Cyber Security Analyst Resume
Philadelphia, PA
SUMMARY
- Cyber security Analyst with over 8+ years of experience in vulnerability management/encryption process and creation and deployment of solutions protecting applications, networks, systems and information assets for diverse companies and organizations.
- Highly skilled in installing, testing, maintaining and designing advance secure network solutions
- Experience as an Information Security Analyst, involved in OWASP Top 10 based Vulnerability Assessment of various internet facing point of sale web applications and Web services.
- Skilled in identifying the business requirements for information security as well as regulations of information security.
- Strong experience with Qualys Guard Vulnerability Management and Policy Compliance solutions
- Proficient in Qualys modules such as Patch Management, Asset Management, and Threat Protection
- Extensive experience in Penetration testing - Expertise in detecting various vulnerabilities (including OWASP top 10) comprised over authentication, authorization, input validation, session management, server configuration, cryptography, information leakage areas.
- Developed, implemented and enforced security policies through experience, in-depth knowledge of security software, and asking the customer the right questions
- Expert in managing, administering and maintaining Qualys Vulnerability Management and Policy Compliance solutions. Possess expertise in implementing and configuring Qualys Guard, Patch Management, Asset Management, and Threat Protection modules.
- An enthusiastic team player who embodies a strong work ethic and a leader who utilizes complex problem-solving skills for incident analysis.
- As a Security Consultant involved in enhancing the security stature of the project by initiatives like Threat Modelling, Security awareness sessions, Dormant & Never Logged IDs clean-up.
- Technical business expert employing tremendous Information Security Audit, Strategy and Risk Management Techniques. Excellent communication, analytical, troubleshooting, customer service and problem-solving skills; excels in mission-critical environments requiring advanced decision-making.
- Strong knowledge of SaaS application security, including understanding of various security frameworks such as OWASP, NIST, and ISO 27001.
- Experience with implementing and deploying security (encryption, anonymization, data integrity, policy control) features in large scale infrastructures
- Experience in automation tools development for penetration testing.
- Developed testing practices, training plan and trained new members in penetration test duties.
- Developed remediation plans for various vulnerabilities and assisted development teams across the organization in remediating them.
TECHNICAL SKILLS
Networking Technologies: Network Traffic Analysis (NTA), Endpoint detection and response, IDS/IPS, Security Operation Center, Forensic analysis
Networking Hardware: Cisco, Palo Alto, Checkpoint.
Forensic Technologies: Encase, FTK Imager, Autopsy, Kali
Security Tools: Qualys Guard, Metasploit, Nessus, Threat connects, Tenable, Burp Suite, Rapid 7, Crowdstrike, Sumologic, Splunk Enterprise Security
Network Monitoring: Solar winds, Wireshark, TCP Dump, Infoblox
Operating Systems: KALI LINUX, Parrot Sec, Unix & Linux
Programming Languages: Python
Simulation Tools: GNS3, VMware
Firewalls: ASA, Checkpoint, Palo Alto firewalls.
Data Analytics: Tableau, Power BI, Splunk
PROFESSIONAL EXPERIENCE
Confidential, Philadelphia, PA
Cyber Security Analyst
Responsibilities:
- Administered Qualys Guard Vulnerability Management and Policy Compliance solutions to ensure the security of the organization's network and systems.
- Perform scans and generate reports for vulnerabilities, threats, and policy violations.
- Configure and maintain asset inventory and patch management modules.
- Work with security and IT teams to remediate identified vulnerabilities and policy violations.
- Conduct training sessions for users on how to use Qualys Guard.
- Collaborate with vendors to ensure the availability of required updates and patches.
- Maintain documentation and records related to scanning, reporting, and compliance activities.
- Analyzed, troubleshoot, and investigated security related incidents, events, and alerts.
- Maintained, configured, and analyzed security platforms and tools.
- Evaluated security gaps using Qualys vulnerability scanners and manual techniques.
- Evaluated existing and proposed architectures, recommend, and implement security measures, enhancements and mitigate risk.
- Extracting Qualys API data and cleansing the data using ETL tool to provide accurate vulnerability reports to the stakeholders.
- Assessed the security risk of all networked, IP devices by using Qualys and created custom reports for various departments to view vulnerability issues.
- Operated MacAfee ESM tools to monitor, identify and evaluate potential security events; research alerts that may indicate the potential of a security event.
- Leveraged secure software as a service (SaaS) application and provide comprehensive security solutions.
- Conducted regular vulnerability assessments and penetration testing for SaaS applications, identifying and mitigating security risks.
- Experience with Cloud based WAF solutions (F5 Cloud) and SaaS based WAF solutions (Incapsula)
- Contributed to incident investigations and incident response as a member of the incident response team.
- Administered and enhance data solutions, working closely with principal engineer, providing guidance, analysis, and recommendations to evolve capabilities.
- Reviewed the maturity and effectiveness of multiple security platforms ensuring proper performance, availability, and capacity management.
- Build configured and administered assigned security platforms ensuring accurate, consistent and complaint configuration and documentation.
- Provided moderate to complex technical maintenance services and overseed implementation of patches to integrated security systems and solutions ensuring continuous availability and operation.
- Conduct audits and code testing to identify data security vulnerabilities and undertake necessary actions to eliminate identified threats.
- Ensured that security plans, controls, processes, standards, policies, and procedures are aligns with overall information standards.
- Anti-Tamper and Program Protectionin areas such as embedded systems, hardware design, software design, penetration testing,encryption, networks, RTOS, and cross domain solutions.
- Reacted and responded to cyber security incidents, investigating, and remedying the situation by utilizing the incident reporting process.
- Provided assessments for auditing purposes and liaise with stakeholders to ensure cross collaboration over various platforms.
- Triage vulnerability findings from DAST and SAST tools, providing insight for remediation steps
- Followed the NIST Risk Management Framework to continuously assess, prioritize, and address internal and external vulnerabilities.
- Maintained records and evaluate metrics pertaining to status of remediation efforts and company vulnerability profile.
- Conducted technical compliance assessments of information systems in accordance with established standards.
- Developed custom integrations with Qualys Guard Vulnerability Management and Policy Compliance modules using Qualys APIs, SDKs, and scripting languages
- Coordinated with system administrators, ISSMs, and information systems owners to remediate vulnerabilities.
- Created custom qualys reports and dashboards to provide visibility and insights into the organization's security posture
- Investigate security incidents and recommend actions needed to resolve situations.
- Responsible for coordinating and supporting annual risk assessments and follow-on activities.
- Worked as a Point of coordination for various security related activities within the central Technology Risk Management and Information Security teams
- Responsible for the maintenance and delivery of security CDRL documentation.
- Exhibit problem solving when analyzing system designs to identify potential information security risks.
- Monitored the traffic of pass-through firewalls (which allows all the traffic) and created the new policies and helped to improve security concerns and blocked all unnecessary traffic.
- Expertise in using Splunk with a shell script in creating scripts for various activities like Generating Server Status and Health reports, Deployments on the large-scale configuration of servers.
- Experience with Splunk technical implementation, Planning, customization, integration with big data and statistical and analytical modeling.
- Responsible for Scheduling Backups and Restore, Maintenance plans using Native & Third-party tools.
- Support Compliance Certification and Vulnerability Assessments, as required.
- Knowledge of programming languages such as Python, and Perl.
Confidential, Allen, TX
Information Security Specialist
Responsibilities:
- Executed cybersecurity assessments on internally and externally hosted solutions, including internal, SaaS and cloud hosted solutions.
- Executed assessments of existing solutions, driving alignment/compliance with relevant security standards, policies, and procedures.
- Performed vulnerability scans using Qualys, in order to scan the subnet of 41 assets to find the vulnerabilities, report to the Chief Information Officer and colleagues to help remediate.
- Scanned all the network IP's using Qualys and created custom report in order to provide vulnerability information to every relevant department.
- Routinely conduct security analysis and provide written and/or oral recommendations to stakeholders.
- Knowledgeable in vulnerability management processes and standards such as CVE, CVSS, and NIST
- Experience in creating and managing security policies and compliance reports.
- Advised on processes and methodologies required when valuating product solutions, developing new internal solutions.
- Continuously improve cybersecurity assessments capabilities, development solutions, and security artifact requirements.
- Responsible for the installation, configuration, and programming, and testing of multiple networking and voice switching systems to include voice switches, network servers (mail, exchange, proxy) network firewalls, Cisco routers and switches, networkencryptiondevices and transmission multiplexing platforms.
- Monitored and proactively executed the vulnerability management program to prevent or reduce IT hygiene risk issues from impacting production systems.
- Maintained and managed security toolsets that helped to mitigated or respond to security events and incidents.
- Supported and lead security incident response and investigation efforts as needed.
- Assisted with validating and tracking IT operational activities to ensure compliance with policy, standards, and other applicable requirements, or as directed by organizational needs.
- Researched and identified security vulnerabilities and relevant industry/cybersecurity trends for follow-up and action.
- Designed secure, scalable web-based application using Python.
- Regularly reported and tracked of IT security events and metrics along with remediation activities.
- Planned and implemented security systems and standards by evaluating network and security technologies, developing security requirements for the enterprise infrastructure, and maintaining overall user access in support of enterprise objectives and client service delivery.
- Researched and provided recommendations on methods, software, and technologies to mitigate risk exposures.
- Performed security log event analysis taking appropriate action as directed or required to address security risk issues or event/incidents.
- Assisted with developing and contributing to security policies, standards and procedures to maintain an appropriate security posture and /or compliance with applicable requirements.
- Analyze and investigate intrusion attempts and perform in-depth analysis of exploits.
- Security awareness training for new and existing employees.
- Coordinate and manage team activities during assessment engagements.
- Establish schedules and deadlines for assessment activities.
- Threat intelligence collection using open-source networks.
- Performing routine SQL Injection attacks and remediate them.
- Preventing Data loss by working with Symantec endpoint protection.
- Familiar with Vulnerability Scanning Tools such as Tenable Cloud Scanner, Nessus and analyses reports to vulnerabilities.
- Managing and providing support to various project teams with regards to the addition of new equipment such as routers switches and firewalls to the DMZs.
- Conducted vulnerability testing using tools: Nessus, Burp suite, Tenable, and analyzed reports.
Confidential, Dallas, TX
Penetration Tester/Vulnerability Tester
Responsibilities:
- Working in collaboration of both networking and security teams.
- Scheduled a Penetration Testing Plan throughout the organization and completed all the tasks in the given time frame.
- Performed pen tests over different business applications and network devices of the organization.
- Conducted threat modeling exercises to identify potential security risks in SaaS applications, and provided recommendations to mitigate those risks.
- Performed vulnerability scanning using Nessus and maintained clear documentation for every report that is generated.
- Performed vulnerability analysis over wired and wireless networks.
- Identifying the critical, High, Medium, Low vulnerabilities in the applications based on OWASP Top 10 and prioritizing them based on the criticality.
- Update with the new hackings and latest vulnerabilities to ensure no such loopholes are present in the existing system. Performed static code reviews with the help of automation tools.
- Performed a threat analysis on the new requirements and features.
- Burp Suite, Hp Fortify, N-map, Nessus, OWASP ZAP Proxy, Acunetix tools were used as part of the penetration testing, on daily basis to complete the assessments.
- Establishing and improving the processes for privileged user access request.
- Execute and provide remediation support for Static Application Security Testing (SAST) assessments.
- Planning and managing the delivery of SAST & DAST tests (both automatic and manual), and source code reviews on high-risk web applications.
- Solid understanding of security, encryption, authentication, key management and applied cryptography
- Proactively conducted research, analyze, and report on trends in certain activities, vulnerabilities, reported attack methods and known exploits that could impact network and information assets.
- Supporting cryptographic strategy, policies, standards and compliance procedures
- Implementing security architectures involved with authentication, authorization and cybersecurity
- Performed penetration testing over the enterprise systems to audit the standards to comply with PCI DSS regulations.
- Conducted Risk Assessments and created detailed reports displaying prioritized findings, demonstration of exploits, and explanation of compromise impacts, and recommendations for mitigation.
- Executed live packet data capture using Wireshark to examine security flaws in the network devices.
- Given presentations to client over their security issues and potential solutions for those problems.
- Used CVSS Scores to create reports demonstrating the severity of the existing vulnerabilities and was helpful to prioritize the course of implementation depending on the severity of the vulnerabilities.
- Documented a Closure Document detailing my findings and recommendations for security improvement and patch management.
- Operate and maintain application security tools, such as static application security testing (SAST) and dynamic application security testing (DAST) tools.
- This includes their integration points with Jira, Jenkins
Confidential
Security Analyst
Responsibilities:
- Conducted Threat Modeling Index to prioritize and categorize applications based on different security perimeters like complexity, sensitivity and business priority to comply with PCI DSS regulations.
- Worked with the development team to understand the application workflow and formulated test plans.
- Define test policy for automated scanners and manual test scripts for applications across platforms.
- Conducted application security vulnerability assessment and penetration testing (SAST & DAST) using automated tools like Burp suite, IBM Appscan.
- Experience with SAST products such as IBM AppScan Source
- Conducted secure code reviews using automated tools and manual techniques.
- OWASP Top 10 Issues identifications like SQLi, CSRF, XSS and invalidated redirects etc.
- Performed network assessments using tools like Qualys Guard, Nmap, Nessus.
- Prepared Monthly and Quarterly Issue trend analysis report and suggested measures for improvement.
- Created and managed an Application Security Metrics Dashboard.
- Worked on risk management activities such as identifying risks and assessing their probability/impact.
- Worked on Internal Incident Management systems to identify and investigate the incidents. Worked on incident closure activities.