We provide IT Staff Augmentation Services!

Senior Security Architect Resume

3.00/5 (Submit Your Rating)

Marietta, GA

KEY SUMMARY

  • Highly skilled Cyber Security Professional with deep experience deploying and managing key components of a complete security solution such as:
  • Risk Management Framework, IT infrastructure controls, network segmentation, system vulnerability scan, Cloud solution and cloud security, application security management.
  • Privileged access, security information and event management; threat monitoring, endpoint detection and response.
  • Self - starting professional skilled at maintaining attention to detail, mitigating risks, proactively solving problems and taking initiatives to produce successful results.

TECHNICAL SKILLS

  • Risk Assessment and Risk Management Framework Process
  • Security Architecture
  • Data Normalization and Field Extraction in Splunk
  • Data Mapping
  • Field Validation, custom logger solutions from sample logs to production
  • Security control deployment automation
  • Splunk data ingestion and deployment
  • SPL Logic, Splunk alerts, monitoring and dashboards
  • Security Data Governance; Data collection design, data integration, operational alerting, data normalization and validation
  • Information Lifecyle Management
  • UBA/Reporting Solutions
  • Analytical Support
  • ELK (Elasticsearch and Kibana)
  • Salt Stack and MSCCM (Microsoft Systems Center Configuration Manager)
  • Automation deployment of Tanium, Pkware, Nessus, Crowdstrike, Venafi, Palo Alto, Guardium, F5 Silverline, Splunk, Qradar Ping, and Saltminer
  • Social Engineering Security (Phishing)
  • Incident Response, Azure Message header Analyzer, Office365
  • Event management tools; Splunk and IBM Qradar
  • SIEM, DLP, IDS/IPS solutions, PaloAlto Firewalls.
  • Request Tracker (RT)
  • Network Security, Qualys, Symantec, VMware and Hybrid Analyst
  • Identity access management (IAM), SSO, Okta and Citrix-NetScaler
  • SOC Cyber Security Support
  • ZScaler and Crowley ServiceNow
  • Log management tools; Splunk, IBM QRadar and LogRhythm
  • PCI DSS, HIPAA and NIST compliance knowledge
  • Network Access Control (NAC), Routers, Switches
  • OWASP development guide
  • Audit related frameworks, NIST Framework and Common Control Framework
  • Incident report and ServiceNow
  • Cloud Application Security
  • Asset Security
  • Communications and Network Security
  • Security Assessment and Testing
  • VDI VMware and VPN (Cisco AnyConnect)

PROFESSIONAL EXPERIENCE

Confidential, Marietta, GA

Senior Security Architect

Responsibilities:

  • Architecting, Designing, Implementing high level solutions for enterprise customer environment
  • Conduct in-depth information technology risk assessments including creating detailed process flows, identifying potential gaps or inconsistencies and making sound recommendations for improvement and/or mitigation
  • Created SPL Logic, Splunk alerts, monitoring and dashboards
  • Perform Data Normalization and Field extractions using Knowledge Objects and Regex.
  • Build automation using Terraform to support workload migration to AWS Cloud and ensure solutions meet security and compliance requirements
  • Design and architect cloud migration and cloud-native solutions on AWS platforms
  • Executed Big Data integration activities and data streams using Splunk and AWS cloud platform
  • Robust experience in Business and Operational Intelligence
  • Design and implement automation pipelines for deployment into AWS Cloud Platform
  • Perform security initiatives that involves production of custom logger solutions that contains a universal log format framework which help application teams, security investigators, security forensic analysts and satisfy quarterly audit requirements
  • Perform Field Extraction and ensure data are properly indexed
  • Ensure Data are properly mapped from various security controls into Splunk
  • Assessed and mitigated cloud security controls including tenant isolation, encryption at rest, encryption in transit, key management, vulnerability assessments, and application firewalls
  • Managed the end-to-end lifecycles of a project including mission critical technology components with multi-geography, multi-tier service design and DR capabilities
  • Executed data and network architecture/infrastructure
  • Deployed security controls such as Tanium, Pkware, Nessus, Crowdstrike, Venafi, Palo Ato, Guardium, F5 Silverline, Splunk, and Qradar using deployment automation technologies
  • Provide support to GCSF teams to implement new data sources/log feeds into cyber data providers (ELK/Splunk)
  • Integrating data source from AWS cloud into Splunk/ELK
  • In-depth knowledge of all major vendors products and customer requirements
  • Enhance, update or create new structured information record(s) for downstream report data sources (Information Lifecycle Management)
  • Deployed various security controls into Clients infrastructures and integrated the logs into SIEM (Splunk)
  • Create strategy and solution to integrate data in cyber data providers (Splunk and ELK)
  • Monitor security logs generated by SIEM tool; Splunk and LogRhythm to determine and prevent malicious threats (SOC)
  • Mitigate risk of malicious attack using various network security tools IDS/IPS solutions, Qualys, SolarWind, and PaloAlto
  • Handle potential phishing emails, malicious files, attachment and links (Social Engineering Security)
  • Request Tracker (RT) to annotate and escalate Incidence response (IR)
  • Implement Identity access management (IAM), Single sign-on solution (SSO), and Okta
  • Create and monitor incident report to identify risk and remediate threats
  • Ensure appropriate IT controls are established and functioning effectively
  • Perform internal validation for existing or new UBA/Reporting solutions leveraging cyber providers (ELK/Splunk)
  • Perform risk assessment of third-party vendors but not limited to cloud computing and identifying gaps in the vendor ITcontrol environment and recommending mitigating controls to address the gaps that are not in line
  • Identify and mitigate risk using Risk Management Framework Process
  • Analyze network traffic, systems and computing environment logs (Web applications, servers, Symantec endpoint protection, IDS/IPS systems, anti-virus and malware, data encryption, mobile device security) for activities including policy violations, intrusions, breaches, anomalous and abnormal behaviors
  • Apply Qualys Vulnerability scan to mitigate risk, detect threats, and apply effective countermeasures.
  • Oversee network security, systems security, software application security, systems architecture.
  • Mitigate risks using SIEM (Splunk) and other security event monitoring tools
  • Manage firewall rules through firewall software and Syslog.
  • Implement PaloAlto network firewall, DLP, IDS/IPS solutions to identify and mitigate risk
  • Troubleshoot system security using McAfee for malicious websites and suspicious viruses
  • Analyze and respond to security incidents from IDS/IPS devices and also, working with vendors to troubleshoot network security intrusions
  • Apply security policies and procedures to analyze, detect and prevent both internal and external breaches
  • Comprehend and comply with clients security policies knowledge, skills and abilities required
  • Working knowledge of security compliance and standards like NIST, PCI DSS, SOX, SOC2, ISO 27001
  • Knowledge in OWASP development guide

Confidential, Atlanta, GA

Senior Information Security Engineer

Responsibilities:

  • Plan, implement, upgrade, or monitor security measures for the protection of computer networks and underlying IT Infrastructures
  • Monitor and analyze security logs generated by SIEM tool; Splunk and LogRhythm to mitigate malicious threats (SOC)
  • Proficient in mitigating threats from phishing emails, malicious files, attachment and links (Social Engineering Security)
  • Experience in using Request Tracker (RT) to annotate and escalate Incidence response (IR)
  • Oversee and monitor a comprehensive patch and vulnerability management for servers and end user machines
  • Risk mitigation using Anti-Virus, IDS/IPS, Tripwire, Qualys, SolarWind, PaloAlto network firewall and patching tools
  • Proficient and knowledgeable of information security standards such as ISO 27001, NIST and ITIL
  • Analyze and utilize vulnerability management tools to protect and mitigate from potential threats
  • Create and monitor incident report to identify risk and remediate threats
  • Ensure appropriate security controls are established appropriately and functioning effectively
  • Demonstrate solid understanding of technical aspects including security architecture and engineering, identity and access management, operations and communication and network security
  • Experience in Risk Management Framework Process
  • Proficient in implementation of Identity access management (IAM), Single sign-on solution, Okta and Citrix
  • Used PaloAlto while checking different threats, signature for malware analyst and reseach
  • Monitor and analyze logs from devices on the network sent to SIEM, Splunk and IBM QRadar (SOC)
  • Proficient with OSI model: Maintain and monitor all installed system and infrastructure with the OSI model
  • Develop and schedule regular cybersecurity reports (event logs, firewalls, cyber incidents) to assist with monitoring and oversight
  • Excellent, effective communication skills and ability to communicate technical issues to a less technical audience
  • Maintain security, backup and redundancy strategies
  • Analyze, troubleshoot, and monitor incoming security events using IDS/IPS, SIEM, Splunk and IBM QRadar
  • Proficient with security solution such as DLP, network access management, network segmentation, privileged access management, vulnerability management, application security management, threat monitoring and endpoint detection.
  • Knowledge in standards and framework such as NIST, ISO 27001, PCI DSS, and SOX

Confidential, Atlanta, GA

System Engineer

Responsibilities:

  • Implement, analyze and monitor firewalls, VPNs, SIEM, DLP, IDS/IPS solutions, Tripwire, IAM, and PaloAlto Firewalls
  • Monitored all IT security systems including Symantec Endpoint Protection, SIEM (Splunk) and Two Factor Authentication Patch (SOC)
  • Managed IT Security risks by performing IT Security Risk Assessments and recommending the appropriate security controls that will safeguard the IT landscape
  • Ensure effective implementation of Risk Management Framework Process
  • Designed training manuals to increase security awareness throughout the organization
  • Maintained and updated Symantec Antivirus Server and PaloAlto
  • Implementation of Identity access management (IAM), Single sign-on solution (SSO), Okta and Citrix
  • Proficient at responding to technical security questions and concerns from client, help desk, desktop support and other network administration staff
  • Monitor security SIEM log tools; Splunk, LogRhythm, IBM QRadar, ArcSight and AlienVault.
  • Worked with Service Now and Active Directory for assigning users to its proper groups

We'd love your feedback!