We provide IT Staff Augmentation Services!

Network Security Sr. Analyst Resume

4.00/5 (Submit Your Rating)

Plano, TX

SUMMARY

  • Computer Science Engineer with previous professional experience. Detail - oriented individual with patience and flexibility dat thrives in a position dat requires quick learning and great accuracy.
  • Proficient Splunk Engineer with 3+ year of IT experience in client/server applications.

PROFESSIONAL EXPERIENCE

Confidential, Plano, TX

Network Security Sr. Analyst

Responsibilities:

  • Working noledge on security technologies like Anti-virus, Encryption, Data Loss Prevention (DLP), IPS/IDS, Firewalls etc.
  • Working on Shift basis in SOC, giving client 24/7 service, monitoring.
  • Challenges dealing with customized threat bypasses security gateways,
  • Loaded skills like understanding security policies, Data & traffic analysis, identifying security events, incident response.
  • Security investigation skills like, prevent, detect, analyze, collect, mitigate.
  • Also in incident response team responsible for handling security dat occur with in organization and correcting and documenting the security issue in a timely manner.
  • Ingesting and working with various data types like CSV, JSON, XML, Raw Logs, Syslogs and parsing them with custom sourcetypes.
  • Parsing, Indexing, Searching concepts Hot, Warm, Cold, Frozen bucketing andsplunkclustering.
  • Worked on setting upSplunkto capture and analyze data from various layers, Load Balancers, Webservers and application servers.
  • Good Understanding and Knowledge about Vormetric.
  • Installing and configuring Vormetric.
  • Great noledge on computer forensics dealing with capture and analysis of evidence from computers, servers.
  • Foundation skills like, Device config, traffic capture, performance monitoring, device monitoring.
  • Strong analytical and problem solving skills as needed to perform the job of a SOC analyst.
  • Tools used Nmap, Wireshark, Splunk
  • Monitor systems and report the status to client staff.
  • Splunk server configurations (web, indexing retention, autantication, etc.), data onboarding operations, data parsing operations
  • Creates correlation search rule for the admin activity, indexes for field extractions.
  • Create and manage host values and source types.
  • Manage and ensure proper data fields for file and directory inputs.
  • Manage network, Windows and any other inputs dat may arise (universal forwarders).
  • Composed reports detailing theforensicanalyses performed and the results of the investigations.
  • Conducted digitalforensicacquisitions and examinations of laptops, desktops, and other digital storage media in civil litigations, criminal matters, and internal investigations.
  • Identify threats and work to create steps to defend against them
  • Monitor network traffic for suspicious behavior
  • Configure security systems such as firewalls, antivirus, and IDS/IPS software
  • Actively protects the availability, confidentiality, and integrity of customer, employee, and business identity.
  • Contribute to the Risk Assessment Program including identifying and scoring risk.
  • Collaborate with the team and architecture on new platforms, IAM roadmap, assess security risks, and identity long-term strategy recommendations.
  • Addressed basic client configuration issues and service alerts.
  • Position requires mentoring and training of SOC Technicians and SOC employees.
  • Monitored and correlated events with thorough noledge of principles, methods, and techniques of network and data security.

Confidential, Chicago, IL

Splunk Engineer

Responsibilities:

  • Design, support and maintain theSplunkinfrastructure on Windows, Linux and UNIX environments.
  • Installation ofSplunkEnterprise,Splunkforwarder,SplunkIndexer, Apps in multiple servers (Windows and Linux) with automation.
  • Splunk Heavy Forwarder Configuration.Install and maintain theSplunkadd-on including the DB Connect, Active Directory, LDAP for work with directory.
  • ManageSplunkconfiguration files like input, props, transforms etc.
  • Upgrading theSplunkEnterprise and security patching.
  • Well versed in both remote and on-site userSplunkSupport.
  • On boarded multiple data sources withinSplunk, creating custom TAs for data parsing.
  • Advised clients on the best practices for aSplunkdeployment
  • Developed detailed documentation for the installation and configuration ofSplunkandSplunkApps

Confidential, Milwaukee, WI

Splunk Admin

Responsibilities:

  • Monitor systems and report the status to client staff.
  • Good working noledge on AWS Environment, Cloudtrail, Cloudwatch, Vpc flow logs, EC2 instance, configuring AWS.
  • Splunk server configurations (web, indexing retention, autantication, etc.).
  • Splunk data onboarding operations (inputs, SQL, index-time configurations).
  • Splunk data parsing operations (search-time field extractions, eventtypes, tags).
  • Manage existing application and create new applications (visual and non-visual).
  • Worked on AWS cloudtrails and F5 data.
  • Deploy, configure and maintainSplunkforwarder in different platforms.
  • Creating Reports, Pivots, alerts, advanceSplunksearch and Visualization inSplunkenterprise.
  • Provide power, admin access for the users and restrict their permission on files
  • Installed and upgradedSplunksoftware in distributed and clustered

Environment: Windows Server 2012/2008/2003 R2, Linux and Unix Servers,SPLUNK 6.5, ServiceNow, F5 data, Vometric, wireshark, AWS cloudtrail, cloudwatch, Jira, TCP/IP, Nagios, CompTIA Security+.

Confidential

Security Analyst

Responsibilities:

  • Analyze security and rewall logs for compromised/infected hosts on tanetwork
  • Responsible for Disaster Recovery Site Management
  • Design and develop theSecurityZone diagram for theSecurityMonitoring Team
  • Member of theSecurityOperations Center (SOC) dat provides 24/7 monitoring, analysis, and remediation ofsecurityevents
  • In charge of Cyber Attack Response Team including data recovery
  • Analyze security incidents and escalate as necessary
  • Create daily, monthly, and adhoc reports for various devices
  • Identify, monitor, and prepare daily reports ofNetworkthreats, and Vulnerabilities
  • Prepare reports using the Nagios server monitoring tool
  • Create new process documents to halp theAnalystsin analyzing events
  • Responsible for vulnerability reporting and vulnerability scan scheduling
  • Follow up with asset owners for remediation of vulnerabilities either at OS or application level
  • Maintain Spam Filter and Web Filter
  • Work with vendors to support system maintenance
  • Keep servers updated with latestsecurityupdates
  • Create and migrate virtual servers

We'd love your feedback!