Cyber Security Analyst Resume
4.00/5 (Submit Your Rating)
East Rutherford, N
SUMMARY:
- Over fifteen years of experience in technical design, installation, configuration, support, administration of information technology systems. Over eight years of experience in project management an 3rd level escalation support as technical lead. Over three years of experience as a Cyber Security Engineer/Analyst.
- Member of Cyber Security Team implementing the “Defense In Depth” technology to protect the company from attacks and to provide a Business Continuity and a quick Disaster Recovery solutions from any incident to the company infrastructure.
- Built and implemented layered IT security solutions using Cisco ASA Firewall, Cisco Firepower IDS/IPS, Splunk Enterprise, Nexpose Vulnerability Scanners and Carbon Black - Bit9 Malware protection as SIEM tools.
- I regulated access to computer files, Audit Firewalls and server security configurations, perform Risk Assessments and test Software Application Data processing systems to verify security holes and recommend countermeasure.
- Member of a Cyber Security Team that reported weekly to CISO to develop and update the security Policy and procedures.
- Experienced in IT Security solutions - SIEM - Splunk Enterprise, Logrythm and Solarwinds. Metaspolit and Nexpose for Vulnerability Scans, Tableau Disk duplication, US CERT, NIST, ISO 27000 for Threat Intelligence, Change management and Patch management using MS SCCM/WSUS, Solarwinds, etc.
- Work to identify key events to be monitored, continuous evaluation and recommendations to change configurations to match Risk appetite.
- Partner with the business departments to develop and enrich Countermeasures using case scenarios.
- Continuously improve process efficiency and effectiveness of IT Security tools
- Experience with Incident Response and Vulnerability Management.
- Addressed and managed breaches/attacks including Malware, Phishing and Pharming and Data exfiltration.
- Documented the incidents with lessons learned and track recommendations follow-up actions.
- Work with outsourced Cyber Crime Expertise and Response Team (CCERT) for wide overview of countermeasures against breaches and attacks.
- Threat Intelligence Feeds and Alerts - assessed security advisories, coordinated scans, tracked remediation, provided regular status updates to CISO and other IT departments.
- Experienced in monitoring and collaboration of Security Logs and SIEM events using the security tools - Splunk, Solarwinds, Logrhythm and Nexpose vulnerability scanner.
- Consultant to IT teams responsible to address Vulnerabilities Scans report and vulnerabilities identified in outsourced pen tests, vulnerability scans, and secure code reviews.
- Work with CISO to manage and oversight of remediation plans and risk acceptances.
- Work with other IT Departments to include Security measures and controls from the beginning of every projects.
- Harden of all software Applications using the standard guides, systems administration and provide countermeasures guidance related to the security features of IT tools.
- Direct hands-on Audit oversight of LAN/WAN devices like Cisco Switches, Cisco Routers, Firewalls, VPN, SIEM, IDS/IPS, Malware analysis and protection, Access Controls, DLP, Sniffers, Web Content Filtering technologies, Vulnerability scanners, Forensics software, and Security Incident Response tools.
- Ability to collaborate on critical IT projects to ensure security issues are addressed throughout the project lifecycle.
- Working knowledge of IT best practices and regulatory requirements such as ITIL, COBIT, ISO 27000, PCI, NIST-800 standards.
- Developed and implemented Software application security procedures.
- Implemented Disaster Recovery Solutions for system recovery procedures to minimize losses should an attack occur.
- Implemented the use of intrusion-detection, IDS/IPS, DLP, SIEM, vulnerability-scanning, Web gateway, proxy appliances and antivirus tool to minimize Data Loss
- Introduced use of security metrics to mitigate vulnerability by analyzing historical threats, addressing risks/gaps/violations and implementing improved protocols.
- Implemented Security Awareness program to train about 2150 end users on security processes, procedures and risks via the company’s first security education program, which is being rolled out companywide.
- Experienced in Cisco Routing and Switching with Cisco Catalyst Switches 4500, 2900, 3560 series and Cisco Routers 4948, 800, 1920 and 2600 series, Cisco ASA 5520 and 5525 Firewall, Cisco NGFW 4100 FirePower for IDS/IPS, KEMP Load Balancers, Network Monitoring - SolarWind, Splunk- Logging and Monitoring of Network devices, Wireless Networks, Bluecoat Web Filtering, Fatpipe IS Provider Load Balancer, Reflex Stratacloud VMWare System Monitoring, Logrhythm- Logging System for SIEM Management, Install and deploy Cisco Meraki MS-Switches, Meraki MX-Security Appliances and Meraki MR-Wireless Access Points devices.
- Experienced in TCP/IP - DNS - DHCP, EIGRP LAN / WAN Protocols, Virtual Private Network (VPN), IPSec Tunnel, DMVPN. HSRP/VRRP, NAT/PAT, SNMP, VoIP, Meraki QoS, T1, Ethernet.
- Built and administered Endpoint Protection and Malware Application like Symantec Endpoint Protection 11.0, Symantec Enterprise Vault Archiving System, and Sophos Anti-Virus - AV agent, Kaspersky AV Agent, Carbonblack-Bit9 Malware protection on Servers, Windows desktops and Laptops, using Auto-deploy and Manual-deploy policies.
- Built and administered Bluecoat Proxy SG 510 and SG 610 Appliances as Web Filtering device for our user environment. Configured the appliances with User authentication, Web filtering for both ingress and egress web sites, monitor users internet usage and report on any malicious activity.
- Experienced in Dell Compellent iSCSI Storage System, IBM V7000 Fiber Channel Storage System, HP/Dell Servers Virtualization, VMWare - ESXi Host 4.1, 5.0, 5.5 and 6.0, Cisco ARCH (Data Center Design), Power Management. Experienced in EMC SAN storage as Restore/Backup repository storage. Managed and administered EMC Storage by creating LUNs and attaching the LUNS to VMWare environment. Add more Disk Space to the SAN for Restore and Backup software applications.
- Lead Architect in building a new Virtual environment based on VMware EXSi 5.0, vCenter, High Availability Clustering supporting VMKernel technologies such as vMotion, Template management, vSphere Update Manager.
- Microsoft Server Systems:
- Experienced in MS Windows Application and Messaging Systems: MS Active Directory 2003/2008/2012, MS Exchange Enterprise 2003/07/10, Group Policy (GPO).
- Designed and implemented two-forest Active Directory Federation Services - ADFS on Windows 2008 server’s infrastructure to separate normal production environment from the Credit-Card-Holder PCI environment.
- Built and implemented the MS ADFS FSMO Roles to create the Schema in ADFS manage Active Directory Resources and MS Exchange Communication Systems by extending the AD Schema to create MS Exchange Containers.
- Created Domain Trust among the ADFS domain and using the MS Sites and Services for ADFS sites Replication to replicate ADFS changes to each member of the ADFS Domain Controllers.
- Implemented MS Group Policy to manage and control ADFS Objects/Resources like User Accounts, Software, Folder and File Mapping, etc.
- Designed, planned and implemented MS Exchange migration from Exchange 2003 to Exchange 2007 environment and later upgraded to Exchange 2010
- Lead a 5-man team with migration from Exchange 2003 to Exchange 2007. Wrote custom scripts to assist with the migration and Exchange DB defragmentation.
- Implemented and managed a MS Exchange Systems with CAS and DB solution.
- Built and managed MS Exchange Systems with a DAG solution in Cluster environment
- Built and managed Exchange environment for email retention and the recovery of mail for litigation.
- Expanded e-mail capabilities through interconnecting Microsoft Exchange, implementing and deploying Outlook Web Access.
- Collaborated with multiple departments to plan and manage migrations to the Exchange environment.
- Created and supported 6700 total Exchange users nationwide and Canada.
- Created, managed, and supported thousands of Exchange objects such as distribution lists and other managed Exchange objects like generic mailboxes for bulk emails.
- Proficiency with Microsoft Exchange Management Console.
- Implemented Dynamic DNS Services on the ADFS Domain Controllers as the company internal DNS Servers. Installed and implemented DHCP environment for Dynamic allocation of IP Addresses to network end-point devices.
- Built, Implemented and administered MS Active Directory Service. Migration of ADS from 2003 to 2008 and 2012. Upgrading MS Windows servers 2003 to 2008 R2 and 2012, planning and configuring DHCP scopes, maintaining and updating the internal and public DNS records, designing and creating the Group Policy Object across the domain. Also using the MS GP console to deploy User and Computer based policies, Account Policies and Software deployment.
- Led and managed a 5-man team for the Projects of migrating MS Active Directory Services from MS 2003 Active Directory Services to MS 2008 ADS and Upgrade to 2012 ADS. Lead the project of migrating and upgrade of MS Exchange Systems.
- Implemented, configured and administered Microsoft Exchange Failover Clusters Servers, SQL Servers, IIS, FTP and Load Balancing
PROFESSIONAL EXPERIENCE
Confidential, East Rutherford, N
Cyber Security Analyst
Responsibilities:
- Expert in Intelligent Threat monitoring using the Confidential, Confidential, Confidential, Confidential and SAN alerts.
- Implementing IT Security Awareness policies based on the IT Security Frameworks - NIST SP 800 series, ISO 27000 series and the Compliance and Regulatory standards like CC, PCI DSS and ITIL Services.
- Performed daily network and security traffic monitoring/analysis, review of vulnerability reports, threat intelligence feeds and triage of security alerts from SIEM, IDS/IPS, Firewalls, Web filtering reports while coordinating follow-up activities specific to CVE's and Alerts, taking ownership of the review process to ensure visibility, escalation of threat concerns and action.
- Monitored and identified areas of network exposure, abnormalities, and emerging threats by executing the quarterly audit policy of network devices and analyze security events/offenses to determine their root cause, report violations and security related operational incidents.
- Coordinated with IT Infrastructure team to recommend and install appropriate security tools and countermeasures like the IDS/IPS solution.
- Implemented Endpoint Protection of Malware and Anti-Virus on systems using Symantec Endpoint Protection 11 and 12, Sophos, Kaspersky and Carbon Black Bit 9 Endpoint malware protection.
- Implemented the Identity and Access Management solution to enable the users to access the right resources at the right times and for the right reasons for easy “Audit” of Access Control procedure, security violations, and programming changes.
- Expert in conducting system vulnerability scanning, performing risk assessment, and internal/external information security audits coordination and respective follow-up activities.
- Worked closely with CISO to assist in updating policies, standards and guidelines while maintaining centralized repository documents and control processes library according to regulatory requirements.
- Maintained knowledge of industry standards and best practices involving security, including identification of solutions to mitigate risk vector.
- Maintain proactive, consistent communications with the IT Infrastructure team on systems or network security issues, status and projects.
- Implementing Malware Threat protection using Kaspersky, Sophos and Carbon Black Bit9 applications.
- Implemented a robust Patch Management Policy using Rapid 7 Nexpose Vulnerability Scanner to scan for Software, Firmware and Security vulnerability patches on Network servers, Routers and Switches.
Confidential , NJ
Sr. Network Engineer
Responsibilities:
- Designing, Implementing, Configuring and Administrating Hudson Network Infrastructure for 3500 users distributed over United States and Canada.
- Day to day Network Operation, Scheduled and Emergency maintenance.
- Build a new Virtual environment based on VMware EXSi 5.0, vCenter, High Availability Clustering supporting VMKernel technologies such as vMotion, Template management, vSphere Update Manager.
- Migrate existing Email System from Exchange 2003 to Exchange 2010 DAG Implementation, ActiveSync, Online Archiving, and Exchange Backup.
- Design new Power Management solution with automated emergency shutdown.
- Implement and maintain HP servers, Monitoring server performance, Configure HP Insight Manager, setup performance and failure alerts.
- Implement and maintain Dell EqualLogic (iSCSI) Dell Compellent (Fiber Channel) SAN Brocade Fiber Switches.
- Install and deploy Watchguard Firewall 850XTM and upgrading to Watchguard Firewall M4600 Series.
- Configure network solutions for different TCP/IP based network Infrastructures
- Proficient using network protocols like EIGRP, IPSec, GRE, HSRP/VRRP, NAT/PAT, SNMP, Meraki QoS, T1, and Ethernet.
- Experience with dynamic routing with EIGRP and OSPF.
- Install and administer the SIEM using the Splunk Enterprise application tool.
- Experience with wireless protocols (802.11) and wireless networks standards a, b, g, i, n.
- Implement, Administrate Backup Strategy using various backup technologies such as Symantec Backup Exec, CA ArcServe, Quantum Library, Virtual Libraries, Disk to Disk.
- Experience with network load balancers: Administer and support the KEMP Load Balancers to efficiently distribute outgoing network traffic across a group of ISPs backbone Routers. At the Egress point we implemented a policy of load balancing our egress traffic between our ISP Providers – Verizon, Comcast and Optimum Lightpath. At the inside, we configure the appliance in conjunction with KEMP appliance to load balance between our Web servers to increase capacity among concurrent users and reliability of applications and to improve the overall performance of applications by decreasing the burden on servers associated with managing and maintaining application and network sessions, as well as by performing application-specific tasks.
- Manage Existing, and Install and Configure new Cisco switching environment, VLAN assignment, VTP, Spanning Tree Protocol, DMZ Switches, iSCSI networks.
- Implemented the Cisco NGFW 4100 FirePower for IDS/IPS solution.
- Install and deploy Cisco Meraki Switches-MS, Meraki Security Appliances-MX and Meraki Wireless Access Points-MR devices.
- Lead Architect in the design, implementation and management of the MS ADFS. Building a 2-Forest ADFS of Hudson Group production environment and the PCI DSS environment.
- Lead Architect in the design, implementation and administration of Confidential Email Systems. Building a 4-MS Exchange servers (2- CAS and HUB-Transport servers and a 2-Exchange Mailbox servers) in cluster mode
- Lead the project of implementing the VMWare environment, building a 4 VMWare ESXi hosts in DRS and HA mode.
- Managing Infrastructure migration/upgrade projects, comparing solutions, communication with vendors, Creating and Implementation of plans and procedure and documentation.
- Building, Implementing and administration of MS Active Directory Service. Migration of ADS from 2003 to 2008 and 2012. Upgrading MS Windows servers 2003 to 2008 R2 and 2012, planning and configuring DHCP scopes, maintaining and updating the internal and public DNS records, designing and creating the Group Policy Object across the domain. Also Using the MS GP console to deploy User and Computer based policies, Account Policies and Software deployment.
- Installed and configured Bluecoat SG620 Proxy appliances for fail-over Web filtering services. The Bluecoat appliances were installed in a High Redundancy mode where the Master was in High-Priority mode configured to deliver policy control and content orchestration to scan data and files against multiple Web sites, check against document white lists, scan code and structure of files to sniff out potential malware and to block internal users from accessing unauthorized web sites – all in real time through the Blue Coat Content Analysis System.
- Support the Citrix Cloud environment for Dufry and Hudson Citrix-Hosted applications.
- Implement, configure and administrate Microsoft Exchange Failover Clusters Servers, SQL Servers, IIS, FTP and Load Balancing.
- Basic knowledge of the Security Appliance – ASA Firewall
- Design and Implement Automatic Updates for workstations and servers across the network using WSUS and SCCM 2007 and SCCM 2012.
- Asset management and security, policy and software deployments using GPO, LanDesk and Footprint Ticketing Application, Bomgar Remote Application Software for Workstations and POS Registers.
Confidential,, New York
Sr. Network Engineer
Responsibilities:
- Designing, Implementing, Configuring and Administrating IIE network infrastructure across the nation supporting more than 1000 users within 8 states.
- Managing Active Directory Environment and migrating from AD 2003 to AD 2008 R2, planning and configuring DHCP scopes, maintaining and updating the internal and public DNS records, designing and creating the Group Policy Object across the domain.
- Maintenance, Install, Configure and Administrate Windows 2003 and Windows 2008 Servers, Web Servers, SQL Servers, IIS, FTP, Share Point Servers, ISA Sever, Office Communicator Server (OCS), Failover Cluster Servers,
- Implementing and maintaining HP Proliant servers (DL/ML/BL), Monitoring server performance, configure HP System Insight Manager (SIM), Monitoring Network Performance, Server Connectivity, Hardware failure, Network Traffic Analysis.
- Implement, configure and administrate Storage Clusters, SAN Solutions, NetApp, HP Lefthand, Data deduplication, Data Domain, Disk to Disk Backup, CA Arcserve, HP Tape Library, Symantec Endpoint Protection, Windows System Update Service (WSUS), Windows Deployment Server (WDS)
- Design, Implement and configure Cisco based Wireless network throughout the organization, Cisco 5508 Wireless Controller, Cisco Aironet Access Points, H-Reap.
- Administrating Microsoft Exchange Environment, Exchange 2007 / 2003, Power Shell, Forefront SPAM filtering, SPAM Rules.
- Design, Configure and administrating Network infrastructure devices include Cisco 2900 routers, Cisco Catalyst Switches 2960/3560/4506/4510. Configure Cisco ASA Firewall and administrate access rules between security zones (DMZ/Public/Private), Cisco VPN Concentrators, Access Control List (ACL), Virtual LANS (VLAN).
- Managing Infrastructure migration / upgrade projects, comparing solutions, communication with vendors, Creating Implement plans and procedure documentation.
Confidential
Sr. Systems Engineer
Responsibilities:
- Design, Implement and configure network solutions for different TCP/IP based network Infrastructures.
- Implement, Migrate Microsoft Active Directory, Domain controllers, DNS Servers, DHCP Servers, Exchange 2003, Windows failover cluster, Microsoft Internet Security and Acceleration (ISA), Web Servers, IIS, FTP Servers, setting up network access permissions.
- Design, implement and configure the infrastructure devices such as (routers, catalyst switches, firewall, VPN), configuring routing protocols Static routes, RIPv1, RIPv2, EIGRP, Configure VLANS, Access Lists, Security Zones, Firewall rules, Network Load Balancing.
- Implement Monitoring solution to monitor server hardware performance and network traffic utilization, HP SIM, HP Site Scope, FLUKE Networks.
- Configure Network Backup, Full / Incremental / Differential Backup, Arcserve, Backup Exec,.
- Creating Documentation, Diagrams, Troubleshooting Guide, FAQ sheets, asset tracking database.
Confidential
Systems Engineer
Responsibilities:
- Technical Lead to a team of LAN/WAN professional responsible for handling various LAN/WAN technologies. Implementing a TCP/IP network from the ground up.
- Setting up the infrastructure devices (Cisco 2600 Routers / Cisco Catalyst 3500 Stiches / Catalyst 2900), Configure EIGRP, OSPF, Access Control List, VLAN.
- Creating a new Active Directory Forest / Domain for the enterprise, Migrating Users Information, Creating Group Policies, DHCP Server, and Implement DNS.
- Implement Microsoft Exchange 2003, Configure Exchange backup.
- Implement Remote Installation Service (RIS) Windows System Update Service (WSUS)
- Implement the IPSec VPN Tunneling using WatchGuard Firebox.