We provide IT Staff Augmentation Services!

It Specialist Resume Profile

5.00/5 (Submit Your Rating)

New Orleans, LA

OBJECTIVE

To obtain a position that maximizes and furthers my technical, analytical, and mechanical abilities with regard to applying information technology and information assurance policies, principles and practices.

SUMMARY PROFILE

Goal oriented IT Specialist with approximately 15 years of experience implementing IT products and procedures to ensure compliance with company policies. Focused and driven, with an earnest determination to troubleshoot complex problems thoroughly and efficiently Flexible team player with excellent interpersonal and communication skills Committed work ethic with key focus on the mastering and incorporation of current and economically feasible innovations in technology and in computer science field. Provide technical expertise and consultation in the implementation and administration of user accessibility to computer facilities, as well as access controls to computer data files, system software, and application programs according to local, Departmental, and Government-wide security policies

SUMMARY OF QUALIFICATIONS

Specialized experience in developing IT policies and procedures providing expert technical advice, guidance, and recommendations to management and other technical specialist on critical IT issues analyzing and defining network requirements designing and developing data base management systems security related incident response plans and disaster recovery plans and knowledge of IT security related laws and executive directives, e.g., Federal Information Security Management Act FISMA , OMB Circular A-130, Presidential Decision Directive PDD 63, NIST 800-53 r4, NIST 800-83 r1, NIST 800-40 r3 and NIST 800-61 r1. Utilizes security specifications and procedures for IT security systems including, but to limited to large mainframe computing systems, mid-range computing systems, Linux/Windows/Citrix servers, Firewalls, Local Area networks LAN , Wide Area networks WAN ,certificate Authority/digital signature functions, and other methods of secured open system communications. Develops, implements, coordinates, reviews and evaluate security plans, policies, technical/administrative procedures, accreditation documents, programs associated with IT equipment software, design, data and physical security, communications. Specialize with implementing and administering security solutions in support of enterprise information security objectives including Security Information and Event Management SIEM , Forensic Tool Kit FTK , Memory Forensics, intrusion detection, e-discovery, and access management capabilities. Also perform tasks in support of enterprise incident response capabilities including preparation, detection, containment, remediation, and resolution phases. Managing information technology projects, and providing direct support for enterprise Security Assessment and Authorization activities.

EXPERIENCE

IT Specialist

Confidential

Assign to the Information Technology System Security Department as an IT Specialist that investigate cyber incidents, event detection, network security monitoring, intrusion investigations and cyber defense mitigation strategies. Also, serve as one of the Federal Agency Site Incident Response Coordinator that is responsible for monitoring and coordinating handling of cyber incidents that include triaging and correlating cyber security incidents, performing strategic analysis, advising customers on strategies to protect and secure sensitive information and systems, conduct malware analysis, performing vulnerability penetration testing.Conduct incident management, vulnerability analysis, reverse engineering, computer forensics using Forensic Tool Kit FTK , Access Data, Mandiant Intelligent Response, Mandiant Redline other security tools and risk management and/or audit trail analysis. Evaluates, acquires, configures, and usesecurity software tools such as Tenable Security Center/ Nessus and Tivoli Endpoint Managementto ensure network devices are configured and federallycomplaint, automated and secure from unauthorized use, viral infection, and other problems that would compromise sensitive information in terms of confidentiality, integrity, and availability, or would compromise other aspects of overall system security. Review systems, networks, and software designs to identify and evaluate system vulnerabilities and potential security risks. Stay up to date by Analyzing new cyber threats and vulnerabilities, disseminate warning information, and coordinate incident response activities. Provide technical expertise in one or more of the IT areas of security infrastructure architecture and implementation. Oversee the design and development of cyber exercises, training materials, and training requirements. Independently leads major IT projects to accomplish the development, implementation, coordination, review, and evaluation of security plans, policies, technical/administrative procedures, accreditation documents, programs associated with IT equipment software, design, data and physical security, communications. Provide technical expertise and consultation in the implementation and administration of user accessibility to computer facilities, as well as access controls to computer data files, system software, and application programs according to local, Departmental, and Government-wide security policies. Leads major IT projects to develop software to automate security procedures and/or provide security reports and guidance to other IT Specialists on monitoring audit logs and access to operating systems, computing platforms, application systems, network links, and telecommunication links. Also, provide technical expertise and consultation for Audit Reviews, Security and Risk Assessments, Security Test and Evaluations, and other accreditation activities in order to insure agency systems are fully accredited and comply with all applicable security standards. Investigates or leads periodic surveys and inspections to ensure compliance with the Office Chief Financial Office IT security directives and inspection procedures, to ensure all actual or suspected security violations are identified and reported appropriately. Finally, provide expertise and leadership in the development, maintenance, execution, and monitoring of the OCFOComputer Forensic Center and Disaster Recovery DR Plan, Continuity of Operations Plan COOP .

Information Security Analyst

Confidential

Serve as Team Leader over several IT Projects, conduct weekly conference calls, and delegate responsibilities to team. Oversee the planning, designing, and implementing of new systems or changes in existing data processing systems to support management control and decision-making activities. Creates and executes project work plans and revises as appropriate to meet changing needs and requirements. Prepares and presents reports, and represents the organization in interactions with other organizations. Provides technical leadership, and evaluate and recommends adoption of new or enhanced approaches to system security. Applies information security, and assurance policy, principles, and practices. Establish metric and analysis systems to assess efficiency, effectiveness, and responsiveness to customer wide area network requirements and concerns. Ensures effective use of organization resources to achieve organization goals and objectives as well as fulfill serviced customers' needs. Plan and carries out routine assignments using standard Information Technology systems security methods, approaches, and procedures. Participates in the implementation and coordination of activities designed to ensure, protect and restore IT systems, services, and capabilities. Collaborates, negotiates, and coordinates with external entities to ensure effective management of customer requirements. Establishes and maintains operating level agreements with customers to document network and customer operation agreements and processes. Ensures operations processes with vendors are in place to perform monitoring and problem resolution. Ensure compliance with all Information Assurance IA policies, guidance, and patches. Focal point for user accounts. Processes all documentation, creates, deletes, and suspends accounts as directed. Evaluate the impact to the systems in terms of resource consumption and performance degradation, system reliability, and system integrity. Provide technical support, guidance to staff on matters relating to IT management issues involving a wide range of IT matters that typically extends, and applies to an entire organization or major components of an organization. Ensure information systems reliability, accessibility, prevent, and defend against unauthorized access to systems, networks, and data. Implements, maintains, and conducts on-site and remote analyses of information system standard security products and associated systems in order to determine overall technical features and standard security protection required for information systems and networks processing at all levels of information security. Develops or interprets policies and procedures and employs technologies to ensure information systems reliability and accessibility and to prevent and defend against unauthorized access. Reviews risk and vulnerability assessments. Review systems security contingency plans, and disaster recovery procedures. Experience installing software and hardware in order to manage, monitor and otherwise support an extensive computer systems network. Assist in implementing a communications system connecting the various components of an enterprise network. Assist in monitoring performance and efficiency of an enterprise network. Develops or interprets policies and procedures and employs technologies to ensure information systems reliability and accessibility and to prevent and defend against unauthorized access. Compiles and maintains documentation of hardware and software configurations. Performs assign tasks of increasing complexity in the installation and maintenance of system software packages. Researches, tests and documents network LAN/WAN/Enterprise operating systems, application software products, and associated peripheral hardware. Respond to technical calls, emails, wireless issues, and personnel requests for technical support. Tracks and monitor the problem utilizing ticketing system to ensure a timely resolution. Load and update new operating systems as well as updating software. Use virus protection software as well as cleaning spy ware. Add/Delete users in Active Directory, set up permissions through ACL and reset passwords. Join computers to the domain and installed Cisco switches and routers, and coordinate cabling with vendors for new data wiring, moves/additions, and repairs. Coordinate the return of leased computer equipment at the end of the lease term with vendor. Participate in the creation and approval of images for desktop and laptop computers that will be deployed to FMS locations. Demonstrate a thorough understanding of antivirus policy and the process for detecting and removing viruses. Demonstrate thorough understanding of policies and procedures relating to information technology. Finally, conduct incident management, vulnerability analysis, reverse engineering, computer forensics using Forensic Tool Kit FTK , Access Data and risk management and/or audit trail analysis.

Information Security Analyst

Confidential

Ensure information systems reliability, accessibility, prevent, and defend against unauthorized access to systems, networks, and data. Implements, maintains, and conducts on-site and remote analyses of information system standard security products and associated systems in order to determine overall technical features and standard security protection required for information systems and networks processing at all levels of information security. Develops or interprets policies and procedures and employs technologies to ensure information systems reliability and accessibility and to prevent and defend against unauthorized access. Coordinate cabling vendors for new data wiring, moves/additions, and repairs. Prepares and presents reports, and represents the organization in interactions with other organizations. Provides technical leadership, and evaluate and recommends adoption of new or enhanced approaches to system security. Applies information security, and assurance policy, principles, and practices. Establish metric and analysis systems to assess efficiency, effectiveness, and responsiveness to customer wide area network requirements and concerns. Ensures effective use of organization resources to achieve organization goals and objectives as well as fulfill serviced customers' needs. Determine whether data cabling vendor is needed and obtain prior to dispatching. Coordinate the return of leased computer equipment at the end of the lease term with vendor. Participate in the creation of images for desktop and laptop computers. Assist users with backing up computer data on network files shares or CDRW drives. Demonstrate a thorough understanding of antivirus policy and the process for detecting and removing viruses. Demonstrate thorough understanding of company policies and procedures relating to information technology. Finally, educate users on these policies. Troubleshoot Windows/Unix network and personal computers. Maintain cabling infrastructure. Install new servers and switches. Load and update new operating systems as well as updating software. Set up VPN remote access. Add/Delete users in Active Directory, setting up permissions, resetting passwords. Join personal computers to the domain.

Desktop Support/Network Analyst

Confidential

Coordinate cabling vendors for new data wiring, moves/additions, and repairs. Determine whether data cabling vendor is needed and obtain approval from the IT Manager prior to dispatching. Prepares and presents reports, and represents the organization in interactions with other organizations. Provides technical leadership, and evaluate and recommends adoption of new or enhanced approaches to system security. Applies information security, and assurance policy, principles, and practices. Establish metric and analysis systems to assess efficiency, effectiveness, and responsiveness to customer wide area network requirements and concerns. Ensures effective use of organization resources to achieve organization goals and objectives as well as fulfill serviced customers' needs. Assist users with backing up data. Evaluate the impact to the systems in terms of resource consumption and performance degradation, system reliability, and system integrity. Provide technical support, guidance to staff on matters relating to IT management issues involving a wide range of IT matters that typically extends, and applies to an entire organization or major components of an organization. Demonstrate a thorough understanding of antivirus policy and the process for detecting and removing viruses. Demonstrate thorough understanding of School Board policies and procedures relating to information technology. Finally, educate users on these policies. Load and update new operating systems as well as updating software. Use virus protection software as well as cleaning spy ware. Configure email accounts using Outlook add/Delete users in active directory, setting up permissions through ACL, resetting passwords. Join personal computers to the domain. Assist in the Migration of users from one domain to another, Install 2900/3520 Cisco switches, routers and imaging computers using Norton Ghost.

Security Technologies: Bluecoat, Websense, Nessus and Open Vas Security Scanner SSH SSL Anti-Virus Tools Norton, Symantec v 12, Ghost, Trends Office Tracking laptop Computrace , Encryption, Utimaco , Microsoft baseline security analyzer, Scan Network Tool such as: for Proxy free proxy are proxy switcher , Network Mappers Netmapper , Scanning Tools NetScan Tools Pro, Network Inventory Explorer, and Free Port Scanner Web Application Security Scanner Tools Scandcat and Wikto for window Intrusion Detection Tools Tripwire, Peek Spy Honeypot Tool KFSenor Cryptography Tool Advance Encryption Package Certification Authorities Comodo and Entrust website , etc

Systems: Window XP, 7, 8, Vista, Server 2003/2008 Linux, Virtualization VM Ware 4 Esx, Virtual Machine, and Server 2008 , Citrix

Networking: DNS, DHCP, WINS, TCP/IP,

Software: MS Office Word, Excel, Outlook, Access, PowerPoint Adobe, Heat, Firefox, BMC Remedy, Remote Admin, CA, Java, Lotus Notes, Ghost, Active Directory, Goverlan Management Console, Paper Port, Lexmark Printer Software, Blackberry Software, AS/400, IE, Mozilla, IBM Product TSM backup/recovery EMC-San Technology, FIDELIS XPS-DLP, SIEM, Symantec, Infoblox

Expertise Network System Security

We'd love your feedback!