Cyber-threat Security Analyst Resume Profile
Dallas, TX
Summary
An accomplished IT professional with demonstrated success implementing strategic IT initiatives to improve business functionality encompass positive impacts on the bottom line equipped with a skilled, multi-task, work ethic with ability to maximize productivity. Technology savvy self-starter, adept at encountering new situations and extrapolate from existing experience to quickly adapt to new technologies fluently. Possess communication and collaboration skills to lead and work in concert with diverse groups effectively.
QUALIFICATION HIGHLIGHTS
|
|
|
|
|
|
|
|
|
TECHNICAL EXPERTISE
Operating Systems: Windows 9x, ME, NT, XP, Vista, 7, 8 all versions DOS, Windows Server 2000, 2003, 2008 2012 SBS, Standard Enterprise , Novell Netware 6.0, Limited experience with Mac OS 10.5-8
Hardware: SAN Dell, EMC, clustering , NAS, BDR, Firewalls PIX/ASA, Sonicwall, Watchguard , Cisco Routers Switches, Dell, DLink, Netgear Switches, Panasonic Phone systems KX-TD series , Mitel Inter-tel 3000 Phone system, Cisco Nortel VOIP, Wireless Routers, Hubs, Fiber, Cat 5e, Cat 6, POTS, T1/T3, PRIs, Laptops, Workstations, Servers Dell, HP, IBM, Sony , Industrial PCs, Motherboards, CPUs, Memory, RAID, SCSI, Monitors, Projectors, Printers, Copiers, Plotters, Scanners and other peripherals.
Software: Windows Server 2000, 2003, 2008 R2 , 2012 R2 , VMware v4.1-v5.5, Hyper-V, Windows Powershell, Microsoft Exchange 2003, 2007, 2010, 2013, Powershell, IIS versions 6 - 7.5, GPO, Cisco Call Manager, Avaya IP Office Manager, SharePoint, Blackberry Enterprise Server v5.0, Blackberry Professional Software v4.1, MDM/BYOD, FTP/TFTP, VPN Clients, Citrix, Terminal Service, VNC, RDP, PCAnywhere, Microsoft Office 2000, 2003, 2007, 2010, Office365, Microsoft Lync 2010 2013, Business Contact Manager, SQL Server 2005-2008 R2, Microsoft Visio 2010 2013, AS400, Novell NetAdmin Client, Sedona Office, Amadeus, Manitou, Cabinet NG, Adobe, AutoCAD 2005, Win Mark Pro, Spectre Soft, MS Operations Manager, Acronis Echo Workstation Server w/Universal Restore, Veritas Backup Exec, SolarWinds, Vipre Enterprise, McAfee, Trend Micro, Mozy Pro, Symantec Endpoint, Norton Ghost, Symantec Backup Exec, AVG Avast AntiVirus, and ticketing like: ConnectWise, Kaseya, ZenithInfoTech, Remedy, USD, and TOSS.
Networks/Protocols: LAN/WAN, TCP/IP, WINS, DHCP, DNS, POP3, SMTP, FTP, TFTP, SNMP, ICMP, RIP, RIPv2, OSPF, IGRP, EIGRP, BGP, IDS, IPS, ACL, NAT, PAT, VPN, TELNET, SSH
PROFESSIONAL EXPERIENCE
Confidential
Cyber-Threat Security Analyst
Worked in a niche Security Operations group that was not part of the NOC, SOC, nor firewall team. I did forensics investigation for penetration testing on PCI compliant networks. Some tenants include Alliance Data Services, Hallmark, and Vertex Inc. My assignments were related to PCI penetration testing remediation, but others were issues that were never resolved and usually reassigned and transferred from team to team because the time was never taken to find the root cause. I served as glue between the teams, often having to reach out to different resources on each of the teams. Part of my investigation required looking into outstanding incidents, service requests, and work orders providing evidence of root cause utilizing tools such as QRadar, Nessus, Tripwire, Zenmap, Envision, Triole CMDB, and looking at security appliance configurations. The security appliances I worked with were Bluecoat Proxy and Cisco ASAs. Bluecoat tickets were going to be transferred to the firewall team, but while I was there I handled the Bluecoat tickets making configuration changes in a test environment then implementing in production. With Cisco ASAs I looked at the running configuration including thousands of lines of ACLs. The network was documented on a large scale but no documentation existed of all the intricate network changes of some particular clients so it did require a great amount of effort to investigate these tickets. Often the ticket was poorly documented and I had to find out the actual issue. If I did not have authority to make the appropriate changes to resolve the ticket myself I would have to track down and assign it to the appropriate resource.
Confidential
Microsoft Lync/Unified Communications Engineer
As a Telephony Engineer I was responsible for the deployment of VOIP solutions with Polycom phones that I fully integrated with Microsoft Lync 2013, built a baseline configuration file from scratch for each phone model, provisioned phones, security, set up users in Lync for Enterprise Voice used Windows PowerShell to do the bulk of the provisioning. I traveled around the US going to clients' sites for migrations taking out old Cisco VOIP system and implementing a fully integrated Microsoft Lync 2013 VOIP solution with Polycom phones. During the migration I also was responsible for making any firewall changes necessary for the migration and analog gateway, moving any analog lines for fax machines and security systems. All of the warehouses had overhead paging so we use AudioCodes MP118 analog gateways to integrate the paging system to the VOIP system. I did all of the programing on the AudioCodes appliances and also configured CP911 emergency dialing so if the WAN went down the local network could still reach the analog gateway and use the POTS line to dial 911 and get the correct call back number and address on caller ID. Trained end users how to use the new phones and also setup and Bluetooth headsets required, also supported Microsoft Lync and Office 365. After testing all of the phones, fax lines, overhead paging, emergency 911 calling and train the end users labeling all new punches, jacks, fax machines, the analog gateway and taking pictures of the telecom environment and documenting all of the DIDs, user PIN authentications, I would create a master spreadsheet and submit all documentation and pictures to the project manager.
Confidential
Windows Systems Administrator
- As a System Engineer I was responsible for Hardie's entire network infrastructure across all locations. I also served as the Sr. Windows Systems Administrator and Tier 3 support. The network consisted of 5 locations, approximately 35 Windows Server 2008 R2 2012 , in which 8 Windows servers were VMs and the remaining were physical servers. I supported around 400 end users. Each of their locations had a Cisco ASA 5505 or 5510 that I managed and configured all updates. I managed the entire virtual environment, the hosts' resources, and backups of all servers. We used DPM for physical servers and Veeam Backup for VMs. MPLS network between locations and I also setup fail over SSL VPN tunnels through the DIA for backup. Projects I did while I was at Hardie's:
- Implemented Microsoft Exchange High Availability environment with full redundancy
- Migrated end users from Office 2007 2010 to Office365 and setup OneDrive synchronization settings with local user data
- Deployed LogMeIn Central solution for remote support on all networked PCs, Laptops, Servers
- Deployed TrendMicro Office Scan solution throughout the entire network
- Setup and configured a new helpdesk system with inventory, asset management, reporting, CMDB, MDM, workflow, endpoint protection automation from SysAid Technologies
- Setup local print server at each location and deployed printers through group policy for each location and their respective departments and personnel
- Revised the network IP Scheme by implementing VLANs throughout the network because they were not structured for growth and needed to minimize broadcast traffic
Confidential
Cyber-Threat Security Analyst
- Prevented hackers, crackers from effecting customer experience
- Made network documentation and uploaded to Sharepoint
- I was the go to engineer for the NSI models
Confidential
Windows Systems Administrator
- As the System Engineer at Goodson Acura of Dallas I was solely responsible for the entire environment across four locations communicated with all 3rd party vendors, project planning, management, and implementation. All end users using Active Directory in a Windows Server 2008 R2 environment email hosted by Rackspace Exchange IMAP provided training on end user programs serviced and maintained all client PCs, servers, maintained resolved all issues used McAfee Complete Endpoint Protection Cisco Unified Communications Manager Business Edition Avaya IP Office - VOIP systems, and supported the internal network infrastructure containing Cisco 3800 series routers, Cisco 2900 series routers, and Cisco 2960 series switches. Also configured and maintained Sonicwall 2400 series UTM firewalls with IDS, IPS GAV, Sonicwall's Sonicpoint WiFi solution.
- Solved all of the Wi-Fi problems throughout the entire building, implemented MDM BYOD for customers and vendors and managed the Virtual SSIDs
- Configured the customer PCs in the lounge so that no changes could be made by the customer thus no longer a need to spend time on correcting changes made by customers and fixing problems to get the computer running again
- Implemented folder redirection and roaming profiles so that any user could use any computer and it would be seamless to the end user. This also included Outlook with IMAP configuration.
- Configured and enabled Content Filtering Service through the Sonicwall with LDAP integration and Single Sign-On and also setup Viewpoint and web usage reports that were automatically email to the General Manager.
