It Security Compliance Analyst Ii Resume
3.00/5 (Submit Your Rating)
SUMMARY
- Analytical - minded security professional with 10+ years of IT experience including technical support, system administration, process efficiency, and secure enterprise application deployment.
TECHNICAL SKILLS:
- Active Directory security administration, auditing and management
- Process automation
- SCCM application and security patch deployment, network monitoring and reporting
- PowerShell, VBA, SQL, vbscript
PROFESSIONAL EXPERIENCE:
IT Security Compliance Analyst II
Confidential
- Managed, document and automate process to deliver Role Based Access using SQL scripting and Excel automation. This allowed the collection and organization of over 2,000 job roles.
- Support and manage privilege account audits by creating an automated Outlook email and Excel process. This created privileged access accountability for 5,000 accounts.
- Using PowerShell and SQL scripting, removed stale admin accounts and efficiently organized active directory. This effectively removed 500 unused admin accounts.
- Reported on network file share permissions using Data Insight. This report was used to effectively restructure network file shares to use secure group memberships for permission allocation.
Security Engineer
Confidential
- Worked with a team to implement the single sign on deployment across 4 remote hospital locations, by providing security best practices, security strategy, security architecture, and security design work. This included creating a process to use SCCM as an efficient and reliable deployment and reporting tool..
- Created a successful installation process that resolved Windows 7 compatibility issues with the single sign on program. This allowed the project to run concurrent with the system wide Windows 7 deployment project.
Security Analyst
Confidential
- Increased the efficiency of account provisioning by automating and documenting the account setup process using SharePoint. This increased reliability of account setups, and allowed for quick and consistent training of new security staff.
- Monitored web filtering and antivirus systems to detect and isolate potential malware and virus infected hosts; assisted with incident response including investigative follow-up, assigning responsibility for corrective action, and auditing.
- Worked with the security staff to implement and continuously improve, a user account sponsorship process, that creates secure management of external user account access.
- Added automation and documented the user termination/account audit procedures, which created a consistent and accurate process that could be performed by other security staff.
- Managed team of contractors, who worked to transition the identity management process, over to a corporate partner.
IT Suppport Analyst
Confidential
- Monitored and created reports for the company's intrusion detection system. This included monitoring of employee internet usage and for the identification for network hacking attempts, virus and malware attacks. Resolved desktop virus removal based on intrusion detection system reports.
- Documented security policies and automated security procedures for identify access management, including new user on-boarding and terminations. This allowed for increased accuracy in account setup and the ability to audit the user account access..
- Created documentation, and procedures for a new IP Cisco Call Manager system. This created quicker training of users and staff on the new system.
- Resolved several software compatibility issues that allowed the completion of the upgrade to Windows 7, on 600 desktops.
- Performed day to day VMware and Windows system administration. This allowed our current administrator, the time to work on other network design projects.
- Automated install packages for the entire software inventory. This created quick and consistent installs of complex software packages.
- Created various automated scripted processes that moved excel files received by email, into a UNIX system. This replaced the previous manual order entry system and ran as a scheduled task allowed the process to run at night, so that work orders were ready the next day to be shipped..
- Utilized SCCM reporting tools for software, and hardware inventory.This increased security by accounting for all hardware and software installations, that previously had an unknown location.
- Developed a touch-screen based time clock application, running in a Citrix environment that replaced the current unreliable time clock system in the factory's production environment.
Software Support Analyst
Confidential
- Deployed and administered the Enterprise Symantec server. This achieved successful antivirus administration across 800 desktops..
- Created and implemented process that automated the set up of users, and computers, including installing necessary applications, and setting up security in Active Directory. This created a time savings of 1.5 hours per set up, and increased reliability of user role based security.
- Developed processes for software deployment, patch management, image builds and antivirus management using, scripted utilities, and SCCM. This eliminated previous manual processes and increased efficiency.
- Created documentation for administering user accounts in Blackberry Enterprise Server platform. This documentation was used to train other support staff in Blackberry administration.
Computer Programmer
Confidential
- Lead programmer that was responsible for the accounting, inventory, and payroll systems. Corrected and improved many on-going system problems. Performed system administrative tasks, including user account provisioning, and backups.