Senior Software Security Consultant Resume
Jersey City, NJ
SUMMARY:
Information Security AnalystVulnerability Assessments - Networking - Penetration TestingProven leader known with great adaptability and uncandid passion - Senior Analyst with demonstrated ability in Information Security. I have deep roots in the Application Security, Risk Management, Software Security, Secure SDLC, as well as Security Awareness and Training. Prior to immersing myself into security I worked as a Software Developer.
TECHNICAL SKILLS:
- HP WebInspect
- HP Fortify
- Burp Suite
- AppScan
- Nexpose
- Metasploit
- Kali Linux
- Vale
- SET
- BeEF
- TCP/IP Protocol Suite
PROFESSIONAL EXPERIENCE:
Senior Software Security Consultant
Confidential, Jersey City, NJ
Responsibilities:
- Developed Java program that performs frequency analysis on security logs. Post analysis the data was present in visual charts and graphs.
Information Security Officer
Confidential, Chicago, IL
Responsibilities:
- Accountable for maintaining portfolio of 7 applications in regards to identifying risk and supporting controls throughout the entire application lifecycle.
Staff Consultant Cyber Security
Confidential, Chicago, IL
Responsibilities:
- In-depth understanding of OWASP, CWE along with hands on testing of vulnerabilities
- Participate in daily/monthly meetings with the Information Security management team
- Manual source code analysis
- Deploying Security tools & applicable database and application servers
- Triage results from application scans, and prioritize findings
- Preparing Fortify Vulnerability reports. .
- Triaging with development to understand assessment results and provide guidance on the remediation of vulnerabilities
- Scripting and developing in variety of languages: Python, Bash, etc.
- Communicating advanced technical security requirements to technical and non-technical personnel
Application Security Analyst
Confidential, NJ
Responsibilities:
- Responsible for information security & influence security decisions.
- Responsible for auditing suite of security tools (WebInspect, Fortify).
- Perform internal and external vulnerability scans (Static, Dynamic, & Network) and analyze results from vulnerability scans.
- Ensure access to all information systems is controlled, both internally and externally, commensurate with the level of potential risk. Recommend appropriate corrections.
- Coordinate mitigation efforts for web application vulnerabilities as well as server vulnerabilities amongst developers and project managers.
- Involved in creating hardening guides for various OSes and Server types.
- Perform white box penetration testing for all internal applications.
Programmer Analyst (JAVA)
Confidential, New York, NY
Responsibilities:
- Using numerous APIs including Amazon Marketplace Web Service retrieved orders XML via API, execute various manipulations on the data and prepare results to be translated in the next EDI process.
Software Engineer
Confidential, Princeton, NJ
Responsibilities:
- Automated Hardware & Software licensing notification system for sales team. Completely eliminating human involvement in this process.
- Contributed software engineering expertise in the development of new GUI through the software lifecycle, from requirements definition through successful deployment.
- Excelled in rapid application development of enhancements and resolved hundreds of problem request in existing product.
- Significantly improved Cloud Based Automation project which removed manual process of installing daily software builds on server units by making it multi-threaded. This ability allowed multiple server to be installed simultaneously.
Junior Software Engineer-Intern (JAVA)
Confidential, New York, NY
Responsibilities:
- Provided design and programming support for enhancement of Web application accessed by thousands of clients worldwide.
Programming 101 Instructor (JAVA)
Confidential, Princeton, NJ
Responsibilities:
- Taught future developers OOP (Object Oriented Programming) using numerous tools. Students learned basics including variable, methods, control-flow, classes & objects then OO concepts comprising of Encapsulation, Data hiding, Inheritance and more.
- Assisting in student completing project upon creating of course, text-based games including hangman.