of analysis, optimization, troubleshooting and documentation of LAN/WAN networking systems.
  • Experience analyzing Symantec DLP events and reports.
  • Monitor controls post authorization to ensure continuous compliance with the security requirements. plans, and testing were executed appropriately and discuss lessons learnt.
  • Extensive PowerShell and VBScript scripting Remote management of Windows 2003 & Windows 2008 servers.
  • Experience analyzing network traffic captures and network mapping using WireShark, Nstat, ZenMap, AirCrack, NetStalker, etc.
  • Worked on Cisco Layer 2 switches (spanning tree, VLAN).
  • Knowledge of IP traffic flow, sniffing, capturing and monitoring of live traffic streams using Wireshark.
  • In-depth experience with Symantec DLP in an enterprise environment.
  • Experience with architecting Symantec DLP Platforms.
  • Experience with Check Point R75-40 Smart-Dashboard, Anti-bot/Anti-Virus, IDS/IPS and Threat cloud Managed Security service (SOC).
  • Monitoring the network for suspicious activity using various tools splunk.
  • ReviewingSecuritylogs on end user machines and analyzing root cause.

Confidential

Security Engineer

Responsibilities:

  • Performed network and host DLP monitoring and logging
  • Information protection solutions including Monitoring, DLP and Security Auditing solutions from Symantec and McAfee.
  • Conducted Security Risk Assessment on all new applications, IT Systems or changes to existing IT systems to verify if they satisfy established security baseline before adoption into Corporate Regional offices.
  • Maintained operational efficiency of client DLP programs.
  • Reviewed business requirements and conducted task analysis.
  • Implemented business procedures and DLP security programs.
  • Suggested expansions for DLP programs as per business requirements.
  • Formulated system policies by conversion of business information.
  • Documented requirements specifications and user manuals.
  • Assisted in interfacing with business units and teams.
  • Generated customized reports and installed customer equipment.
  • Formulated and configured Logger appliances and analyzed system anomalies.
  • Designed and developed Splunk architecture components and related upgrades.
  • Prepared system plans and executed Splunk architecture modifications.
  • Managed, upgraded and maintained operational data flows and Splunk platforms.
  • Created and documented reports, rules, trends and Dashboard for Splunk.
  • Analyzed Splunk and related tools and resolved IT security failures.
  • Provided guidance for equipment checks and supported processing of security requests.
  • Conducted Security Risk Assessment on new Vendors and annual Vendor Risk Assessment.
  • Assisted management in authorizing the IT Systems for operation on the basis of whether the residual risk is at an acceptable level or whether additional compensating controls should be implemented.
  • Coordinated with system owners and ISSOs across the organization to ensure timely compliance
  • Worked with Palo Alto NGFW Panorama management tool to manage all Palo Alto NGFW firewall and network from central location.
  • Install and configure the Splunk SIEM including all its components, local & or remote log collectors.
  • Worked on SIEM tool Splunk for reporting and data aggregation
  • Used SIEM tool Splunk on adding the newly build windows and Linux log servers and creating policies for different alerts
  • Security Audit, Budget Violation, Operational Violation, Best practice check in client AWS environment.
  • Troubleshooting connectivity and perform connector installation and tune configurations, conditions, filters, aggregations, and correlation for the flow of events for Splunk SIEM.
  • Gathered data and perform monthly reports for Splunk SIEM.
  • Conduct regularly health checks and content tuning.
  • Provide continued maintenance and development of bug fixes and patch sets for existing web applications.
  • Implemented and managed Splunk ESM and Connectors at multiple locations.
  • Executed database tuning and troubleshooting processes and updated configuration files.
  • Working with Client teams to find out requirements for their Network Requirements.
  • Monitor performance of network and servers (Microsoft and Linux) to identify potential problems and bottleneck.
  • Provided technical support on hardware and software related issues to remote production sites.
  • Monitored controls post authorization to ensure continuous compliance with the security requirements.
  • Developed Cyber Security Standards on NIST Frameworks and insured their proper implementation to reduce the risk of vulnerability to IT assets
  • Updated the controls changes from NIST rev 3 to NIST rev 4 and control assessment changes from NIST A to NIST 53A rev4
  • Assisted in deployment of AWS (Amazon Web Services) database and encryption, reducing operational costs by 50%.

We'd love your feedback!