Cyber Security Analyst Resume
Chaska, MN
SUMMARY:
- Has deep understanding of problems and solutions to produce secure, scalable, and resistant security solutions in Microsoft, IOS, and Linux operating systems to constantly harden systems security.
TECHNICAL SKILLS:
Security: SOC, IBM QRadar SIEM, IBM X - Force threat intelligence tool, HP ArcSight SIEM, EnVision RSA SIEM, Cybersecurity Triage, Metasploit, Nmap, Wireshark, OpenVAS, Skipfish, IE cache view, RATS, ping, NSLookup, TCPdump. Encryption using MD5 and SHA256, pfSence, streamdefender network AVs, and Symantec Endpoint Protection Firewalls, Red Teaming, Penetration testing, IDS/IPS, SQL (DML, DDL, DCL) in Unix, Identity and Access Management, Damballa, FireEye, Cisco IronPort, Vontu DLP, Palo Alto Networks, invincea, data vulnerability and threat assessment, security application use cases.
Network: LAN, WAN, TCP/IP, IPv4, IPv6, NFS, TCP, DNS, FTP, SMTP, Active Directory, Remote Support, Routers, Switches, Hubs.
Systems: MS Windows XP, Vista, 7, 8, Server 2008R2 and server 2012R2, UNIX, Linux, iOS, CCNA, VMware, Citrix XenApp, SQL.
Architectures: X86, x64, Intel, AMD, iOS.
Operation: Vision, Strategy, Program/Project Management, Passion, Critical Thinking, Strategic Planning.
PROFESSIONAL EXPERIENCE:
Confidential, Chaska, MN
Cyber Security Analyst
Responsibilities:
- Monitoring of security events at the SOC using HP ArcSight SIEM and RSA EnVision SIEM, other security feeds, and CTU communications (email, phone, chat, and other communications). Performing network traffic analysis utilizing raw packet data, IDS, IPS, and custom sensor output. Triaging of incoming security events, performing preliminary and secondary analysis, validating events, and escalating to management if events deem additional response action.Documenting event analysis using ITIL processes. Creating security applications use cases. Reverse engineering of malware in some cases.Participating in red teaming and penetration tests.
- Memory analysis of infected devices.Open source intelligence collection and analysis to provide intelligence driven security.Forensic acquisition and analysis of potentially infected devices. Opening tickets for breaches, hacks, and various security events. Participating in security investigations and compliance reviews. Symantec Endpoint Protection, IDS/IPS, Damballa, FireEye, Bit9, Cisco IronPort, Vontu DLP, Palo Alto Networks, Invincea, SQL, data vulnerability and threat assessment. Help develop and review policies, standards, and guidelines and set baselines in some cases.
Confidential, Minneapolis, MN
Data Security Analyst (Information Systems)
Responsibilities:
- Creating, setting up, and modifying users with required security access provisioning configurations to applications, directories, databases, and servers for Confidential employees and affiliates. Conducting quality assurance on identity management tools. Setting up access provisioning workflows. Extensive use of Epic (Citrix), Excellian (ERP), identity and access management applications, and Active Directory.
Confidential, Minneapolis, MN
Field Service Engineer
Responsibilities:
- Installing, moving, updating and integrating computers, workstations, network systems, communications equipment, and peripherals. Managing users and applications access controls to resources in Active Directory. Installing and configuring software upgrades, enhancements and revised functions; verifying functionality, compatibility and performance of IT systems. Implementing technical solutions and workarounds per MPS IT knowledge base articles. Documenting work completed using the IT ticketing system and maintaining IT records following MPS IT guidelines, policies and procedures..
Confidential, Minneapolis, MN
Customer IT Engineer
Responsibilities:
- POS hardware and software support. Managing client assets through Active Directory. Performing installation of hardware, hardware and software diagnostics, maintenance, and repairs, including multi-vendor maintenance with customer satisfaction and asset management as additional areas of responsibility.
Confidential
Team Lead I.T. Security Support Specialist
Responsibilities:
- Windows Server 2008 R2 system administration, virtualization in VMware and Citrix, Active Directory administration, remote support, coordinating I.T. support programs and policies, supervising I.T. security technicians, conducting periodic in-house I.T. security .
Confidential
Responsibilities:
- Linux server administration, managing the information system, database management (builds, patches, installs), network access control, hardware maintenance and repair, software maintenance, maintaining wired and wireless LAN, maintaining the school website, conducting one to one teaching sessions to formulate highly individualized learning programs for struggling learners; students with esteem needs, low memory and low cognition.
Confidential
Group Assistant I.T. Administrator
Responsibilities:
- Windows server administration, managing information system, managing staff and student databases (builds, patches, installs) and setting access controls in Active directory, maintaining CISCO LAN hardware, remote support, hardware service and repair, creating and implementing and indoctrination matrices for new IT hires, creating technical policies, supervising I.T. specialists, virtualization in VMware and Citrix XenApp 5.0 for Windows Server 2003, generating and interpreting daily reports.