We provide IT Staff Augmentation Services!

Sr. Security Engineer Resume

3.50/5 (Submit Your Rating)

New, JerseY

SUMMARY:

  • An Information Security Professional wif experience of over 9 years in Cloud Security, Application Security, API Security, Security Architecture & Design, Network Security, Identity and Access Management (IAM), DevSecOps, Security Automation, Penetration Testing,, Threat Hunting, Secure Coding, Mobile Security, Cryptography, PKI, Security Audits, Security Information Event Management (SIEM), Security Controls and Validation, IT Risk Assessments, Regulatory Compliance.
  • Highly analytical computer security engineer wif success both defending and attacking large - scale enterprise networks
  • Working knowledge of OWASP Top 10 andSANS Top 25 software guidelines, Federal Financial Institutions Examination Council's (FFIEC) regulations, including Payment Card Industry (PCI-DSS), HIPAA, Center for Information Security (CIS benchmarks) and Sarbanes-Oxley Section404 (SOX).
  • Experience in conducting IT Security Risk Assessments in accordance to NIST and FFIEC framework
  • I’ve hands-on experience in performing threat hunting using Carbon Black as part of Security Operations Center (SOC) operations.
  • Very good experience in tools like Burp Suite, IBM/HCLAppScan Standard, AppScan Enterprise, AppScan Source Analysis, Secure Assist, Checkmarx, HP Toolkit, HP Web Inspect, HP AMP, Qualys, Nessus, Nmap, etc.,
  • Hands-on wif Penetration Testing, DAST, SAST, IAST and manual ethical hacking.
  • Advanced threat hunting, root cause analysis using Carbon Black (Cb Response), decide on what to remediate and what to risk accept based on security requirements. Implementation of cloud (AWS and MS Azure) security controls for IaaS, PaaS and SaaS based applications and infrastructure.
  • Hands-on wif Symantec Cloud SOC CASB and Symantec DLP.
  • Cloud networking and routing technologies (path based) Experience.
  • Experienced wifPuppet, Ansible, Chef and saltstackas System Configuration Tool.
  • Working knowledge of IAM implementation, OAuth2.0, SAML frameworks.
  • Experience using a wide variety of security tools to include Kali-Linux, Metasploit, HP WebInspect, HP Microfocus Fortify, Veracode, BurpSuite Pro, Wireshark, L0phtcrack, Snort, Nmap, Nmap-NSE, Cain and Abel, Nitko, Dirbuster, IBM App Scan, MicrofocusWebInspect, OWASP ZAProxy, Nessus, Open Vas, W3AF, BeEF, Etthercap, Maltego, Wifi-Security, SIFT, SOAP UI, Havij, Aircrack-ng suite.
  • Hands-on wif network penetration testing and ethical hacking.
  • Involved in implementing and validating teh security principals of minimum attack surfacearea, least privilege, secure defaults, avoiding security by obscurity, keep security simple, Fixing security issuescorrectly.
  • Worked on Web Application Firewalls (WAF) and database security / Vulnerability scanners.
  • Strong knowledge in Manual and Automated Security testing for Web and Mobile Applications.
  • Analyze teh results of penetrations tests, design reviews, source code reviews . .

TECHNICAL SKILLS

Security Tools: MicrofocusWebInspect, QualysGuard, Veracode, RSAArcher, FireEye Retina, Onapsis, IBM/HCLAppScan Enterprise (ASE), Standard & Source editions, BurpSuite Pro, Acunetix, Fortify SCA,BeEF,WAS, SQLMAP. CHEKMARX (Code Analysis), Carbon Black.

CigitalSecure: Assist, AppDetect, BeyondTrust PAM, Oracle Identity Manager, Oracle Access Manager,JHijack, Metasploit Pro, ZED attack proxy, IDA Pro, Firemon, SQLMAP, Wireshark, WebScarab, BlueCoat Proxy, Nmap, BMC BladeLogic, Nessus, Rapid7 Nexpose, Tripwire, DBProtect, ArcSight SIEM, e-DMZ Password Auto Repository (PAR), Varonis, Amazon Web Services (AWS) Cloud security.

Programming Languages: Java, C# .NET, C, C++

Identity & Data Protection Tools: Gemalto KeySecure HSM, ProtectDB, ProtectFile, RSA Single Sign-On (SSO), OAuth2.0 & SAML, Two-Factor (2F) autantication.

Cloud Platforms: Java & J2EE Technology

AWS, MS Azure: Spring Framework, EJBs, Struts2, Servlets, JavaServerPages (JSPs), JMS, Java Mail API, JNDI, LDAP, JDBC, JTS, RMI, AWT, Swing, Socket Programming, IONA Orbix CORBA.

Networking: IDA pro, OllyDbg, Windbg, Symantec Endpoint Protection, DL, Palo Alto Firewalls, Cisco IronPort, Check Point, Cisco ASA, IDS/IPS, Anti-virus, BMC BladeLogic, Remedy.

Scripting Languages: Python, Powershell, shell Scripting

Web Technologies: HTML 4.0/5, XHTML, DHTML, CSS2/CSS3, JAVASCRIPT, JQUERY, Angular JS, NodeJS, AJAX, JSON and XML

Web Services: RESTFul/SOAP, SOA, UDDI, WSDL, Apigee, SoapUI Pro

Operating System: Linux/Unix (Red Hat Enterprise Linux, Debian, Ubuntu, Kali Linux), Windows.

Databases: MySQL, Oracle, MS SQL Server

PROFESSIONAL EXPERIENCE

Confidential, New Jersey

Sr. Security Engineer

Responsibilities:

  • Part of teh Red Team to conduct penetration testing and ethical hacking across teh asset focusing on application security.
  • Security Operations Proactive threat hunting,Incidient Response, SIEM(Splunk),Log Anylasis,SourceFire, Fireeye.
  • Performed code analysis using Microfocus Fortify, Veracode, CHECKMARX.
  • Performed teh penetration testing of mobile (Android and iOS) applications, specifically, APK reverse engineering, traffic analysis, malware analysis (IDA Pro), and manipulation, dynamic runtime analysis.
  • Worked wif external security vendors (i.e., TrendMicro) in conducting Managed Detection and
  • Instrumental in architecting, implementing and administrating a Security and Information Event Management (SIEM) solution (Splunk) to automate teh correlation,
  • PerformedAPI Security testing, CI/CD pipeline, security automation of APIs using SmartBear SoapUI Pro.
  • Working knowledge of OWASP Top 10 and SANS Top 25 software compliance guidelines,
  • Federal Financial Institutions Examination Council's (FFIEC) regulations, including Payment Card Industry (PCI-DSS 3.2), HIPAA and Sarbanes-Oxley Section404 (SOX).
  • Monitored for non-complaince issues and recommended solutuonss by closely working wif various engineering teams such as architecture and design.
  • Researched applicable complaince guideliens for various enterprise systems, developed policies, procedures and ensured that these policies and procedures have been enforced.
  • Participated in teh implementation of Public Key Infrastructure (PKI) for securing data at rest and data in transit. Involved in teh implementation of encryption and decryption of confidential data and supported teh certificate key life cycle.
  • Implemented Continuous Integration (CI) and Continuous Delivery (CD) using Jenkins CI which TEMPhas very strong build pipeline consists of Build verification, Junit tests, Deployment Tests, API tests, Service Tests.
  • Created continuous integration system usingAnt, Jenkins, Puppetfull automation, Continuous Integration, faster and flawless deployments.
  • Development ofPuppet modules wif Jenkins for continues integration and continues deployment of managed products, and related services.
  • Participated in teh implementation of Tanium platform. Deployed and configured Tanium Asset,ch, EDR and Vulnerability Configuration modules, generated reports and applied remediation to meet teh compliance.
  • Performed server hardening of Linux and Windows server based on CIS benchmarks and internal security standards
  • Implemented DevSecOps for automating security scanning process and integrated wif CI/CD pipeline using Jenkins, GitHub, Gradle, TFS.
  • Configured security controls for AWS VPCs, S3 buckets, EC2 instances, ECS, ECRs. Route53, CloudWatch.
  • Content delivery network (CDN) wif Akamai, Amazon CloudFront.
  • Cloud networking and routing technologies (path based) Experience.
  • Participated in teh implementation of AWS Virtual Private Cloud (VPC). Implemented multiple layers of security, including security groups, network access control lists, to control access to Amazon EC2 instances in each subnet.
  • Implemented Cloud Access Security Broker (CASB) for cloud apps using Symantec CloudSOC. Integrated CloudSOC CASB wif Symantec DLP and Endpoint Protection (SEP).
  • Identifying teh critical, High, Medium, Low vulnerabilities in teh applications based on OWASP Top 10 and SANS 25 and prioritizing them based on teh criticality.
  • Proficient in understanding application level vulnerabilities like XSS, SQL Injection, ClickJacking, CSRF, autantication bypass, cryptographic attacks, autantication flaws etc.
  • Skilled using Burp Suite Pro, Veracode, HP Web Inspect, IBM AppScan Standard, Source and Enterprise, nmap, Dirbuster, Qualysguard, Nessus, SQLMap, RSAArcher, FireEye Retina, Onapsis for web application penetration tests and infrastructure testing. Performing onsite & remote security consulting including penetration testing, application testing, web application security assessment, onsite internet security assessment, social engineering, wireless assessment, and IDS/IPS hardware deployment.

Confidential, Detroit, MI

Sr. Security Engineer

Responsibilities:

  • Penetration testing based on OWASPTop 10 andSANS25. Analyze teh results of penetrations tests, design reviews, source code reviews and other security tests.
  • Decide on what to remediate and what to risk accept based on security requirements. Highly analytical computer security analyst wif success both defending and attacking large-scale enterprise networks.
  • Experience using a wide variety of security tools to include Kali-Linux, Metasploit, Microfocus WebInspect, Fortify,Checkmarx,Burp Suite Pro, Wireshark, L0phtcrack, Snort, Nmap, Nmap-NSE, Cain and Abel, Nitko, Dirbuster, IBM AppScan, OWASP ZAProxy, Nessus, Open Vas, W3AF, BeEF, Etthercap, Maltego, Wi-Fi-Security, SIFT, SOAP UI, FOCA, Havij, Yersinia, Recon-ng, Aircracking suite
  • Implemented Security Group Policies for Elastic Compute Cloud (EC2), Simple Storage Service (S3), DockerContainers, ECS, ECRs wifin AWS. Developed AWS Service Roles to protect Identity Provider access.
  • Participated in teh implementation of Virtual Private Cloud (VPC). Implemented multiple layers of security, including security groups, network access control lists, to control access to Amazon EC2 instances in each subnet.
  • Involved in implementing and validating teh security principals of minimum attack surface area, least privilege, secure defaults, avoiding security by obscurity, keep security simple, Fixing security issues correctly. Strong knowledge in Manual and Automated Security testing for Web and MobileApplications.
  • Administered PKI, encryption (Gemalto/SafeNet), certificate management, key generation and implemented dual keys to address segregation of duties issue between DBAs and security admins. Written software programs to encrypt/decrypt for data at rest and data in transit.
  • Utilized AWS KMS, CloudHSMs for PKI and key management
  • Develop teh PKI Program specific outline for teh connected cars security program
  • Provide technical program oversight specific to teh PKI security domain to all components of connected cars
  • Knowledge of OWASP Top 10, secureSDLC, and SANS Top 25 software guidelines, Federal Financial Institutions Examination Council's (FFIEC) regulations, including Payment Card Industry (PCI-DSS), HIPAA and Sarbanes-Oxley Section404 (SOX).
  • Analyzed teh results of penetrations tests, design reviews, source code reviews and other security tests.
  • Implemented Continuous Integration (CI) and Continuous Delivery (CD) to integrate SAST and DAST scans into teh build cycle using Jenkis, GitHub, Gradle, Maven. Developed DevSecOps processes for security automation.
  • Maintain and support PassSand API gateway infrastructure and associated tools.
  • Decide on what to remediate and what to risk accept based on security requirements.
  • SOX Compliance Audit experience on controls like User access management, Change Management, Incident Management.
  • Implemented Single Sign-on (SSO) using SAML2.0 and OAuth2.0 for various web and mobile applications.
  • Performed teh penetration testing of mobile (Android and iOS) applications, specifically, APK reverse engineering, traffic analysis and manipulation, dynamic runtime analysis.
  • Experience in Threat Modeling during Requirement gathering and Design phases.
  • Experience wif Security Risk Management wif TCP-based networking.
  • Experience wif TCP/IP, Firewalls, LAN/WAN. Experience in implementing Security.

Confidential, Deerfield, IL

Security Engineer

Responsibilities

  • Created and documented reports, rules, trends and Dashboard. Analyzed Arc Sight and related tools and resolved IT security failures.
  • Data Leakage Prevention f(DLP), forensics, sniffers and malware analysis tools.
  • Designed security policies, alarm response protocols and access card guidelines.
  • Developed and updated security procedures, security system drawings and related documentation.
  • Developed correlation rules for Security Incident and Event Management (SIEM) system.
  • Developed procedures for teh emergency incident response and crisis management, physical security, information protection, incident management and investigation units.
  • Experience in Network Intrusion detection/Intrusion Prevention System and Firewalls.
  • Experience wif Identity and Access Management (IAM) and development of user roles and policies for user access management.
  • Good knowledge and experience in Installation, Configuration and Administration of Windows Servers 2000/2003, Active Directory, FTP, DNS, DHCP, TFTP, Linux OS under LAN and WAN environments.
  • Implemented HP ArcSight ESM including, correlation rules, data-monitors, reports, event annotation stages, case customization, active lists, and pattern discovery.
  • Implemented IBM AppScan standard, source editions, HP Web Inspect, Nessus, and Qualys Guard web application scanners.
  • Implemented Secure Software Development Life Cycle (S-SDLC) processes; developed secure coding practices for web, mobile applications, including database and middleware systems.
  • Reviewed Azure network security architecture and implemented security controls. Specifically, Azure virtual networks, including on-premise connectivity, traffic filtering, secure communication, point-to-site VPN etc.,
  • Implemented Network Security Groups (NSG) to control network traffic to various Azure network resources.
  • Created NSG rules (inbound and outbound) and prioritized teh rules based on teh requirements.
  • Associated NSGs to VMs, NICs, and subnets based on teh deployment model.
  • Validated database security for SQL servers deployed in Azure Cloud environment. Implemented Integrated Windows autantication supported by Azure Active Directory.
  • Enabled threat detection for databases in teh Azure portal.
  • Teh security alerts generated in teh Azure Security Center have been reviewed and remediated.
  • Implemented Azure Key Vault for storing secrets.
  • Developed security controls for implementing Azure storage security. Teh RBAC wif Azure AD TEMPhas been implemented for securing teh storage account.
  • Implemented Web Filter database for URL content Filtering.
  • Participated in teh implementation of SafeNet product for encrypting customer credit card information using Public Key Infrastructure (PKI).
  • Performed Static and Dynamic Analysis and Security Testing (SAST and DAST) for various applications as per firm's security standards

Confidential, Webster, NY

Security Engineer

Responsibilities:

  • Provided project planning, guidance and technical expertise in program, policy, process, and planning; risk management, auditing, and assessments; A&A; and quality planning and control.
  • Researched and analyzed known hacker methodology, system exploits and vulnerabilities to support Red Team Assessment activities
  • Performed advanced security testing of F5 load balancers, Websense V10K &BlueCoat Proxies using virtual machines, security tools, and URL generator.
  • Assisted wif teh update and administration of all SOX audit requirements from an IT internal controls perspective.
  • Performed security compliance assessments for all IT infrastructures (firewalls, routers, IDS/IPs, DLP, Linux/Windows security hardening).
  • Provided wif Threat profiling of teh application to teh Client and prepared combined reports of level of risks, their trend, and frequency to teh client
  • Conducted white/gray box penetration testing on teh financial systems using Kali Linux, Cobalt Strike for OWASP top 10 Vulnerabilities like XSS, SQL Injection, CSRF, PrivilegeEscalation and all teh test-case of a web application security testing
  • Splunk licensing updates by adding new license under Admin and System and License Management.
  • Ironport URL filtering for known bad URL content.
  • Threat and virus scanning using Malware bytes from centralized console Enforcement of policies and procedures for users, admins, and management
  • Reverse engineering of malware using tools like malwr, process hacker and so on Incident response tabletop exercise by documenting and alerting necessary personnel.

We'd love your feedback!