Network/information Security Analyst, It Engineer Resume
0/5 (Submit Your Rating)
Oklahoma City, OK
OBJECTIVE:
- Acquire a challenging security position at a stable and dynamic company, where my experience and will be of benefit to the organization.
SUMMARY:
- Highly motivated, dedicated and creative information security engineer and complex systems architect with 14 years of experience in the field. Expert server analyst, network engineer, tier 3 help desk analyst, business continuity analyst;
- Excellent organizational, communication, customer service and problem - solving skills;
- Seasoned call center manager and help desk technician;
- Expert technician in all versions of Windows.
WORK EXPERIENCE:
Network/Information Security Analyst, IT Engineer
Confidential, Oklahoma City, OK
Responsibilities:
- Exploit security flaws and vulnerabilities with attack simulations on multiple projects working against specific client focused scopes of work.
- Design, implement, configure and integrate network infrastructure and supporting network/information security controls according to specification
- Write technical reports that include suggested resolution for identified problem areas and perform operational risk assessment.
- Support company through the testing and evaluation of new technologies and security controls.
- Perform, review and analyze security vulnerability data to identify applicability and false positives
- Research and develop testing tools, techniques, and process improvements
- Conduct formal tests on web-based applications, networks, and computer systems.
- Conduct regular security audits from both a logical/theoretical standpoint and a technical/hands-on standpoint.
- Audit security of wireless networks, databases, software development, and/or company secrets.
- Plan, implement, upgrade, or monitor security measures for the protection of computer networks and data.
Senior Network Security Engineer
Confidential, Oklahoma City, OK
Responsibilities:
- Responsible for delivering controlled threat simulation services against company assets.
- Conduct threat research, structured attack development, vulnerability research and exploit development/testing, scripting, controlled exploitation of configuration weaknesses and software vulnerabilities, evasion of detection mechanisms and more.
- Lead and execute vulnerability assessments; defining scope, coordinating attacks, executing tests and reporting findings, following an established methodology in accordance with defined processes.
- Conduct adversary simulation to determine if flaws and exposures can be exploited by unfriendly forces.
- Research, develop, implement, test and document tools, techniques and tactics used by adversaries to compromise and maintain control of information assets.
- Install, monitor, maintain and operate network security solutions, such as Palo Alto Firewall, LogRhythm, NeXpose, Qualys
- Analyze performance and security data, identify areas of concern and formulate action plans.
- Post-deployment vulnerability monitoring and security testing.
- Planning, testing and executing upgrades and patching as necessary.
Network Security Engineer/IT Manager
Confidential, Edmond, OK
Responsibilities:
- Implement Payment Card Industry Data Security Standard
- Repair, maintain and upgrade and implement network hardware and cabling
- Inventory authorized and unauthorized hardware and software
- Secure configurations of hardware and software on laptops, workstations, servers, printers, switches, firewall and routers (including ports, protocols and services)
- Design, establish, administer, implement and maintain backup policy, backup system, change management, and mal-ware defense systems, security and spam control measures
- Troubleshoot all network performance, connectivity and related issues
- Design, implement, test and improve security plan, security policy and regulatory compliance
- Manage network implementation and optimization
- Implement and administer network software and hardware lifecycle management
- Establish, document and administer IT policies and procedures
- Design, establish, remediate and perform security audits, risk, vulnerability, threat assessment and analysis
- Maintain, monitor and analyze security and audit logs
- Design, implement and provide ongoing security awareness
- Create, modify, manage and delete user accounts
- Monitor systems security posture and respond to security incidents
- Ensure confidentiality, integrity and availability of company data
Complex Server Technical Support Analyst
Confidential, OKC, OK
Responsibilities:
- Provide assistance and guidance to Confidential Gold Enterprise customers and/or lower level technicians engaged in solving customer problems with servers, storage, networking and server software.
- Identify issues requiring fee-based Network, Microsoft, Novell or Linux support, and handle or escalate the calls as required by the complexity of the issue and by departmental policy.
- Aggressively escalate issues covered by support contracts, in addition to unresolved server issues according to department procedures.
- Perform assignments that are highly complex and where independent action and a high degree of initiative is required in resolving problems and developing recommendations.
- Act independently with substantial latitude to determine methods and procedures on assignments, setting objectives and deciding how to proceed.
- Devise creative and innovative approaches which may amend/improve existing practices and policies.
Network Administrator, PKI Application Support
Confidential, Oklahoma City, OK
Responsibilities:
- Lead Public Key Infrastructure (PKI) team as Level II expert, supporting over 6 million DoD PKI customers CONUS and worldwide;
- Develop troubleshooting instructions for PKI issues with extensive problem isolation procedure to support call center and IT staff;
- Remotely monitor the PKI infrastructure, track Revocation Lists (CRLs);
- Compile, consolidate and publish statistical reports of all complex PKI architecture to a variety of organizations and agencies;
- Acquire PKI for call center staff to support new PKI workload;
- Provide Global Directory Service (GDS) Application Support, ensure high level of availability for all GDS systems; GDS is a DoD-wide search capability for information regarding DoD personnel (name, telephone number, e-mail address, and key encipherment ).
- Develop a complete problem isolation procedure to assign or resolve GDS issues appropriately;
- Monitor the GDS infrastructure via remote administration; monitor logs and application processes; compile, consolidate and publish logs and configuration files;
- Provide Vulnerability Management System (VMS) Application Support, supporting the DoD
- Vulnerability Management System. The VMS helpdesk supports a DoD-wide customer base that includes Information Assurance divisions at each Command/Site/Agency;
- Develop a problem isolation procedure in order to assign or resolve VMS issues efficiently;
- Implement remote SiteScope monitoring solutions, ensuring change management procedures were followed and documentation kept up-to-date.
- Develop application and administration standards and procedures with management and other SiteScope system administrators;
Microcomputer Services Coordinator
Confidential, Oklahoma City, OK
Responsibilities:
- Provide problem resolution and installation of network and computer related hardware and software;
- Provide clerical and technical support for computer and network services, including generating requisitions, placing orders, tracking all phases of order, receipt, physical moving of equipment documentation, installation and inventory cycles;
- Provide help-desk support for employees to resolve hardware and software problems;
- Develop, implement and maintain information security policy; Monitor network traffic, hacking attempts and viruses;
- Develop and maintain inventory system tracking all hardware, software, and licenses;
Supervisor, Corporate Support
Confidential, Oklahoma City, OK
Responsibilities:
- One and a half years supervisory experience in an enterprise level Internet call center environment;
- Provide technical support for Internet services throughout North America and abroad.
- Install and maintain corporate access accounts; configure customer premise routers, DNS, e-mail routing; shared web and other Internet applications, and ensure customer satisfaction by responding to their phone and email inquiries.
- Provide second level and management support for escalated issues and customers.
Confidential, EVERETT, WA
Responsibilities:
- Two and a half years management/leadership experience in assorted team and staff scenarios;
- Four years experience designing, installing, operating, maintaining, and upgrading state-of-the-art information systems technology including local and wide area networks, mainframe, mini and micro-computer systems and associated peripheral devices;
- Project Lead for IT-21, a major overhaul and computer equipment upgrade to USS Abraham
- Network administration experience; specializing in Windows NT 4.0, UNIX (HPUX), and NetWare;
- Microsoft Exchange Server 5.5 Enterprise, cc:Mail, Sci-Net CD Server and Advanced Technical Information System Optical Juke Boxes;
- Information Systems Security Officer; establish and maintain data security and controls of data processing equipment, operations and procedures;
- Directed implementation of first anti-virus solution for USS Abraham Lincoln's PC’s;
- Tech support and PC to end users for various applications