We provide IT Staff Augmentation Services!

Lead Security Engineer Resume

4.00/5 (Submit Your Rating)

Chicago, IL

SUMMARY

  • Hands - on experience in developing threat models, security controls, threat analysis, creation of risk control matrices and risk mitigation strategies.
  • Experience in conducting IT Security Risk Assessments in accordance to NIST and FFIEC framework.
  • Experience in collaborating wif various product management and development teams to ensure alignment between security and development practices.
  • IT Professional Security /Risk Analytic and Architectural skills, IT Governance and Security Operations expertise overseeing teh alignment of enterprise
  • Hands-on wif Penetration Testing, Source Code Review, DAST, SAST and manual ethical hacking.
  • IT Security Strategy in meeting teh Company's IT Security efforts for dynamic Business Goals. Additionally, proficient in security policy write up, procedures and control review to attain optimal maturity level.
  • Expertise in Security assessment on teh applications, web sites, and web applications to determine teh security posture.
  • Experience in performing manual exploitation using different tools like NMAP and Kali Linux.
  • Expertise in Penetration Testing and established a formal vulnerability management process.
  • Experience in monitoring and recommended solutions for correcting issues related to security technologies such as to monitor viruses, malware, and intrusions.
  • Thorough noledge on COBIT, OWASP, FFIEC, NIST, HIPAA regulations and frameworks.
  • Expertise in Highlighting Best Security Practices, Procedures and Metrics - KPIs, KRIs Enterprise-wide for effective Risk and Vulnerability Control Experience on maintaining better administer, secure and monitor user access privileges and activities using Oracle and AWS IAM (Identity Access Management) Tools like IDI, IDS, and ISAM.
  • Experience in Security Audit proactive mindset for Risk Mitigation and proven ability to using Information Technological Solutions and Tools to Optimized different Information Security Frameworks and approaches through Practical Application to evolving Business needs.
  • Experienced in Developing, Documenting and Deploying Security Controls against IT Cyber Threats such as Data Exfiltration, Security Non-Compliance Issues and Social Engineering Antics.
  • Experienced in Security Assessment tools: Nessus, Burp Suite, NMap, Netcat, and WireShark etc.
  • Experience and also has strong working noledge on various information security standards and compliances such HIPPA, HITRUST, PCI-DSS, FISMA, GLBA, SOC2, NIST and other GRC's. Additionally, passionate in Enterprise Data Classification, Identity and Access Control management (IAM) deployment solutions, IT Risk Management, Governance, Security Compliance Methodologies.

PROFESSIONAL EXPERIENCE

Confidential, Chicago, IL

Lead Security Engineer

Responsibilities:

  • Penetration testing based on OWASP Top 10 and SANS25. Analyze teh results of penetrations tests, design reviews, source code reviews and other security tests.
  • Decide on wat to remediate and wat to risk accept based on security requirements. Highly analytical computer security analyst wif success both defending and attacking large-scale enterprise networks.
  • Experience using a wide variety of security tools to include Kali-Linux, Metasploit, HP WebInspect, HP Fortify, Burp Suite Pro, Wireshark, L0phtcrack, Snort, Nmap, Nmap-NSE, Cain and Abel, Nitko, Dirbuster, IBM AppScan, OWASP ZAProxy, Nessus, Open Vas, W3AF, BeEF, Etthercap, Maltego, Wifi-Security, SIFT, SOAP UI, FOCA, Havij, Yersinia, Recon-ng, Aircracking suite
  • Involved in implementing and validating teh security principles of minimum attack surface area, least privilege, secure defaults, avoiding security by obscurity, keep security simple, Fixing security issues correctly. Strong noledge in Manual and Automated Security testing for Web Applications.
  • Administered encryption, certificate management, key generation and implemented dual keys to address segregation of duties issue between DBAs and security admins. Developed Security Operations Centre (SOC) policies and proceedings for reviewing and monitoring security events.
  • Participated in analyzing security incidents as part of teh SOC detection and response team activity.
  • Worked exclusively wif teh forensics team wif teh SOC in investigating security incidents.
  • Working noledge of OWASP Top 10 and SANS Top 25 software guidelines, Federal Financial Institutions Examination Council's (FFIEC) regulations, including Payment Card Industry (PCI-DSS), HIPAA and Sarbanes-Oxley Section404 (SOX).
  • Guides Cyber Delivery teams in adoption of NIST andCOBITIT Risk Framework Capabilities.
  • Analyzed teh results of penetrations tests, design reviews, source code reviews and other security tests.
  • Performed Continuous Integration (CI) and Continuous Delivery (CD) of SAST scans using IBM AppScan Source for Automation.
  • Configured AWS Simple Storage Service (S3) to securely store teh organization’s critical file systems. Implemented Access Control Lists (ACLs) and Bucket Policies for controlling access to teh data.
  • Implemented Security Group Policies for Elastic Compute Cloud (EC2) instances wifin AWS. Developed AWS Service Roles to protect Identity Provider access.
  • Participated in teh implementation of Virtual Private Cloud (VPC). Implemented multiple layers of security, including security groups, network access control lists, to control access to Amazon EC2 instances in each subnet.
  • Decide on wat to remediate and wat to risk accept based on security requirements.
  • SOX Compliance Audit experience on controls like User access management, Change Management, Incident Management.
  • Good Experience in exploiting teh recognized vulnerabilities.
  • Experience in Threat Modeling during Requirement gathering and Design phases.
  • Experience wif Security Risk Management wif TCP-based networking.
  • Experience wif TCP/IP, Firewalls, LAN/WAN. Experience in implementing Security.
  • Incident and Event Management System (SIEM) using HP ArcSight, Splunk.
  • Quick Learner, Committed team player wif interpersonal skills and enjoy challenging environment wif scope to improve self and contribute to teh cause of teh organization.
  • Excellent problem-solving and leadership abilities. Experience in Web UI Development implementing web development tools like HTML 4.0/5, XHTML, DHTML, CSS/CSS3, JavaScript, jQuery, AJAX, JSON and XML.
  • Knowledgeable about Document Object Model (DOM) and DOM Functions along wif experience in Object Oriented Programming Concepts, Object Oriented JavaScript and Implementation.

Confidential, Chicago, IL

Sr. Security Engineer

Responsibilities:

  • Penetration testing based on OWASP Top 10 and SANS25. Analyze teh results of penetrations tests, design reviews, source code reviews and other security tests.
  • Decide on wat to remediate and wat to risk accept based on security requirements. Highly analytical computer security analyst wif success both defending and attacking large-scale enterprise networks.
  • Analyzing suspicious web or email files for malicious code discovered through teh CSOC's own analysis or reported to teh CSOC.
  • Experience using a wide variety of security tools to include Kali-Linux, Metasploit, HP WebInspect, HP Fortify, Burp Suite Pro, Wireshark, L0phtcrack, Snort, Nmap, Nmap-NSE, Cain and Abel, Nitko, Dirbuster, IBM App Scan, OWASP ZAProxy, Nessus, Open Vas, W3AF, BeEF, Etthercap, Maltego, Wifi-Security, SIFT, SOAP UI, FOCA, Havij, Yersinia, Recon-ng, Aircracking suite
  • Involved in implementing and validating teh security principles of minimum attack surface area, least privilege, secure defaults, avoiding security by obscurity, keep security simple, Fixing security issues correctly. Strong noledge in Manual and Automated Security testing for Web Applications.
  • Categorized support problems, and responded wif teh appropriate level of urgency.
  • Collect and provide intelligence from many different sources of information.
  • Working noledge of OWASP Top 10 and SANS Top 25 software guidelines, Federal Financial Institutions Examination Council's (FFIEC) regulations, including Payment Card Industry (PCI-DSS), HIPAA and Sarbanes-Oxley Section404 (SOX).
  • Analyzed teh results of penetrations tests, design reviews, source code reviews and other security tests. Define and update security standards and checklists.
  • Work wif various departments to improve detection of security threats and breaches.
  • Decide on wat to remediate and wat to risk accept based on security requirements. SOX Compliance Audit experience on controls like User access management, Change Management, Incident Management.
  • Good Experience in exploiting teh recognized vulnerabilities.
  • Experience in Threat Modeling during Requirement gathering and Design phases.
  • Experience wif Security Risk Management wif TCP-based networking.
  • Experience wif TCP/IP, Firewalls, LAN/WAN. Experience in implementing Security
  • Incident and Event Management System (SIEM) using HP ArcSight, Splunk.
  • Quick Learner, Committed team player wif interpersonal skills and enjoy challenging environment wif scope to improve self and contribute to teh cause of teh organization.
  • Excellent problem-solving and leadership abilities. Experience in Web UI Development implementing web development tools like HTML 4.0/5, XHTML, DHTML, CSS/CSS3, JavaScript, jQuery, AJAX, JSON and XML.
  • Knowledgeable about Document Object Model (DOM) and DOM Functions along wif experience in Object Oriented Programming Concepts, Object Oriented JavaScript and Implementation.

Confidential, New York, NY

Security Analyst

Responsibilities:

  • Vulnerability assessments using HP Web Inspect, Acunetix scanners perform map and gap analysis on all systems, software, and network appliances Access vulnerability dataprepare reports and load scan data into database.
  • Discuss false positives and prepare a plan of action and milestones for mitigation Prepare incident reports for reported and unreported attacks APT hunting for Ransomware.
  • Performed Root Cause Analysis for teh incidents reported at Security Operations Center. Performed Security event monitoring of heterogeneous networks such as Firewalls, IDS/IPS, Cisco ASA, DLP devices using Splunk.
  • Provided solution to many problems on a call wif teh best of my noledge on teh applications using event logs on teh system/server and telemetry logs on teh server, later started using Splunk for health monitoring, analysis, and reporting.
  • Wrote scripts on servers using PowerShell on Windows Server 2008 in order to update servers wif teh latest patches and changes systems configurations at large.
  • Used Remedy Information Technology Service Management (ITSM) tool for managing teh incidents based on teh priorities and solved issues which are in teh security domain.
  • Experience in performing authenticated and unauthenticated testing.
  • Generated Vulnerability reports to monitor teh health of teh applications and also reported High, Medium and low vulnerabilities in dis system.
  • Analyze attack patterns Build workflows to automatically analyze teh samples
  • Determine wat functionality attackers may has introduced and scan for malicious artifacts based on sandbox results Investigate endpoint attacks and replay attacks on systems.
  • Analyze JavaScript, PDFs, Office documents, and packet captures for signs of malicious activity SIEM implementation and analysis by writing rules and reference sets.
  • SIEM to determine attack vectors and source of incident Troubleshoot network application inbound/outbound connectivity utilizing Cisco WSA proxies and Wireshark.
  • Actively involved on Bridges in solving High / Severe incidents reported in teh application or in teh environment.
  • Ironport URL filtering for non bad URL content IronportMail.
  • Analysis and blocking for non bad emails Analysis of pcap files using FireEye and Wireshark System audit and analysis using DOD checklist for PA series Threat and virus scanning using Malwarebytes from centralized console.
  • Enforcement of policies and procedures for users, admins, and management Reverse engineering of malware using tools like malwr, process hacker and so on Incident response tabletop exercise by documenting and alerting necessary personnel.

Confidential

Java/J2EE Developer

Responsibilities:

  • Designed and created DAO using data modeling in teh integration layer.
  • Exposed all teh enterprise services to teh clients using SOAP and REST based web services, and tested using SOAPUI.
  • Modified WSDL documents for teh internal clients and deployed on WSRR.
  • Implemented request and response objects using SOAP web services and JAXB for converting WSDL to java classes.
  • Configured all dependencies wif spring framework and various stateful and stateless beans in teh application.
  • Used various spring features to deploy custom properties and static context in teh application.
  • Exposed Stateless session beans as restful web services using Jersey JAX-RS.
  • Created virtual host and configured based on teh IP configuration for all enterprise services.
  • Used JSON marshaller for marshaling and unmarshalling teh JSON Objects and Dom manipulations wif various SAX and Dom parsers
  • Worked and configured wif MKS and RTC versioning tools for keep track of source code.
  • Used Jenkins for continuous integration wif maven built in to generate teh EAR files and sanity4j code quality testing reports.
  • Hands-on a service-oriented approach (SOA) using WebLogic for integration.
  • Worked on HP portfolio Management software to create teh PPM packages and deploy teh various environments.
  • Updated teh WSDL in WSRR for teh governance & storing, accessing and managing information.
  • Setup meeting to configure and understand teh Data power for security, for accessing teh application.
  • Used Log4j for logging for debugging, warnings, errors etc.
  • Created log back file based on time based triggering policy and application based triggering policy.
  • Used HPQC for defect tracking and working on teh defects and created Triage process (Microsoft Visio) to track teh defects in teh application.
  • Migrated MKS Source control to RTC and created JENKINS builds for all enterprise services.
  • Worked closely wif teh infrastructure team to create teh performance environment for enterprise services.

We'd love your feedback!