We provide IT Staff Augmentation Services!

Event Analyst - Information Security Resume

Glen Allen, VA


As an IT Security professional with an additional 10 years of customer service experience, working from a secure first basis I have brought my experience to companies in a security role administering and analyzing firewall implementations, hardening switches, routers, and configuring other network hardware and software requisite upon company demand even from the ground up.


Security auditing and Hardening of company wide policy and safe practices for Networks, Host and Network based Intrusion detection and Packet Analysis, Application layer intrusion security software including web server and Proxy, Database front end and back end security, Honeypot implementation, VPN configuration, SSL, Nessus Security Vulnerability Appliances, Splunk, Sguil, Wireshark, APT and Cybercrime Kill Chain methodology, Systems forensics, Biometric standards, CISCO and Juniper firewalls, routers/switches, Checkpoint security appliances, Load and Quality of Service testing, Compliance Assessment and Penetration Software, HIPAA, Sarbanes - Oxley, Gramm-Leach-Bliley and PCI Compliance, Familiarity with Burp web security, Familiarity with Samurai web testing framework, Windows 9x/NT/2000/XP/Vista/7/8, Windows NT/ 2000/2003/2008 Server, Linux, Apache, OSx, TCP/IP in depth theory, Exchange Server, Internet Information Server, Active Directory and NTFS permission oriented setup, Visual Basic, Perl Scripting, MS Office, Novell, Citrix/Metaframe/VMware, Norton Ghost, Point of Sales and industry specific software,Telxon hand-held configuration.


Confidential, Glen Allen, VA

Event Analyst - Information Security


  • Served as the triage escalation point for the multinational organization's mission critical data security concerns using Cyber Kill Chain methodology.
  • Duties include collaboration, mentoring, and intensive daily research into emerging APTand Cybercrime threats to the CERT specializing in network and host malware analysis using Live Response, Log Analysis, and Reverse Engineering.

Confidential, Chesterfield, VA

Hardware and Systems Security auditor


  • responsible for locating and securing vulnerabilities to the continued use of computers, routers, firewall, and intrusion prevention and detection systems.
  • Sites involved inventorying, presenting report findings and security recommendations.

Confidential, Morgantown, WV .

System Adminstrator


  • As a System Administrator tandem, administered enterprise network, secured Active Directory, firewall access control including packet analysis for future intrusion prevention, implemented backup strategy and expanded contractual federal government sensitive network used for entities.
  • Remotely handled end user and client sensitive technical calls related to security issues including firewall, IDS, IPS rule and access assessment and network questions for other contracted companies.

Confidential, Irvine, CA

Systems roll-out and configuration Technician


  • Provided recommendations and reconnection of networks including switches, routers, intrusion detection systems, and firewalls to new locations often with workstations and servers numbering in the hundreds.
  • Reconnected over 15 major companies’ network resources to making sure system security and availability is as was before relocation while maintaining, network bandwidth quality of service with network security in mind by utilizing load balancing and testing geared to the specific needs of the client.

Confidential, Carson, CA

Migration/Installation Administrator


  • As part of an IT team, provided seamless transition of workstations and laptops to end users. Implemented network security in the form of predetermined parameter personal firewalls and VPN/IPsec tunneling to each client before end user received machine for connection to client network while installing proprietary and personally required software.

Confidential, Irvine, CA

Desktop/Server/Network Analyst


  • Provided administration and security policy implementation for network, software, hardware, firewall, and intrusion detection systems.
  • Provided application optimization. Consulting was for the well known company Confidential within a concentrated team unit in which data security was a must with HIPAA regulations.

Confidential, Irvine, CA

Technical Support


  • Provided first and second line technical support to end users dealing with LAN/WAN, VPN, DSL/Cable modems, Routing, Personal Firewall Appliances, Print servers, and Wireless connections with over 98% call team resolution.

Confidential, San Diego, CA

System Administrator


  • Resolved network administration issues within a two-month period.
  • Maintained LAN/WAN stability to remote sites, while maintaining Active Directory cross-site and cross-domain security.
  • Using packet analysis software achieved maximum quality of service meeting clients needs and requirements while preventing unauthorized network traffic.
  • Trained all end users at site in the use of PC and secure operating system practices leaving behind a security policy framework.

Confidential, Fountain Valley, CA

Computer Tech


  • Maintained and left a secure LAN/WAN environment at Confidential with Window NT and 9x Solutions.
  • Replaced as needed, hardware and software while instructing students and teaching staff of security issues and proper PC/MAC use.

Confidential, Irvine, CA

Network and Security Consultant


  • Resolved numerous on/off-site system administration, engineering, and troubleshooting issues applying needed solutions as indicated.
  • Implemented NT/2000/9x Network and various software and or hardware solutions.
  • Trained businesses in use of new network and hardware solutions.
  • Implemented company wide Point of Sale software system.

Confidential, Huntington Beach, CA

Liquor Department Manager


  • As part of supermarket environment guided customers, supervised lesser experienced associates and supervised outside vendors to synergistically expand sales from $22,000 to $35,000 per week.

Hire Now