We provide IT Staff Augmentation Services!

Network/information Security Analyst, It Engineer Resume

0/5 (Submit Your Rating)

Oklahoma City, OK

OBJECTIVE:

  • Acquire a challenging security position at a stable and dynamic company, where my experience and will be of benefit to the organization.

SUMMARY:

  • Highly motivated, dedicated and creative information security engineer and complex systems architect with 14 years of experience in the field. Expert server analyst, network engineer, tier 3 help desk analyst, business continuity analyst;
  • Excellent organizational, communication, customer service and problem - solving skills;
  • Seasoned call center manager and help desk technician;
  • Expert technician in all versions of Windows.

WORK EXPERIENCE:

Network/Information Security Analyst, IT Engineer

Confidential, Oklahoma City, OK

Responsibilities:

  • Exploit security flaws and vulnerabilities with attack simulations on multiple projects working against specific client focused scopes of work.
  • Design, implement, configure and integrate network infrastructure and supporting network/information security controls according to specification
  • Write technical reports that include suggested resolution for identified problem areas and perform operational risk assessment.
  • Support company through the testing and evaluation of new technologies and security controls.
  • Perform, review and analyze security vulnerability data to identify applicability and false positives
  • Research and develop testing tools, techniques, and process improvements
  • Conduct formal tests on web-based applications, networks, and computer systems.
  • Conduct regular security audits from both a logical/theoretical standpoint and a technical/hands-on standpoint.
  • Audit security of wireless networks, databases, software development, and/or company secrets.
  • Plan, implement, upgrade, or monitor security measures for the protection of computer networks and data.

Senior Network Security Engineer

Confidential, Oklahoma City, OK

Responsibilities:

  • Responsible for delivering controlled threat simulation services against company assets.
  • Conduct threat research, structured attack development, vulnerability research and exploit development/testing, scripting, controlled exploitation of configuration weaknesses and software vulnerabilities, evasion of detection mechanisms and more.
  • Lead and execute vulnerability assessments; defining scope, coordinating attacks, executing tests and reporting findings, following an established methodology in accordance with defined processes.
  • Conduct adversary simulation to determine if flaws and exposures can be exploited by unfriendly forces.
  • Research, develop, implement, test and document tools, techniques and tactics used by adversaries to compromise and maintain control of information assets.
  • Install, monitor, maintain and operate network security solutions, such as Palo Alto Firewall, LogRhythm, NeXpose, Qualys
  • Analyze performance and security data, identify areas of concern and formulate action plans.
  • Post-deployment vulnerability monitoring and security testing.
  • Planning, testing and executing upgrades and patching as necessary.

Network Security Engineer/IT Manager

Confidential, Edmond, OK

Responsibilities:

  • Implement Payment Card Industry Data Security Standard
  • Repair, maintain and upgrade and implement network hardware and cabling
  • Inventory authorized and unauthorized hardware and software
  • Secure configurations of hardware and software on laptops, workstations, servers, printers, switches, firewall and routers (including ports, protocols and services)
  • Design, establish, administer, implement and maintain backup policy, backup system, change management, and mal-ware defense systems, security and spam control measures
  • Troubleshoot all network performance, connectivity and related issues
  • Design, implement, test and improve security plan, security policy and regulatory compliance
  • Manage network implementation and optimization
  • Implement and administer network software and hardware lifecycle management
  • Establish, document and administer IT policies and procedures
  • Design, establish, remediate and perform security audits, risk, vulnerability, threat assessment and analysis
  • Maintain, monitor and analyze security and audit logs
  • Design, implement and provide ongoing security awareness
  • Create, modify, manage and delete user accounts
  • Monitor systems security posture and respond to security incidents
  • Ensure confidentiality, integrity and availability of company data

Complex Server Technical Support Analyst

Confidential, OKC, OK

Responsibilities:

  • Provide assistance and guidance to Confidential Gold Enterprise customers and/or lower level technicians engaged in solving customer problems with servers, storage, networking and server software.
  • Identify issues requiring fee-based Network, Microsoft, Novell or Linux support, and handle or escalate the calls as required by the complexity of the issue and by departmental policy.
  • Aggressively escalate issues covered by support contracts, in addition to unresolved server issues according to department procedures.
  • Perform assignments that are highly complex and where independent action and a high degree of initiative is required in resolving problems and developing recommendations.
  • Act independently with substantial latitude to determine methods and procedures on assignments, setting objectives and deciding how to proceed.
  • Devise creative and innovative approaches which may amend/improve existing practices and policies.

Network Administrator, PKI Application Support

Confidential, Oklahoma City, OK

Responsibilities:

  • Lead Public Key Infrastructure (PKI) team as Level II expert, supporting over 6 million DoD PKI customers CONUS and worldwide;
  • Develop troubleshooting instructions for PKI issues with extensive problem isolation procedure to support call center and IT staff;
  • Remotely monitor the PKI infrastructure, track Revocation Lists (CRLs);
  • Compile, consolidate and publish statistical reports of all complex PKI architecture to a variety of organizations and agencies;
  • Acquire PKI for call center staff to support new PKI workload;
  • Provide Global Directory Service (GDS) Application Support, ensure high level of availability for all GDS systems; GDS is a DoD-wide search capability for information regarding DoD personnel (name, telephone number, e-mail address, and key encipherment ).
  • Develop a complete problem isolation procedure to assign or resolve GDS issues appropriately;
  • Monitor the GDS infrastructure via remote administration; monitor logs and application processes; compile, consolidate and publish logs and configuration files;
  • Provide Vulnerability Management System (VMS) Application Support, supporting the DoD
  • Vulnerability Management System. The VMS helpdesk supports a DoD-wide customer base that includes Information Assurance divisions at each Command/Site/Agency;
  • Develop a problem isolation procedure in order to assign or resolve VMS issues efficiently;
  • Implement remote SiteScope monitoring solutions, ensuring change management procedures were followed and documentation kept up-to-date.
  • Develop application and administration standards and procedures with management and other SiteScope system administrators;

Microcomputer Services Coordinator

Confidential, Oklahoma City, OK

Responsibilities:

  • Provide problem resolution and installation of network and computer related hardware and software;
  • Provide clerical and technical support for computer and network services, including generating requisitions, placing orders, tracking all phases of order, receipt, physical moving of equipment documentation, installation and inventory cycles;
  • Provide help-desk support for employees to resolve hardware and software problems;
  • Develop, implement and maintain information security policy; Monitor network traffic, hacking attempts and viruses;
  • Develop and maintain inventory system tracking all hardware, software, and licenses;

Supervisor, Corporate Support

Confidential, Oklahoma City, OK

Responsibilities:

  • One and a half years supervisory experience in an enterprise level Internet call center environment;
  • Provide technical support for Internet services throughout North America and abroad.
  • Install and maintain corporate access accounts; configure customer premise routers, DNS, e-mail routing; shared web and other Internet applications, and ensure customer satisfaction by responding to their phone and email inquiries.
  • Provide second level and management support for escalated issues and customers.

Confidential, EVERETT, WA

Responsibilities:

  • Two and a half years management/leadership experience in assorted team and staff scenarios;
  • Four years experience designing, installing, operating, maintaining, and upgrading state-of-the-art information systems technology including local and wide area networks, mainframe, mini and micro-computer systems and associated peripheral devices;
  • Project Lead for IT-21, a major overhaul and computer equipment upgrade to USS Abraham
  • Network administration experience; specializing in Windows NT 4.0, UNIX (HPUX), and NetWare;
  • Microsoft Exchange Server 5.5 Enterprise, cc:Mail, Sci-Net CD Server and Advanced Technical Information System Optical Juke Boxes;
  • Information Systems Security Officer; establish and maintain data security and controls of data processing equipment, operations and procedures;
  • Directed implementation of first anti-virus solution for USS Abraham Lincoln's PC’s;
  • Tech support and PC to end users for various applications

We'd love your feedback!