We provide IT Staff Augmentation Services!

Security Engineer Resume

5.00/5 (Submit Your Rating)

Atlanta, GA

SUMMARY

  • Six plus extensive experience in varying areas of security dat includes vulnerability testing, security assessment, and implementation of security systems. Has extensive noledge in vulnerability testing of web application dat includes intelligence gathering, vulnerability scanning, exploiting and reporting.
  • Good interpersonal skills, commitment, result oriented, hard working wif a quest and zeal to learn new technologies and undertake challenging tasks.
  • Knowledge of OWASP exploitation methodology and web application vulnerability standards.
  • Experience executing, ethical hacking and penetration testing.
  • Knowledge of advanced cyber threat actor tactics, techniques and procedures (TTP),and emulate these TTP to assess vulnerability and risk
  • Knowledge and experience wif penetration testing and ethical hacking product.
  • Experience wif web - based programming, protocols, best practices, and cryptography
  • Knowledge on Windows, Linux, Unix Operating System Configuration, Utilities and programming.
  • Experience wif various security tools and products (Fortify, AppScan, etc.)
  • Knowledge of hardware, software, and networking technologies to provide powerful combination of analysis, implementation, and support
  • Familiarity wif common programming or scripting languages.
  • Ability to plan, develops, and executes security tests.
  • Knowledge of TCP/IP ports and protocols.
  • Understanding of Software Development Life Cycle (SDLC).
  • Work Status: Green Card (Lawful Permanent Resident)

TECHNICAL SKILLS

Application Security tools: Kali Linux, IBM AppScan, Metasploit, SQL Map, Nessus, Nmap, HP Fortify, Burp Suite, OWASP ZAP, Wireshark, Acunetix.

Operating System: Linux, Unix, Windows, Mac

Programming: C, C++, Java Script, CSS, HTML

Applications: MS Word, Excel, PowerPoint, Service Now, Word Press.

PROFESSIONAL EXPERIENCE

Confidential, ATLANTA, GA

Security Engineer

Responsibilities:

  • Working in collaborate team of both networking security teams.
  • Identifying teh critical, High, Medium, low vulnerabilities in teh application based on OWASP top 10 and SANS 25 and prioritizing them based on teh critically.
  • Performed penetration testing over different business application and network devices of teh organization.
  • Enforced Password Cracking tests over teh administrator and user accounts to evaluate teh strength of password used
  • Uncovered high vulnerabilities at teh infrastructure level for internet facing website.
  • Using Kali Linux to do web application assessment wif tools like DirBuster, Nessus, and Nmap.
  • Update wif teh new hackings and latest vulnerabilities to ensure no such loopholes are present in teh existing system.
  • Conducted testing over teh application to comply wif PCI DSS Standards.
  • Capturing and analyzing network traffic at all layers of OSI model.
  • Created detailed report written reports on teh assessment findings and recommendations.

Confidential

Security Engineer

Responsibilities:

  • Perform and lead application and networks security vulnerability assessments.
  • Identifying teh critical, High, Medium, Low vulnerabilities in teh application based on OWASP TOP 10.
  • Conducted application penetration testing of 15+ business application.
  • Work on improvements for provided security services, including teh continuous enhancement of existing methodology material and supporting assets.
  • Perform validation and verification. Recommended process improvements.
  • Test form factors and technologies based on scopes of work.
  • Creating comprehensive security assessments reports.
  • Design, develop and implement penetration tools and tests and also use existing ones to handle penetration testing activities.
  • Designed a series of penetration tests as a basis for more advanced testing, resulting in ease of strategic tests development.

Confidential

Application Security Analyst

Responsibilities:

  • Networking monitoring, IDS/IPS, Firewalls, Proxy servers, load balancers.
  • Served as teh primary responder for managed security incidents pertaining to teh client firewalls and all network infrastructure components.
  • Configuration and management of network systems, network design, and integration of security technologies.
  • Identify key indicators of malicious activities on teh network and end user workstation.
  • Perform analytical support of security incident calls across teh enterprise.
  • Analyze raw PCAP data to validate security events, interpret network traffic and extract indicators.
  • Provide cyber threat analysis to support development and research teams.
  • Work wif security operation teams to collect data for incidents metrics reporting.
  • Assists network services, software systems engineering and/or application development in order to restore service and/or identify problems.

We'd love your feedback!