We provide IT Staff Augmentation Services!

Information Security Analyst Resume

4.00/5 (Submit Your Rating)

Mclean, VA

SUMMARY:

  • IT professional with experience in IT configuration, information security, system configuration, and technical support.
  • Dedicated professional with a master’s degree in Cybersecurity and Information Assurance and, with an excellent work ethic.
  • Experience in a wide range of technology with the ability to learn quickly and adapt to new environments.
  • Knowledge and experience in Network Security, Server, and Endpoint Vulnerability Assessment, Penetration Testing, Network Traffic Collection and Investigation/Analysis, Malware Analysis, Mobile Device Forensics and Analysis, Network Forensics
  • Platforms: Windows 7/8/10, Windows Server 2008/2012R2/2016/2019, Unix/Linux, Mac OS, Android, Apple iOS, Citrix XenApp 6.5/7.X, XenDesktop, Citrix PVS, Citrix StoreFront, Citrix Delivery Controller, Citrix Director, Studio, NetScaler, VMware ESXi, Visual Studio, Eclipse
  • Knowledge of industry security standards (ANSI - ISO/IEC 27001/27002 , NIST SP, NIST SP, NIST, NIST SP, COBIT, HIPAA, PCI-DSS, FISMA)
  • Knowledge and experience with SIEM (SolarWinds Log and Event Manager, IBM QRadar, Splunk)
  • Experience with Risk Management Framework (RMF)
  • Knowledge and experience with LAN/WAN, WLAN, TCP/IP, DNS, DHCP, VPN
  • Programming Languages: Java, Visual Basic, HTML, SQL
  • Familiarity with Digital Forensic tools: Encase Enterprise Edition, Autopsy/Sleuth Kit, FTK
  • Vulnerability Scanning and Analysis: Nessus, QualysGuard, OpenVAS
  • Experience analyzing protocols with Wireshark, using Wireshark and NetWitness investigator to analyze wireless traffic
  • Experience configuring pfSense Firewall on the client and server, configuring VPN client for secure file transfers
  • Knowledge and experience of Sniffing Tools: Wireshark, SteelCentral Packet Analyzer, Tcpdump, Windump, Capsa
  • Experience with Microsoft Azure, AWS

WORK HISTORY:

Information Security Analyst

Confidential, McLean, VA

Responsibilities:

  • Perform daily SOC tasks and ad hoc security functions, including but not limited to maintenance, administration, deployment and testing of IT SIEM tool
  • Perform system configuration, system tuning, and license management for optimum SIEM performance
  • Perform system monitoring, incident detection, response, and investigation, offense investigation, and provide report to client on findings
  • Investigate security events and dashboard alerts
  • Interface with vendors and client/agency to communicate security issues, alerts and submit related support request to product vendors
  • Establish configurations that ensures event notifications are distributed to the proper management, and support staff
  • Perform periodic and on-demand system accounts audits, user accounts, and service account audits
  • Performing on-demand requests using BMC Remedy to create, manage and track incidents
  • Experience with creating routing rules in QRadar, configure and manage log sources (Syslog, JDBC, Microsoft Security Event Log, etc.) and managing QRadar applications
  • Overall management and engineering of the QRadar SIEM environment
  • Research, evaluates, recommends, communicates and stay current on emerging tools, techniques, and technology
  • Generate and distribute formal documentation from security tool
  • Configure and integrate REST APIs to communication with SIEM
  • Support the agency’s Continuous Diagnostics and Mitigation (CDM) program
  • Ensures that all project life cycles are following U.S Dept. of the Treasury standards and procedures

Cyber Security Consultant

Confidential, Dallas, TX

Responsibilities:

  • Install, configure and administer vulnerability scanning tools (Nessus)
  • Analyze security systems, and applications and provide security recommendations
  • Install, configure and administer SIEM (SolarWinds Log and Event Manager, IBM QRadar)
  • Perform vulnerability analysis/security assessment on systems to detect possible vulnerability and apply appropriate remediation action
  • Perform network scanning and enumeration using tools such as Nmap and advanced IP scanner
  • Perform forensic analysis
  • Manage Endpoint Detection and Response (EDR) tool
  • Firewall configuration and implementation
  • Evaluate security incidents and report possible threats
  • Experience in incident detection, investigation and handling with IBM QRadar
  • Planning, deploying and maintaining QRadar
  • Knowledge and experience with QRadar architecture
  • Experience and knowledge performing offensive investigation and offensive handling on QRadar
  • Experience and knowledge with data collection, flow collection and performing vulnerability scan
  • QRadar event searching and virtualization

Graduate Student - Cybersecurity and Information Assurance

Confidential, Clayton, MO

Responsibilities:

  • Focused on designing and protecting computer networks, secure physical and logical network architecture design for both wired and wireless networks to maximize the security of a computer network
  • Network device configuration, secure network segmentation strategies, perform root cause analysis to determine the source of network-related problems and recommend mitigation approaches/solutions, OSI and TCP/IP model for designing and building secure networks
  • Ethical Hacking (CEH)
  • Focused on security threats, penetration testing, vulnerability analysis, denial-of-service, IDS, firewall, risk mitigation, business-related issues, and countermeasures
  • Covers various network and system hacking concepts, session hijacking concepts, and cryptography, Web Application and Server vulnerabilities, techniques used in social engineering, SQL injection, hacking mobile platform, IoT hacking, ethical and legal issues related to the unauthorized access of information assets
  • Vulnerability assessment using Nessus and reporting process, CGI scanning with Nikto, and SIEM
  • Various techniques used in open-source information gathering, network scanning, and target enumeration
  • Forensic and Network Intrusion (CHFI)
  • Focused on detecting hacking attacks and evidence extraction to report a crime, conducts audits to prevent future attacks, computer forensics in today’s world; media and operating system forensics; data and file forensics; audits and investigations; and device forensics
  • Forensic investigations of physical and virtual devices such as routers, e-mail servers, mobile devices, and personal data assistants (PDA), network systems and file audit
  • Cybersecurity Graduate Capstone
  • Protecting Organization Assets through Vulnerability Scanning and Penetration Testing

System Engineer

Confidential, Kansas City, KS

Responsibilities:

  • Daily work activities in a Backend Unix/Redhat and Windows environments
  • Unix: Filesystem creation in Red Hat and CentOS
  • Logical volume, physical volume and volume group creation, and management
  • Performed system troubleshooting using internal tools
  • Create and manage users accounts on backend RedHat servers
  • Cerner millennium troubleshooting using internal and external troubleshooting tools to resolve customers issues
  • Experience using ServiceNow and BMC Remedy to create, manage and track incidents/change management control
  • Managed Server Shares
  • Experience with system monitoring, event response, virtual machines, and service monitoring with monitoring tool such as Zabbix
  • Experience supporting Virtualization (vSphere) Exsi, VMware, Hyper-V, VMware vSphere Web Client, Windows Server 2008/2012R2/2016
  • Experience with Cerner software configuration, integration and troubleshooting (PowerChart, Millennium Mobile, CareAware Connect Mobile solutions, Fetalink, FirstNet)
  • Experience with Microsoft Active Directory, administration and management
  • Installation and Configuration
  • Active Directory Users & Computers
  • Creating & Managing User / Computer Accounts
  • Managing Account s
  • Resetting Passwords
  • Managing AD OU Structure
  • Create and Manage groups in AD
  • Experience with IBM Web Services (Windows/Linux) and JVMs
  • Install, configure and provide support for IBM WebSphere applications, and JVMs
  • Knowledge of MQ queue manager
  • Performs regular software updates and Windows security patches
  • Performs Windows security patches using PowerShell script
  • Software and application installation/upgrades
  • Participate in Windows/Unix Server and VMware tuning for optimal performance
  • Research, identify and resolve applications or hardware performance/reliability issues
  • Install, configure and provide support and client access for Nuance Dragon software
  • Experience with KOFAX installation build, configuration, management, troubleshooting, and migration
  • Experience with Royal TS for remote desktop connection and troubleshooting
  • Build, configure, Implement and manage Citrix PVS servers, Gold Master server, XenApp, XenDesktop, and Delivery Controllers
  • Experience using Jira to submit and track issues
  • Business Objects SAP installation, configuration and troubleshooting
  • Microsoft SQL Server installation, configuration, and maintenance
  • Experience with PowerShell scripting for software installation, Windows registry updates, file and folder updates, managing services
  • Create and support the infrastructure which Cerner technology runs

IT Support Technician (Student Manager)

Confidential, Indiana, PA

Responsibilities:

  • Assigned tasks to other IT student workers and ensured that all assigned duties were completed successfully
  • Imaged and configured PCs for staff, classrooms, computer labs, and auditoriums
  • Imaged systems with Windows operating systems
  • Installed, configured and provided support for third-party applications
  • Package installation with Microsoft Software Installation (MSI)
  • Installed and set up new PCs and peripheral devices in Offices, auditoriums, computer labs, lounge areas, and classrooms
  • Peripherals such as mouse, keyboard, microphones,
  • Performed LAN/WAN and network printer troubleshooting
  • Configured and provided support for local and wide area network included wireless printers
  • Configured and set up wireless network connection for staff and students on their handheld devices such as iPods and Android tablets, Microsoft Surface Pro and mobile phones
  • Maintained and troubleshoot technology equipment such as printers, pdf scanners, projector, laptops, Desktop PCs
  • Windows operating system build, installation /configuration, joining workstations to domain

Information Technology Service Delivery Intern

Confidential, Exton, PA

Responsibilities:

  • Imaged laptops and PC on a stick
  • Windows OS Image and software deployment using Microsoft
  • Imaged and set up new computer systems with Windows operating systems with Windows 7/8 operating system
  • Inspect and re-imaged returned PCs
  • Performed PC upgrades, troubleshooting, and maintenance
  • Prepared PCs for shipment to various location for remote workers
  • Performed password reset, unlocked user accounts
  • Rendered remote and over the phone technical support to remote clients
  • Printer troubleshooting and ink replacement
  • Make use of Active Directory for users and computer management using Windows Server 2012 R2, Microsoft Office 365 for daily office activities, Skype for business (client communication and troubleshooting), and SharePoint development
  • Maintained the ITSD assets and inventory database
  • Make use of help ticketing system to resolve client PC issues
  • Configured Microsoft outlook email client for customers

IT Support Technician Student Worker

Confidential, Indiana, PA

Responsibilities:

  • Imaged and configured PCs with Windows 7 OS
  • Provided technical support to staff members and students
  • Identified and resolved technical issues in a prompt and reasonable manner
  • Identified and resolved technical problems with network printers, copiers, pdf scanners, office desktop printers, network troubleshooting, E-mail client not sending and receiving emails, fixed issues with LAN and WAN
  • Collaborated with other IT student workers to work on projects
  • Configured VPN connection on laptop PCs
  • Package installation with Microsoft Software Installation (MSI)
  • Make use of the university-wide ticketing system to help resolve customer related issues
  • Rendered remote desktop support and in-person assistance
  • E-mail client configuration, such as Thunderbird and Outlook
  • Viruses and malware scanning and removal (Sophos and Malwarebytes)
  • Configured and provided technical support for wireless network connection on Android phones, Microsoft Surface Pro, iPads, and iPhones

We'd love your feedback!