Identity Access Management/security Analyst Resume
2.00/5 (Submit Your Rating)
Plano, TX
SUMMARY:
Experienced professional with proven success as a security analyst with a focus on Identity Access Management and Endpoint Protection. Strong ability to manage projects from concept to completion ensuring their on - time, on-budget, and on-quality delivery. Military veteran with demonstrated skills in working with both business owners and information technology experts to provide optimal business results. Well-versed in system security.
HIGHLIGHTS OF EXPERTISE:
- Project Management
- Business Intelligence
- Strategy and Execution
- Wireless Solutions
- Training and Mentoring
- Firewall Policies and Procedures
- Network Monitoring
- Agile/Scrum SDLC Methodologies
- Process Redesign
- Client Relations
- End-User Training
- Microsoft Office
PROFESSIONAL EXPERIENCE:
Confidential, Plano, TX
Identity Access Management/Security Analyst
Responsibilities:
- Manage identity access management process for the creation, modification, and removal of user-level access across key systems
- Responsible for access controls and integration on Active Directory, Office365, AS400 iSeries, and legacy applications
- Write and use Powershell scripts to create and maintain user accounts
- Responsible for the management of Confidential and endpoint security of workstations and servers
- Increased customer satisfaction for on-boarding process by reducing time between request and completion
- Responsible for security compliance of endpoint protection of over 1200 mobile workstations
- Achieved and maintained 97% reduction in daily threats from 1,151 to 36 through threat detection and trend analysis to spot machines with malware
- Manage Fortigate firewalls, configuring policies, security profiles, virtual private networks, web filtering, upgrading firmware, and managing users
- Investigate intrusion alerts through network traffic analysis using FortiAnalyzer, Meraki Dashboard
- Business Intelligence/Business Analyst III
- Responsible for the creation of project scopes based on business-defined requirements
- Define and document Confidential Controls for more than 120 remote centers
- Collaborate with team members to design stories and develop workable scenarios
- Prioritize stories based on dependencies, logical flow, and value
- Engineer processes to most effectively include software modules, user practices, and business needs
- Produce BI reports, dashboards, and data models
- Research BI and report results to senior leadership. Liaise with multiple business groups to improve BI reporting and analytics.
- Write and implement Confidential processes
Confidential, Houston, TX
Contract Software Trainer
Responsibilities:
- Develop and lead training for end-users, help desk staff and other trainers for on-line ordering and tracking application
- Manage all aspects of training including announcements, invitations, scheduling, confirmations, teleconferencing service set up and on-line hosting, instructions to join on-line meeting and teleconference, and follow-ups
- Create PowerPoint presentation to teach on-line e-business application.
- Utilized on-line hosting vendors to present PowerPoint slide show and live demonstration
- Partner with leadership and programmers to include alterations recommended by end-users during training sessions
- Work under deadline to develop training, review and delivery and other department reporting requirements.
