Information Security Analyst Resume
San Francisco, CA
SUMMARY
- 6+ years of Experience in Information Security, Policy procedure development and implementation, Systems and Network security implementation, Security analysis.
- Experienced and proficient in performing Security Administration, setting up role based security, resource permission for the organization.
- Skilled in IT security, vulnerability and risk assessment.
- Hands on experience in Encryption using Credant and Symantec PGP.
- Experienced in key management with Symantec PGP.
- Have good understanding Private key and Public key cryptography.
- In depth knowledge and experience in Vulnerability management using QualysGuard.
- Hands on Expertise in SIEM Monitoring using Log rhythm.
- Expertise in Antivirus management, log analysis and Control compliance suit.
- Experienced with working on Windows and LINUX platform.
- Hands on experience with monitoring tools like net numen, splunk.
- Technical knowledge about antivirus, IPS, IDS and Firewall logs.
- Conducted Network traffic analysis using Wireshark, solar winds and fiddler.
- Performed different security attack tests using Deter lab, Burp suit and DVWA.
- Knowledge in designing SDN networks, web server backend, cisco routers and switches, access control list, SCCM and Microsoft active directory.
- Hands on experience with Alarm monitoring and Fault management in NOC environment.
- Provided L1 and L 2 level support to engineers in Network operation center.
TECHNICAL SKILLS
Programming Skills: C++, python.
Industrial tools: Net Numen, UNMS, eOMS, Splunk, QualysGuard, Credant, Symantec PGP, Log rhythm.
Networking Skills: Vulnerability and malware detection, Risk management, file and folder encryption, full disk encryption, decryption, firewall logs, network monitoring, routing and routed protocols, virtualization, trace route, ping, data center, load balancer, cryptography, IDS and IPS, VOIP, SIP, MPLS, Open flow, Network and system security.
Hardware & Software Platforms: Windows, Linux, eclipse, Visual studio, Cisco routers and switches, Deter lab, Putty, NS3, Mininet, MS Office, Wireshark, Fiddler, Cisco packet tracer, VMware player, solar winds, SDN.
PROFESSIONAL EXPERIENCE
Confidential, San Francisco, CA
Information Security Analyst
Responsibilities:
- Experience working in operations environment with commitment to procedurals ways of working, security disciplines, strict change control process and emphasis on availability of service
- Worked on various enterprises security applications like Qualysguard, Symantec PGP & Credant and performed implementation, configuration, upgrading and policy creation.
- Worked on Credant file and folder encryption to secure sensitive data in end point devices.
- Experience of usage of WDRT token, WDE Administration and Whole disk recovery
- Installation, export, archival of encryption keys and shield ID on client machines using various utilities like WS Scan, CMG encryption and decryption agent.
- Monitored, Evaluated & Responded to the vulnerability scanning IT network and system using Qualysguard and remediation activity with responsible system administrator to resolve unauthorized activity within global computing environment.
- Discovered, analyzed, diagnosed and reported on malware events, files and vulnerability issues.
- Investigated root cause for suspicious threats, analyzing global threats in IT environment and Solution designing.
- Developed policies and procedures to mitigate incidents for the entire computer network.
- Worked on different module on qualysguard as WAS, WAF, PCI.
- Scanned PCI module application and send reports to acquiring banks.
- Monitored firewall logs for assessing security events and activity using log rhythm.
- Log analysis & managing the accuracy to lowering/avoiding false positives and false negatives.
- Reviewed authentication, security event logging and monitoring of various servers.
- Monitored proxy rules, security settings and logical policy sets for gateway devices.
- Responded, investigated and reported IT security incidents.
- Provided day to day operational support to resolve remedy tickets related to security incidents.
- Network monitoring, Traffic capturing using Wireshark.
Confidential
Security Engineer
Responsibilities:
- Operated in alarm monitoring and fault management department monitoring alarms through EMS/UNMS terminal in NOC.
- Monitored live traffic and resolved call failure issues.
- Classified alarms and filter those alarms based on alert levels. Fixed alarms by performing scheduled tasks.
- Escalate and informed infra alarms to filed engineers. Provide support to field engineer to clear BTS alarms.
- Dispatched fault and system alarms to fault management team for further processing while working in alarm monitoring team.
- Providing technical faults and solutions to faults which occur in BTS.
- Cleared and configured system alarms in Net - Numen. System alarms are high alert alarms and require given set of command to clear them using UNMS application.
- Preparing POP performance and monitoring carrier wise utilization of POP.
- Monitor KPI and preparing reports for performance KPI on monthly basis.
- Quality measure by testing routes for different carriers. Traceroute and ping for all destinations.
- Troubleshoot customer complaints such as call failure, mute call. Follow with the carriers for packet loss or poor voice quality issues.
- Created daily infra reports, alarm clearance report and BSC health checkup reports.
- Provided L1 and L2 support to BSS engineers.
- Generated trouble ticket in oms application. Trouble tickets are used to resolve issues and effectively communicate with customers, vendors and internal management.
Confidential
Network Security Analyst
Responsibilities:
- Responsible to work on ID Administration (Access Management) & compliance concerns, support related with various applications.
- Work with Audit, Risk Management, Assurance, and Compliance monitoring team to provide required document/information.
- Preparing and maintaining technical documentation for information security products and preparing standards for their administration & use.
- Performed 60/90 days data report to validate and remove access from different system.
- Work with security monitoring team to assist with audit logs.
- Gather relevant information and documentation, review and determine the scope of applicability for respective Risk Assessments.
- Perform Application and Infrastructure security risk assessments for applications, applying the Risk Assessment standards established and generate required documentation according to the process defined.
- Create access forms with internal ticketing tool BMC Remedy and provide the resolution to the team with service level agreement.
- Connect with SME to evaluate risks associated with applications & come up with a compliant solution.
- Increase network performance by monitoring performance troubleshooting network problems and scheduling upgrades.
- Monitored key performance indicators (KPI) ensuring established norms of network performance are maintained.
- Handle the tasks of identifying network issues and report to the network support team in case of high level alerts/issues.
- Use trouble ticketing to resolve networking/technical issues of various customers and follow escalation procedures.
