Cyber Security Engineer / Sr. Devops Engineer Resume
4.00/5 (Submit Your Rating)
Hamilton, NJ
SUMMARY:
- Accomplished Cyber Security Engineer with a unique and extensive background in Dev - Ops configuration management/continuous integration, penetration testing, and zero-day exploitation.
- Experienced with remote-delivery and remote management of assets, all platforms from Linux/Windows/OSX/Solaris, including switching and routing devices.
- Certified Ethical Hacker of virtual, mobile, embedded, wireless and web-enabled devices.
- Experienced with supporting Defense and Healthcare markets, detailed understanding of OPSEC procedures and requirements.
- 11 years of experience with protocol characterization/manipulation & vulnerability assessment of network nodes, appliances, switching/routing devices, phones, tablets and embedded devices.
- Expert level skills with Linux servers, VMs and embedded devices.
- Created marketable capabilities currently in use using RaspberryPi and Arduino embedded boards.
- Authored white-papers and offered training for clients and colleagues.
- Cyber Intelligence, exploit development, identification, prevention, and remediation.
- Linux systems administration, Solaris administration, Windows Server administration
- Penetration testing, exploitation, security assessments of network switching routing equipment
- Protocol vulnerability analysis, hacking, verification & sandbox testing
- Ethical/Black Hat hacking of mobile, embedded & wireless devices (Android, iOS, Linux)
- Analysis and development using NMAP, Nessus, Nagios, Metasploit, Nexpose Tcpdump/Snoop, Idapro, Hexdump
- Regression testing, stress/load testing of web applications, back end, and mobile device management applications
- Continuous Integration, Configuration Management, Jenkins, Vagrant, Sonatype Nexus, RHEL Satellite, Docker.
- Database technologies Oracle/Mongo/SQL
- McAfee Enterprise AntiVirus, Host Intrusion Protection, McAfee e-Policy Orchestrator.
- Atlassian Administrator (JIRA, Confluence. Fisheye, Stash, Crowd)
- Operation of Cisco IOS, IOS XR, Qualcomm QXDM, QPST, QCAT, Gemalto CardAdmin, Ixia, SIEM tools
- EMM, Mobile Device Management debugging, device provisioning, SIM/CSIM/RUIM/USIM module provisioning
- Capability development and prototyping using RaspberryPi/2, Arduino, Teensy, BeagleBone, Gumstix
PROFESSIONAL EXPERIENCE:
Confidential, Hamilton, NJ
Cyber Security Engineer / Sr. DevOps Engineer
Responsibilities:
- Reverse engineered equipment of interest, extracted and disassembled binaries, identified suspected back-doors and debug modes resident in embedded equipment and binaries. Created a network sandbox to capture, analyze, and identify interesting network communications in real-time.
- Created Mobile Device sandbox to develop and test exploits. Mobile device sandbox is based on an Ubuntu 14 Virtual Machine and includes Metasploit, Browser Exploitation Framework, BurpSuite, and PCAP analysis tools (Wireshark, tcpdump). Characterized Mobile Phones and Tablets through Cellular and WiFi, Characterized MDM/EMM devices.
- Used IdaPro to disassemble/take apart binaries, used GNU tools to parse for strings in binaries looking for interesting debug clues. Created Virtual Machines and sandbox environments to reverse engineer applications of interest. Soldered to pcb boards and dumped entire filesystems when necessary in an attempt to re-create files needed to understand application behavior.
- Characterized and conducted vulnerability assessments on carrier-grade Evolved Packet Core elements (MME, PGW/ SGW/HSS/CG/Cisco). Created “golden image archives” of network elements (blade servers and embedded block devices). Developed and documented a repeatable process "roll-back" state for penetration testing, development and testing purposes. SIEM for entire Evolved Packet Core network.
- Created a Linux based capability platform and secure framework utilizing embedded boards (Raspberry Pi/2, Beagle Bone Black, Gumstix). This capability platform is a hardened customized version of OpenWRT, offers remote access & control, and can be expanded and customized for specific demands.
- Management of Operations & Maintenance FISMA Low/Moderate/High Cloud infrastructure. Platform as-a-Service (PaaS), Infrastructure-as-a-service (IaaS) virtual cloud environment including SIEM, EAV, EMM. Design, Implement and update infrastructure. Experienced with Verizon Terremark Enterprise Cloud and AWS.
- Supported multiple Agile/Scrum teams, helping solve the most complex issues for the teams ranging from McAfee Enterprise AntiVirus - McAfee ePO Server communication issues, to complex Mac OSX Vagrant continuous integration and build environment issues.
- Migrated machines from Virtualbox to Verizon Terremark Enterprise cloud, worked with Verizon to solve bugs in their front end/back end that would not allow proper import of OVF files.
- Managed multiple projects and teams simultaneously. Created project plans to support virtual machine migrations to obtain Authority to Operate (ATO). Coordinated with Cloud provider and vendors to operate, implement, and troubleshoot.
- Authored white-papers related to vulnerabilities discovered from characterization of networks and mobile devices.
- Expert level operation of Qualcomm QXDM/QCAT tools for network protocol analysis and log processing.
- Captured user traffic through LI (Lawful Interception) and combined this information with matching network protocol data.
- Performed biometric system vulnerability testing. Hardware and software analysis, embedded minicom communication. Characterization of multiple embedded units with perl/bash automation scripts.
- ATCA Linux characterization & administration. Solaris High Availability cluster management. SIEM, ArcSight, Splunk.
Confidential, NJ
Field & QA Support Specialist / Cyber Systems Administrator
Responsibilities:
- Created custom Linux kernels in CentOS, Ubuntu10, OpenSolaris to support wireless penetration testing & development. Used BEEF (Browser Exploitation Framework) to characterize vulnerabilities in a wide range of clients (network nodes, tablets, phones, PCs) Embedded Gingerbreak and Zimmper exploits into web pages for Android Exploitation testing. WiFi WEP/WPA/WPA2 encryption cracking using Aircrack, Reaver, WPAcrack. IP Forwarding and MITM (Man In The Middle) attacks to gather and collect information, captured Ethernet logs for post analysis, DDoS attacks on clients. Android Exploitation including upload of malicious applications to gain control and track GPS coordinates of a user's device.
- Evaluated and reverse-engineered vendor RF systems and equipment. Vigorous testing of equipment to find bugs, flaws, and identify potential issues that may impact functionality.
- Deployed virtual server appliances/clusters with SFTP, FTP, WEB, DNS, DHCP services in Linux, Windows, and Solaris hosts. Configured a custom kernel Fedora 7 Server, installed development tools and source management system. Added TFTP Server with PXEBOOT for multiple distribution unattended installation over the LAN. Choices for automated installation - Ubuntu, Fedora, or CentOS base system, also implemented kickstart/preseed options available to customize any distribution. Deployed Asterisk VOIP Servers.
- Worked with Aeroflex and Verizon Wireless to perform carrier acceptance. Built and deployed virtual appliance with OpenIMS for 4G LTE devices. Communicated with devices through ADB.
- Extensive application and hardware level testing of 4G LTE, GSM/UMTS, CDMA/EvDO mobile phones and devices. Rooted/Jailbroken/Flashed images. Characterized network behavior of mobile phones and devices.
- Successful design of a CDMA Portable Test System. Supervised production team to build & test all components of the system. Created version system to properly track production revisions, documented all changes and updates.
- Authored product documentation, product data sheets, and hardware assembly guides. Created RMA process, maintained line of communication with customers to troubleshoot, resolve issues, and maintain satisfaction with our products.
- Increased productivity by mentoring others, explaining advanced testing methodologies. Enforced strict detail on the importance of regression testing and proper documentation during the test process. Developed software Acceptance Test Plans for mobile applications, ensured proper and efficient integration test execution. Created UATs (User Acceptance Tests) to ensure proper operation & end user satisfaction. Created project schedules, distributed tasks for production QA team.
- Extensive experience in GUI testing, WEB-UI testing, reverse-engineering and back-end testing/verification.Proficient with unit testing, regression testing, integration testing, stress and load testing.
- Configured LTE Femto cell, burned 4G USIM cards for Android 4G Devices, used Linux back-end server to forward data and web services to all mobile devices on the 4G Femto Cell, tested 4G packet loss and packet speed over TCP/UDP.
- Created Linux CentOS machines running Asterisk VOIP gateway software and provisioned Android phones to communicate through VOIP to clients on private encrypted cellular communication networks. Characterized VOIP performance.
- Worked with Telecom Base-Station vendors to debug, identify & resolve protocol issues resulting in product success.
- Expert level operation of QUALCOMM CAIT & QXDM/QPST/QCAT tools to monitor behavior of multiple LTE, UMTS, CDMA phones, processed and filtered through protocol logs to characterize phone behavior.
- Ability to operate various test equipment including spectrum analyzers, signal generators, and power meters to ensure proper RF functionality.
- Expert level testing of Airwalk Communications CDMA IP-RAN BSS and PICO-Cell units, IPAccess, Nokia MetroSites, DRT units, TEMS, NEMO Handy, and Sagem drive test tools.
- Configured and maintained Microsoft Exchange Server to deliver secure e-mail and Outlook services to clients world- wide. Secured environment with Barracuda Spam Firewall and Sonicwall SPI Firewall. SIEM alerts and analysis.
- Managed internal network with VPN and SSH connectivity, created users and groups to allow network access. SSH into remote terminals to perform upgrades on all nodes in network, installed VNC remotely to have GUI access on specific machines.
- Backup and restoration of network nodes using Clonezilla and TrueImage. Created a virtual appliance able to perform Multicast PC restoration using FOG project (Free Open Source Ghost).
- Created Linux bash scripts to automate creation of Linux installation packages, created Debian packages for Ubuntu, and RPM packages for CentOS. Deployed apt repository, configured apt-cacher.
- Trained others to operate QXDM Pro, Gemalto Card Admin, QPST, Loadrunner, Ixia Chariot, TEMS, NEMO.
- Implemented & deployed bug tracking system “Bugzilla” on the internal LAN.