Cyber Security Engineer Resume
3.00/5 (Submit Your Rating)
Arlington, TX
SUMMARY
- A Personnel with over 15 years of significant & progressively responsible professional experience with 6 years of management experience in Clinical healthcare and Technology with experience in Databases, Cyber Security, Vulnerability Management and DB Vulnerability Management.
TECHNICAL SKILLS
- SQL Server
- Service Now
- IBM Guardium
- IBM Resilient
- SCCM
- Shavlik
- Power BI
- Tableau
PROFESSIONAL EXPERIENCE
Confidential, Arlington, TX
Cyber Security Engineer
Responsibilities:
- Day to Day Data Analysis of various type of data which include failed logins, use of powerful service account, unauthorized access to server or databases and review teh analysis with teh system or application owner for validation of data activity and making suggestion how to improve teh process and DB Vulnerability Management using Guardium.
- Day to day manages SIEM applications and manages teh upgrades and involved in change process.
- Managed and installed new integration apps in our SOAR application and manage App - Host Appliance & Utility server.
- Manage and Create Phishing Campaign for whole enterprise using ProofPoint Platform.
- Manage and Create Data Analytics reports for higher management and for Information security team as needed.
- Manage and provide support and awareness to identified application teams regarding ITS Security policies and standard in terms of user access based on defined roles and access reviews.
- Manage and support management in teh development of standardized procedure for role-based provisioning and access reviews.
- Manage and work closely with high profile application teams to support teh standardization of user roles based on teh risk and job function.
- Manage and work closely with high profile application team to support teh implementation of access reviews for identified systems.
- Managed and worked on remediation efforts of identified IT risks and issue to ensure process owners are identified, action plans are documented, and target dates are provided to ensure timely remediation.
- Managed and participate in teh consultative process and advise personnel in IT departments to coordinate ITS activities.
- Support Cyber Security team and seniors in cyber security activities as needed.
- Identify process improvement activities for Identity access management operations to ensure access is provisioned and de-provisioned in accordance with Security Standards and Contractual SLA’s.
- Manage and create documentation of each process and user manuals for teh applications we use in our environment.
- Managed Guardium application which include 11 appliances/servers & Guardium Console and responsible for managing Administrative tasks and perform reporting and system upgrades.
- Possess a strong work ethic and a high level of professionalism.
- Demonstrated business and analytics/financial skills with strong communication and organizational skills.
- Proven experience in a customer service environment.
- Strong people management and development skills with teh ability to shape communication to teh needs of teh audience.
- Knowledge of HIPAA, release of information and record retention with familiarity with Electronic Medical Record (EMR) functionality, document imaging and workflow.
- Have a working experience with Allscripts.
- Manage and Perform network scans including subnets to obtain key security information regarding all CH asset on teh GSK Network and Cloud providers (Azure and Google Cloud Platform).
- Discover Consumer Health (CH) assets using CH tools
- Manage and create schedule run discovery scans to identify CH assets, ensure assets are documented in ServiceNow and CMDB system.
- Manage and install Tenable Agents (Must have Tenable Experience) are installed on all assets, create metrics to generate awareness around missing agents and missing CMDB entry.
- Manage and create daily agent-based Vulnerability Management (VM) scans on teh assets with an agent and share reports with teh stakeholder. “Chase” remediation with teh CH Infrastructure team and teh asset owner until closure.
- Explain vulnerabilities to internal GSK customers as part of remediation and patching process.