Senior Information Security Engineer Resume
Centerville, OhiO
OBJECTIVE:
- My goal is to utilize my,, over 15 years of real world experience and inherent skills to obtain an ongoing and upwardly mobile position in the information technology industry and continue to further my especially pertaining to Information Security
TECHNICAL SKILLS:
Skills: Specializing in Network Administration, Cisco CCNA, A+ computer hardware, Windows 9x, NT, 2000, XP,7,Server 2000, Server 2003, Server 2008, Unix, Linux, Microsoft Office 2003,2008 professional, VB6.0, Various Database Management Systems, Web development focusing primarily with Macromedia Studio MX, VM - Ware, MS Hyper-V manager, Data Management, Backup and Disaster recovery, Citrix client/server operations and configurations
PROFESSIONAL EXPERIENCE:
Confidential
Senior Information Security Engineer
Responsibilities:
- Head of Vulnerability Management leveraging Nessus Professional and Tenable I.O.
- Custom vulnerability scan and policy creation and implementation.
- Writing general company wide security policy.
- Assist management in risk assessment and help guide decisions relating to general security best practice and security solution purchasing and implementation.
- Preparation and submission of official attestation for PCI-DSS compliance
- Assist management in the preparation and submission of ROC and AOC.
- Vulnerability scanning of internal and customer network infrastructure in an enterprise global managed services environment.
- Assist outside auditors with compliance audits.
- Creation of custom reports in Excel for management visibility into the current state of the business security posture as it relates to open vulnerabilities and remediation progress.
- Sending vulnerability remediation tickets as necessary to the applicable remediation teams and track remediation work.
- Assist in incident response using log correlation with various security solutions including IPS/IDS, endpoint security, and SIEM.
- Keep abreast of current attack vectors and tactics used by bad operators and stay educated about their methodologies.
Confidential
Information Security Engineer
Responsibilities:
- As part of a small security team, implement, enforce, and maintain the security infrastructure for a 40,000+ user global enterprise with both retail and ecomm environments with 5000+ endpoints and 10 globally placed datacenters.
- Management and implementation of log aggregation using Splunk.
- Policy creation, adherence to and enforcement of PCI-DSS and SOX compliance.
- I personally head up the Vulnerability Management Program utilizing such tools as Tenable Security Center and Nessus Cloud Scanners. Penetration testing.
- I also head the Information Security Awareness Program using KnowB4 for 3000+ end users. This includes awareness, social engineering campaigns, and email phishing campaigns.
- Monitor and configure application whitelisting and OS secure configuration using Bit9.
- Monitor and configure FIM using Tripwire.
- Managed endpoint protection using Cisco Amp for Endpoint and Symantec SEP.
- VPN management using Cisco Anyconnect.
- Assist in the completion and submission of ROC’s for Vantiv and BAMS.
- Email filtering and DLP for mail egress using Proofpoint.
- DLP using Symantec DLP
- Implementation and management of two factor authentication using DUO and DUO mobile.
- Management of PKI environment and Digital s.
- Network activity monitoring using Riverbed Cascade Profiler
- Incident resolution and forensic investigation of events using multiple tools.
Confidential
M.I.S. Administrator
Responsibilities:
- Manage the entire I.T. infrastructure for a large regional manufacturing environment including 2 commercial textile plants and 4 distribution facilities throughout southern Ohio and Indiana.
- Information Security management consisting of multi layered approach including access restriction, perimeter defense appliances, intrusion prevention and detection software, anti-virus and anti-malware software, data encryption, end user, security policy enforcement and patch management.
- Manage physical and virtual windows server environment. MACD of user profiles, group policy management, VB scripting for policy enforcement, managing all directory services, file shares and share permissions, print servers and services, DNS, DHCP, LDAP
- Mitigation of potential and real security threats. Risk Assessment. Virus and malware removal. Vulnerability management. Exploit remediation.
- Hands-on management of all hardware infrastructure including: routing and switching, WLan’s, VLan’s, firewalls, server hardware, cabling infrastructure, desktop deployment and imaging, printers and all peripherals, tape libraries
- Creation and management of disaster recovery policy and implementation of solutions including fault tolerance, tape library management. Creation, maintenance and testing of high availability interchangeable hot sites.
- Microsoft Exchange administration including MACD of mailboxes, distribution groups, retention policy, mail archive management and global address list management.
- Software integration including sql and crystal reports with highly proprietary ERP and CRM.
- Mobile device management including over 100 smartphones 20 tablet devices using both Android and Mac platforms. Application and security management on those devices and managing a BYOD environment.
- f end-users for proper software usage, acceptable use, internet security consciousness and layman direction of program usage applying techniques that the end user can understand without the tech-babble.
- Ensuring vendor SOW’s and SLA’s are met.
- Project Management
Confidential
Systems Engineer
Responsibilities:
- Worked as an outsourced systems engineer serving varying clients from medical offices to banks to manufacturing facilities with widely varying complexities.
- Network troubleshooting and administration, server administration including AD administration.
- MS exchange administration, OWA configuration, MS office administration. management.
- Windows client xp-8.1. Hardware and software break/fix.
- Incident management for varied software systems and configurations
- Virus and malware prevention and remediation.
- Backup and disaster recovery implementation and testing.
- All levels of Information security.
Confidential
Systems Administrator
Responsibilities:
- SQL database management, network security, firewall and spam filtering administration.
- Manage asp.net storefront website and custom shopping cart
- Manage Microsoft and Linux server environment. In house spam filtering.
- Microsoft Exchange Server 2005 administration.
- Active Directory administration. Server configuration and backup/disaster recovery management
- Malware and virus prevention/ removal
- Social media management and administration
- Manage all facets relating to I.T.
Confidential
Information Technology Director
Responsibilities:
- Develop, design and deploy complete LAN /WAN network infrastructure from design to implementation to daily administration using numerous manufacturers’ equipment but primarily Cisco routing, switching, unified communications configurations and ASA firewall implementations and monitoring.
- Information Security management consisting of multi layered approach including ACL’s, Cisco ASA perimeter defense appliances, anti-virus and anti-malware software, data encryption, end user, security policy enforcement and patch management.
- Create and maintain working business relationships with both software and hardware vendors and ensuring lowest possible cost and highest possible ROI.
- Day to day and 24/7 on call administration of 200+ end users, 140 workstations, 6 Application servers running on various platforms, 4 file servers, multiple domain controllers, active directory administration, email synchronization.
- Administration of Cisco Unified Communications VOIP Call Manager and Unity servers and all related devices including analog converters, Cisco routers, switches and Cisco board level telephone repair.
- Maintain and configure Cisco routers, switches and ASA and PIX firewalls for multiple campuses.
- Educate end users about proper hardware and software usage. Teach classes for new software implementations.
- Work with service providers to streamline and expedite provisioning for addition of new campuses.
- Work with multiple software providers to ensure seamless integration with existing software applications.
- Responsible for design of company website and administration of company email using Microsoft Outlook as well as webmail integration.
- Responsible for enforcing HIPAA policies and procedures to maintain and exceed compliance in accordance with federal guidelines and internal policies as well as creating and enforcing internal security policies.
- Maintain the highest level of network security including implementation and maintenance of malware protection software (namely Symantec products) but also using numerous other prevention tools such as Cisco ASA and PIX security appliances, creation of VLAN’s and access control lists as well as utilizing network monitoring software to ensure EPHI confidentiality, data integrity and optimization of network performance.
- Develop, secure and maintain multiple mission critical IPSEC tunnels to major local hospitals to maintain the electronic data exchange of EPHI. Also create, secure and maintain numerous VPN’s to our network for telecommuting and remote VOIP telephone service so that telecommuters could have company phone extensions and access to their work computers from home or while mobile.
- Create and maintain multi unit Confidential t audio/video systems at numerous campuses including but not limited to television, cabling, and mounting maintenance and the injection of our own company Confidential t channel broadcast exclusively on our internal network.
- Configure and maintain network, mobile software applications and email access for all company PDA’s and smartphones.
- Installation and configuration of Citrix client/server applications namely EPIC.
- Maintain the highest level of professional excellence and use my extensive interpersonal communication skills to boost end users morale and motivate department heads in a positive manner in order to promote efficiency, positive office attitude and an overall fun work environment.
- Workstation break/fix and virus/malware removal.
Confidential
Senior Network Engineer
Responsibilities:
- Install, secure and support client’s wireless and wired on and off base residential networks and ensure the highest quality and speeds of internet access.
- Configure VPN access for high ranking USAF officers ranked up to and including Generals in order to connect to secure D.O.D. networks.
- Install commercial grade wired and wireless networks on Wright Patterson AFB in secure and non secure facilities to varying specifications.
- Configure and maintain company wide network infrastructure including routers, switches, cabling and Cisco Cable modem Termination System.
- Acquire and maintain appropriate military security clearance as a civilian contractor at Wright Patterson AFB.
Confidential, Dayton, Ohio
Lead Network Technician
Responsibilities:
- Install and support clients’ wireless internet network connections and configure their commercial and residential networks.
- Determine geographical topography to determine viability of wireless repeater installation. (line of sight to transmitter)
- Educate clients about network security and safe internet usage.
- Direct sales to residential and commercial prospects.
Confidential, Centerville, Ohio
Computer Production Manager
Responsibilities:
- Manage and coordinate computer technicians
- Build and troubleshoot new and RMA computer based digital surveillance systems.
- Configure and maintain company network.
- Ensure Production meets demand and utilization of product tracking systems.
- Perform final quality control of all outgoing systems.
Confidential, Kettering, Ohio
Retail Sales Manager
Responsibilities:
- Direct sales in a retail men’s clothing store environment
- Work with vendors doing daily ordering, accounts payable, accounts receivable, shipping and receiving.
- Supervising employees, hiring and firing, creating employee schedules.
- Creating long lasting personal relationships with my customers ensuring repeat business.
- s available upon request.