We provide IT Staff Augmentation Services!

Info Security Analyst Resume

2.00/5 (Submit Your Rating)

SUMMARY:

To secure an opportunity working as an Application Security Engineer

PROFESSIONAL EXPERIENCE:

Confidential

Info Security Analyst

  • I support Anti - Malware Infrastructures and Clients (e.g. Symantec Endpoint Protection 14 and 14 MP1, McAfee)
  • I take on a high level of responsibility, initiative, and accountability
  • I am adept at collecting, summarizing, and documenting highly technical content, such as software business requirements.
  • I have a strong attention to detail and accuracy skills
  • I have strong collaboration and partnering skills
  • I have the ability to manage multiple and competing priorities
  • I manage complex issues and develop solutions
  • I have the ability to work with limited supervision
  • I have experience working with a software development team.
  • I have strong communication skills; verbal, written, and interpersonal.
  • I have a working knowledge of the Windows
  • I have experience working in the Information Security field with clear understanding of security policies and procedures.
  • I have experience with implementing Application and Device Control and Host Integrity configurations
  • I have experience with implementing and/or supporting Splunk infrastructures.
  • I have knowledge of formal Infrastructure engineering disciplines, hands-on experience with managing server and/or appliance infrastructure, and all phases of engineering lifecycles (SOW, BRD, Installation and Configuration document creation and support).
  • I support and administer Bromium 3.2 and Bromium 4.0
  • I am also responsible for the configuration of ATP and the Splunk and Nagios configuration of these ATP Appliances

Confidential

Information Systems Security Engineer

  • Administration of Tenable Nessus and Security Center
  • Tuning, configuration and implementing custom scanning profiles in Nessus
  • Supports customers at the highest levels in the development and implementation of doctrine and policies.
  • Applies know-how to government and commercial common user systems, as well as to dedicated special purpose systems requiring specialized security features and procedures.
  • Performs analysis, design, and development of vulnerability assessment reporting and dashboards.
  • Analyzes security requirements for the management and administration of vulnerability assessment technology.
  • Designs, develops, engineers, and implements solutions that meet security requirements (relating to vulnerability assessment and management).
  • Analyzes general information assurance-related technical problems and provides basic engineering and technical support in solving these problems.
  • Evaluate that all information systems are functional and secure.
  • Occasionally provide security engineering and integration services to internal customers.
  • Deploy new Nessus vulnerability scanners, and Security Center management platforms.
  • Administer IT security technology such as Tenable Nessus, and Tenable Security Center.
  • Assess existing vulnerability management infrastructure and identify key system flaws
  • Perform administrative and engineering work on Security Operation Center tools such as Remedy, Service manager, etc.
  • Develop detailed supporting documentation regarding technical projects (such as materials to support an architecture review board)
  • Provide recommendations on collection, processing and distribution systems in the cyber security market
  • Manage customer expectation and attend all mandatory review / regulatory discussions related to the specific project being delivered
  • Operates with appreciable latitude in developing methodology and presenting solutions to problems
  • Contributes to deliverables and performance metrics where applicable
  • Experience in networking (TCP/IP) protocols, computer/network security, and system administration.
  • Background in INFOSEC operations, vulnerability assessment, and security-scanning tools
  • Worked with configuration of sensors on CentOS platform to install and configure Snort
  • Creation of Run Books and SOPs using Requirements documentation to fully document the Sensor, Vulnerability Management and the Network Infrastructure configuration and process during the transition phase.

We'd love your feedback!