We provide IT Staff Augmentation Services!

Security Operation Specialist Resume

PROFESSIONAL SUMMARY:

CISSP certified Cyber Security Engineer with 10 years’ experience, including Firewalls, Intrusion Detection, Penetration Testing, Vulnerability Assessments, SIEM, DLP, Data Classification, Networking Protocols and Network Design seeking to obtain a Cyber/Information Security Engineerposition with a challenging company.

PROFESSIONAL EXPERIENCE:

Confidential

Security Operation Specialist

Responsibilities:

  • Designing and implementing IT Security Topology
  • Security Systems planning, installation, administration and monitoring of;
  • Network Security (Over 25 HA Checkpoint firewalls, Cisco ASA VPN appliances)
  • Web Application Firewall (Imperva WAF)
  • Database Activity Monitoring (Guardium, Imperva DAM)
  • Remote Access Control of Employees and Outsources (Juniper SSL VPN)
  • Intrusion Detection and Prevention (4 HA IPS - Mcafee, IBM Security Network Protection)
  • Content Filtering(Websense)
  • Confidential (insightX)
  • Algosec Firewall Analyzer, Tufin
  • Documentation of procedures and practices for all topology
  • A member of Cyber Shield Exercise 2012 team, conducted in nationwide
  • Management of various projects concerning many aspects of IT and Confidential

Confidential

Information Security Engineer

Responsibilities:

  • Administrated Information Security Systems
  • Endpoint security consists of Anti-virus, Disk encryption and Port protector (Checkpoint-PointSec for PC)
  • OTP (One Time Password) system which authenticate the VPN users and internet banking users (Secovid, Radius, Microsoft CA)
  • Load Balancer(Citrix)
  • IPS (Intrusion Prevention System)/IDS (Intrusion Detection System)
  • Certificate Authority (Microsoft CA, Radius)
  • Deployed New Information Security/IT Systems
  • Wi-Fi set up at three major buildings (Aruba Networks)
  • ICMFD (Intelligence Control for Mobile Device) is to control mobile devices
  • ATM Security which is compulsory per Banking Regulatory and Supervisory Agency’s rules was designed
  • Confidential (Network Access Control); To authenticate the machines trying to connect network of the Company.

Confidential

Information Security Engineer

Responsibilities:

  • it was funded by Confidential for technology transfer

Confidential

Network Security Architect

Responsibilities:

  • Managed Confidential Relocation & Renovation Project
  • Designed fully redundant WAN, LAN, WLAN, IPT topology which hosts 1500 client and 20 regional offices
  • Upgrading communication networks to fiber technology within the whole Confidential networks
  • Setup and maintenance of Security Tools (Firewalls, Confidential, Log Managementtools)
  • Installed Monitoring Tools(PRTG) and measured service availability
  • Activated DHCP service covering whole end user PCs, laptops and smart devices
  • Documentation of procedures and practices for all topology
  • Setup and maintenance of security tools
  • Internet and 3rd Party Firewall (Checkpoint, Cisco)
  • Content filtering and data loss prevention tool (Websense)
  • Web Application Firewall (Citrix) to guard Confidential web services
  • Mobile Device Management (IBM Maas 360)
  • Support of Network Security Products (Firewalls, IPS, IDS, VPN boxes)
  • HTTP services/applications turned into theHTTPS services/applications
  • Confidential FTP services switched into the SFTP services(GlobalScape)
  • Technical consultancy to the ongoing projects and analyzing all the projects in accordance with the ITSEC
  • Provided compliance with legislations of local and global authorities at the insurance industry (completed some findings for more than 5 years)
  • TCP/IP trouble shooting, subnetting, and routing
  • Performed contract work for consulting or service companies

Confidential

Cyber Security Consultant

Responsibilities:

  • Guiding for Secure Network topology.
  • Transforming service and application infrastructure to the 3-tier architecture.
  • Administrating Network Security Tools
  • Firewalls(Checkpoint)
  • IPS/IDS (Mcafee)
  • Citrix NetScaler
  • Web Security(Forcepoint-Websense)
  • Conducting Pentest (Kali, Burp, Nmap, Metasploit, Nessus)
  • Secure SDLC process improvement (SAST (Fortify) and DAST(Webinspect, Netsparker) tools, Owasp Top 10)
  • Monitor, Detect and Respond to Security Incidents (Arcsight, Qradar, Splunk)
  • Guiding Database security implementation.
  • Monitoring service availability (SolarWinds, Prtg)
  • Responding tickets and finding proper solutions

Confidential

Cyber Security Expert

Responsibilities:

  • Led security part of IT Transformation Project including POCs, Purchasing, installations and maintenance of following tools
  • Firewalls (Checkpoint, Palo alto, Cisco)
  • Anti-spam, AV (Symantec, Bright mail)
  • SIEM tools (Arcsight, Mcafee)
  • Application Security tools (HP WebInspect, HP Fortify)
  • DLP (Websense)
  • IPS/IDS (Mcafee, Sourcefire)
  • DAF/WAF (Guardium, Imperva Waf, Oracle Daf)
  • Full Disc/File/Folder Encryption (PointSec for PC-Checkpoint, Mcafee)
  • Load Balancer, Waf(Citrix)
  • Vulnerability Assessment (Mcafee Foundstone, Qualys, Tenable)
  • Provided to Company granting ISO/IEC 27001 Certification
  • Implemented Secure SDLC (SAST and DAST)
  • Some sensitive HTTP services/applications turned into HTTPs services/applications
  • Documentation of enterprise policies and procedures
  • Performed internal audits and security assessments
  • Periodic penetration tests to the it systems of the Organization
  • Fraudulent Activity Monitoring scripts were activated

Hire Now