We provide IT Staff Augmentation Services!

Tvm Analyst Resume

3.00/5 (Submit Your Rating)

PROFESSIONAL EXPERIENCE

Confidential

TVM Analyst

Responsibilities:

  • Create workflows.
  • Creation of Python scripts to automate recurring tasks.
  • Design, test, and implement the use of the Qualys API for automation.
  • Consult wif team members and client on Qualys workflow.

Confidential

Vulnerability Remediation Analyst

Responsibilities:

  • Assists the Operations manager in any of the following activities, either in a direct or an indirect fashion:
  • Defining and communicating the overall program direction
  • Define operational processes for execution/ implementation and on - going operational management of processes, etc. as they are developed.
  • Provides thought-leadership and applies area of expertise to technology matters to develop processes and tools that are TEMPeffective and efficient to achieve program goals
  • Utilizes research and analysis in addition to in-depth understanding of organizational goals/priorities and technology to develop executable strategies and plans.

Confidential

Senior Associate

Responsibilities:

  • Duties include PCI remediation, GAP analysis and readiness reviews. Assessment details include the evaluation of: Logical and Administrative Access Controls, Risk Management, Physical Security and Environmental Controls
  • Encryption, Malicious Code, System Development, Personnel Security, Logging and Data Collection, Service Provider Oversight, Intrusion Detection and Response, Business Continuity Management, and Technical Controls.
  • The ability to communicate highly technical concepts to both upper management and support personnel is an important part of this position.

Confidential

Technical Lead

Responsibilities:

  • The Technical Lead for MillerCoors is a hands-on role to assess vulnerabilities on servers, research and analyze software dependencies as well as compatibility and impact for vulnerability remediation strategies.
  • Coordinate and collaborate wif project team, business area contacts and vendors. Document information associated wif research/analytics, communications and status.

Confidential

PCI Compliance Consultant

Responsibilities:

  • Supports the HP Cyber Security Payment Card Industry Program Management Office and HP Enterprise Services in assessing current levels of PCI compliant activities.
  • Duties are related specifically to PCI, spanning multiple Enterprise Services clients and involving technical compliance assessments, gap analysis, reporting and developing remedial plans.
  • This position also supports the timely and accurate compliance reporting up and through the aligned Business Units and councils and to assist Enterprise Services in understanding the PCI DSS requirements.

Confidential

Security Consultant

Responsibilities:

  • Evaluation of both Web Application and server vulnerabilities using the Qualys platform.
  • Design and modification of vulnerability remediation workflows
  • Creation of Python and VB scripts to automate recurring tasks.
  • Design of scans and results using the Qualys API.

Confidential

Security Systems Sr. Advisor

Responsibilities:

  • Member of the GRC (Governance, Risk, and Compliance) team
  • Duties include PCI remediation, PCI GAP analysis and PCI readiness reviews. Assessment details include the evaluation of: Logical and Administrative Access Controls
  • Rick Management, Physical Security and Environmental Controls, Encryption, Malicious Code, System Development, Personnel Security, Logging and Data Collection, Service Provider Oversight, Intrusion Detection and Response, Business Continuity Management, and Technical Controls.
  • The ability to communicate highly technical concepts to both upper management and support personnel is an important part of this position. Designed remediation strategies for gaps as it relates to information assurance.

Confidential, Madison, WI

Security Analyst/Architect

Responsibilities:

  • Evaluation through the Risk Assessment process of the security practices for connected partner companies.
  • Design of partner assessment questionnaire which covers Policies and Standards, Identification and Autantication, Authorization and Access Controls, Confidentiality and Integrity, Incident Detection and Response
  • Administration, Training and Awareness, Firewall and Intrusion Detection\Prevention Systems, System Development and Maintenance, Physical Security, Business Continuity and Disaster Recovery.
  • Analysis of security logs in support of Incident Response and Forensics through the design of custom bash scripts.
  • Packet flow analysis using Wireshark and other packet capture tools.

We'd love your feedback!