Security Engineer Resume
SUMMARY
- Versatile and resourceful security systems and network engineer. Demonstrated strengths including ability to learn quickly and work accurately, while adding responsibilities.
- Great analytical and problem solving skills with an emphasis on detail. See problems through to resolution.
- Excellent communication skills. Adopts new ideas, try’s alternative approaches.
- A believer in building strong business relationships with customers and coworkers in different departments.
- Organized and detailed oriented, ability to multi - task and able to prioritize effectively.
TECHNICAL SKILLS
LAN/WAN: TCP/IP, DNS, HSTS, SMTP, FTP, TELNET, TFTP, SNMP, PPP, IPX, ICMP, RIP, IGRP, EIGRP, BGP, OSPF, SSL, Multicast, IGMP, Frame Relay, MPLS, 802.11a/b/g/n, 802.1x, 802.1q and VLAN’s. Security protocols IPSec, IKE, SSH, SSL, HTTPS.. Active Directory, LDAP/Kerbos, Radius.
Switches and Routers: Dell, Cisco, Juniper, Pala Alto, and HP.
Firewalls: Cisco ASA 5505 5510, Fortigate, Check Point, Sophos, Juniper SRX, Watch Guard.
Wireless: 802.1 a/b/g/n Cisco WLC, Aruba, WEP, WPA, WPA2, TKIP, MIC, 802.1X, WPA-PSK, CCMP
Misc.: ShoreTel, Fonality and Avaya IP-phones, IOS, ANDROID, Tablets, APC/UPS, Security CCTV
Network Security: CheckPoint, FireEye, F5, Rapid7, HP, Redline, ArcSight, ForensicTK
SIEM and Analytics: Splunk, Nitro, Log Rhythm, LogStash, Kibana, GreyLog2, Puppet, etc.
Threat Intelligence: Rapid7, Websense, Force point, Sophos WG, McAfee, Barracuda, etc.
IAM: Rest, OAUTH, MYSQL, SAML, Oracle, Openstack, AWS
Java: Script, REST, Perl, Python, Ruby, HTML, IIS, SQL, AppEngine, Jquery, OAuth, MVC and Gevent.
PROFESSIONAL EXPERIENCE:
Confidential
Security Engineer
Responsibilities:
- Create Single Sign On, Identity Lifecycle Management; provide audits, provisioning and risk based authentication including two-factor authentication for cloud applications. Use Open stack, Oracle Linux, Oracle Virtual Directory, Oracle Internet Directory, Oracle Identity Federation, Oracle Entitlements Server, Oracle Access Manager, Web logic, LDAP and Active Directory.
- In addiction to our core IAM, IDM solution’s, I’m the professional services lead providing audits for PCI, SAS70, SSAE16, HIPAA and PHIPAA, Pentesting (blackbox, whitebox, greybox application, authorization, functionality, wireless and social) governance, risk assessments, compliance management, security design engineering, vulnerability management, Malware/APT/Breach Detection, incident response and digital forensics and created around preparation, identification, containment, eradication, recovery and lessons learned.
- Leverage experience with different frameworks, FINRA’s suggested cyber security practices, OWASP, SANS and many other sources.
Confidential
Cyber Security lead Engineer
Responsibilities:
- Duties include architecting, managing and supporting cyber security, network, servers, disaster recovery and database protection. Assisted with management of Enterprise level IT system.
- Provided IT security analysis to ensure all applications are functional and secure, maintain both hardware and software security systems, develop policies and procedures, perform desktop, network and system support as needed. Used AIAA/ NIST security framework for security assessments.
- Updated and managed Barracuda spam appliance and created reports. Reconfigured FTP to SFTP. reconfigured VPN, Firewall, setup DAM, IDS, SIEM, DLP and enabled SNMP to manage switches.
- Updated Viper anti-virus and configured different policies for PC, MAC and Linux agents. Updated all patches consistently after testing. Isolated and resolved viruses issues using risk and mitigation.
- Used SIEM data for event correlation dat was used to send message records and events to email.
- Managed Domain Controllers, Exchange, Active Directory, LDAP, Hyper V, DNS, DHCP, Symantec Back-up MSBLM, MSCM and production and dev servers.
- Managed Help Desk employee. Worked with manager and CFO to Purchase all hardware and software for IT Department while maintaining within budget.
- Provide pentests and results for applications, authorizations, functionality, wireless and social.
- Implemented and configured case tracking tool for information security incidents, established policies for incidents, performed risk assessments and mitigated with controls. Served as the liaison for HR, and CFO for investigations. Facilitated data collection from network shares, servers, images, cell phones and other sources. Improved desktop and server build policies by enhancing the security posture. Developed plans for incident response to include preparation, identification, mitigation, eradication/containment, recovery and follow-up.