We provide IT Staff Augmentation Services!

Sr. Managed Security Services Specialist Resume

4.00/5 (Submit Your Rating)

PROFESSIONAL SUMMARY:

  • I am a IT security professional with a focus on Information Security and years of experience supporting computer systems, software and networks. I troubleshoot and diagnose technical issues and ensure that timely resolutions are provided.
  • Vulnerability Management
  • Patch & Remediation Management
  • SIEM
  • Malware Removal
  • Anti - Virus Adminstration
  • Remote User Support
  • Firewall Administration
  • Incident Response Lifecycle
  • Antivirus software
  • Endpoint Security
  • Hardware and Software Upgrades
  • Application and Device Hardening
  • Compliance Standards
  • Inventory Audits
  • User Account Provisioning
  • Incident Handling Procedures
  • Identity & Access Management
  • Risk Control Assessment
  • Security Information Event Monitoring
  • Managed Security Services
  • CEH in progres

TECHNOLOGY:

  • IBM QRadar
  • Carbon Black
  • Active Directory
  • Intrusion Detection and Prevention
  • McAfee Security
  • Symantec Endpoint Protection
  • LINUX \ UNIX
  • Remedy Ticketing System
  • Single Sign On (SSO)
  • Basic HTML, CSS, and JavaScript
  • Qualys/Qualysguard
  • Kali Linux
  • IOS / Android
  • Hyper-V
  • SQL

WORK EXPERIENCE:

Confidential

Sr. Managed Security Services Specialist

Responsibilities:

  • Perform system/network defense incident triage, to include determining scope, urgency, and potential impact.
  • Perform installation and configuration management of security systems and applications, including policy assessment and compliance tools, network security and host-based security systems
  • Recommend, schedule and apply patches, remove or otherwise mitigate known control weaknesses
  • Perform remediation strategies as a result of threat and vulnerability assessments or audits.
  • Locate and repair security problems and failures
  • Prepare and analyze security incident and event data reporting
  • Develop and maintain documentation for security systems, procedures and security diagrams
  • Research, recommend, evaluate and implement information security solutions
  • Monitor and analyze unusual or suspicious activity and make recommendations for resolution
  • Serve on projects and initiatives to develop, plan and implement network and distributed system security technologies
  • Serves as a liaison with product vendors and service providers in support of application development, operations, network and privacy teams

Confidential

Security Analyst

Responsibilities:

  • Manage user accounts, password resets and new account creation.
  • Ensures authorized access by investigating improper access; revoking access; reporting violations; monitoring information requests by new programming; recommending improvements.
  • Hands on work experience in Microsoft Active Directory or other directory services, IAM, Privileged Identity Management solutions and supporting.
  • Patch, Update, and apply security software to systems
  • Experience working across cross teams and effectively deliver IAM services across business lines.
  • Evaluate, configure, implement, administer, maintain and upgrade (as applicable) security tools with oversight provided by federal staff.
  • Safeguards computer files by performing regular backups; developing procedures for source code management and disaster preparedness; recommending improvements.
  • Prioritize and differentiate between potential intrusion attempts and false alarms.

Confidential

IT Support Analyst

Responsibilities:

  • Assists the customer in resolving complex technical problems on a primary account by providing guidance regarding software and hardware problems. Resolves and/or refers highly complex technical problems as appropriate.
  • Testing. Troubleshooting, and coordinated deployment of agent installations across the enterprise.
  • Ability to implement various re-imaging strategies.
  • Trouble shoot and test for laptop, kiosk, printer, phone and network issues
  • Assisting in deploying and configuring new laptops, desktops, printers, multifunction devices, etc.
  • Escalate issues to the appropriate group and assist in the resolution of complex issues

We'd love your feedback!