We provide IT Staff Augmentation Services!

Arcsight Sme Resume

5.00/5 (Submit Your Rating)

Rehoboth Beach, DE

SUMMARY:

  • Currently working CIBC and MSSP
  • 15 years experience in information technology, Information Assurance.
  • Ability to work independently or within a team environment .
  • Working knowledge of SIEM tools such as ArcSight ESM, Logger, Oracle and MySql
  • Expertise in Inter - networking implementation of Arcsight and Splunk
  • 8 years e xperience with flex connectors using Regex or JSON.
  • Skilled in IT enterprise security ex: tracking and shutting down suspicious activity.
  • Currently, studying and follow the latest trends in the hacking community.
  • Well schooled and groomed in the TCP/IP protocols like DNS, DHCP, FTP, SNMP and SMTP.

PROFESSIONAL EXPERIENCE:

Confidential, Rehoboth Beach, DE

ArcSight SME

Responsibilities:

  • ArcSight SME for HP MSSP, CIBC and CMS
  • Very good with flex connectors using Regex or JSON
  • Installed a 4.5,5.0, and 5.2, 6.0c/6.5c ESM managers and databases
  • Performed a 5.X to 6.0c migration and 6.5c upgrade, 6.8/6.11 upgrade.
  • Rebuilt loggers to 5.3 and 6.2 to 6.4
  • Maintaining 6.5c, 6.8,6.9 and 6.11 CORRE (MySQL), databases
  • MySQL DBA experience through CORRE backend
  • Configured and currently maintaining numerous connectors
  • Consulted on training content tailored to the users’ environment.
  • Built numerous reports for the Logger environment and ESM
  • Created numerous content for ESM 5.X and 6.0c/6.5c/6.8c/6.9/6.11
  • 3 years experience with Splunk (Splunk similar to ArcSight logger)

Confidential, Rehoboth Beach, DE

Security Information Security Engineer

Responsibilities:

  • Develop a solution for a large-scale company issue with Enterprise Messaging for Detecting E-mail Campaigns.
  • Supported security planning, risk analysis, and risk management for on-going security issues.
  • Created numerous Security content for HP/ArcSight ESM 6.5c, 6.8c and 6.9.1
  • 2-years’ experience with Splunk administration (field alias, extractions etc.)
  • Making Splunk dashboards, alert and reports.
  • Identified overall security requirements for the proper handling of Bank data.
  • Developed ArcSight training tailored to the Confidential users’ environment.
  • Efficient with Regex making parsers for ArcSight flex connectors
  • Did In-Depth Data Injection Testing with FireEye, Tipping Point, Blue Coat, and NetWitness
  • Working knowledge with FireEye, Tipping Point, Blue Coat, Symantec Cloud and NetWitness
  • Currently working with the SOC in developing needed content.

Confidential, Reston, VA

Security Engineer

Responsibilities:

  • Configuring ArcSight, ASA firewalls, MARS and Cisco IPS out of box
  • In Charge creating content for Arcsight 4.0 ESM.
  • Worked DIACAP C & A for the GBS program.
  • A full working knowledge of the DIACAP process (focused on the scorecard part for Windows and Unix servers).
  • Currently analyzing, Retina results, Incident Response and Disaster Recovery Planning for The GBS Program.
  • Assuring that all STIG’s are met by each Enclave involved in the C & A process.
  • Consulted on what deliverables should be given to the CA (Certifying Authority).
  • Analyzing scanning results from the DISA Gold Disk and the Retina Scanner.
  • Hardening Windows 2003 according to Gold Disk requirements.
  • Running Vulnerability testing on SCI level servers and computers.
  • Performing FISMA audits weekly by VAT testing.
  • Currently administrating and monitoring Arcsight.

Confidential, Reston, VA

Security Engineer

Responsibilities:

  • Hands-on experience with ArcSight, ISS NIDS and HIDS.
  • Creating rules and filters in ArcSight.
  • Tracked the activity of many worms by using the ArcSight, ISS NIDS and ISS HIDS.
  • Monitor firewall, NIDS and HIDS logs though the use of a SEM tool (ArcSight).
  • A full working knowledge of network security secrets and solutions on Windows, Linux and UNIX networks.
  • I have discovered many computers doing tcp port sweep, udp port sweep, and brute force attack and shut them down
  • Configured policies that were applied to ISS HIDS and NIDS.
  • Troubleshooting security incident though use of packets captured by Sourcefire NIDS.
  • Monitor and analyze all traffic going though two separate networks.
  • Studied and follow the latest trends in the hacking community (know your enemy mentality).
  • Keeping up-to-date on the latest security trends and hacker techniques.

Confidential, Alexandria, VA

Lead Security System Engineer

Responsibilities:

  • Hands-on experience with Net screen firewalls, Symantec enterprise anti-virus, enterprise IDS and ACL’s.
  • Develop password files that were used with lophtcrack to crack\audit passwords for the United States Coast Guard.
  • Mastered Sniffing and analyzing network traffic with ethereal.
  • Excellent working knowledge achieved though daily usage of McAfee IntruShield IDS’.
  • Shutdown infected workstation by contacting the ISSO located in each region of the Coast Guard.
  • Security Test and Evaluation (ST&E): Tested vulnerability by using Nessus and GFI Languard.
  • I have discovered many computers doing tcp port sweep, udp port sweep, and brute force attack and shut them down.
  • Currently, study and follow the latest trend in the hacking community (know your enemy mentality).
  • Currently run the CG CIRT website that is built with Apache and PHP and post the most current threats on this website.
  • Tracked the activity of many worms, Trojans, and virus by using the Intruvert IDS...
  • Pushed out new virus definitions when any new virus that had a category of two or higher were found in the wild.
  • Running testing on cracking passwords with john the ripper and Denial of Service scripts on a test network.
  • A full working knowledge of network security secrets and solutions on Windows, Linux and UNIX networks.

Confidential, Quantico, VA

Network Security Engineer

Responsibilities:

  • Hands-on experience with Netscreen firewalls and vpn’s, Symantec enterprise anti-virus, enterprise IDS and ACL’s
  • Spearheaded our computer forensics effort to investigate suspicious activity IE. Virus’ and brute force attacks.
  • Mastered NetRanger, SAV, Raptor firewalls, Manhunt, TCPdump and scripts that were used to track network activity.
  • Excellent working knowledge achieved though daily usage of network (Shadow) and host based (ITA) IDS’.
  • Shutdown infected workstation though blocking the port on the access switch and denying at the outer router.
  • Security Test and Evaluation (ST&E): Tested vulnerability by doing broadcast ping attacks from the interior network.
  • Discovered the green team doing a tcp port sweep, udp port sweep, and brute force attack and shut them down.
  • Made a report after seeing a user had hacker software and other illegal material on his/her computer.
  • Independently caught two employees downloading pornographic material with Trojan horses.
  • Tracked the activity of the welchia worm by using the TCPdump signature and the Snort built into Manhunt IDS.
  • Pushed out new virus definitions when any new virus that had a category of two or higher were found.
  • Fixed sendmail issues that occurred because of ACL denials, wrong DNS records, or site exchange boxes down.
  • Monitored firewalls for suspicious activity by port number and investigated why a certain site was denied access.

Confidential, Fairfax, VA

Network Engineer

Responsibilities:

  • Maintained a NT/2000/HP-Ux secure network and secure VPN connections to remote sites.
  • Configured and maintained ACL’s on Cisco Pix Firewalls 501 and 515, Catalyst 2900 switches, and routers 3600.
  • Maintained VPN’s and monitored for suspicious traffic from the Internet. (Ex: blaster worm or welchia worm).
  • Working knowledge of how SANS works in a high availability cluster in a HP-UX/ Windows environment.
  • Maintained a Gauntlet firewall between to secure networks that supported a mission critical application.
  • Produced a vb script that pulled data from a paper document and converted into a .txt, .pdf or .doc form.
  • Monitored network activity on a worldwide network containing 90 domain controllers.
  • Redesigned the system administration web page by adding network Visio diagrams while using HTML and Java
  • Designed network architecture for a disk array which included power requirements and network equipment.
  • Worked in Active directory maintaining user rights, policies and privileges.

Confidential, Arlington, VA

System Administrator

Responsibilities:

  • Worked with Active directory security policies (NMCI and Legacy) on two separate domains.
  • Effectively solved software and security issues for customers.
  • Closed more tickets than any other technician during the first quarter of 2002.
  • Configured virtual directories, shared folder permissions, shared printer’s permissions.
  • Configured access permissions for Navy intranet services and web based programs.
  • Validated clients by using the ping, ipconfig and arp commands.
  • Backup and restored Linux backbone with the tar, unmount and mount commands.
  • Partition hard disks on a production Redhat server and a Windows 2000 server production server.
  • Troubleshoot name resolution problems by using nbststat, ipconfig, nslookup and netdiag.
  • Configured group policy logon scripts and links to group policy with Active Directory
  • Managed security daily on two OU’s of high priority for the U.S Navy on the NMCI network.
  • Used Winpe and the recovery console to fix numerous blue screens on clients PC’s.
  • Used Symantec Ghost 2000 to configure all workstations with C2 security and DOD approved apps.

Confidential, Sterling, VA

Technical Support

Responsibilities:

  • Involved in securing hosts and networked systems, Public Key Infrastructure (PKI), centralized Directory Services, and contemporary OS platforms, e.g. Windows NT/2000, UNIX, and Netware.
  • Troubleshot and replaced all defective hardware in workstations and servers ( all types: Windows /UNIX)
  • Managed and updated all hot fixes, patches, and service packs on Window/Unix boxes.
  • Configured and troubleshot all remote access and vpn connections.
  • Used security templates to implement security policies and analyze by using the secedit command.
  • Installed and configured Windows NT 4.0, 2000, and Linux installs.

Confidential, Vienna, VA

LAN Engineer

Responsibilities:

  • Ported over toll free numbers.
  • Fielded calls from the sales team.

We'd love your feedback!