Tvm Analyst Resume
3.00/5 (Submit Your Rating)
PROFESSIONAL EXPERIENCE
Confidential
TVM Analyst
Responsibilities:
- Create workflows.
- Creation of Python scripts to automate recurring tasks.
- Design, test, and implement the use of the Qualys API for automation.
- Consult wif team members and client on Qualys workflow.
Confidential
Vulnerability Remediation Analyst
Responsibilities:
- Assists the Operations manager in any of the following activities, either in a direct or an indirect fashion:
- Defining and communicating the overall program direction
- Define operational processes for execution/ implementation and on - going operational management of processes, etc. as they are developed.
- Provides thought-leadership and applies area of expertise to technology matters to develop processes and tools that are TEMPeffective and efficient to achieve program goals
- Utilizes research and analysis in addition to in-depth understanding of organizational goals/priorities and technology to develop executable strategies and plans.
Confidential
Senior Associate
Responsibilities:
- Duties include PCI remediation, GAP analysis and readiness reviews. Assessment details include the evaluation of: Logical and Administrative Access Controls, Risk Management, Physical Security and Environmental Controls
- Encryption, Malicious Code, System Development, Personnel Security, Logging and Data Collection, Service Provider Oversight, Intrusion Detection and Response, Business Continuity Management, and Technical Controls.
- The ability to communicate highly technical concepts to both upper management and support personnel is an important part of this position.
Confidential
Technical Lead
Responsibilities:
- The Technical Lead for MillerCoors is a hands-on role to assess vulnerabilities on servers, research and analyze software dependencies as well as compatibility and impact for vulnerability remediation strategies.
- Coordinate and collaborate wif project team, business area contacts and vendors. Document information associated wif research/analytics, communications and status.
Confidential
PCI Compliance Consultant
Responsibilities:
- Supports the HP Cyber Security Payment Card Industry Program Management Office and HP Enterprise Services in assessing current levels of PCI compliant activities.
- Duties are related specifically to PCI, spanning multiple Enterprise Services clients and involving technical compliance assessments, gap analysis, reporting and developing remedial plans.
- This position also supports the timely and accurate compliance reporting up and through the aligned Business Units and councils and to assist Enterprise Services in understanding the PCI DSS requirements.
Confidential
Security Consultant
Responsibilities:
- Evaluation of both Web Application and server vulnerabilities using the Qualys platform.
- Design and modification of vulnerability remediation workflows
- Creation of Python and VB scripts to automate recurring tasks.
- Design of scans and results using the Qualys API.
Confidential
Security Systems Sr. Advisor
Responsibilities:
- Member of the GRC (Governance, Risk, and Compliance) team
- Duties include PCI remediation, PCI GAP analysis and PCI readiness reviews. Assessment details include the evaluation of: Logical and Administrative Access Controls
- Rick Management, Physical Security and Environmental Controls, Encryption, Malicious Code, System Development, Personnel Security, Logging and Data Collection, Service Provider Oversight, Intrusion Detection and Response, Business Continuity Management, and Technical Controls.
- The ability to communicate highly technical concepts to both upper management and support personnel is an important part of this position. Designed remediation strategies for gaps as it relates to information assurance.
Confidential, Madison, WI
Security Analyst/Architect
Responsibilities:
- Evaluation through the Risk Assessment process of the security practices for connected partner companies.
- Design of partner assessment questionnaire which covers Policies and Standards, Identification and Autantication, Authorization and Access Controls, Confidentiality and Integrity, Incident Detection and Response
- Administration, Training and Awareness, Firewall and Intrusion Detection\Prevention Systems, System Development and Maintenance, Physical Security, Business Continuity and Disaster Recovery.
- Analysis of security logs in support of Incident Response and Forensics through the design of custom bash scripts.
- Packet flow analysis using Wireshark and other packet capture tools.