Network Security Service Consultant Resume
SUMMARY:
- Confidential is having total IT experience of 12 years as a Network security service consultant.
- He is good at planning, design and execution approach by using tools like SIEM, IPS, SWG, Firewall, VA/PT, APT Audit Compliance Linux.
- He has handled major projects, like SOC implementation, IPS design, implementation, DC migration.
- He has exposure on different security infrastructure.
- He is proficient with different network and security infrastructure, process (Change Management, Best practice implementation, access and configuration review Incident handling, hardening process definition etc.) and tools (OnTargetNetflow, MRTG,Nagios)to manage the infrastructure.
- He has good exposure on audit and compliance handling ISO 27001, PCI 2.0.One of the key contributor on new security technology evaluation and benefit analysis.
- Handled many data center transition and transformation projects.
TECHNICAL SKILLS:
SIEM ( Security Log Management): Alienvault,Q RadarIntrusion Prevention/ Detection tool ISS Proventia, Snort 2.9, ISS real secure, Cisco Source fire
Web Filtering: Websense proxy, Policy server, PB ( WCG 7.7), WSG (7.5)
Network Products: Routers (1700, 1800, 2500, 2600, 2800, 3600, 3700, 3800, and 7200), Cisco L2 & L3 Switches (2900, 3560,6506,6509)
Network Management Tools: MRTG, Cisco LMS, Netflow Analyzer and WhatsUP Gold, Nagios
Audit/Compliance: PCI 2.0, ISO 27001, HIPPA, Client security Audit.
Firewalls: ASA (5540,5550,5510), Checkpoint GAIA 4K,12K
Operating Systems: Windows 7/2003/XP/2008, Red Hat Linux, Sun Solaris
PROFESSIONAL EXPERIENCE:
Confidential, Houston, TX
Responsibilities:
- New data center design and implementation.
- Process definition, hardening standard creation for different servers and network equipment.
- SOC design and implementation using Alienvault SIEM solution
- 800 different network device, servers, database, application integration.
- Use case, SOC process implementation.
- Nessus vulnerability management solution design and implementation. Including Tenable security center, Nessus cloud, Nessus manager, Nessus agents and scanner.
- Vulnerability management process implementation.
- Fireyee Web MPS 2310 design and implementation for web traffic.
- Policy definition, sandbox implementation.
- Handover to steady state operation team.
Confidential, Phoenix, AZ
Responsibilities:
- Responsible for mobile app testing cloud design, security process roll out, vendor co - ordination and roll out.
- As a Service lead, capacity planning, design, implementation and team management done by Confidential .
- Worked as a Service lead, capacity planning, design, implementation and team management under the scope.
- Built custom plug-ins for different event source.
- Total 780 different event source integration. Including applications, network device, security device and servers.
Confidential
Responsibilities:
- Worked as a Service lead, capacity planning, design, implementation and team management under the scope.
- Implementation of Fireye and policy defination.
Confidential
Responsibilities:
- Guardium 9.0 designing and implementation for Confidential internal HR DB activity monitoring and vulnerability analysis.
- DB2 on AIX and Oracle on RHEL 6 DB integration with Guardium. Rule and policy configuration.
- Guardium Integration with Q-Radar for unified alerting.
Confidential
Responsibilities:
- As a Service lead, capacity planning, design, implementation and team management done by Confidential .
- Handled many security audit including ISO 27001, PCI-DSS 2.0
- Implemented Change management process, problem management process.
- Responsible for periodic firewall rules review SWG policy review, ACS access and log review.
- Implemented Firewall and network device best practice process.
- Review and update of all OS hardening standard across organization.
- Implemented Change management process, problem management process.
- Responsible for periodic firewall rules review SWG policy review, ACS access and log review.
- Implemented Firewall and network device best practice process.
- Review and update of all OS hardening standard across organization.
Confidential
Security consultant
Responsibilities:
- As a security consultant, successfully conducted VA and PT
- Built custom scripts for assessment
- Report creation
- Patching up the system.
Confidential
Responsibilities:
- As a team lead I was responsible for implementation and configuration of RSA Envision in Wipro SOC and one of the major client on behalf of Confidential .
Confidential
Responsibilities:
- Vulnerability Identification and verification (Web / Networks and OS)
- Carrying out exploits against discovered vulnerabilities
- DOS Attacks
- OS Hardening verification (Solaris/VxWorks)
- OS and Network Audits
- DTFT (Future Test Case Designing)
- Vulnerability Identification and verification for web servers & app servers on Solaris10 & AIX platform.
- New web application implementation & maintenance including dynamic & static code deployment
- URL access control by using oblix webgate client installation.
- Provide application access control thorough Netilla 2.4.
Confidential
Team Lead
Responsibilities:
- As a security consultant, involved in Installation and configuration of Guardium collector and Aggregator ver 7 for their four different locations.
- Z-TAP & S-TAP agent installation for local traffic monitoring.
- Define policies and rules according to PCI-DSS standard.
- Customization of quires and report templates
- Configuration of Audit Guard schedules for reports.
- Configuration of alerts from Alert builder
- Integration with SIEM tool with SNMP alerts.
Confidential
Network security Technical Implementer
Responsibilities:
- As a technical implementer involved in designing, documenting of the total SOW, RFP for customer.
- Designing, Installation & configuration of the network and security devices.
- Creating specific policies for PKI based servers.
- Designing and implementing DR site.