We provide IT Staff Augmentation Services!

Security Engineer Resume Profile

3.00/5 (Submit Your Rating)

Other Software Usage Experience

  • EnCase Forensic, Forensic ToolKit FTK , Sleuth Kit TSK , Ddrescue FSF , System Development Kit SDK , Android SDK , iOS SDK , XCode Development, VM Ware, VPN Access, FireEye-Mandiant Tool Kit MIR , Damballa Malware Products, F-Response, Trip Wire nCircle Pure Cloud, Splunk, SIEM Regripper, Log2TimeLine, Helix, Caine, DEFT6, Camou 21, Disk Internals, Ethereal, FS Win, Goologscan, Hide Folders XP, History Monitor, Invisible Folders, Invisible Secrets 4, Maltego, Net Tools 5, Network Sumbler, Nir Soft, Ping Terminal, Rainbow Crack, Sysinternal, Tcbrute, USB Write Blocker, WIFI Finders, Wire Shark, Access Data FTK Imager, Astewrisk Master, Bitpim, Chanalyzer, DAMN Info Viewer, E-mail Spider, Emtmain, Exif, HDD Informer , History Monitor, HOST, Operack, Pie snap Shop, Presearch 8, Recon 2, Shadow Copy, Spade 114, Teleport Pro, Thunderbird, Tor-brower, Unetbootin Window 494, Winrar x64, Yahoo Message-Archive Decoder.
  • Network intrusion methods, network containment, and segregation techniques with network platform based security techniques experience and development of an enterprise IT Malware prevention modernization plan.
  • Strong knowledge of incident response and crisis management Design security system polices and operation development, including trouble shooting technical customer issues and developing implement solutions.
  • Ability to assess security incidents quickly and effectively and communicate a course of action COA to respond to the security incident while mitigating risk and limiting the operational and reputational impact to
  • Knowledge of computer forensics both host and network based responding to critical computer security incidents by collecting, analyzing and preserving digital evidence
  • Conduct advanced computer and network forensic investigations ediscovery relating to various forms of computer/network intrusion, theft of information, denial of service, multi-national organized electronic criminal groups.
  • Subject matter expert in design of deployment and management of security systems and tools development to industry standard.

Confidential

Cyber Security Engineer II Malware Consultant

Confidential

Security Engineer II - Lead Malware Engineer Server and End-Point Security

  • Lead Global Malware Resistance -NA, LAC, APAC, EMEA Groups
  • Malware Specialist and Forensics Investigator of 30,000 End Point Users with PCI Payment Card Industry and data security audits assessments. Detect, Analyze and Remediate the malicious attacks that evade Servers and Endpoints.
  • Lead 24 X 7 X 365 planning, deployment, and management of network security Enterprise Incident Response with MIR Mandiant/Fireeye providing custom reports on devices status, management, and upgrades of entire cyber security on malware.

Confidential

Trouble Shooting computer /networks and forensic examinations

Confidential

Government Relations, Public Policy Development and Political Advisor

Confidential

Deputy

Patrol and Court Security - Documented 575 plus Law Enforcement Training Hours

Computer and Network Forensic Training and Certifications

We'd love your feedback!