Info Security Analyst Resume
2.00/5 (Submit Your Rating)
SUMMARY:
To secure an opportunity working as an Application Security Engineer
PROFESSIONAL EXPERIENCE:
Confidential
Info Security Analyst
- I support Anti - Malware Infrastructures and Clients (e.g. Symantec Endpoint Protection 14 and 14 MP1, McAfee)
- I take on a high level of responsibility, initiative, and accountability
- I am adept at collecting, summarizing, and documenting highly technical content, such as software business requirements.
- I have a strong attention to detail and accuracy skills
- I have strong collaboration and partnering skills
- I have the ability to manage multiple and competing priorities
- I manage complex issues and develop solutions
- I have the ability to work with limited supervision
- I have experience working with a software development team.
- I have strong communication skills; verbal, written, and interpersonal.
- I have a working knowledge of the Windows
- I have experience working in the Information Security field with clear understanding of security policies and procedures.
- I have experience with implementing Application and Device Control and Host Integrity configurations
- I have experience with implementing and/or supporting Splunk infrastructures.
- I have knowledge of formal Infrastructure engineering disciplines, hands-on experience with managing server and/or appliance infrastructure, and all phases of engineering lifecycles (SOW, BRD, Installation and Configuration document creation and support).
- I support and administer Bromium 3.2 and Bromium 4.0
- I am also responsible for the configuration of ATP and the Splunk and Nagios configuration of these ATP Appliances
Confidential
Information Systems Security Engineer
- Administration of Tenable Nessus and Security Center
- Tuning, configuration and implementing custom scanning profiles in Nessus
- Supports customers at the highest levels in the development and implementation of doctrine and policies.
- Applies know-how to government and commercial common user systems, as well as to dedicated special purpose systems requiring specialized security features and procedures.
- Performs analysis, design, and development of vulnerability assessment reporting and dashboards.
- Analyzes security requirements for the management and administration of vulnerability assessment technology.
- Designs, develops, engineers, and implements solutions that meet security requirements (relating to vulnerability assessment and management).
- Analyzes general information assurance-related technical problems and provides basic engineering and technical support in solving these problems.
- Evaluate that all information systems are functional and secure.
- Occasionally provide security engineering and integration services to internal customers.
- Deploy new Nessus vulnerability scanners, and Security Center management platforms.
- Administer IT security technology such as Tenable Nessus, and Tenable Security Center.
- Assess existing vulnerability management infrastructure and identify key system flaws
- Perform administrative and engineering work on Security Operation Center tools such as Remedy, Service manager, etc.
- Develop detailed supporting documentation regarding technical projects (such as materials to support an architecture review board)
- Provide recommendations on collection, processing and distribution systems in the cyber security market
- Manage customer expectation and attend all mandatory review / regulatory discussions related to the specific project being delivered
- Operates with appreciable latitude in developing methodology and presenting solutions to problems
- Contributes to deliverables and performance metrics where applicable
- Experience in networking (TCP/IP) protocols, computer/network security, and system administration.
- Background in INFOSEC operations, vulnerability assessment, and security-scanning tools
- Worked with configuration of sensors on CentOS platform to install and configure Snort
- Creation of Run Books and SOPs using Requirements documentation to fully document the Sensor, Vulnerability Management and the Network Infrastructure configuration and process during the transition phase.