We provide IT Staff Augmentation Services!

Cloud Security Engineer Resume

0/5 (Submit Your Rating)

Winston Salem, NC

SUMMARY

  • An experienced Cyber and Cloud Security Engineer with good hands on supporting, Automating, and optimizing mission critical deployments in AWS, with a proven track record in Solutions Design for Cloud tech and Quality Engineering.
  • Also possess in depth experiences in transitioning multiple projects and ensuring seamless end to end delivery of Cloud and Security services.
  • In - depth knowledge of AWS Cloud services and platform

TECHNICAL SKILLS

Operating Systems: Amazon Linux AMI, Linux (Red Hat 7.x & 8.x) CentOS 7.xUbuntu 20.x & 22x and Kali-Linux v2022.4

Web Servers/ Application Servers: Apache2.0/2.2/2.4, Apache Tomcat8.0.x

Languages: Shell scripting, Python

Bug/Issue Tracking: JIRA, ServiceNow

Monitoring Tools: Splunk Enterprise Server, Amazon CloudWatch, andPrometheus & Grafana, Nessus, Qualys

IaC Tools: Terraform Enterprise

Virtualization: VMware Workstation, ESXi, and vSphere 6 client.

Proof of Concept: Design Phase to Development Phase to Technical

AWS Cloud Services: AWS EC2, VPC, AMIs, S3, IAM Role & Policies, KMS, Security Groups, AWS Secret Manager, AWS WAF, AWS Config Rules, Security Hub, AWS Trusted Advisor, RDS-MySQL, Route53, CloudWatch, CloudTrail, and GuardDuty

PROFESSIONAL EXPERIENCE

Confidential, Winston Salem, NC

Cloud Security Engineer

Responsibilities:

  • Conduct Network Security Monitoring on services including SIEM, IDS/IPS, Firewall, Web Application Firewalls, and Data Loss Prevention (DLP)
  • Administered IT-monitoring toolsets like AWS CloudWatch, Prometheus & Grafana to collect and track metrics, collect, and monitor log files, and set alarms.
  • Conduct 15+ incident response investigations monthly for Classified Incidents, and ensure all classified systems complied with cybersecurity regulations.
  • Implemented AWS WAF with ALB to block SQL Injection, Geo Location and Query string.
  • Utilized Session Manager to access EC2 instance and manage AWS CloudWatch for monitoring purposes.
  • Experience deploying and managing Nessus scanner to run vulnerabilities in EC2 environment, configuring and automating Amazon Inspector to scan AWS native assets.
  • Experience with configuration baseline standards such as CIS Benchmarks or DISA and enabling a compliance Framework policy using AWS Security Hub service.
  • Experience in management of AWS Security Hub vulnerabilities remediation, automated AWS Inspector to scan AWS EC2 instance and Assets for vulnerabilities and utilize Systems Manager for patching.
  • Experience deploying integrated security logging, monitoring, and altering solutions using AWS services.
  • Configured AWS Web Application Firewall (WAF) to block all unauthorized incoming web traffic from customer accounts in AWS platform.
  • Ensure compliance with cyber security policies and procedures regarding documentation, labeling, asset tracking, and quality assurance.
  • Monitoring internal server resources utilizing Prometheus & Grafana application.
  • Integrate Splunk with AWS Security Hub to pull and analyze CloudTrail logs.
  • Work closely with DevOps team using Shell Scripting and Python for automation of cloud services.
  • Proof of Concept; Working with DevOps team to identify achievable technical results.

Confidential

Cloud Security Engineer

Responsibilities:

  • Defined, developed, and operationalized 7 security metrics while employing classified systems to help protect data on running devices.
  • Implemented security best practices in AWS including multi-factor authentication, access key rotation, role-based permissions, encryption using KMS, enforced strong policy, configured security groups and NACLs, S3 bucket policies and ACLs, mitigating DDoS attacks etc.
  • Generated Signing Request (CSR), create private key files and requested SSL from Entrust. Imported SSL encryptions keys into AWS Manager (ACM) and configured application load balancer for it.
  • Implement secure key and management: Store encryption keys and s securely and rotate them at appropriate time intervals while applying strict access control; for example, by using a management service, such as AWS Manager (ACM).
  • Enforce encryption in transit: Enforce your defined encryption requirements based on appropriate standards and recommendations to help you meet your organizational, legal, and compliance requirements.
  • Automate detection of unintended data access: Use tools such as GuardDuty to automatically detect attempts to move data outside of defined boundaries based on data classification level, for example, to detect a Trojan that is copying data to an unknown or untrusted network using the DNS protocol.
  • Monitored Cloud Compliance Automation Tool (CCAT), a shell script that checks for compliance on all security tools installed on various operating systems within AWS EC2.
  • Utilized AWS Inspector and Nessus vulnerability scanner as a security tool to identify security vulnerabilities found from CIS benchmarks and Security best practices.
  • Good use and understanding of DAST tools using Nessus Vulnerability Scanner
  • Remediated Log4j vulnerability captured by our Nessus scan in Development and Production accounts.
  • Utilized AWS SSM run command to launch Amazon EC2 instances using Amazon Images (AMI) for (RHEL/Ubuntu/Windows) and

Confidential

Sr. Cyber Security Analyst

Responsibilities:

  • Monitoring alerts from the SIEM tools and responding with analysis of the triggered alerts.
  • Performed S3 bucket creation, access policies, and archive outdated data to Glacier through the Lifecycle policy configuration.
  • Knowledge of PCI-DSS Compliance requirements related to credit cards. Working knowledge of security tools such as firewalls, IDS/IPS, anti-spam, content management, server, and network device hardening.
  • Performed evaluation testing on enterprise intrusion detection systems and prevention systems (IDS/IPS) such as McAfee.
  • Ability to analyze malicious files through code analysis/reverse engineering.
  • Understanding of SOAR products and EDR technologies
  • Comprehensive knowledge of OWASP, NIST and FISMA compliance

Confidential

Cyber Security Analyst

Responsibilities:

  • Monitored, identified malware and intrusion issues.
  • Used Wireshark to examine alerts from various browsers and other security monitoring tools.
  • Monitored, investigated, and reported incidents of suspicious activity.
  • Assisted with implementation of counter measures, as well as mitigating controls.
  • Fixed detected vulnerabilities, to maintain high security standards.
  • Assisted level 3 team in designing new security systems for company’s use.
  • Monitored identity and access management, in addition to monitoring for abuse of permissions.
  • Generated reports for both technical and non-technical staff.
  • Analyzed security breaches to determine the root cause of problems.
  • Microsoft Office 360
  • Vulnerability scan, Endpoint detection and log analysis

We'd love your feedback!