Cybersecurity Engineer/analyst Resume
2.00/5 (Submit Your Rating)
Vienna, VA
SUMMARY:
- Cybersecurity professional of 9 years who specializes in listening and securing information systems. Skillset consist of operational/advisory services in the following: intrusion detection and prevention, network threat analytics, threat intelligence (Indicators of Compromise/IOC), protect information networks/systems utilizing/implementing security controls, NIST, FISMA, RMF, FIPS, SRTM, POA&Ms, vulnerability assessment/remediation’s, Familiar with System Security Plans (SSP) and finalizing design/modifications of architectures, ATO process, data spill management, incident response, Splunk, HBSS, knowledge of firewalls, insider threat, SIEMs and similar security tools.
- Competent, dependable, articulator willing to effectively communicate processes, controls and tools to ensure a secure information system.
PROFESSIONAL EXPERIENCE:
Cybersecurity Engineer/Analyst
Confidential
Responsibilities:- Splunk Administrator providing Log Monitoring (events, logs, system health) and implements, configures, builds/creates Splunk dashboards and reports using the indexes, etc. Also, investigates potential escalations regarding various attack types utilizing the Splunk ESM (SIEM).
- Splunk ESM (SIEM) analyst - Monitoring for emerging threat patterns, vulnerabilities and triages incidents, their priority and the need for escalation as well as the ability to use the analysis and trends of the security log data to tell a story or to explain the what, when, and where of an event/incident (trend analysis)
- System Administrator for HBSS (DLP, ePO, HIPS): Deployment, configurations, implementations, and build guide as well as tuning (writing exceptions). Also, provides CIS CSC Top 20 documentation
- Incident Response - Cyber threat hunting, proactive threat research and coordinates detection, analysis and remediation activities on attacks that impact information assets
- Security Assessments to detect network vulnerabilities scans/remediation/compliance reporting (ACAS Security Center, Nessus, Dell/Quest Change Auditor, Wireshark)
- Assist with developing procedures and NIST/RMF policies for initial stand up of a security operations center (SOC) communicating how tools or solutions meet security controls/SRTM (defense-in-depth).
Jr. Information Assurance Engineer
Confidential, Vienna, VA
Responsibilities:- Provided daily analytics utilizing Splunk, HBSS (McAfee), Insider Threat, Threat Intelligence, Indicators of Compromise (IOC) to ensure that threat based applications were addressed.
- Threat Intelligence - Created profiles for threats that identified the likely intent, capability, and target. Also, ensured that threat information sources that addressed all components of the threat profile were prioritized and monitored.
- Analyzed Indicators of Compromise for the development of cyber threat summaries that included risks to the institution and provided recommendations to consider.
- Incident Handler/Responder for enterprise data spills, managed risk with custom Risk program and SRTM.
- Application Whitelisting administration (ForcePoint WebSense)
- Provided expertise and guidance for system accreditation process (ATO), change management and vulnerability assessment - risk/mitigations (POA&MS), enforced polices/compliance.
- Provided support as acting authority for the ISSO implementing ICD 503, CNSS, NIST, FISMA, SSP, etc.
- Assisted and Wrote system security plans for information systems, conducted security reviews and system audits, conducted risk/vulnerability assessments (Nessus, etc.).
Citywide IT Security Specialist
Confidential, Washington, DC
Responsibilities:- IDS Security Application Analyst/Administrator junior who Provided security based Application Analyst functionality: monitored, implemented, assessed and authorized security control compliance for HBSS/Intel Security ePO, oracle PeopleSoft, Phire architect, FireEye alerts, etc.
- Provided guidance and risk mitigation strategies to communicate risk assessment findings as well as analyzed threat analysis from FireEye email reports and communicate those findings with the Application Security team to process vulnerability scans/custom vulnerability status reports. Analyze system and audit logs and identify potential issues with policies and compliance (Information Assurance)
- Deploy applications and services related to password updates, application patches/upgrades (HBSS) and operating system provisioning, encryption and monitoring.
- Enforced VPN multifactor authentication as well security measures to ensure proper password encryption, authentication methodologies and proper access policies for the remote access server infrastructure.
- Understood as well as managed the complete lifecycle processes for Cybersecurity Insider Threat.