It Security Engineer Consultant Resume
Austin, TX
SUMMARY
- Around 6 years of extensive experience in Network Security, Cyber Security, Penetration testing and Vulnerability assessment.
- Relevant experience includes computer security systems design/development, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, systems engineering with network and system administration.
- Heavily involved in PenTest assignments (using Maltego, FOCA, BurpSuite, Nessus, Core Impact, Metasploit and other Kali Linux tools)
- Implemented and Administered PCI, HIPAA and SOX audit requirements from an IT internal controls perspective.
- Experience working in Wireshark, Kali, Netcat, TCPDump, NMAP, and Canvas (exploit tool).
- LDAP Injection, XSS, All HTTP based Injection including headers and SQL and all parameters. Local File Inclusion, Privilege Escalation
- Engineered Splunk to build, configure and maintain heterogeneous environments and in - depth knowledge of log analysis generated by various systems including security products.
- Penetration testing and Vulnerability assessment - Web applications, Wireless network, Mobile Applications and Network (Internet and Intranet) with the intent to deep dive and find all flaws or weakness within the given scope and time frame.
- Understanding of functionality and capabilities of computer network defense technologies, to include: Router ACLs, Firewalls, IDS/IPS, Antivirus, Web Content Filtering
TECHNICAL SKILLS
Tools: Nessus, W3AF, AppScan, Burp Suite Pro, Metasploit, Canvas (exploit tool)
Protocols And Compliance: HTTP, SSL/TLS, SMTP, SMB, NTP, DNS, SOAP, TCP/IP V4, SNMP, VOIP. Compliance: HIPAA, SOX, PCI
Scripts: Python. Shell Scripting (BASH, SH, CSH etc )
Penetration Tests: LDAP Injection, XSS, All HTTP based Injection including headers and SQL and all parameters. Local File Inclusion, Privilege Escalation
PROFESSIONAL EXPERIENCE
Confidential, Austin, TX
IT Security Engineer Consultant
Responsibilities:
- Primary responsibilities include protecting the company's web hosting environment, and corporate IT endpoints from hackers and cyber threats
- Developed custom tools to gather, correlate, and analyze data pertaining to threats and incidents on the networks in order to identify areas in need of security improvement
- Part of Cyber Network Operation (CNO) group to perform PenTest/Vulnerability assessments (BurpSuite, Nessus, Canvas)
- Implemented a third-party Data Loss Prevention (DLP) monitoring program ($250k) to ensure both Payment Card Industry (PCI) and personally identifiable information (PII) information is secure.
- Assisted with the update and administration of all SOX audit requirements from an IT internal controls perspective
- Worked on setting up Splunk to capture and analyze data from various layers Load Balancers, Webservers and application servers
- Worked with resellers to procure a next generation firewall for deployment within the Data Tactics IT network.
- Writing standard reports on vulnerabilities found in testing, what was exploited and how, recommending methods of remediation
- Primary firewall engineer managing and deploying CheckPoint, Cisco ASA/Pix (legacy), and Sophos firewalls.
- Used Nessus, W3AF, AppScan, Burp Suite Pro, Metasploit, Canvas (exploit tool).
- Port scanned servers using NMAP and closed all unnecessary ports to reduce the attack surface
- Design a comprehensive set of policies that are customized to a unique security business
- Performed all continuous monitoring using Nagios and Cloud watch, including coordinating mitigation of gaps, findings and other security issues; reviewing plans of action and milestones; and any other testing required by auditors
- Performed packet analysis and analyze network traffic for security events and network sniffing using WireShark
- Performed detailed analysis of components used on UH-60, AH-64, CH-47 and OH-58 platforms to help determine reliability, cost of repair and efficiency of training for ground personnel
Confidential, Dallas, Texas
System Security Engineer II
Responsibilities:
- Created applications as needed to enhance various aspects of penetration testing as well as demonstrate potential impact to specific security related issues discovered during assessments
- Conduct tuning engagements with client to develop/adjust SIEM rules and analyst response procedures.
- Implemented HP ArcSight Logger within organization's syslog enclave for long-term data retention and analysis
- Administer HIPAA privacy and security audits and attestation for covered entities and business associates
- Forwarded findings to Cyber Forensic Investigations or Security Incident Response team(s) to further investigate (Encase 6 and Encase 7 forensic tool were utilized).
- Coordinated with Forensic Investigations Team in managing BlueCoat Proxy appliance configuration and NPC's proxy appliance administration.
- Provided project planning, guidance and technical expertise in program, policy, process, and planning; risk management, auditing, and assessments; A&A; and quality planning and control.
- Participated in discussions with the System Analyst to identify technical requirements.
- Worked with Project Manager on E-discovery analysis to perform Business Application data collections as requested by legal department.
- Responsible for network design and implementation of secure Big Data project using Hadoop ecosystem.
- Performed advanced testing of F5 load balancers, Websense V10K & Blue Coat Proxies using virtual machines, security tools, and URL generator
- Involved in standardizing Splunk forwarder deployment, configuration and maintenance across UNIX and Windows platforms
- Provided IP subnet design for data center using RFC 1918 addressing and CIDR blocks for network appliances, security devices and hundreds of data nodes.
- Heavily emphasized on Monitoring using Nagios, Cloud Watch, Network Sniffing (Wireshark).
Confidential, Costa Mesa, CA
IT Security- Penetration Technique Engineer
Responsibilities:
- Developed penetration testing tactics, techniques and procedures and performs penetration tests against various systems which includes web applications, databases, web services, and networks.
- Performed routine vulnerability scans against specified systems, analyzes the results, and works with business units to remediate systems.
- Securing corporate Wi-Fi network using hidden SSIDs, WPA2 personal and MAC filtering.
- Conducted white/gray box penetration testing on the financial systems using Kali Linux, Cobalt Strike for OWASP top 10 Vulnerabilities like XSS, SQL Injection, CSRF, Privilege Escalation and all the test-case of a web application security testing.
- Monitored SIEM and IDS/IPS feeds to identify possible enterprise threats. Investigate and triage threats to determine nature of incident.
Confidential
Network Engineer
Responsibilities:
- Collaborate with Architects, Developers, DBA, Application, Security, and NOC teams on designing scalable and highly available network infrastructure platforms
- Ensure proper security, monitoring, alerting, and reporting for enterprise infrastructure
- Install, configure, and maintain networking equipment and services to support the enterprise WAN, LAN, and WLAN environments.
- Design highly resilient network with no single point of failure; all failovers fully tested on regular schedule
- Manage workflow closely with a variety of different level support organization in the process of providing network support
- Worked on Ethernet and associated protocols, TCP/IP, IPv4/IPv6, BGP and OSPF routing protocol operation, IP filtering, firewalls, 802.11 Wi-Fi protocols in an enterprise environment, load-balancers, WAN acceleration, VPNs
- Worked with network protocol analyzers such as tcpdump or Wireshark
- Regularly review the health of the network and ensure it is operating optimally
- Shell scripting skills for automation of simple tasks using Perl, Python or Ruby