We provide IT Staff Augmentation Services!

It Security Engineer Consultant Resume

0/5 (Submit Your Rating)

Austin, TX

SUMMARY

  • Around 6 years of extensive experience in Network Security, Cyber Security, Penetration testing and Vulnerability assessment.
  • Relevant experience includes computer security systems design/development, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, systems engineering with network and system administration.
  • Heavily involved in PenTest assignments (using Maltego, FOCA, BurpSuite, Nessus, Core Impact, Metasploit and other Kali Linux tools)
  • Implemented and Administered PCI, HIPAA and SOX audit requirements from an IT internal controls perspective.
  • Experience working in Wireshark, Kali, Netcat, TCPDump, NMAP, and Canvas (exploit tool).
  • LDAP Injection, XSS, All HTTP based Injection including headers and SQL and all parameters. Local File Inclusion, Privilege Escalation
  • Engineered Splunk to build, configure and maintain heterogeneous environments and in - depth knowledge of log analysis generated by various systems including security products.
  • Penetration testing and Vulnerability assessment - Web applications, Wireless network, Mobile Applications and Network (Internet and Intranet) with the intent to deep dive and find all flaws or weakness within the given scope and time frame.
  • Understanding of functionality and capabilities of computer network defense technologies, to include: Router ACLs, Firewalls, IDS/IPS, Antivirus, Web Content Filtering

TECHNICAL SKILLS

Tools: Nessus, W3AF, AppScan, Burp Suite Pro, Metasploit, Canvas (exploit tool)

Protocols And Compliance: HTTP, SSL/TLS, SMTP, SMB, NTP, DNS, SOAP, TCP/IP V4, SNMP, VOIP. Compliance: HIPAA, SOX, PCI

Scripts: Python. Shell Scripting (BASH, SH, CSH etc )

Penetration Tests: LDAP Injection, XSS, All HTTP based Injection including headers and SQL and all parameters. Local File Inclusion, Privilege Escalation

PROFESSIONAL EXPERIENCE

Confidential, Austin, TX

IT Security Engineer Consultant

Responsibilities:

  • Primary responsibilities include protecting the company's web hosting environment, and corporate IT endpoints from hackers and cyber threats
  • Developed custom tools to gather, correlate, and analyze data pertaining to threats and incidents on the networks in order to identify areas in need of security improvement
  • Part of Cyber Network Operation (CNO) group to perform PenTest/Vulnerability assessments (BurpSuite, Nessus, Canvas)
  • Implemented a third-party Data Loss Prevention (DLP) monitoring program ($250k) to ensure both Payment Card Industry (PCI) and personally identifiable information (PII) information is secure.
  • Assisted with the update and administration of all SOX audit requirements from an IT internal controls perspective
  • Worked on setting up Splunk to capture and analyze data from various layers Load Balancers, Webservers and application servers
  • Worked with resellers to procure a next generation firewall for deployment within the Data Tactics IT network.
  • Writing standard reports on vulnerabilities found in testing, what was exploited and how, recommending methods of remediation
  • Primary firewall engineer managing and deploying CheckPoint, Cisco ASA/Pix (legacy), and Sophos firewalls.
  • Used Nessus, W3AF, AppScan, Burp Suite Pro, Metasploit, Canvas (exploit tool).
  • Port scanned servers using NMAP and closed all unnecessary ports to reduce the attack surface
  • Design a comprehensive set of policies that are customized to a unique security business
  • Performed all continuous monitoring using Nagios and Cloud watch, including coordinating mitigation of gaps, findings and other security issues; reviewing plans of action and milestones; and any other testing required by auditors
  • Performed packet analysis and analyze network traffic for security events and network sniffing using WireShark
  • Performed detailed analysis of components used on UH-60, AH-64, CH-47 and OH-58 platforms to help determine reliability, cost of repair and efficiency of training for ground personnel

Confidential, Dallas, Texas

System Security Engineer II

Responsibilities:

  • Created applications as needed to enhance various aspects of penetration testing as well as demonstrate potential impact to specific security related issues discovered during assessments
  • Conduct tuning engagements with client to develop/adjust SIEM rules and analyst response procedures.
  • Implemented HP ArcSight Logger within organization's syslog enclave for long-term data retention and analysis
  • Administer HIPAA privacy and security audits and attestation for covered entities and business associates
  • Forwarded findings to Cyber Forensic Investigations or Security Incident Response team(s) to further investigate (Encase 6 and Encase 7 forensic tool were utilized).
  • Coordinated with Forensic Investigations Team in managing BlueCoat Proxy appliance configuration and NPC's proxy appliance administration.
  • Provided project planning, guidance and technical expertise in program, policy, process, and planning; risk management, auditing, and assessments; A&A; and quality planning and control.
  • Participated in discussions with the System Analyst to identify technical requirements.
  • Worked with Project Manager on E-discovery analysis to perform Business Application data collections as requested by legal department.
  • Responsible for network design and implementation of secure Big Data project using Hadoop ecosystem.
  • Performed advanced testing of F5 load balancers, Websense V10K & Blue Coat Proxies using virtual machines, security tools, and URL generator
  • Involved in standardizing Splunk forwarder deployment, configuration and maintenance across UNIX and Windows platforms
  • Provided IP subnet design for data center using RFC 1918 addressing and CIDR blocks for network appliances, security devices and hundreds of data nodes.
  • Heavily emphasized on Monitoring using Nagios, Cloud Watch, Network Sniffing (Wireshark).

Confidential, Costa Mesa, CA

IT Security- Penetration Technique Engineer

Responsibilities:

  • Developed penetration testing tactics, techniques and procedures and performs penetration tests against various systems which includes web applications, databases, web services, and networks.
  • Performed routine vulnerability scans against specified systems, analyzes the results, and works with business units to remediate systems.
  • Securing corporate Wi-Fi network using hidden SSIDs, WPA2 personal and MAC filtering.
  • Conducted white/gray box penetration testing on the financial systems using Kali Linux, Cobalt Strike for OWASP top 10 Vulnerabilities like XSS, SQL Injection, CSRF, Privilege Escalation and all the test-case of a web application security testing.
  • Monitored SIEM and IDS/IPS feeds to identify possible enterprise threats. Investigate and triage threats to determine nature of incident.

Confidential

Network Engineer

Responsibilities:

  • Collaborate with Architects, Developers, DBA, Application, Security, and NOC teams on designing scalable and highly available network infrastructure platforms
  • Ensure proper security, monitoring, alerting, and reporting for enterprise infrastructure
  • Install, configure, and maintain networking equipment and services to support the enterprise WAN, LAN, and WLAN environments.
  • Design highly resilient network with no single point of failure; all failovers fully tested on regular schedule
  • Manage workflow closely with a variety of different level support organization in the process of providing network support
  • Worked on Ethernet and associated protocols, TCP/IP, IPv4/IPv6, BGP and OSPF routing protocol operation, IP filtering, firewalls, 802.11 Wi-Fi protocols in an enterprise environment, load-balancers, WAN acceleration, VPNs
  • Worked with network protocol analyzers such as tcpdump or Wireshark
  • Regularly review the health of the network and ensure it is operating optimally
  • Shell scripting skills for automation of simple tasks using Perl, Python or Ruby

We'd love your feedback!