We provide IT Staff Augmentation Services!

Lead Security Incident Response Resume

2.00/5 (Submit Your Rating)

SUMMARY:

  • In light of my prolonged experience in the information technology; I have managed employees and faced customers in and outside the boundaries of local operational outfit.
  • I am looking for an IT Security Engineer/Consultant position as part of a consistently fast - paced organization with opportunities for personal and .
  • The environment I seek should equally present some challenge because I am highly motivated to solve problems.
  • I have 6+ years of local and state wide operation in this field and approximately 21 years of broad technical experience in Systems, Infrastructure, Security, Virtualization, Storage and Networking.
  • Successfully designed and delivered secure, robust cloud solutions for small, medium and enterprise organizations.
  • Multiple years of experience architecting and engineering of corporate business acquisitions and spinoffs.
  • Years of Management expertise including people management, strategic planning, risk mitigation, business process improvement, business continuity and regulatory compliance including, SOX, PCI and HIPAA.
  • Extensive technical experience in Microsoft Server Systems, SQL, Exchange, ADFS and Active Directory as well as Vmware& Microsoft virtualization technologies and EMC SAN/NAS technologies.
  • High level of experience in network security, compliance and data governance including firewalls, IPS/IDS systems, Payment Card Industry (PCI) and Sarbanes-Oxley (SOX) compliance as well as familiarity withSAS 70 & SSAE 16 reporting standards and data governance practices including data security, retention and data management.
  • J2EE application server stack for web (IIS 6 +)

TECHNICAL SKILLS:

  • Cloud / SaaS / PaaS Platforms
  • Microsoft Azure
  • Software Development
  • Java, Python
  • C/C++
  • Systems Architecture, Engineering and Administration
  • VMware vSphere 5.x, 4.x, ESX 3.x
  • Microsoft Server 2000, 2003, 2008, 2012& R2 versions
  • Microsoft SQL Server 2000, 2005, 2008, 2012
  • Microsoft Exchange 2003, 2007, 2010, 2013, O365
  • Microsoft Active Directory Federation Services (ADFS)
  • Microsoft IIS 5.0, 6.0, 7.5, 8.0, 8.5
  • Microsoft Cluster Services, SQL Clustering
  • Active Directory, DNS, DHCP, Group Policy
  • Linux OS: Debian, Redhat, Ubuntu, Open Susie
  • Kali Linux, HackLab VPN
  • Network and Wireless Administration
  • Cisco Access Switches 2960, 3560, 3750
  • Cisco ISR Routers 800, 1900, 2600
  • Cisco ASA 5505, 5510, 5520
  • Sonic Wall NSA
  • Riverbed Steelhead (Wan Optimization)
  • Hardware Platforms
  • HP ProLiant DL and BL Blade Systems
  • Dell PowerEdge Physical and Blade Systems
  • Scripting & Automation
  • PowerShell v2, v3 & v4
  • PERL, Jscript, VB ScriptSecurity SIR: Assesment/Mitigation/Remediation
  • Pentesting, Finding and Recommendations
  • SIR, Mitigation and Remediation
  • COBIT, ISO 27001/27002
  • MARS: E, HIX, HIPPA

PROFESSIONAL EXPERIENCE:

Confidential

Lead Security Incident Response

Responsibilities:

  • Triage of escalated priority incoming security events, perform preliminary and secondary analysis, validate events, create war room to conduct incident management and event resolution with internal security and network engineering teams
  • Documenting and generating reports on incidents and SIR productivity
  • Experience with Firewalls, load balancing, and other various security technologies
  • Experience working with event logging and monitoring (SIEM preferred) security analytics tools (Splunk preferred)and Akamai
  • Strong written and verbal communication skills; escalating malware and DDOS attacks to warroom.
  • Demonstrated ability to work in a team environment
  • Understands Enterprise Governance Risk and Compliance (EGRC) and experience working in a regulatory environment
  • Experience with, or knowledge of, Intrusion Detection/Intrusion Prevention Systems (IDS/IPS)
  • Strong understanding of Windows and Unix/Linux low-level operating system functionality
  • Using Symantec DLP, Security Aanalytics, Fireeye (APT tool), SNOW, ICANN and Agilance.

Confidential

Sr. Security Engineer

Responsibilities:

  • Determined the flow of all data in the internal (infrastructure) and external network (web).
  • Verified egress and ingress data advances with respect to IRM Standards.
  • Staged the necessary flows to make sure that they are proper for all ports and protocols.
  • Implemented changes effecting rules in PaloAlto (panorama 6.0), Cisco, Juniper and Checkpoint firewalls.
  • Researched on the latest attacks and the ports or protocols use for such.
  • Used firemon, fastresolver for subnet issues resolution within network segments.
  • Strong working knowledge of ITG ticketing system for fulfilling IRM standards.
  • Assured policies affecting ITG requests by referencing eGRC and IRM standards
  • Used ASM, Provider-1, NSM, AVS to fulfill firewall flow request and rule changes
  • Use of Tufin for network analysis and reporting.

Confidential

Sr. Security Analyst

Responsibilities:

  • Works as level 2 escalation point for tricare SOC war room monitoring
  • Coordinated and used Fireeye, Zscaler, HPsm, RSA (analytics,enVision, IAM), PaloAlto network devices, and Splunk for granular analysis and visibility. Researched on tool like CyberArk, Websphere and Tivoli line of products
  • Designed a severity rating for all incidents based on residual and inherent risks
  • Coordinated Security Incident response procedure and its development
  • Set up frame for SIRT and SOC outline for validating and reporting accurate incidence
  • Developed an incident response Life Cycle including rules of engaging with incident
  • Incorporating NIST, ISO, CERT guideline and ITIL/COBIT in all procedure to protect PII and PHI
  • Analyze incidence with respect to business process and change management
  • Works with other team members in a cooperatively in service and leadership

Confidential

Sr. Security System Engineer

Responsibilities:

  • Authority (CA) migration(Win2003 server to Win2012 server R2 (online and offline PKI)
  • Websense Proxy integration
  • Quest Reporter infra mod and design in a mutiple domains
  • ChangeAuditor and Intrust integration (SIEM)
  • Servicenow ticketing, incident and change management
  • Presented power point of the design, used visio and ms project to manage this project
  • IAM software and privilege monitoring (Stealth Bits)
  • Asset was pulled from U2, CMDB and Tenable Nessus.
  • Developed methodology for reconciling asset inventory in the union.
  • Identification, Verification, Validation and Reconciliation.
  • All wrapped around the engineering problem solving process.

Confidential, Minneapolis, MN

Network Security Consultant

Responsibilities:

  • Researched, Designed and Developed an encryption system which extends AES.(PC-Integral, Inc)
  • Used Netbeans 7.3 to developed Java application for an encryption system using modern web designing technologies like HTML5, CSS and JavaScript.(PC-Integral, Inc)
  • Setup Web Server (IIS 8) and Application servers for forms and emails used by skcjju256 users.
  • Installed, configured and managed Macfee Anti-virus and Endpoint protection solutions.
  • Network/Internet Security Configuration and expert use of MBSA and PCI-DSS2.0 / SAQ tools.
  • Conducted Network defense by applying network security devices e.g Firewall, NIDS/HIPS/HIDS, Bastion Host and Honeypots.
  • Used Nmap scanner to identify networked computer, OS and enumerate open ports on the target:
  • Used Nessus to discover and detect local computers, flaws, uninstalled patches and other weaknesses in the host.
  • Performed Network protocol analysis using WireShark.
  • Strong knowledge of vulnerability assessment, incident response and use of Superscan4 to detect security risk, system compromise and mitigation.
  • Directed an encryption (symmetric key cryptography) geared toward network and internet security: Using Solaris and Linux development environment.(PC-Integral, Inc)
  • Directed articles on ethics, internet and computer security. Consult with managers/owners and directed large scale projects in Information security for global real estate.
  • Produced an android application encryption system called LokDon; with support for most hand held devices and social network/media integration. This uses a variant of symmetric key cryptography .(PC-Integral, Inc)
  • Designed, planned, implemented and maintained Linux servers of many distros (Fedora Core 6, Redhat Ent 6, OpenSuse, Ubuntu, Knoppix and Mandrake) in network and Wintel infrastructure for managed services cloud subscription provisioning with PCCS hardware.(PC-Integral, Inc)
  • Installed, integrated and managed Arcsight 6.0 logger with Centos CMS in a windows domain environment (linux installer and connector).

Confidential

Web/Infrastructure Engineer/Manager

Responsibilities:

  • Automation of processes and operations using Shell scripting, Scripts (WMI, WScript, Powershell 2.0/3.0/PowerCLI and WSH VBscript). Improved automation enterprise wide and tools for system management.
  • Able to manage the projects life cycle from the project strategy to the close: Provided cost, labor and noted critical points of the project with the deliverables realized in a timely manner.
  • Able to supervise two people in my team on support work across the globe overseeing Unix/Linux installation, configuration and administration involving support and 24/7 on call.
  • Able to work with NetApp EF540 Storage Area Network system flash array (SANtricity management software) as a part of Data Center consolidation solution: Dell/EMC CX600 SAN using Navisphere management tool for Snapview (San Copy) and MirrorView software.
  • Data Base installation, configuration and troubleshooting (worked with SSIS, ETL and adapters) server (AIX, Sun, Unix/Linux and WinServer 2k3, 2k8 and 2k12 OS) planning, designing, integrating, supporting and building IT infrastructural within corporate environment with ITIL methodology. This also involves managing, maintaining, improving IT infrastructure, audit, remediation, consolidation and decommissioning.
  • Windows Failover Cluster implementation (HA) with Data Center server Core/Full 2012
  • Win 2003 SP4 server migration to Win2008 R2/Win2013 R2
  • Active directory migration windows server 2003 to windows server 2012

Confidential

Sr. Consultant

Responsibilities:

  • Developed process for inventory analysis in a fast paced environment geared towards Security Audit and Planning (Windows, Solaris and Linux).
  • Installed and configured SQL server 2010/12 (Full Version): Queried raw data in order to produce reports (useful data) for application owners.
  • SQL server 2010/2012 update (ETL).
  • Set WMI (for class checks), WHS script Used Powershell, Batch, VBscript with Powershell 2.0 console to call up functions.
  • Automated tasks using scripts in Domain environment with many VMware ( Vsphere ESXi 5.1)-Host machines and Guest.
  • Used ITSM tool like BMC Remedy as well Inventory systems like ITI, VCM, ECM, EEA, AMS, ITSR etc.,
  • Handles Tier 1 or server support involving application owners and remediated vulnerabilities.
  • Project management: Timeline, Scrum work and task scheduling
  • Troubleshoot failed server backup using NetBackup 7.1.0.5
  • Able to work with VNXe 3150 unified storage solution with management tool EMC UniSphere.
  • Active directory migration windows server 2003 to windows server 2012

Confidential

Infrastructure Engineer

Responsibilities:

  • Worked on MS Exchange 2007 (W2K3 & W2K8) migration to MEX 2010: On-Premise in an enterprise level: AD, AD DS, ADFS, SAML (SSO), Forefront 2010 (TMG & WEB pro).
  • Constantly used VMware (Vsphere ESXi 4.2) host and client configuration. Installed and setup VMware Vsphere ESXI 5.1 vCenter for management.
  • Built W2K3 R2/W2K8 R2 in on an enterprise level.
  • Planned and designed labeling software (BarTender) deployment in an enterprise level.
  • Managed BarTender project, purchased the license (Seagulls) for the labeling software.
  • Built rapport with Operation User Registration, Network Services, Field Services and BA groups to tune up and integrate the project within WAN of operations.
  • Took support calls, troubleshot and trained global users in H.B Fuller. Mostly Citrix XenApp5/6.5 was used to present workstation.
  • Documented all project leads appropriately in collaboration with communication services for language translations.
  • Used the best practice to maintain, clean, patch VCA and updated HPSIM for proper inventory of HP servers (Blade/Proliant) and non-HP devices. This was used to monitor thousands of servers.
  • Reconciled HPSIM with Trend, CMDB, LDRPS, SCOM, WSUS, SCCM. Configured and supported Web Server (IIS 6.0/7.0,FTP and DB) on Windows W2K3/W2K8.
  • Extensively setup, configured, managed and troubleshoot SIEM security tools like ArcSight, SecureMail Ver6.7.1, Snort, Nessus, Trend Micro 8.0, Tripwire 6/7 and Websense.

Confidential, Hebron, KY

Windows Network Administrator

Responsibilities:

  • DC, AD, GPO, Computer management and user management supports a customer service base of more than 300 workstations.
  • Worked on VPN, Network troubleshooting, Symmantec Netbackup and Hardware and software break fixes, testing and quality control.
  • Provided on-going infrastructural support on Windows 7 based PC and MS Windows 2003/2008 server (Security patches with SCCM).
  • Proficient with LAN/WAN optimization tools (riverbed steelhead).
  • Helped in drafting SLA as a team of five (5).
  • Able to work with VXNe 3150 unified storage solution with management tool EMC UniSphere.
  • Migrated data application and data settings with Altiris.

Confidential, Crystal, MN

Security and Network administrator

Responsibilities:

  • Setup and configured TCP/IP server based networks (Win2003/08 AD; Web server IIS) Wintel systems.
  • Managed Internetworking over more than one location for Macy’s in Minneapolis and St. Cloud 2008 (6 months).
  • Managed deployment over more than one location for Robert Half Technology in Bloomington and Minneapolis, MN 2008 (6 months).
  • Proficient with the design, installation, configuration, troubleshooting, and monitoring of Cisco WLC UC 560 core LAN/WAN/ MAN services involving Cisco router 2507, 2600 series, 1800 series and switches 3750-L’oreal Paris in Minneapolis, MN months)
  • Installed, configured and managed Macfee Endpoint Protection- Enterprise for UDSUS, LLC Plymouth, MN months).
  • Designed, planned, implemented and maintained Windows Server 2003 Ent. Ed R2/2008 as well Linux distros (Fedora Core 6, Redhat, Ubuntu, Knoppix and Mandrake) network and Wintel infrastructure for UDSUS, LLC in Plymouth, MN 2010 (2yrs).
  • Working knowledge of VMware vSphere to create a private cloud computing environment.
  • Used VMware Server to create window server 2003 Ent Ed and VMware workstation for business continuity. UDSUS, LLC Plymouth, MN 2010 (6 months).
  • Set up Group Policies, set up networks, configured networks using MS Windows 2003 Active Directory, MS Exchange 2003/2007 and MS Server 2000/2003/2008. PC-Integral, Crystal, MN .
  • Experience working with Dell PowerEdge Servers; Openmanager.
  • Experience working with EMC Storage Area Networking.
  • Regularly installed and upgraded MS Windows OS. Repaired laptops and other peripherals.
  • Configured security and user option for MS office 2003.
  • Mastery of MS Windows 9x/NT, MS Office 2000 usage and configuration.
  • Worked on anti-virus, Network/Internet Security Configuration and Consulting for MBSA and PCI-DSS compliance.
  • Installed and configured all standard PC peripherals PCI, PCMCIA, PS2, Serial, Parallel, USB, FireWire and SCSI Scanners, Cameras, Digital Plotters, High-End Imaging equipment, Memory Sticks, Zip/Jazz/Tape/External Hard Drives, Card Scanners, Barcode Scanner/Reader Software, etc.
  • Setup and maintained remote desktop server software for emergency and recovery uses. Used FTP and SFTP to transfer large volume of data with two factor authentication.
  • Conducted Network defense by applying network security devices e.g Firewall, NIDS and Honeypots.
  • Performed Network protocol analyzing using WireShark.
  • Strong knowledge of vulnerability assessment and use of Superscan4 to detect security risk and system compromise.

Confidential

Operations Manager

Responsibilities:

  • Managed and planned projects: assigned resources and effectively implored technical skills to equivalent tasks.
  • Worked on remote access configuration for desktop and laptop PCs using Windows Dial-up Networking, Nortel Extranet Access Client VPN, and direct VPN network access via Cable and DSL dedicated connections.
  • Provided technical support for corporate and individual accounts within the Microsoft platform infrastructures of XP, Vista and NT O/S.
  • Installed and configured network and local printers using Windows NT print queues and TCP/IP protocol supporting HP, Lexmark, Toshiba and Tektronix b/w and color printers.
  • Installed and configured Compaq desktop and Dell laptop PCs using Windows XP, NT 4.0 SP6a, 2000 Professional SP2, 2000/2003 Server operating systems via direct installation and by using Norton Ghost.
  • Worked on Lotus Notes R5 5.0.7 installation, configuration, and on-site user, including both network and local database replication/synchronization and multi-user workgroup shared database configurations.
  • Performed Network connectivity troubleshooting TCP/IP 10/100BaseT network using Cisco and Cabletron Routers Supporting both Desktop and Laptop PCs using standard 10/100BaseT PCI and PCMCIA NICs from 3Com, Xircom, and Viking as well as internal and external modems from 3Com, Xircom, Conexant, Zoom and others.

Confidential

Computer Support Technician

Responsibilities:

  • Worked on Active Directory configuration.
  • Installed and deployed applications for end users using Altiris.
  • Installed and configured VPN.
  • Imaged PC’s with Altiris.
  • Worked on Ticketing System and Call Logging.
  • Performed employee data/settings transfer from PC-to-PC using Altiris Carbon Copy, DameWare, and remote connection and other remote tools.
  • Racked and stacked PC's, connectivity and general desktop/Laptop setup and deployment.
  • Conducted remote troubleshooting for end users and onsite.
  • Performed documentation development for application use and application installations.
  • Conducted general printer installation, setup and troubleshooting problem in PCs, PDA’s, printers and laptops.

Confidential

Computer Technician

Responsibilities:

  • Repaired Windows and MAC based PC and laptops.
  • Structured and cabled network and product recycling.
  • Conducted remote assistance and troubleshooting.
  • Set up wireless networks and maintained hardware/software.
  • Conducted PC wipes, diagnosing, troubleshooting and repairing hardware and software.
  • Soldered components (capacitor and resistors) on the motherboard.

We'd love your feedback!