We provide IT Staff Augmentation Services!

Network Security Service Consultant Resume

0/5 (Submit Your Rating)

SUMMARY:

  • Confidential is having total IT experience of 12 years as a Network security service consultant.
  • He is good at planning, design and execution approach by using tools like SIEM, IPS, SWG, Firewall, VA/PT, APT Audit Compliance Linux.
  • He has handled major projects, like SOC implementation, IPS design, implementation, DC migration.
  • He has exposure on different security infrastructure.
  • He is proficient with different network and security infrastructure, process (Change Management, Best practice implementation, access and configuration review Incident handling, hardening process definition etc.) and tools (OnTargetNetflow, MRTG,Nagios)to manage the infrastructure.
  • He has good exposure on audit and compliance handling ISO 27001, PCI 2.0.One of the key contributor on new security technology evaluation and benefit analysis.
  • Handled many data center transition and transformation projects.

TECHNICAL SKILLS:

SIEM ( Security Log Management): Alienvault,Q RadarIntrusion Prevention/ Detection tool ISS Proventia, Snort 2.9, ISS real secure, Cisco Source fire

Web Filtering: Websense proxy, Policy server, PB ( WCG 7.7), WSG (7.5)

Network Products: Routers (1700, 1800, 2500, 2600, 2800, 3600, 3700, 3800, and 7200), Cisco L2 & L3 Switches (2900, 3560,6506,6509)

Network Management Tools: MRTG, Cisco LMS, Netflow Analyzer and WhatsUP Gold, Nagios

Audit/Compliance: PCI 2.0, ISO 27001, HIPPA, Client security Audit.

Firewalls: ASA (5540,5550,5510), Checkpoint GAIA 4K,12K

Operating Systems: Windows 7/2003/XP/2008, Red Hat Linux, Sun Solaris

PROFESSIONAL EXPERIENCE:

Confidential, Houston, TX

Responsibilities:

  • New data center design and implementation.
  • Process definition, hardening standard creation for different servers and network equipment.
  • SOC design and implementation using Alienvault SIEM solution
  • 800 different network device, servers, database, application integration.
  • Use case, SOC process implementation.
  • Nessus vulnerability management solution design and implementation. Including Tenable security center, Nessus cloud, Nessus manager, Nessus agents and scanner.
  • Vulnerability management process implementation.
  • Fireyee Web MPS 2310 design and implementation for web traffic.
  • Policy definition, sandbox implementation.
  • Handover to steady state operation team.

Confidential, Phoenix, AZ

Responsibilities:

  • Responsible for mobile app testing cloud design, security process roll out, vendor co - ordination and roll out.
  • As a Service lead, capacity planning, design, implementation and team management done by Confidential .
  • Worked as a Service lead, capacity planning, design, implementation and team management under the scope.
  • Built custom plug-ins for different event source.
  • Total 780 different event source integration. Including applications, network device, security device and servers.

Confidential

Responsibilities:

  • Worked as a Service lead, capacity planning, design, implementation and team management under the scope.
  • Implementation of Fireye and policy defination.

Confidential

Responsibilities:

  • Guardium 9.0 designing and implementation for Confidential internal HR DB activity monitoring and vulnerability analysis.
  • DB2 on AIX and Oracle on RHEL 6 DB integration with Guardium. Rule and policy configuration.
  • Guardium Integration with Q-Radar for unified alerting.

Confidential

Responsibilities:

  • As a Service lead, capacity planning, design, implementation and team management done by Confidential .
  • Handled many security audit including ISO 27001, PCI-DSS 2.0
  • Implemented Change management process, problem management process.
  • Responsible for periodic firewall rules review SWG policy review, ACS access and log review.
  • Implemented Firewall and network device best practice process.
  • Review and update of all OS hardening standard across organization.
  • Implemented Change management process, problem management process.
  • Responsible for periodic firewall rules review SWG policy review, ACS access and log review.
  • Implemented Firewall and network device best practice process.
  • Review and update of all OS hardening standard across organization.

Confidential

Security consultant

Responsibilities:

  • As a security consultant, successfully conducted VA and PT
  • Built custom scripts for assessment
  • Report creation
  • Patching up the system.

Confidential

Responsibilities:

  • As a team lead I was responsible for implementation and configuration of RSA Envision in Wipro SOC and one of the major client on behalf of Confidential .

Confidential

Responsibilities:

  • Vulnerability Identification and verification (Web / Networks and OS)
  • Carrying out exploits against discovered vulnerabilities
  • DOS Attacks
  • OS Hardening verification (Solaris/VxWorks)
  • OS and Network Audits
  • DTFT (Future Test Case Designing)
  • Vulnerability Identification and verification for web servers & app servers on Solaris10 & AIX platform.
  • New web application implementation & maintenance including dynamic & static code deployment
  • URL access control by using oblix webgate client installation.
  • Provide application access control thorough Netilla 2.4.

Confidential

Team Lead

Responsibilities:

  • As a security consultant, involved in Installation and configuration of Guardium collector and Aggregator ver 7 for their four different locations.
  • Z-TAP & S-TAP agent installation for local traffic monitoring.
  • Define policies and rules according to PCI-DSS standard.
  • Customization of quires and report templates
  • Configuration of Audit Guard schedules for reports.
  • Configuration of alerts from Alert builder
  • Integration with SIEM tool with SNMP alerts.

Confidential

Network security Technical Implementer

Responsibilities:

  • As a technical implementer involved in designing, documenting of the total SOW, RFP for customer.
  • Designing, Installation & configuration of the network and security devices.
  • Creating specific policies for PKI based servers.
  • Designing and implementing DR site.

We'd love your feedback!