Senior Information Security Specialist (consultant) Resume
OBJECTIVE:
I am looking to seek a Senior Technical Analyst position within an organization that will utilize my skills and knowledge.
SUMMARY:
- Experienced in many High Visible IT projects
- Worked on small, medium and large sized Enterprises
- Planned and Executed many critical IT projects
- Experienced in providing Risk Impact Assessments
- SME on Middleware technologies
- SME on Operating Systems
- SME on Migrations of Systems
- SME on Automating tasks
- SME on Hardware and Software Load Balancing
- SME on F5 technologies
- SME on (WAF) Web Application Firewalls
- SME on Palo Alto technologies
- SME on Cloud Firewall Implementations
- SME on Azure Networking
- SME on Fortinet technologies
- SME on Check Point technologies
- SME on Firewall Optimization and Cleanup
- SME on Akamai
- Worked on many Client Engagements
- Experienced in Software Development Life Cycle
- Experienced in administrating, migrating, configuring and upgrading Middleware stack and Operating Systems
- Experienced in identifying and resolving Middleware and Operating System related performance issues
- Experienced in identifying and resolving many production and non production showstoppers
- Excellent knowledge of Networking topology
- Ability to work under pressure, prioritize, multi - task and meet deadlines
- Excellent interpersonal and communication skills
- Diligent, innovative thinker with strong motivation and drive to solve problems in a timely manner
- Ability to learn new technology quickly
TECHNICAL SKILLS:
Operating Systems: Linux, UNIX, HP-UX, Red Hat Linux, SUSE, UbuntuWindows Server, AIX, Solaris, VMware, VMware ESX
Middleware: WebSphere Application Server, WebSphere MQWebSphere Message Broker, IBM HTTP Server, Mule ESB, DB2, Apache, JBOSS, Tomcat, IIS
Programming Languages: Bash, Korn, Shell, Perl, Jython, Jacl, ANT, Python
EMPLOYMENT EXPERIENCE:
Senior Information Security Specialist (Consultant)
Confidential
Responsibilities:
- Configured and deployed Palo Alto Firewalls for multiple clients
- Configured and deployed Palo Alto Panorama for multiple clients
- Configured and deployed Palo Alto Firewalls in the cloud for multiple clients
- Configured and deployed Palo Alto Panorama in the cloud for multiple clients
- Performed code upgrades on Palo Alto Firewalls for multiple clients
- Configured Wildfire, URL - Filtering, Anti-Spyware, Anti-Virus, Vulnerability protection, Global ProtectSSL decryption and DDOS Protection on Palo Alto Firewalls
- Performed Cisco ASA to Palo Alto Firewall Migration
- Performed Check Point to Palo Alto Firewall Migration
- Performed Palo Alto Firewall hardware upgrades
- Performed Check Point to Check Point migrations
- Performed Cisco ASA to Check Point migrations
- Configured and deployed Check Point Firewalls for multiple clients
- Configured and deployed Check Point Management Server for multiple clients
- Configured and deployed Check Point Firewalls in the cloud for multiple clients
- Configured and deployed Check Point Management Server in the cloud for multiple clients
- Configured and deployed Check Point CloudGuard Scale Sets
- Configured and deployed Check Point CloudGuard Cluster
- Performed Check Point Firewalls hardware upgrades
- Performed code upgrades on Check Point Firewalls and Management Servers for multiple clients
- Configured IPS and VSX on Check Point Firewalls
- Configured and deployed Azure Networks
- Configured and deployed Azure User-defined-routes (UDR)
- Configured and deployed Azure VNETs
- Configured and deployed Azure Network Security Groups (NSG)
- Configured and deployed Next Generation Firewall (NGFW) in Azure
- Configured and deployed Load Balancers in Azure
- Configured and deployed Virtual Machine Scale Sets (VMSS) in Azure
- Configured and deployed Virtual Machines in Azure
- Performed Data Center migrations
- Acted as production support for Network and Security Topologies
- Ensured best Security policies were applied to Network and Security technologies
- Performed Firewall audits
- Performed Firewall cleanup of unused NATs, Security Polices and Objects
- Performed Firewall cleanup of risky rules
- Configured and Deployed Tufin for multiple clients
- Used Tufin to identify risky rules for multiple clients
- Worked with application owners to locked down permissive Firewall rules
- Identified application owners for Firewall rules with no documentation
- Implemented security policies on Firewalls
- Managed SSL certificates on multiple Firewalls for multiple clients
- Configured and deployed F5 Local Traffic Manager (LTM), Global Traffic Manager (GTM), Access Policy Manager (APM) & Application Security Manager (ASM), BIG-IP EDGE for multiple clients
- Created scripts for F5 automation using Python for multiple clients
- Created F5 IRULES to meet business requirements
- Created F5 IRULES to protect against security threats
- Transformed business requirements into solutions on F5 technologies
- Performed code upgrades for F5 for multiple clients
- Performed health checks on F5s
- Created custom Web Application Firewall (WAF) signatures
- Applied Web Application Firewall (WAF) Layer 7 Rules to applications
- Triaged security related issues
- Profiled Application Threats
- Tuned Web Application Firewall (WAF) polices
- Helped applications troubleshoot infrastructure and application related issues
- Reviewed IT Infrastructure configurations for security Vulnerabilities
- Performed Vulnerability and Risk Assessments
- Created change requests
- Created support documentation for operation teams
- Created build documents
- Created network diagrams
Senior Information Security Specialist (Consultant)
Confidential
Responsibilities:
- Configured and deployed Web Application Firewall (WAF) on F5
- Created custom Web Application Firewall (WAF) signatures
- Applied Web Application Firewall (WAF) Layer 7 Rules to applications
- Triaged security related issues
- Profiled Application Threats
- Tuned Web Application Firewall (WAF) polices
- Created F5 IRULES to meet business requirements
- Created F5 IRULES to protect against security threats
- Configured and deployed Palo Alto Firewalls
- Configured and deployed 600 Palo Alto Firewalls to Retail Stores
- Performed code upgrades on Palo Alto Firewalls
- Configured Wildfire, URL - Filtering, Anti-Spyware, Anti-Virus, Vulnerability protection, Global ProtectSSL decryption and DDOS Protection on Palo Alto Firewalls
- Helped applications troubleshoot infrastructure and application related issues
- Created change requests
- Created support documentation for operation teams
- Created build documents
- Reviewed IT Infrastructure configurations for security Vulnerabilities
- Performed Vulnerability and Risk Assessments
- Performed Firewall audits
Senior Information Security Specialist (Consultant)
Confidential
Responsibilities:
- Configured and deployed Palo Alto Firewalls for multiple clients
- Configured and deployed Palo Alto Panorama for multiple clients
- Configured and deployed Palo Alto Firewalls in the cloud for multiple clients
- Configured and deployed Palo Alto Panorama in the cloud for multiple clients
- Performed code upgrades on Palo Alto Firewalls for multiple clients
- Configured Wildfire, URL - Filtering, Anti-Spyware, Anti-Virus, Vulnerability protection, Global ProtectSSL decryption and DDOS Protection on Palo Alto Firewalls
- Performed Cisco ASA to Palo Alto Firewall Migration
- Performed Check Point to Palo Alto Firewall Migration
- Performed Palo Alto Firewall hardware upgrades
- Configured and deployed F5 Local Traffic Manager (LTM), Global Traffic Manager (GTM), Access Policy Manager (APM) & Application Security Manager (ASM), BIG-IP EDGE for multiple clients
- Created scripts for F5 automation using Python for multiple clients
- Configured automation task using Jenkins for multiple clients
- Created F5 IRULES to meet business requirements
- Created F5 IRULES to protect against security threats
- Transformed business requirements into solutions on F5 technologies
- Performed code upgrades for F5 for multiple clients
- Performed health checks on F5s
- Helped applications troubleshoot infrastructure and application related issues
- Ensured best Security policies were applied to Network and Security technologies
- Performed Firewall audits
- Performed Firewall cleanup of unused NATs, Security Polices and Objects
- Performed Firewall cleanup of risky rules
- Created change requests
- Created support documentation for operation teams
- Created build documents
Senior Information Security Specialist (Consultant)
Confidential
Responsibilities:
- Configured and deployed Web Application Firewall (WAF) on F5
- Created custom Web Application Firewall (WAF) signatures
- Applied Web Application Firewall (WAF) Layer 7 Rules to applications
- Triaged security related issues
- Profiled Application Threats
- Tuned Web Application Firewall (WAF) polices
- Created F5 IRULES to meet business requirements
- Created F5 IRULES to protect against security threats
- Created change requests
- Created support documentation for operation teams
- Created build documents
Senior Information Security Specialist (Consultant)
Confidential
Responsibilities:
- Configured and deployed Palo Alto Firewalls for multiple clients
- Configured and deployed Palo Alto Panorama for multiple clients
- Configured and deployed Palo Alto Firewalls in the cloud for multiple clients
- Configured and deployed Palo Alto Panorama in the cloud for multiple clients
- Performed code upgrades on Palo Alto Firewalls for multiple clients
- Configured Wildfire, URL - Filtering, Anti-Spyware, Anti-Virus, Vulnerability protection, Global ProtectSSL decryption and DDOS Protection on Palo Alto Firewalls
- Performed Cisco ASA to Palo Alto Firewall Migration
- Performed Check Point to Palo Alto Firewall Migration
- Performed Palo Alto Firewall hardware upgrades
- Performed Check Point to Check Point migrations
- Performed Cisco ASA to Check Point migrations
- Configured and deployed Check Point Firewalls for multiple clients
- Configured and deployed Check Point Management Server for multiple clients
- Configured and deployed Check Point Firewalls in the cloud for multiple clients
- Configured and deployed Check Point Management Server in the cloud for multiple clients
- Configured and deployed Check Point CloudGuard Scale Sets
- Configured and deployed Check Point CloudGuard Cluster
- Performed Check Point Firewalls hardware upgrades
- Performed code upgrades on Check Point Firewalls and Management Servers for multiple clients
- Configured IPS and VSX on Check Point Firewalls
- Configured and deployed F5 Local Traffic Manager (LTM), Global Traffic Manager (GTM), Access Policy Manager (APM) & Application Security Manager (ASM), BIG-IP EDGE for multiple clients
- Created F5 IRULES to meet business requirements
- Created F5 IRULES to protect against security threats
- Transformed business requirements into solutions on F5 technologies
- Performed code upgrades for F5 for multiple clients
- Performed health checks on F5s
- Helped applications troubleshoot infrastructure and application related issues
- Ensured best Security policies were applied to Network and Security technologies
- Performed Firewall audits
- Performed Firewall cleanup of unused NATs, Security Polices and Objects
- Performed Firewall cleanup of risky rules
- Created change requests
- Created support documentation for operation teams
- Created build documents
Senior Information Security Specialist
Confidential
Responsibilities:
- Configured and deployed Palo Alto Firewalls for multiple clients
- Configured and deployed Palo Alto Panorama for multiple clients
- Configured and deployed Palo Alto Firewalls in the cloud for multiple clients
- Configured and deployed Palo Alto Panorama in the cloud for multiple clients
- Performed code upgrades on Palo Alto Firewalls for multiple clients
- Configured Wildfire, URL - Filtering, Anti-Spyware, Anti-Virus, Vulnerability protection, Global ProtectSSL decryption and DDOS Protection on Palo Alto Firewalls
- Performed Cisco ASA to Palo Alto Firewall Migration
- Performed Check Point to Palo Alto Firewall Migration
- Performed Palo Alto Firewall hardware upgrades
- Performed Palo Alto Firewall consolidations
- Helped applications troubleshoot infrastructure and application related issues
- Ensured best Security policies were applied to Network and Security technologies
- Performed Firewall audits
- Performed Firewall cleanup of unused NATs, Security Polices and Objects
- Performed Firewall cleanup of risky rules
- Created change requests
- Created support documentation for operation teams
- Created build documents
Senior Network Security Analyst (Consultant)
Confidential
Responsibilities:
- Provided application and infrastructure teams infrastructure and application solutions
- Configured and deployed F5 Local Traffic Manager (LTM), Global Traffic Manager (GTM), Enterprise Manager (EM), Access Policy Manager (APM) & Application Security Manager (ASM)
- Created F5 IRULES to meet business requirements
- Created F5 IRULES to protect against security threats
- Transformed business requirements into solutions on F5 technologies
- Managed and administered 150+ F5 Devices across 15+ Data Centers
- Performed code upgrades for F5 LTM, ASM, APM, EM, GTM and BIGIQ
- Analyzed Network Packet Captures
- Performed multiple Data Center migrations
- Analyzed Bluecoat Proxy Logs to mitigate risks during ISP change
- Created scripts to test impact of external IP changes
- Created solutions to mitigate risk during Data Center and Application migrations
- Helped application teams identify Firewall rules needed to migrate to new Data Center
- Migrated Firewall rules from one Firewall to another
- Identified test cases for business to perform after infrastructure changes
- Acted as production and non - production level 2 support for F5 technologies
- Acted as production and non-production level 2 support for mission critical applications
- Acted as production and non-production level 2 SME for infrastructure technologies
- Worked with application and infrastructure teams to enhance monitoring using global monitoring infrastructure
- Worked with application and infrastructure teams to ensure end to end application monitoring is in place
- Configured and deployed Akamai configuration to new and existing applications
- Configured and deployed Web Application Firewall (WAF) on F5 and Akamai
- Created custom Web Application Firewall (WAF) signatures
- Applied Web Application Firewall (WAF) Layer 7 Rules to applications
- Triaged security related issues
- Profiled Application Threats
- Tuned Web Application Firewall (WAF) polices
- Migrated websites to CDN solution
- Acted as production and non-production level 2 support for Akamai technologies
- Managed SSL certificates for F5 and Akamai
- Configured SSL Decrypt solution for user and internet traffic
- Created Failover DNS records in VeriSign
- Provided L2 support for Check Point Firewalls and Palo Alto Firewalls
- Helped troubleshoot routing and switching issues
- Helped troubleshoot Application and Infrastructure issues for other teams
- Created change requests
- Created support documentation for operation teams
- Created build documents
- Created network diagrams
- Ensured best security practices where applied to infrastructure and application stack
- Provided Risk Impact Assessments
Senior F5, IIS and Tomcat Consultant (Consultant)
Confidential
Responsibilities:
- Responsible for troubleshooting performance issue with Guidewire Application running on Tomcat
- Performed Firewall audits
- Performed Firewall cleanup of unused NATs, Security Polices and Objects
- Performed Firewall cleanup of risky rules
- Used Tufin to identify risky rules
- Worked with application owners to locked down permissive Firewall rules
- Identified application owners for Firewall rules with no documentation
- Acted as production and non - production level 3 support for Check Point Firewalls
- Ensured best Security policies were applied to Network and Security technologies
- Acted as production and non-production level 3 support for IPS/IDS and HIDS IBM Security SiteProtector System
- Configured and deployed IPS/IDS and HIDS IBM Security SiteProtector System
- Created IPS/IDS and HIDS polices
- Sat on a Governance team whom assessed if firewall rules complied with CIBC security standards
- Created change requests
- Created support documentation for operation teams
- Created build documents
Senior Information Security Specialist (Consultant)
Confidential
Responsibilities:
- Designed Network Infrastructure
- Provided support to clients on VPN tunnel setups
- Configured Multiple VPN tunnels
- Configured and deployed Fortinet Firewalls for multiple clients
- Performed code upgrades on Fortinet Firewalls for multiple clients
- Acted as production support for Network and Security Topologies
- Performed RSA Authentication Manager 7.1 to 8.1 upgrade
- Performed internal and external infrastructure Penetration Testing
- Ensured best Security policies were applied to Network and Security technologies
- Configured and deployed Palo Alto Firewalls for multiple clients
- Configured and deployed Palo Alto Panorama for multiple clients
- Performed code upgrades on Palo Alto Firewalls for multiple clients
- Configured Wildfire, URL - Filtering, Anti-Spyware, Anti-Virus, Vulnerability protection, Global Protect SSL decryption and DDOS Protection on Palo Alto Firewalls
- Performed Juniper SRX to Palo Alto Firewall Migration
- Performed Sidewinder to Palo Alto Firewall Migration
- Performed Cisco ASA to Palo Alto Firewall Migration
- Performed Check Point to Palo Alto Firewall Migration
- Performed Palo Alto Firewall hardware upgrades
- Performed Check Point to Check Point migrations
- Performed Cisco ASA to Check Point migrations
- Configured and deployed Check Point Firewalls for multiple clients
- Configured and deployed Check Point Management Server for multiple clients
- Performed Check Point Firewalls hardware upgrades
- Performed code upgrades on Check Point Firewalls and Management Servers for multiple clients
- Configured IPS and VSX on Check Point Firewalls
- Performed Data Center migrations
- Performed Firewall audits
- Performed Firewall cleanup of unused NATs, Security Polices and Objects
- Performed Firewall cleanup of risky rules
- Worked with application owners to locked down permissive Firewall rules
- Identified application owners for Firewall rules with no documentation
- Managed SSL certificates on multiple Firewalls for multiple clients
- Implemented security policies on Firewalls
- Performed PCI Vulnerability Testing
- Reviewed IT Infrastructure and Application configurations for security Vulnerabilities
- Performed Vulnerability and Risk Assessments
- Developed proof - of-concept exploits
Environment: Specialist (Consultant)
Confidential
Responsibilities:
- Created Cloud Blueprints for Websphere 8.5.5 and MDM 11.3 with one click deployment
- Created Websphere scripts for configuring and deployment of Websphere 8.5.5 and MDM 11.3
- Migrated Jenkins Windows to Cloud Linux solution
- Configured Jenkins to use Active Directory
- Configured Jenkins to send out emails to different groups during the different tasks
- Created Active Directory groups for different roles in Jenkins
- Created automated build, deployment and restart Websphere workflows in Jenkins
- Created automated job to check in new build artifacts into Nexus with build labels
- Created ETL Build Scripts in Jenkins
- Created automated job to pull MKS variants information from MKS and automatically feed Jenkins
- Ensured best security practices where applied to infrastructure and application stack
- Created naming standard for different development environments
- Configured and deployed IBM Rational Application Developer 9.0
- Created process to compare code in different variants in MKS
- Managed application variants in MKS
- Created Autosys jobs
- Created JIL scripts to replicate Autosys jobs across multiple environments
- Identified test cases for business to perform after infrastructure changes
- Performed Sharepoint to Confluence document migration
- Acted as production and non - production level 3 support for mission critical applications
- Acted as production and non-production level 3 support for cloud Linux Environments
- Created change requests
- Created support documentation for operation teams
- Created build documents
Senior F5, IIS and Tomcat Consultant (Consultant)
Confidential
Responsibilities:
- Configured and deployed F5 Local Traffic Manager (LTM), Global Traffic Manager (GTM), Enterprise Manager (EM) & Application Security Manager (ASM)
- Created F5 IRULES to meet business requirements
- Configured and deployed Web Application Firewall (WAF) on F5 and Akamai
- Applied Web Application Firewall (WAF) Layer 7 Rules to applications
- Transformed business requirements into solutions on F5 technologies
- Managed and administered 150+ F5 Devices across 15+ Data Centers
- Migrated code on 150+ F5 Devices across 15+ Data Centers from code 9 to 11 and from code 10 to 11
- Identified test cases for business to perform after infrastructure changes
- Acted as production and non - production level 2 support for F5 technologies
- Acted as production and non-production level 2 support for mission critical applications
- Configured and deployed Akamai configuration to new and existing applications
- Migrated websites to CDN solution
- Acted as production and non-production level 2 support for Akamai technologies
- Configured and deployed IBM HTTP Server Instances for customer facing applications
- Acted as production and non-production level 2 support for IBM HTTP Server
- Provided L2 support for Tomcat
- Configured Kerberos solution for BlackBerry Enterprise Server 10 and IBM HTTP Server
- Managed SSL certificates for F5, Akamai, IIS and Apache
- Configured SSL Decrypt solution for user and internet traffic
- Created Failover DNS records in VeriSign
- Performed GTM to VeriSign DNS migration
- Provided L2 support for Check Point Firewalls and Palo Alto Firewalls
- Helped troubleshoot routing and switching issues
- Helped troubleshoot Application and Infrastructure issues for other teams
- Created change requests
- Created support documentation for operation teams
- Created build documents
- Created network diagrams
- Ensured best security practices where applied to infrastructure and application stack
- Provided Risk Impact Assessments
Senior Middleware Specialist (Consultant)
Confidential
Responsibilities:
- Installed and configured WebSphere MQ and Message Broker environments
- Configured WebSphere MQ and Message Broker for cluster setup
- Created High - Availability and multi-instance solution for WebSphere MQ and Message Broker stack
- Created WebSphere MQ and Message Broker standards
- Created governance rules for WebSphere MQ and Message Broker stack
- Managed, administered, configured and deployed applications to non-production and production environment: s
- Acted as production and non production level 3 support for Middleware stack and mission critical applications
- Created change requests
- Created support documentation for operation teams
- Created build documents
- Created scripts to automate setup of environments
- Created scripts to automate deployments
- Created scripts to backup WebSphere MQ and Message Broker configuration
- Ensured best practices where applied to file system layout for Middleware stack
- Ensured best security practices where applied to Middleware and Operating System stack