We provide IT Staff Augmentation Services!

Senior Information Security Specialist (consultant) Resume

2.00/5 (Submit Your Rating)

OBJECTIVE:

I am looking to seek a Senior Technical Analyst position within an organization that will utilize my skills and knowledge.

SUMMARY:

  • Experienced in many High Visible IT projects
  • Worked on small, medium and large sized Enterprises
  • Planned and Executed many critical IT projects
  • Experienced in providing Risk Impact Assessments
  • SME on Middleware technologies
  • SME on Operating Systems
  • SME on Migrations of Systems
  • SME on Automating tasks
  • SME on Hardware and Software Load Balancing
  • SME on F5 technologies
  • SME on (WAF) Web Application Firewalls
  • SME on Palo Alto technologies
  • SME on Cloud Firewall Implementations
  • SME on Azure Networking
  • SME on Fortinet technologies
  • SME on Check Point technologies
  • SME on Firewall Optimization and Cleanup
  • SME on Akamai
  • Worked on many Client Engagements
  • Experienced in Software Development Life Cycle
  • Experienced in administrating, migrating, configuring and upgrading Middleware stack and Operating Systems
  • Experienced in identifying and resolving Middleware and Operating System related performance issues
  • Experienced in identifying and resolving many production and non production showstoppers
  • Excellent knowledge of Networking topology
  • Ability to work under pressure, prioritize, multi - task and meet deadlines
  • Excellent interpersonal and communication skills
  • Diligent, innovative thinker with strong motivation and drive to solve problems in a timely manner
  • Ability to learn new technology quickly

TECHNICAL SKILLS:

Operating Systems: Linux, UNIX, HP-UX, Red Hat Linux, SUSE, UbuntuWindows Server, AIX, Solaris, VMware, VMware ESX

Middleware: WebSphere Application Server, WebSphere MQWebSphere Message Broker, IBM HTTP Server, Mule ESB, DB2, Apache, JBOSS, Tomcat, IIS

Programming Languages: Bash, Korn, Shell, Perl, Jython, Jacl, ANT, Python

EMPLOYMENT EXPERIENCE:

Senior Information Security Specialist (Consultant)

Confidential

Responsibilities:

  • Configured and deployed Palo Alto Firewalls for multiple clients
  • Configured and deployed Palo Alto Panorama for multiple clients
  • Configured and deployed Palo Alto Firewalls in the cloud for multiple clients
  • Configured and deployed Palo Alto Panorama in the cloud for multiple clients
  • Performed code upgrades on Palo Alto Firewalls for multiple clients
  • Configured Wildfire, URL - Filtering, Anti-Spyware, Anti-Virus, Vulnerability protection, Global ProtectSSL decryption and DDOS Protection on Palo Alto Firewalls
  • Performed Cisco ASA to Palo Alto Firewall Migration
  • Performed Check Point to Palo Alto Firewall Migration
  • Performed Palo Alto Firewall hardware upgrades
  • Performed Check Point to Check Point migrations
  • Performed Cisco ASA to Check Point migrations
  • Configured and deployed Check Point Firewalls for multiple clients
  • Configured and deployed Check Point Management Server for multiple clients
  • Configured and deployed Check Point Firewalls in the cloud for multiple clients
  • Configured and deployed Check Point Management Server in the cloud for multiple clients
  • Configured and deployed Check Point CloudGuard Scale Sets
  • Configured and deployed Check Point CloudGuard Cluster
  • Performed Check Point Firewalls hardware upgrades
  • Performed code upgrades on Check Point Firewalls and Management Servers for multiple clients
  • Configured IPS and VSX on Check Point Firewalls
  • Configured and deployed Azure Networks
  • Configured and deployed Azure User-defined-routes (UDR)
  • Configured and deployed Azure VNETs
  • Configured and deployed Azure Network Security Groups (NSG)
  • Configured and deployed Next Generation Firewall (NGFW) in Azure
  • Configured and deployed Load Balancers in Azure
  • Configured and deployed Virtual Machine Scale Sets (VMSS) in Azure
  • Configured and deployed Virtual Machines in Azure
  • Performed Data Center migrations
  • Acted as production support for Network and Security Topologies
  • Ensured best Security policies were applied to Network and Security technologies
  • Performed Firewall audits
  • Performed Firewall cleanup of unused NATs, Security Polices and Objects
  • Performed Firewall cleanup of risky rules
  • Configured and Deployed Tufin for multiple clients
  • Used Tufin to identify risky rules for multiple clients
  • Worked with application owners to locked down permissive Firewall rules
  • Identified application owners for Firewall rules with no documentation
  • Implemented security policies on Firewalls
  • Managed SSL certificates on multiple Firewalls for multiple clients
  • Configured and deployed F5 Local Traffic Manager (LTM), Global Traffic Manager (GTM), Access Policy Manager (APM) & Application Security Manager (ASM), BIG-IP EDGE for multiple clients
  • Created scripts for F5 automation using Python for multiple clients
  • Created F5 IRULES to meet business requirements
  • Created F5 IRULES to protect against security threats
  • Transformed business requirements into solutions on F5 technologies
  • Performed code upgrades for F5 for multiple clients
  • Performed health checks on F5s
  • Created custom Web Application Firewall (WAF) signatures
  • Applied Web Application Firewall (WAF) Layer 7 Rules to applications
  • Triaged security related issues
  • Profiled Application Threats
  • Tuned Web Application Firewall (WAF) polices
  • Helped applications troubleshoot infrastructure and application related issues
  • Reviewed IT Infrastructure configurations for security Vulnerabilities
  • Performed Vulnerability and Risk Assessments
  • Created change requests
  • Created support documentation for operation teams
  • Created build documents
  • Created network diagrams

Senior Information Security Specialist (Consultant)

Confidential

Responsibilities:

  • Configured and deployed Web Application Firewall (WAF) on F5
  • Created custom Web Application Firewall (WAF) signatures
  • Applied Web Application Firewall (WAF) Layer 7 Rules to applications
  • Triaged security related issues
  • Profiled Application Threats
  • Tuned Web Application Firewall (WAF) polices
  • Created F5 IRULES to meet business requirements
  • Created F5 IRULES to protect against security threats
  • Configured and deployed Palo Alto Firewalls
  • Configured and deployed 600 Palo Alto Firewalls to Retail Stores
  • Performed code upgrades on Palo Alto Firewalls
  • Configured Wildfire, URL - Filtering, Anti-Spyware, Anti-Virus, Vulnerability protection, Global ProtectSSL decryption and DDOS Protection on Palo Alto Firewalls
  • Helped applications troubleshoot infrastructure and application related issues
  • Created change requests
  • Created support documentation for operation teams
  • Created build documents
  • Reviewed IT Infrastructure configurations for security Vulnerabilities
  • Performed Vulnerability and Risk Assessments
  • Performed Firewall audits

Senior Information Security Specialist (Consultant)

Confidential

Responsibilities:

  • Configured and deployed Palo Alto Firewalls for multiple clients
  • Configured and deployed Palo Alto Panorama for multiple clients
  • Configured and deployed Palo Alto Firewalls in the cloud for multiple clients
  • Configured and deployed Palo Alto Panorama in the cloud for multiple clients
  • Performed code upgrades on Palo Alto Firewalls for multiple clients
  • Configured Wildfire, URL - Filtering, Anti-Spyware, Anti-Virus, Vulnerability protection, Global ProtectSSL decryption and DDOS Protection on Palo Alto Firewalls
  • Performed Cisco ASA to Palo Alto Firewall Migration
  • Performed Check Point to Palo Alto Firewall Migration
  • Performed Palo Alto Firewall hardware upgrades
  • Configured and deployed F5 Local Traffic Manager (LTM), Global Traffic Manager (GTM), Access Policy Manager (APM) & Application Security Manager (ASM), BIG-IP EDGE for multiple clients
  • Created scripts for F5 automation using Python for multiple clients
  • Configured automation task using Jenkins for multiple clients
  • Created F5 IRULES to meet business requirements
  • Created F5 IRULES to protect against security threats
  • Transformed business requirements into solutions on F5 technologies
  • Performed code upgrades for F5 for multiple clients
  • Performed health checks on F5s
  • Helped applications troubleshoot infrastructure and application related issues
  • Ensured best Security policies were applied to Network and Security technologies
  • Performed Firewall audits
  • Performed Firewall cleanup of unused NATs, Security Polices and Objects
  • Performed Firewall cleanup of risky rules
  • Created change requests
  • Created support documentation for operation teams
  • Created build documents

Senior Information Security Specialist (Consultant)

Confidential

Responsibilities:

  • Configured and deployed Web Application Firewall (WAF) on F5
  • Created custom Web Application Firewall (WAF) signatures
  • Applied Web Application Firewall (WAF) Layer 7 Rules to applications
  • Triaged security related issues
  • Profiled Application Threats
  • Tuned Web Application Firewall (WAF) polices
  • Created F5 IRULES to meet business requirements
  • Created F5 IRULES to protect against security threats
  • Created change requests
  • Created support documentation for operation teams
  • Created build documents

Senior Information Security Specialist (Consultant)

Confidential

Responsibilities:

  • Configured and deployed Palo Alto Firewalls for multiple clients
  • Configured and deployed Palo Alto Panorama for multiple clients
  • Configured and deployed Palo Alto Firewalls in the cloud for multiple clients
  • Configured and deployed Palo Alto Panorama in the cloud for multiple clients
  • Performed code upgrades on Palo Alto Firewalls for multiple clients
  • Configured Wildfire, URL - Filtering, Anti-Spyware, Anti-Virus, Vulnerability protection, Global ProtectSSL decryption and DDOS Protection on Palo Alto Firewalls
  • Performed Cisco ASA to Palo Alto Firewall Migration
  • Performed Check Point to Palo Alto Firewall Migration
  • Performed Palo Alto Firewall hardware upgrades
  • Performed Check Point to Check Point migrations
  • Performed Cisco ASA to Check Point migrations
  • Configured and deployed Check Point Firewalls for multiple clients
  • Configured and deployed Check Point Management Server for multiple clients
  • Configured and deployed Check Point Firewalls in the cloud for multiple clients
  • Configured and deployed Check Point Management Server in the cloud for multiple clients
  • Configured and deployed Check Point CloudGuard Scale Sets
  • Configured and deployed Check Point CloudGuard Cluster
  • Performed Check Point Firewalls hardware upgrades
  • Performed code upgrades on Check Point Firewalls and Management Servers for multiple clients
  • Configured IPS and VSX on Check Point Firewalls
  • Configured and deployed F5 Local Traffic Manager (LTM), Global Traffic Manager (GTM), Access Policy Manager (APM) & Application Security Manager (ASM), BIG-IP EDGE for multiple clients
  • Created F5 IRULES to meet business requirements
  • Created F5 IRULES to protect against security threats
  • Transformed business requirements into solutions on F5 technologies
  • Performed code upgrades for F5 for multiple clients
  • Performed health checks on F5s
  • Helped applications troubleshoot infrastructure and application related issues
  • Ensured best Security policies were applied to Network and Security technologies
  • Performed Firewall audits
  • Performed Firewall cleanup of unused NATs, Security Polices and Objects
  • Performed Firewall cleanup of risky rules
  • Created change requests
  • Created support documentation for operation teams
  • Created build documents

Senior Information Security Specialist

Confidential

Responsibilities:

  • Configured and deployed Palo Alto Firewalls for multiple clients
  • Configured and deployed Palo Alto Panorama for multiple clients
  • Configured and deployed Palo Alto Firewalls in the cloud for multiple clients
  • Configured and deployed Palo Alto Panorama in the cloud for multiple clients
  • Performed code upgrades on Palo Alto Firewalls for multiple clients
  • Configured Wildfire, URL - Filtering, Anti-Spyware, Anti-Virus, Vulnerability protection, Global ProtectSSL decryption and DDOS Protection on Palo Alto Firewalls
  • Performed Cisco ASA to Palo Alto Firewall Migration
  • Performed Check Point to Palo Alto Firewall Migration
  • Performed Palo Alto Firewall hardware upgrades
  • Performed Palo Alto Firewall consolidations
  • Helped applications troubleshoot infrastructure and application related issues
  • Ensured best Security policies were applied to Network and Security technologies
  • Performed Firewall audits
  • Performed Firewall cleanup of unused NATs, Security Polices and Objects
  • Performed Firewall cleanup of risky rules
  • Created change requests
  • Created support documentation for operation teams
  • Created build documents

Senior Network Security Analyst (Consultant)

Confidential

Responsibilities:

  • Provided application and infrastructure teams infrastructure and application solutions
  • Configured and deployed F5 Local Traffic Manager (LTM), Global Traffic Manager (GTM), Enterprise Manager (EM), Access Policy Manager (APM) & Application Security Manager (ASM)
  • Created F5 IRULES to meet business requirements
  • Created F5 IRULES to protect against security threats
  • Transformed business requirements into solutions on F5 technologies
  • Managed and administered 150+ F5 Devices across 15+ Data Centers
  • Performed code upgrades for F5 LTM, ASM, APM, EM, GTM and BIGIQ
  • Analyzed Network Packet Captures
  • Performed multiple Data Center migrations
  • Analyzed Bluecoat Proxy Logs to mitigate risks during ISP change
  • Created scripts to test impact of external IP changes
  • Created solutions to mitigate risk during Data Center and Application migrations
  • Helped application teams identify Firewall rules needed to migrate to new Data Center
  • Migrated Firewall rules from one Firewall to another
  • Identified test cases for business to perform after infrastructure changes
  • Acted as production and non - production level 2 support for F5 technologies
  • Acted as production and non-production level 2 support for mission critical applications
  • Acted as production and non-production level 2 SME for infrastructure technologies
  • Worked with application and infrastructure teams to enhance monitoring using global monitoring infrastructure
  • Worked with application and infrastructure teams to ensure end to end application monitoring is in place
  • Configured and deployed Akamai configuration to new and existing applications
  • Configured and deployed Web Application Firewall (WAF) on F5 and Akamai
  • Created custom Web Application Firewall (WAF) signatures
  • Applied Web Application Firewall (WAF) Layer 7 Rules to applications
  • Triaged security related issues
  • Profiled Application Threats
  • Tuned Web Application Firewall (WAF) polices
  • Migrated websites to CDN solution
  • Acted as production and non-production level 2 support for Akamai technologies
  • Managed SSL certificates for F5 and Akamai
  • Configured SSL Decrypt solution for user and internet traffic
  • Created Failover DNS records in VeriSign
  • Provided L2 support for Check Point Firewalls and Palo Alto Firewalls
  • Helped troubleshoot routing and switching issues
  • Helped troubleshoot Application and Infrastructure issues for other teams
  • Created change requests
  • Created support documentation for operation teams
  • Created build documents
  • Created network diagrams
  • Ensured best security practices where applied to infrastructure and application stack
  • Provided Risk Impact Assessments

Senior F5, IIS and Tomcat Consultant (Consultant)

Confidential

Responsibilities:

  • Responsible for troubleshooting performance issue with Guidewire Application running on Tomcat
  • Performed Firewall audits
  • Performed Firewall cleanup of unused NATs, Security Polices and Objects
  • Performed Firewall cleanup of risky rules
  • Used Tufin to identify risky rules
  • Worked with application owners to locked down permissive Firewall rules
  • Identified application owners for Firewall rules with no documentation
  • Acted as production and non - production level 3 support for Check Point Firewalls
  • Ensured best Security policies were applied to Network and Security technologies
  • Acted as production and non-production level 3 support for IPS/IDS and HIDS IBM Security SiteProtector System
  • Configured and deployed IPS/IDS and HIDS IBM Security SiteProtector System
  • Created IPS/IDS and HIDS polices
  • Sat on a Governance team whom assessed if firewall rules complied with CIBC security standards
  • Created change requests
  • Created support documentation for operation teams
  • Created build documents

Senior Information Security Specialist (Consultant)

Confidential

Responsibilities:

  • Designed Network Infrastructure
  • Provided support to clients on VPN tunnel setups
  • Configured Multiple VPN tunnels
  • Configured and deployed Fortinet Firewalls for multiple clients
  • Performed code upgrades on Fortinet Firewalls for multiple clients
  • Acted as production support for Network and Security Topologies
  • Performed RSA Authentication Manager 7.1 to 8.1 upgrade
  • Performed internal and external infrastructure Penetration Testing
  • Ensured best Security policies were applied to Network and Security technologies
  • Configured and deployed Palo Alto Firewalls for multiple clients
  • Configured and deployed Palo Alto Panorama for multiple clients
  • Performed code upgrades on Palo Alto Firewalls for multiple clients
  • Configured Wildfire, URL - Filtering, Anti-Spyware, Anti-Virus, Vulnerability protection, Global Protect SSL decryption and DDOS Protection on Palo Alto Firewalls
  • Performed Juniper SRX to Palo Alto Firewall Migration
  • Performed Sidewinder to Palo Alto Firewall Migration
  • Performed Cisco ASA to Palo Alto Firewall Migration
  • Performed Check Point to Palo Alto Firewall Migration
  • Performed Palo Alto Firewall hardware upgrades
  • Performed Check Point to Check Point migrations
  • Performed Cisco ASA to Check Point migrations
  • Configured and deployed Check Point Firewalls for multiple clients
  • Configured and deployed Check Point Management Server for multiple clients
  • Performed Check Point Firewalls hardware upgrades
  • Performed code upgrades on Check Point Firewalls and Management Servers for multiple clients
  • Configured IPS and VSX on Check Point Firewalls
  • Performed Data Center migrations
  • Performed Firewall audits
  • Performed Firewall cleanup of unused NATs, Security Polices and Objects
  • Performed Firewall cleanup of risky rules
  • Worked with application owners to locked down permissive Firewall rules
  • Identified application owners for Firewall rules with no documentation
  • Managed SSL certificates on multiple Firewalls for multiple clients
  • Implemented security policies on Firewalls
  • Performed PCI Vulnerability Testing
  • Reviewed IT Infrastructure and Application configurations for security Vulnerabilities
  • Performed Vulnerability and Risk Assessments
  • Developed proof - of-concept exploits

Environment: Specialist (Consultant)

Confidential

Responsibilities:

  • Created Cloud Blueprints for Websphere 8.5.5 and MDM 11.3 with one click deployment
  • Created Websphere scripts for configuring and deployment of Websphere 8.5.5 and MDM 11.3
  • Migrated Jenkins Windows to Cloud Linux solution
  • Configured Jenkins to use Active Directory
  • Configured Jenkins to send out emails to different groups during the different tasks
  • Created Active Directory groups for different roles in Jenkins
  • Created automated build, deployment and restart Websphere workflows in Jenkins
  • Created automated job to check in new build artifacts into Nexus with build labels
  • Created ETL Build Scripts in Jenkins
  • Created automated job to pull MKS variants information from MKS and automatically feed Jenkins
  • Ensured best security practices where applied to infrastructure and application stack
  • Created naming standard for different development environments
  • Configured and deployed IBM Rational Application Developer 9.0
  • Created process to compare code in different variants in MKS
  • Managed application variants in MKS
  • Created Autosys jobs
  • Created JIL scripts to replicate Autosys jobs across multiple environments
  • Identified test cases for business to perform after infrastructure changes
  • Performed Sharepoint to Confluence document migration
  • Acted as production and non - production level 3 support for mission critical applications
  • Acted as production and non-production level 3 support for cloud Linux Environments
  • Created change requests
  • Created support documentation for operation teams
  • Created build documents

Senior F5, IIS and Tomcat Consultant (Consultant)

Confidential

Responsibilities:

  • Configured and deployed F5 Local Traffic Manager (LTM), Global Traffic Manager (GTM), Enterprise Manager (EM) & Application Security Manager (ASM)
  • Created F5 IRULES to meet business requirements
  • Configured and deployed Web Application Firewall (WAF) on F5 and Akamai
  • Applied Web Application Firewall (WAF) Layer 7 Rules to applications
  • Transformed business requirements into solutions on F5 technologies
  • Managed and administered 150+ F5 Devices across 15+ Data Centers
  • Migrated code on 150+ F5 Devices across 15+ Data Centers from code 9 to 11 and from code 10 to 11
  • Identified test cases for business to perform after infrastructure changes
  • Acted as production and non - production level 2 support for F5 technologies
  • Acted as production and non-production level 2 support for mission critical applications
  • Configured and deployed Akamai configuration to new and existing applications
  • Migrated websites to CDN solution
  • Acted as production and non-production level 2 support for Akamai technologies
  • Configured and deployed IBM HTTP Server Instances for customer facing applications
  • Acted as production and non-production level 2 support for IBM HTTP Server
  • Provided L2 support for Tomcat
  • Configured Kerberos solution for BlackBerry Enterprise Server 10 and IBM HTTP Server
  • Managed SSL certificates for F5, Akamai, IIS and Apache
  • Configured SSL Decrypt solution for user and internet traffic
  • Created Failover DNS records in VeriSign
  • Performed GTM to VeriSign DNS migration
  • Provided L2 support for Check Point Firewalls and Palo Alto Firewalls
  • Helped troubleshoot routing and switching issues
  • Helped troubleshoot Application and Infrastructure issues for other teams
  • Created change requests
  • Created support documentation for operation teams
  • Created build documents
  • Created network diagrams
  • Ensured best security practices where applied to infrastructure and application stack
  • Provided Risk Impact Assessments

Senior Middleware Specialist (Consultant)

Confidential

Responsibilities:

  • Installed and configured WebSphere MQ and Message Broker environments
  • Configured WebSphere MQ and Message Broker for cluster setup
  • Created High - Availability and multi-instance solution for WebSphere MQ and Message Broker stack
  • Created WebSphere MQ and Message Broker standards
  • Created governance rules for WebSphere MQ and Message Broker stack
  • Managed, administered, configured and deployed applications to non-production and production environment: s
  • Acted as production and non production level 3 support for Middleware stack and mission critical applications
  • Created change requests
  • Created support documentation for operation teams
  • Created build documents
  • Created scripts to automate setup of environments
  • Created scripts to automate deployments
  • Created scripts to backup WebSphere MQ and Message Broker configuration
  • Ensured best practices where applied to file system layout for Middleware stack
  • Ensured best security practices where applied to Middleware and Operating System stack

We'd love your feedback!