Security Consultant Resume
CaliforniA
SUMMARY
- 6+ years of Information security experience on Security information and Event management (SIEM), Implementation, Operation Support, Vulnerability assessment, Development and implementation of IT processes aligned with business objectives for TEMPeffective security management.
 - 5+ years of extensive experience in Security information and Event management (SIEM) tools like ArcSight, Splunk, RSA Envision and QRadar.
 - Experience working in Banking, Financial, Energy, Retail domain.
 - Extensively worked on development and configuration of SIEM connectors for unsupported devices by ArcSight, Splunk and Qradar.
 - Manage incidents for visibility, transparency and communication.
 - Developed enerprise - wide Application Security Standards.
 - Having extensive noledge on regulatory compliance procedures related to SOX, PCI and HIPPA.
 - Adept in conceptualizing, analyzing software system needs, evaluating end-user requirements, custom designing solutions & troubleshooting for complex software systems.
 - Configured direct alerts and correlated alerts based on teh devices in teh client's network.
 - Strategic Planning Framework to gauge an organization’s current Info Sec maturity level and create roadmap for teh future using COBIT 4.1&ISO 27000 standards
 - Implemented Operating Systems, Applications, Users and Data migration projects
 - Performed Proof of concept with Splunk, Tripwire, Qualys and RSA Envision tools
 - Spearheaded ISO 9000 and driven system and policies for Customer Support division
 - Developed tools and performed Risk Assessment on Network, Application, and Physical Security
 - Have worked on security incidents as part of Incident Response towards forensic investgation.
 - Prepare daily reports and security advisory for customer devices.
 - Have Worked on Health monitoring of ArcSight database and manger.
 - Work closely with other teams and third party vendors to conclude on teh incidents.
 
TECHNICAL SKILLS
Operating Systems: Microsoft: Windows Server 2003/Server 2008; Linux: CentOS, Red Hat, Fedora, Ubuntu Server/Desktop
Web Technologies: HTML, JavaScript, Microsoft.Net, Java
OWASP/SANS Vulnerability: XSS, SQL Injection, CSRF, Security Misconfiguration, Sensitive Data Exposure, Insecure Direct Object Reference
SIEM Tools: IBM QRadar,ArcSight,Splunk,RSA Envision
Security Tools: Qualys, Nessus, IBM AppScan, Wireshark, Snort, Tcpdump, Nmap
Protocols: Ethernet, LAN/WAN/MAN, TCP/IP, DNS, DHCP, FTP, TELNET, SMTP, POP3, SSH, UDP, ICMP, IPsec, HTTP/HTTPS
Database Activity Monitoring: IBM InfoSphere Guardium
PROFESSIONAL EXPERIENCE
Confidential, California
Security Consultant
Environment: Hp ArcSight, Qualys, Splunk, IBM Guardium, RSA Envision, Windows, Linux
Responsibilities:
- Administrated ArcSight components like ESM, Logger and collector appliances, ArcSight Management centre
 - Identifed teh unwanted users that are existing on ESM for report generation and removing those users from ESM reducing teh overhead on ESM.
 - Identifying teh broken resources and fixing teh broken resources to make sure events are parsed and correlated for teh rules to identify teh true and false positives.
 - Migrated teh entire Legacy old logger and and collector appliances to latest appliances of loggers and collector appliances to balance teh load, for retention purpose on loggers.
 - Created teh inventory for all teh collector appliances by identifying teh smart connectors and flex connectors inorder to migrate.
 - Installed teh smart connectors and also flex connectors so that events are parsed and sent to teh ESM
 - Configured most of teh device logs into teh ArcSight environment for monitoring
 - Made teh ArcSight environment simplified by reducing teh number of legacy collector appliances and loggers.
 - Administrated QRadar components like Console, Event Processors, Flow processors, Event Collectors, Flow collectors to NYPA Environment for Log collection and monitoring.
 - Integrate Infrastructure devices and Securiy devices and also applications to QRadar SIEM.
 - Integrated RSA and EMC solutions say Access manager, Authentication manager Symmetrix and made some recommendations for system and process improvement.
 - Responsible for Configuration aligned to internal PCI and SOX controls by using RSA Envision.
 - Involved in creating dashboards using RSA Security Analytics to improve teh ability to spot teh malicious activity.
 - Responsible for transfer of log data to RSA Envision by collecting regular activities of source devices.
 - Recommended and configure Correlation rules and reports and dashboards in QRadar Environment.
 - Successful Integration of Palo AltoFirewall with teh Panorama and Skybox, and implementation experience on Check PointFirewalls.
 - Configure Network Hierarchy and Back up Rention configuration in QRadar SIEM.
 - Extract customized Property value using teh Regex for devices which are not properly parsed by QRadar DSM.
 - Extract teh logs, Perform real time log analysis using SIEM technologies and Forensics Analysis of logs as per teh request.
 - Performed scans on critical systems in teh network for potential vulnerabilities using NMAP and Nessus.
 - Responsible for planning and scheduling Nessus vulnerability scanning to run on regular intervals and on ad-hoc basis.
 - Enhancement and fine tuning of Correlation rules on QRadar based on daily monitoring of logs.
 - Recommended and Configure Daily and weekly and monthly reports in QRadar based on Compliance requirements.
 
Confidential, Rhode Ishland
Security analyst
Environment: RSA Envision, Windows
Responsibilities:
- Integration and testing of multi-platform devices with RSA Envision.
 - Configuring and testing of log generation and collection from a wide variety of products distributed across categories of servers, network devices, security devices, databases and applications through teh collectors (LC, RC).
 - Categorize and test teh messages generated by security and networking devices into teh multi-dimensional RSA Envision schema.
 - Integration of IDS/IPS to RSA Envision and analyse teh logs to filter out False positives and add False negatives in to IDS/IPS rule set.
 - Develop and testing of content for RSA Envision like correlation rules, dashboards, reports and filters, list.
 - Debugging teh issues which are related to RSA Envision performance, reporting, collection of logs from various devices.
 - Develop and test UDS Connectors via XML for teh RSA Envision un supported devices and Business applications.
 - Attending weekly client meetings in that need to discuss about on boarding and content testing results status.
 - Created installation and configuration and test case scenarios documents for each specific device Connectors.
 - Recommended security strategies based on real time threats.
 - Analyzed teh Critical Infrastructure Protection (CIP) reliability standards of teh North American Electric Reliability Corporation (NERC) to identify types of documentation needed for compliance.
 - Analyzed evidence and documentation to evaluate compliance with teh NERC CIP reliability standards.
 
Confidential, Wisconsin
Security Engineer
Environment: ArcSight SIEM, Windows, Linux, Splunk, Qualys Scanner, Tcpdump, NMAP
Responsibilities:
- Installation of Connectors and Integration of multi-platform devices with ArcSight ESM.
 - Configuring log generation and collection from a wide variety of products distributed across categories of servers, network devices, security devices, databases and apps.
 - Integration of IDS/IPS to ArcSight and analyse teh logs to filter out False positives and add False negatives in to IDS/IPS rule set.
 - Categorize teh messages generated by security and networking devices into teh multi-dimensional ArcSight normalization schema.
 - Creating alerts and reports as per business requirements and Threat modelling with specific security control requirements.
 - Develop content for ArcSight like correlation rules, dashboards, reports and filters, Active lists and Session list.
 - Created ArcSight asset modelling, it is used to populate asset properties in Correlation rules and reports.
 - Troubleshooting teh issues which are related to Arc sight, logger and Conapps performances.
 - Develop Flex Connectors for teh ArcSight UN supported devices and Business apps.
 - Configured 1200+ devices to ArcSight ESM for monitoring.
 - Integration of different business data to Splunk Environment and also created dashboards and reports in Splunk.
 - Created Vulnerability Assessment report detailing exposures that were identified, rate teh severity of teh system & suggestions to mitigate any exposures & testing non vulnerabilities.
 - Performed scans on critical systems in teh network for potential vulnerabilities using NMAP and Qualys.
 - Responsible for planning and scheduling Qualys vulnerability scanning to run on regular intervals and on ad-hoc basis.
 - Created installation and configuration documents for each specific device Connectors.
 - Recommended security strategies based on real time threats.
 - Have been a part of incident response team while investigating teh logs using forensics.
 
Confidential
IT Infrastructure Engineer
Environment: Windows, Linux, LAN, WAN, Antivirus
Responsibilities:
- Install and troubleshoot operating systems - Windows 2000, XP, and Win7.
 - Install, upgrade and troubleshoot MS-Office 2000, 2003, 2007.
 - Installation and maintenance of Antivirus Symantec and McAfee.
 - Responsible for data backup on weekly and monthly schedule.
 - Configuring & Handling Outlook, Outlook Express and Data Backups.
 - Implementing & troubleshooting network access LAN, WAN and Wi-Fi.
 - Provide tier 2 remote support for all network & application related issues across teh board.
 - LAN/WAN design, implementation and optimization using Cisco routers and switches
 - Installing, Configuring of Networking Equipment’s: Routers and Switches
 - Recommend and scheduling repairs to teh LAN/WAN.
 - Managing VLANs and inter VLAN routing.
 - Configured VPN, ACL, and NAT in teh Cisco ASA 5540 firewall to allow only authorized users to access teh servers of teh internal network
 - Used Layer 3 protocols like EIGRP and BGP to configure Routers in teh network
 - Configure and Implement Remote Access Solution: IPSEC VPN, Remote Access
 - Upgrade, install and troubleshooting networks, networking hardware devices and software.
 - Involved in patch management and installation of critical systems.
 
