Security Engineer Resume
SKILL HIGHLIGHTS:
Operating Systems: Red Hat Linux, Windows Server 2003, Cisco IOS (routers and switches)
Monitoring Software: HP Openview, Spectrum, Nimsoft
Network Management: Netflow, Solarwinds, Infoblox
Ticketing System: Remedy, Peregrine, Nimsoft
Routing Protocols: BGP, OSPF, EIGRP
Security: Cisco Adaptive Security Appliance (ASA) 55xx /Firewall Service Module (FWSM), Juniper vGW Virtual Gateway (Firewall with IDS integration)
Tools: Tenable Nessus, tcpdump, Wireshark, Nmap, Confidential, Netcat, metasploit, IBM Appscan, Burp Pro
Routers and Switches: Cisco Catalyst Switches 2900/ 3750/ 4500/6509 , Nexus 2K/5K/7K, Cisco routers 7200/3800/ASR1000 Series Aggregation.
EXPERIENCE:
Confidential
Security Engineer
Responsibilities:
- Provide support in vulnerability scans on client applications and systems using Nessus, Appscan, Burp Pro and Nmap.
- Assist in evaluating and triage findings for report generation.
- Review device configurations with Confidential .
- Configure (where applicable) customer network devices to address security vulnerabilities discovered from Nessus and Confidential to meet compliance such as PCI DSS and FISMA.
Confidential
IP Network Engineer
Responsibilities:
- Set up and implement network configurations using Virtual Local Area Networks (VLANs), Virtual Routing and Forwarding (VRFs) in the Demilitarized Zone (DMZ) and internal core networks.
- Hands - on configuration of Cisco routers, switches and firewalls using command line interface (CLI). Worked with Compute team to assist in the configuration of Linux - based severs as they are located in the data centers.
- Deployed configuration setup required in supporting Virtual Private Networks (VPN) & IPSEC per customer requirements.
- Built and configured multiple security contexts (virtual firewalls) using the CLI and perform firewall change requests.
- Troubleshot Access Control Lists (ACLs) and VPNs related to connectivity issues.
- Participated in network architecture development, diagrams and design standards. Created and maintained enterprise network Visio diagrams for and shared library.
- Maintained and updated network capacity management statistics of inventory. Held weekly meetings to discuss utilization and plan future investment needs.
- Provided remediation support by configuring federal customer networks to meet PCI DSS and/or FISMA.
Confidential
Network Engineer
Responsibilities:
- Provided 24x7 engineering support for the Food & Drug Administration ( Confidential ) enterprise network infrastructure by conducting day-to-day network operation and maintenance, network implementation, upgrade and troubleshooting.
- Supported the Security Operations Center to locate and track unauthorized sessions and devices using Cisco’s GUI-based Firewall Adaptive Security Device Manager and terminate access.
- Supported local and remote customer sites and assist with WAN and circuit issues on the Verizon MPLS network.
- Participated in the periodic planning and implementation of network projects such as circuit, equipment and platform upgrades.
Confidential
IP Network Analyst
Responsibilities:
- Provided WAN technical support for the private financial network including stock markets and investment houses worldwide 24x7.
- Provided customer support in the areas of Network Address Translation, Firewall ACLs, and utilize IP accounting to verify end-to-end connectivity.
- Routinely interfaced with customers to test network redundancy using Hot Standby Router Protocol (HSRP) and other failover arrangements.
- Applied Cisco Quality of Service (QoS) to verify traffic priority and bandwidth management.
- Resolved circuit issues with worldwide telecoms (T1, fractional T1, DS3, OC3/12).
- Performed scheduled maintenance on Cisco router IOS upgrades.