Network Security Engineer And Analyst Resume
SUMMARY
- Senior Information/Network Security Engineer possessing over 25 years of IT experience.
- Highly experienced in the design, implementation, administration and monitoring of Information Security environment and related products (firewalls, routers, switches, load balancers, VPN, monitoring software, intrusion detection, intrusion prevention, etc.)
- Assisted and advised in administration of DMZ Solaris, Linux and Windows hosts
- Verified and assured secure ("hardened") configuration of DMZ Servers (Solaris, Linux, Windows NT/2000/XP)
- Extensive knowledge of TCP/IP on multiple hardware and software platforms.
- Strong skills with UNIX/Linux, Windows, OS/390.
- Extensive hands - on experience configuring Firewalls, routers/switches/hubs, VPNs, remote monitoring, mainframe communications and Windows/UNIX management and application servers.
- Extensive interaction with internal and external customers providing technical network and security direction
- Strong troubleshooting and problem-solving skills
TECHNICAL SKILLS
Software: (Firewall) Cisco PIX/ASA, CheckPoint FW-I 4.1 and NG (R1 through AI-7.1), CheckPoint Provider-1, VTAM/SNA (PC, UNIX, AS/400, S/390), TCP/IP (PC/MAC, UNIX/Linux, AS/400, S/390, wireless, telephony, video), Windows NT/2000/XP/2003/2008/7, Cisco Router OS 9.1 through 13.3, UNIX/SOLARIS 2.6 through 2.10, IPSO 3.3-7.0, AIX 3.1.2-4.3.3 , various Linux flavors, NetScreen OS 4-6, RSA/SECURID (ACE) 3.0-5.0, BIND 4.0-9.3, DNSOne (InfoBlox proprietary DNS) version 1-3, IBM OS/390, Bluecoat SGOS 5.1-5.5, SkyBox (SkyBoxView v6.5), Korn/Bourne Shell scripts, PERL, Sed/Awk, mid-level UNIX system administration (system hardening, TripWire, account/security support, log/package maintenance)
Hardware: IBM RS 6000, Sun E 10K, Ultra 60, E420R, Nokia IP330, IP350, IP380, IP700, IP1260, IP1280, IP2260, IP2280, Alteon AD3/AD4/ASF, Cisco/ArrowPoint 11500/11800 , Cisco 29XX/35XX/55XX/65XX/72XX/75XX/85XX Routers, Cisco ASA VPN devices, NetScreen 5/500/1200/2200 workstations, BlueCoat ProxySG 800/8000, InfoBlox-1000/1200
PROFESSIONAL EXPERIENCE
Confidential
Network Security Engineer and Analyst
Responsibilities:
- Designed and updated global installations of Juniper/Netscreen, Cisco PIX/ASA and Checkpoint firewalls
- Designed, built and supported multiple VPNs using Netscreens and Cisco ASAs
- Troubleshot networking issues for internal and external customers
- Maintained, supported and updated SkyBoxView (Linux appliance) for log and policy analysis
- Updated and maintained multiple Bluecoat proxy systems for internal customers
Confidential
Firewall Engineer and Analyst
Responsibilities:
- Supported and update security policies for Checkpoint firewalls and Cisco ASAs and PIX devices
- Troubleshot networking issues for internal and external customers
- Mentored and advised junior members of the security support staff
Confidential
Firewall Design and Support Engineer
Responsibilities:
- Designed and updated global installations of Juniper/Netscreen and Checkpoint firewalls
- Remediated and optimized Checkpoint firewall policies for global standards
- Interacted with multiple internal and external customers to provide technical network and security direction
Confidential
Network Security Analyst
Responsibilities:
- Implemented and supported multiple internal and external VPN installations utilizing Cisco Routers and Switches.
- Designed, implemented, and administered multiple intercompany Extranets.
- Interacted with internal and external customers to provide technical network and security direction
- Verified and assured secure ("hardened") configuration of DMZ Servers (Solaris, Linux, Windows)
- Assisted and advised in administration of DMZ Solaris and Linux hosts; assisted and advised in administration of DMZ Windows hosts.
Confidential
Senior Network Security Engineer
Responsibilities:
- Implemented and administered RSA/SecurID system for 10,000 employees and vendors
- Designed, implemented, and administered multiple intercompany Extranets
- Implemented and maintained Alteon and Arrowpoint load-balancing solutions
- Interacted with internal and external customers to provide technical network and security direction
- Configured and administered corporate external DNS using BIND and DNSOne
- Verified and assured secure configuration of DMZ Servers (Solaris, Linux, Windows NT/2000)
- Administered DMZ Solaris hosts; assisted in administration of DMZ Windows hosts
Confidential
I/T Architect
Responsibilities:
- Provided technical network and security direction to internal and external customers
- Designed and built secure TCP/IP networks using IBM and Cisco Router and Switch technologies
- Built and maintained TCP/IP-based firewalls using IBM Firewall, CheckPoint FW-1, and Cisco PIX
- Setup, configured and maintained HA CheckPoint Firewall servers for large hosting site
- Tuned and assisted in the development and testing of corporate networking software
- Built and supported multiple TCP/IP and SNA networks on Sun/Solaris, OS/390, AS/400, Windows NT, and UNIX, utilizing IBM and Cisco networking products
- Administered the NIS and NFS Servers.
- Setup and configured the company DNS Servers
- Maintained Korn and Bourne Shell scripts for IP-based functions
- Maintained TCP/IP and SNA in a multi-system, multi-platform environment.
- Tuned performance of transitional SNA-to-TCP/IP mainframe networks.
- Supported multiple Novell NetWare Networks, including multi-platform applications. (CNA/CNE)
- Wrote several NetWare Loadable Modules and client interface routines in 'C', utilizing IPX/SPX as communications protocol.
- Maintained, tested, and assisted in tuning of several large LU 6.2 SNA client/server applications.
- Coordinated daily batch operations, managed RACF access security, and provided primary programming support for a restricted-access MVS system.
- Consolidated and eliminated 4 MVS and 2 VM systems by migrating users and data to appropriate platforms.
Confidential
Computer Operator
Responsibilities:
- Maintained batch-processing system running ADABAS under MVS/XA and CICS.
- Provided backup support for Telecommunications department to ensure 24- hour coverage.
- Analyzed failures of batch routines; repaired JCL or contacted responsible programmer to maintain processing schedule.
Confidential
Junior Computer Operator
Responsibilities:
- Maintained batch-processing system running ADABAS under MVS/XA and CICS.
- Printed and distributed multiple forms for large insurance company and subsidiaries.
- Provided first-level support for System 38 and AS/400 problem determination for remote sites.
Confidential
Computer Operator Trainee
Responsibilities:
- Maintained batch-processing system running under MVS/XA.
- Maintained VM/XA system.
- Provided first-level user support and maintained local printers.