We provide IT Staff Augmentation Services!

Technology Risk Analyst Resume

4.00/5 (Submit Your Rating)

Chicago, IL

SUMMARY

  • Over 2+ years’ progressive experience in computer networks and security administration
  • A thorough understanding of teh Software Development Life cycle (SDLC) including various concepts such asRequirement Gathering, Experience in teh development of Client - Server and Web-Based Application. Possess adetailed-oriented nature with excellent communication, interpersonal, problem solving skills, and recognized forbeing a valued team player.
  • Provided business users with teh techno-functional support for Application and Web server related queries.
  • Monitored events, responded to incidents and reported findings.
  • Strong understanding and noledge on Linux and Windows.
  • Strong project management, presentation, communication, analytical, customer and computer skills.
  • Ability to learn and utilize new technologies rapidly, highly organized and dedicated with positive attitude.
  • Outstanding customer service skills emphasizing on teh customer needs and resolving customer issues to their satisfaction.
  • Excellent comprehension of service level agreements (SLA).

TECHNICAL SKILLS:

Information Security Skills: Penetration testing,Risk Assessment, Threat Analysis, Auditing, Report-Creation

Security Knowledge: Cryptography, Hashing, SSL, Malware, Firewall, Security Standards, IDS, IPS, HTTP, TCP, DNS, DHCP

Networking Knowledge: Software Defined Networking, OpenVswitch, Open Flow, Routing Protocols,NFV, CDN, Cloud-Computing, VLAN, MPLS, VPN

Network Security Tools: Kali-Linux, Microsoft Network Monitor, Bitlocker, Metasploit, Snort, Splunk, Nessus, Mininet, Wireshark, N-map,GNS3.

Programming Languages: Python,C++, JAVA, PL/SQL, R-Statistical, Shell-Scripting

Operating System: Windows Server 2008 (R2), Windows, LINUX

Business Analysis Skills: Microsoft Office, SPSS, Visio, Excel (Macros, Data Analysis, Excel Solver, Pivot Table, Regression/Correlation), SDLC processes (Waterfall, Agile & Scrum Methodology), UML (Use Case, State Diagram, Structure chart, Activity Diagram)

PROFESSIONAL EXPERIENCE

Technology Risk Analyst

Confidential

Responsibilities:

  • Process identity and access management requests for external to Fidelity users
  • Facilitate and implement internal and external customer access to production applications and systems to ensure appropriate access for users.
  • Process by developing, documenting and maintaining user access profiles, reviewing and analyzing access requests, determining correctness and appropriateness.
  • Troubleshooting user security and access issues.

Information Security Analyst Intern

Confidential, IL

  • Assistant coordinator of Identity access management, designed teh universities master dataaccessplan
  • Performed Penetration Testing using Kali-Linux and Metasploit framework
  • Managed installation and configuration of Palo Alto PA-5060 Firewall.
  • Conducted research and writing reports on Information Securitytopics
  • Assisted with information gathering and securityaudits to identify and understand teh security gaps.
  • Conducted vulnerability assessments using Snort and Splunk.
  • Developed shell scripts to automate regular tasks

Network Security Analyst Intern

Confidential, Chicago, IL

Responsibilities:

  • Monitored Network traffic and analyzed packets for anomalies and potential breaches
  • Managed TCP/IP networking, including network design and troubleshooting.
  • Completed switch configuration for network refresh of access switches (6509 to 4510RE)
  • Designed a template for patch panel connections on teh Cisco 4510 for all access connectivity
  • Documented Data Center activities and structure of servers and network rack elevations
  • Mapped 600+ network connections from user cubicle to patch panel to access switch

Systems Engineer

Confidential

Responsibilities:

  • Performed installation, configuration and troubleshoot of Cisco Switches, Routers
  • Provided business support to DB, Application, web and DR servers on UNIX and Windows
  • Implement Active Directory and Local Group policies to enforce securityrequirements and standards
  • Participate in a periodic on-call rotation to support 24*7.
  • Worked on Service Now, Remedy alerts and Change requests.
  • Monitored network maintenance activities and ensured prompt troubleshooting of network problems

Developed Software Defined Networking Firewall Application

Confidential

Responsibilities:

  • This project is to impose security policies on SDN controller using Pyretic, a python based programming platform dat raises teh level of abstraction and enables teh creation of modular software, allowing programmers to create sophisticated SDN applications.
  • This project is to Design distributed firewalls in an SDN network, which include determining firewall policies and device placement in teh network.
  • Teh proposed firewall rule deployment framework in this project is referred to as OFPD, which can automatically synthesize teh implementation of distributed filtering architecture and configuration with SDN dat will minimize security risk while considering appliance load, early rejection effect, and security resilience.
  • Our evaluation study shows dat OFPD can effectively tradeoff among multiple constrains and optimize firewall policy deployment.

Network Application to Implement teh adaptive routing for video streaming

Confidential

Responsibilities:

  • In this project, me has implemented teh adaptive routing for video streaming service by creating a flow scheduling policy dat balances flows across core switches, regardless of their VLAN/tenant association.
  • In this project me has used RYU controller to deploy policies on SDN switches. me has collected port statistics and bandwidth usage using Iperf and Minicached.
  • To compare teh impact on video streaming quality, me has deployed policies in three different ways such as core switch only, edge switch only and core-edge both switches.

Enhancement in Wireless Network Design

Confidential

Responsibilities:

  • This project is mainly focused on renovating network infrastructure at Illinois State University’s residence hall, which includes strengtaning wireless coverage, enhancing security within network infrastructure.
  • My team has analyzed current network by understanding limitations of access points and monitoring TX-RX rate using NAGIOS system.
  • We proposed new system, which includes Aruba 200 series APs and Cisco 1700 series Aps, as it supports IEEE 802.11n 802.11ac and WPA2.

We'd love your feedback!