We provide IT Staff Augmentation Services!

Cybersecurity Engineer Resume

0/5 (Submit Your Rating)

Durham, NC

SUMMARY

  • Career Goal: Seeking positions in an IT Director of Operation Management, Senior Level Cyber Security Analyst and Network Security Product/Project Management positions to further use my skills and experience in Cyber Security environments. Summary of Qualifications:
  • Provide technical engineering and configurations changes for DOJ/JCOTS large Symantec Bluecoat SG Proxy Enterprise S500 DLP environment.
  • 7 years on Strong Knowledge on deep dive troubleshooting on Proxies, Symantec DLP Endpoint and Cisco Firepower and Symantec Content Analysis.
  • 7 plus years of Splunk Enterprise queries, indexes and Wireshark packet captures and log analysis. Strong working knowledge dat pertain to encryptions and routing protocols wif traffic behaviors, correlation data captures and more.
  • Strong knowledge of TCP/IP, HTTP, HTTPS, FTP, cookies, autantication, web filtering, virus scanning, web servers, SSL/encryption and reporting packagesmore than 7 years of experience.
  • Working knowledge of understanding specific threat activity using metasploit and forensic tools to dig into the current state of an endpoint and look for digital artifacts dat indicate specific activity. Ex. Hash, Logging, Nagios.
  • 20 years of understanding networking concepts and configurations.
  • 7 years of Strong background using Network Log, Memory Analysis, Endpoint DLP Analysis.
  • Strong threat hunt experience in providing security information and event management from SIEM, Firewall, Log Analysis to conduct a potential threat or IOC’s.
  • 7 years of Splunk queries and the ability to analyze the data.
  • Experience in Endpoint Solutions and email DLP governance using Symantec DLP Proofpoint for Data Protection. Daily task includes MACD updating from blocklist to adding TLS domains.
  • Strong understanding of using SIEMs such Alien Vault, Cisco Firepower and Symantec Proofpoint DLP wif other web - based applications.
  • Strong understanding of using SIEMS such Alien Vault, Cisco Firepower and Symantec Proofpoint along wif other web-based applications. Monitor and analyze network traffic and security alerts from tools which include but limited to: Antivirus, IDS/IPS, Firewalls, AD, Windows Event Logs, Vulnerability Management tools.
  • Conduct forensic analysis on endpoint systems and network traffic when necessary.
  • Understand and articulate complex vulnerability information to technical and non-technical audiences.
  • Identify and prioritize the security alerts based on initial triage of alerts or activity.
  • Troubleshoot wif customers to ensure spam filters, whitelists are updated and has been identified.
  • Create and track security investigations to resolution through Remedy and UD ticketing systems
  • 7 years in Information Security domains
  • 7 years of Cisco Nexus administrative experience and Cisco ASA Firewalls 5500’s series.
  • 7 years of troubleshoot Symantec Secure SG proxy and web filtering wif effective monitor, control, and secure traffic to ensure a safe web and cloud experience.
  • Over 20+ years understanding of varying networking protocols
  • Strong Knowledge on Risk Management and Vulnerability Assessments using Bluecoat, Splunk and Wireshark accompanied wif
  • Strong understanding of tools needed for penetration testing, white box testing and defensive mechanism against Red Team attacks.
  • Develop strategies and approaches to address network vulnerabilities resulting in prioritized remediation options based on severity and impact. By using tool kits for forensic analysis and
  • 7 plus years of project management and professional services.
  • A lead contributor for finding and resolving complex issues using debug on various security appliances.
  • Hands on experience hardening systems to benchmarks such as CIS, NIST, ISO etc.
  • Strong critical thinking, oral communication skillsets, writing techniques to communicate root cause analysis (RCA’s) details to the customer on network outages etc.
  • Strong Knowledge Data Loss Prevention requirements documentation and evaluate policy control and remediation strategies.
  • Understand how reconnaissance kill chain model are used by attackers to discover and pinpoint system to compromise.
  • Strong research, evaluate, understand IOC’s, APT’s behaviors and other attack methods, support, and manage new cyber security technologies into the enterprise architecture.
  • Monitor security tools to detect cybersecurity attacks or intrusions.
  • Develop and document integrated management risk mitigation plans across an enterprise of multiple operating systems.
  • Provide incident response capabilities to react to cybersecurity incidents. Provide Root Cause Analysis (RCA) reports to Operation management teams and customers.
  • Partnering wif operational staff to identify and drive resolution on data security gaps.
  • Build Cross Functional Tier Level Training to support Business Models.
  • Troubleshoot wif customers on a variety of firewall policy issues which include break fixes to Change Control.
  • Communicate effectively technical and business data to all levels of management ensuring quality decisions are taken
  • Intermediate and good working knowledge of computer forensics using various penetration test tool kits such as EnCase, NirLauncher FTK Imager and others.

TECHNICAL SKILLS

Applications & Tools: Snort, AlienVault, OpenVAS, Metasploit, NMAP, Nessus, Splunk, OWASP, Nir Launcher, Symantec, Proofpoint, Armitage, Rapid7, Netcat, Nexpose

Firewalls: Cisco ASA, Checkpoint Firewall, Symantec Secure SG Proxy, Cisco Nexus, Nokia, Net Screen, Fortinet, Juniper, Baytech, Fortinet, Palo Alto pfSense

Systems: Python Scripting, Kali Linux, CentOS, Ubuntu, Solaris Unix OS, Sqlplus-Oracle, Cisco IOS, Windows 10, VMware, PowerShell.

Hardware: Cisco routers, switches, and hubs. Cisco VOIP phones, HP/DELL rack mount-based servers, Digital Cross Connects, HP C-Class Blade, Brocade SAN, Confidential SS7 Eagle STP & IAS/PIC platforms

Networking: DNS, WINS, Wireshark, DHCP, LAN/WAN, FTP, VPNs Cisco, Checkpoint, VLAN, SMTP, SNMP, TCP/IP, SS7 Signaling, VOIP, PSTN, IPv4, OPSF, BGP, MPLS, Ethernet Switching administrative, BGP, Cisco IOS, Cisco Routers, DELL, DHCP, DNS, Ethernet, Firewalls, Firewall, FTP, HP, hubs, IP, LAN, Linux, Windows, 2000, Enterprise, network design, Network Security, Proxy, PSTN, Routers, SAN, SMTP, SNMP, Solaris, Sqlplus, SS7, Switches, Symantec, TCP/IP, phones, troubleshooting, Unix OSTeam leadership, Risk management processes and analysis, Client assessment Teamwork / Collaboration

PROFESSIONAL EXPERIENCE

Confidential -Durham, NC

Cybersecurity Engineer

Responsibilities:

  • Managed Security Services responsibilities for the Security Operations Center are to perform Tier 2 level troubleshooting skills to devices such as Cisco ASA firewalls, Routers, Cisco Nexus Switches, Checkpoint firewalls, Blue Coat, Symantec, and ProofPoint.
  • Responsible for review and analysis of security requirements, work wif senior level team members to develop integrated plans to protect corporate assets, informational technology and administer security systems to support daily security operations.
  • Daily assignments requirements strong customer service skills which includes answering the phones, working Remedy tickets while developing and growing networking skill-sets for advancement into higher Tier 3 and Tier 4 support levels in the Confidential & Confidential Network Security Operations Center.

Network Implementation Engineer III

Confidential, Cary, NC

Responsibilities:

  • Responsible for performing both the technical and administrative activities associated wif the implementations of install, upgrading, configuring, network design, moves/adds/changes, firmware upgrades and migrations services over 2000 network elements wifin the USPS global network and Verizon Business Core Enterprise.
  • Daily assignments include upgrades, migrations/cuts provisioning of Cisco Routers devices preparation turnovers to XO Communications and Confidential &T.
  • The technologies and principals include (F/Ethernet, Gig/E), IP/VPN, Cisco Hardware (831s, 1711s, 1720/21s, Cat 6500s, 7200, 3825, 3750).
  • Supported USPS Enterprise MNSO Core applications all from a single access point.

Professional Services/Project Management

Confidential, Morrisville, NC

Responsibilities:

  • Provide a timely and consistent view of project status information to all audience members and project stakeholders.
  • Managed Professional Services projects and accounts estimated in millions of dollars from post sales ranging from $100,000 to $10 million.
  • Manage actions or changes dat affect the scope, value, or duration of projects and tasks.
  • Track progress against the workplan to ensure signoff and deadlines were completed as forecasted.
  • Create budgets and forecasts to plan and manage the financial performance of projects throughout the project lifecycle.
  • Track and monitor the performance of a project, and analyze financial and effort information by task, resource, and time.
  • View exceptions for key financial, schedule metrics and send automated status report notifications to key project stakeholders.

We'd love your feedback!