We provide IT Staff Augmentation Services!

Cloud Security Consultant Resume

3.00/5 (Submit Your Rating)

SUMMARY:

  • Accredited, Certified Technology professional with 10+ years’ experience in Cybersecurity, Cloud Computing, Infrastructure and Application deployments.
  • Strong technical skills, hands - on experience, project management skills and technical leadership abilities combined with a strong grasp of business objectives and goals.
  • Experience translating technical data into business impact information and managing multiple tasks/projects simultaneously to meet established deadlines.
  • Architecture, implementation and management experience within enterprise environments, including end-to-end solutions architecture, feasibility, TCO analysis, solution development, final deployment, monitoring and documentation.
  • Excellent communication skills with ability to concisely report progress to C-level executives, work collaboratively across the organization, and provide clear and detailed artifacts to stakeholders.

TECHNICAL SKILLS:

  • AWS, Azure, Google, SoftLayer
  • Public, Hybrid, On-prem cloud
  • Project Management
  • Cloud security best practices
  • VMware, XEN, Hyper-V
  • SANS/Cert best practices
  • Cloud architecture, TCO analysis
  • Next Gen Firewalls/VPN
  • Cyber risk & compliance
  • Virtualization migrations
  • Linux, RedHat, Ubuntu
  • Threat assessment/response
  • DevOps/Automation
  • Network forensics
  • IT transformation/migration
  • Puppet/Ansible/Chef
  • Identity Access Management
  • Budget forecasting/modelling
  • SIEM monitoring
  • OS & Application hardening
  • Process Management
  • Infrastructure design
  • SOX, PCI compliance
  • MS Project/Excel/Visio
  • ITIL best practices
  • ISO 27k certifications
  • IDS/IPS deployments
  • SOA (service-oriented arch.)
  • Application security
  • Big data (Apache Hadoop)

PROFESSIONAL EXPERIENCE:

Confidential

Cloud Security Consultant

Responsibilities:

  • Provided thought leadership for company’s long-term strategic cloud direction, including recommendations for building-out public vs private cloud solutions.
  • Served as subject matter expert on the capabilities and implementation of all existing security controls, including complex security issues and analysis of emerging technologies.
  • Collaborated with the business and other technologies areas to develop defense in depth security reference architectures, security architecture standards and frameworks spanning all layers of security from host, server, and network to application and data security.
  • Applied FedRAMP security controls across all cloud environments, including internal private cloud deployment as well as public deployments on Amazon AWS and Microsoft Azure.
  • Evaluation, comparison and recommendation of Amazon AWS, Google Cloud Services, Rackspace and SoftLayer with particular emphasis on security considerations across vendor platforms.
  • Analyzed current cybersecurity policies and architectures to Identify the need for new security solutions within existing infrastructure as well as emerging cloud deployments.
  • Contributed to the development and implementation of security technology solutions for complicated and more complex environments and architecture.
  • Contributed technical design specifications for request for information/request for proposal (RFI/RFP) and vendor selection efforts.
  • Conducts system architecture reviews for new technology to ensure best practices, document security solutions, and enables re-use of processes.
  • Authored numerous deliverables including ongoing documentation, development, implementation, and maintenance of processes, procedures, and services associated with architecture.
  • Collaborated with Operations teams to ensure security architectures are appropriately assessed and able to be supported. And additionally, to implement new technologies and security solutions in alignment with industry best practice and commonly accepted principles of secure design.

Confidential

Cloud Consultant

Responsibilities:

  • Architected a full cloud deployment, allowing for scalability, high-availability and fault-tolerance utilizing full suite of compute, storage and networking cloud resources.
  • Managed the migration of existing enterprise apps and services to cloud-based assets.
  • Advised and implemented a robust cloud security solution for a highly secure environment, including detailed project plans and best practices and the installation of additional safeguards using multi-tiered, multi-layered deployment models.
  • Served in a hands-on capacity, designing and configuring secure cloud endpoints, database whitelists, secure VPN connections, system monitoring tools and performance metric analysis.
  • Reviewed and analyzed application security against common attacks such as SQL injection, cross site- scripting, buffer overflows and insecure direct object references, including countermeasures and corrective action.
  • Implemented processes and controls to reduce attack surface of internal and web applications, including data leak prevention safeguards.
  • Evaluated and tested the company’s internal systems and applications to identify weaknesses in operations, processes, systems and controls and presented findings to stakeholders.
  • Performed comprehensive security assessments, including vulnerability assessments, payment card industry compliance, and risk assessments.
  • Implemented a comprehensive disaster recovery and business continuity program to further ensure recovery from incidents.

Confidential

Information Technology Manager

Responsibilities:

  • Recruited by Arizona-based Company to rescue a failing virtualization deployment project affecting the company’s flagship product.
  • Successfully shifted strategy and re-deployed resources to complete project with time & budget and subsequently hired by permanently to address other initiatives.
  • Managed end-to-end implementation of hybrid cloud infrastructure, including AWS deployment, VMware integration, requirements gathering, feasibility, TCO analysis, solution development, systems architecture, and final deployment.
  • Assumed Product Manager responsibilities for core legacy applications to AWS infrastructure, utilizing best-practice security, scalability and high-availability architecture.
  • Provided technical leadership, mentoring and guidance for junior technical staff, improving service metrics and enhancing positive departmental perception across the organization.
  • Fully responsible for the implementation, management and maintenance for enterprise-wide security, including intrusion prevention/detection systems, vulnerability management systems and data leak/loss prevention.
  • Worked with company Management, the Board of Directors, and various Department heads to install best-practice processes and obtain compliance and certifications in several security domains.
  • Negotiated vendor agreements, including negotiation of SLA and support contracts, evaluation of emerging technologies and assessment of current infrastructure with the aim of filling gaps and patching weaknesses.
  • Managed vendor relationships, with responsibilities including writing clear and concise RFPs, performing accounting functions such as budgeting and departmental account management.

Confidential

IT Program Manager

Responsibilities:

  • Analyzed, evaluated and managed the deployment of enterprise level security services, including certificate servers, encryption and secure e-mail options to ensure integrity and privacy of internal messaging.
  • Ensured compliance to government regulations by implementing data integrity procedures, including securing data-in-transit and data-at-rest.
  • Re-focused team members by continually aligning project tasks with operational objectives, including planning, re-deploying resources, monitoring, appraising and reviewing project progress.
  • Continually re-aligned financial objectives by forecasting requirements, preparing budgets, scheduling expenditures and initiating corrective actions when necessary.
  • Examined and certified that network security configurations and deployed applications conformed to industry standards for best practices.
  • Implemented and unified disparate security mechanisms to create a unified, centralized security framework providing end-to-end security throughout the enterprise.
  • Served as the single point of contact for management, with sole responsibility of implementation, monitoring, and reporting of security infrastructure and programs.

Confidential

IT Security Audit & Compliance Advisor

Responsibilities:

  • Analyzed Governance, Risk, and Compliance model approach to cyber security to identify weaknesses and measure gaps.
  • Measured and reported key performance metrics in the security realm to provide stakeholders a high-level overview of the state of security throughout the enterprise.
  • Performed penetration testing of internal financial applications with the aim of patching weaknesses and recommended a best-practices approach to application development.
  • Worked with internal and external audit teams to implement tools for the monitoring of corporate systems for possible mismanagement, fraud and inefficiency.
  • Executed information technology audits, including definition of scope, control evaluation, test activities, audit reporting, issue resolution and risk assessment.
  • Reviewed, analyzed and implemented rules, regulations and policies across several industries, including banking, finance, insurance and healthcare.

Confidential

IT Security Engineer

Responsibilities:

  • Performed comprehensive cyber security assessments, including development of mitigation strategies, recovery plans and the presentation of advanced contingency scenarios.
  • Responsible for the allocation and prioritization of all security resources, including personnel, infrastructure, and on-demand resources.
  • Worked with development team to identify and implement defensive coding practices.
  • Responsible for establishing and expanding the security team, including forming job responsibilities, defining the department mission and assuring adherence to project deadlines.
  • Evaluated existing security infrastructure and services against publicly available baseline security configuration standards and subsequently published findings to fill gaps and establish guidelines.
  • Designed, installed and configured firewalls, VPNs and IAM (Identity Access Management) systems to secure infrastructure against external as well as internal threats.
  • Managed and configured intrusion detection and intrusion prevention systems, including host-based IDS on UNIX, Linux, and Windows hosts, as well as network-based offerings from Cisco and ISS.
  • Worked with management and legal to establish security guidelines, internet usage policies, data security assurance and contingency planning.
  • Researched, evaluated, and recommended firewall solutions based on offerings from several leading firewall vendors, including Cisco, Checkpoint and open source solutions.
  • Continually provided managers with detailed progress reports, timelines and costs for all initiatives.

We'd love your feedback!