We provide IT Staff Augmentation Services!

Systems Security Analyst Iv Resume

4.00/5 (Submit Your Rating)

SUMMARY:

  • Confident Information Technologist/Systems Analyst with experience supporting and strategically managing Network Infrastructure Architecture & Security projects to correct known vulnerabilities.
  • Identify and implement risk - based security controls and track security metrics to gauge compliance and effectiveness for performing audits and reviews to assess compliance with security and privacy policies and procedures to ensure Confidentiality, Integrity and Availability (C.I.A) objectives for data and information to include disaster recovery and continuity of business operations for IT systems.

PROFESSIONAL EXPERIENCE:

Systems Security Analyst IV

Confidential

Responsibilities:

  • Strategically manage and support Confidential ’s enterprise network operations, architecture and infrastructure, e-Gov initiatives and security projects to correct known vulnerabilities, reduce barriers to cross-Center collaboration, and provide cost-effective IT security services.
  • Develop, document and implement information security procedures to enforce information security standards.
  • Documentation of Disaster Recovery business continuity, application and network recovery testing exercises.
  • Responsible for the daily Information Security operations; implements comprehensive Enterprise Information Security and IT Risk Management programs to ensure the integrity, confidentiality, and availability of information.
  • Oversees information security team members; Onboarding of new hires, and performance reviews.
  • Manage information security budget by working directly with vendors to for service-level agreements.
  • Develop, maintain and publish up-to-date security policies, standards andguidelines as applicable to security policies and best practices.
  • Implements Cyber Security Awareness program for all employees, contractors, and approved system users.
  • Identify risks and business requirements; implements an information security management frameworks based on Payment Card Industry (PCI) and the National Institute of Standards and Technology (NIST).
  • Provides risk guidance for IT projects including recommending technical controls; works with business units to identify and determine acceptable levels of risk; and provides periodic reporting on the current status of the information security program.
  • Ensures the security programs are in compliance with federal laws, regulations and policies to minimize risk and audit findings; assists the information security team with corporate compliance, audit, legal, and HR teams.
  • Serve as liaison to the IT infrastructure team to ensure the network architecture is designed with security requirements.
  • Manage security incidents to protect corporate assets including intellectual property and confidential data; (C.I.A.) facilitates a metrics and reporting framework to measure the efficiency and effectiveness of the information security program.
  • Work with customers on a tactical and strategic level to prepare for data security projects (Data Classification, Data Discovery, Data Mapping, Data Loss Prevention integration)
  • Windows 2003R2 & 2008R2 Server troubleshooting, configuration & maintenance.
  • Symantec Backup Exec Version 11d. tape backup and Storage (SAN/NAS) of all servers networked in the Confidential -JPL internal domain; Confidential Files, Confidential DBMS and Confidential workstations.
  • Integrated Credentialed Intrusive Vulnerability Assessment and Penetration Network Scanning via McAfee McAfee Foundstone Vulnerability Scanner of protocols, network devices, databases, web & desktop applications, and operating systems to expose, identify and remediate against hidden environmental vulnerabilities to prevent unauthorized access/intrusions and implement solutions that provide protection against security attacks.
  • WebSense Inbound/Outbound Web filtering, protocol analyzer/network sniffer to decipher traffic & security.
  • Intrusion Detection/Protection Systems (IDS/IPS) support for three firewall devices; two Juniper ISG1000 firewalls running in Active/Passive mode and an NSMXpress (Juniper) firewall configuration and log management server.
  • Support and knowledge of U.S. government policies and guidelines for secure networks to include base documents usage of FIPS 199, NIST /88, NIST and NPR2810.1A and DoD Information Security Program.
  • Security PKI encryption, least privilege, and perimeter security to operate effectively within federal guidelines for best practices in maintaining secure networks.
  • Patching and updating systems and hardware inventory, documentation, monitoring, and scheduled monthly/yearly systems reporting.

Sr. Desktop/Network Engineer

Confidential

Responsibilities:

  • Desktop Support for hardware, software and peripherals, remote access.
  • Remote access SMS/SCCM, VPN, Citrix and RAS connectivity supporting end users.
  • Phone and Desktop Support of Windows XP, Vista and Windows 7.
  • Tape backup and Storage (SAN/NAS) via Veritas Net Backup 6.51.
  • Building, configuring, deploying and troubleshooting desktops, laptops, printers and blackberry equipment in an enterprise environment.
  • Monitor network security following established procedures.
  • Information Technology Infrastructure Library (ITIL) for Change Management environment with emphasis on IT support service.
  • Support network functions, including applying patches, operating systems revisions, maintaining, repairing, and upgrading hardware.
  • Testing of applications in Test, Dev and Production PDLC stages of development.
  • Resolve network related issues for end users to include PKI Encryption/Authentication.
  • Scheduling, setup, and support for Video Teleconferences.
  • Remedy ARS v7.1 Call Tracking/Problem Management system.
  • Provide Tier II MS Outlook and Exchange support for Email Global Messaging Team.
  • Remote software distribution, for anti-virus agents and signature files, software patches, remote control, and remote administration of workstations.
  • Maintain end user accounts, profile permissions, access rights, and security settings.
  • Hardware and peripheral maintenance via Active Directory.
  • MS Office 2007 end user support.
  • Provide Tier II & III Help Desk Remedy Call Tracking /Management system.

Sr. Network (NOC) Systems Engineer

Confidential

Responsibilities:

  • 24x7 coverage for Enterprise operations monitoring of the IT Service infrastructure via HP OpenView via SolarWinds and Network Node Management to acknowledge alerts generated by monitoring software, environmental systems and other network performance monitoring tools and ticketing system to include network IDS/IPS Firewall Web monitoring.
  • Cisco Transport Manager for provisioning, surveillance, and performance monitoring.
  • Information Technology Infrastructure Library (ITIL) for Change Managementenvironment with emphasis on IT support service.
  • Maintain end user accounts, profile permissions, access rights and security settings.
  • Coordinating with SIRT (Security Incident Response Teams); operations and engineering teams in order to identify and triage outages, verify service impact to end users, send out status updates, dispatch the appropriate subject matter experts (SME) and identify root cause to implement a fix.
  • Administration and Support for Windows 2000, 2003, XP, Linux Red Hat and Apache and Sun Solaris firewall & network web server’s configuration of RILO/DRAC cards for remote management on IBM 300 PL, IBM Enterprise RS6000 & Dell Poweredge 1850 & 2950 servers.
  • Remote software distribution, for anti-virus agents and signature files,software patches, remote control, and remote administration of workstations.
  • Provide 24/7 Tier I, II & III support for production and mission-critical systems.
  • Administration, troubleshooting and running of Rumba IBM Mainframe batch program jobs and server tape backup and Storage (SAN/NAS) via Veritas Net Backup 6.51 and IBM Tivoli.
  • Work with customers on a tactical and strategic level to prepare for data security projects (Data Classification, Data Discovery, Data Mapping, Data Loss Prevention integration)
  • Disaster Recovery business, application and network recovery testing exercises.
  • PCI Compliance, prevention, detection and security incidents; Self Assessment Questionnaires, PIN Transaction Security, Payment Application Security.
  • SOX Compliance, independent auditing, corporate governance, internal control assessments, and financial disclosures.
  • Exchange 2003/2007 Support.
  • Remedy ARS v7.1 Call Tracking/Problem Management system.

Network (Work Flow) Administrator

Confidential

Responsibilities:

  • Desktop Support for hardware, software, peripherals and network issues.
  • Windows XP and Windows 7 support for IBM Enterprise RS6000 & Dell Poweredge servers.
  • Remote access support for SMS/SCCM, VPN, Citrix and RAS connectivity.
  • Configuring, deploying and troubleshooting desktops, laptops, printers and blackberry devices.
  • Service Center Enterprise Client Call Tracking /Management system.
  • Telephone, written and interpersonal skills in providing outstanding customerservice.
  • Remedy ARS v7.1 Call Tracking/Problem Management system.
  • Administering Microsoft 2003 client/server, Active Directory, and Microsoft Office XP workstation installation & CiscoWorks.
  • Network Sniffers to for traffic & security to include IDS/IPS Firewall Web monitoring.
  • Network asset management, including maintenance of network component inventory and related documentation and technical specifications information.
  • HIPAA Compliance: SSAQ’s, Internal/External Network & Security Audits, PENTesting.
  • SOX Compliance: Independent Auditing, Corporate Governance, Internal ControlAssessments, and Secure Financial Disclosures.
  • Disaster Recovery business, application and network recovery exercises.
  • Work with customers on a tactical and strategic level to prepare for data security projects (Data Classification, Data Discovery, Data Mapping, Data Loss Prevention integration)
  • Maintain end user accounts, profile permissions, access rights and security settings.

Information Systems Security Analyst

Confidential

Responsibilities:

  • Global identification and implementation of access control automation forsecurity posture and customer satisfaction.
  • Information Technology Infrastructure Library (ITIL) for Change Managementenvironment with emphasis on IT support service.
  • Work with the technical project team to ensure change control ismanageable, acceptable and in compliance with the mandated GlobalInformation Security Policy.
  • Application security, as defined in industry best practices (such as ISO-27001).
  • Telephone, written and interpersonal skills in providing outstanding customerservice.
  • Remedy ARS v7.1 Call Tracking/Problem Management system.
  • HIPAA compliance: SSAQ’s, Internal/External Network & Security Audits, PENTesting.
  • SOX compliance: Independent Auditing, Corporate Governance, Internal Control Assessments, and Secure Financial Disclosures.
  • PCI compliance: Prevention, Detection and Security Incidents; Self AssessmenQuestionnaires, PIN Transaction Security & Payment Application Security.
  • Disaster Recovery business, application and network recovery testing.
  • Work with customers on a tactical and strategic level to prepare for data security projects (Data Classification, Data Discovery, Data Mapping, Data Loss Prevention integration)
  • Perform encryption key management administrative functions, to include;auditing, executing, creation, reset, and revocation of user encryption keysthat provide specialized access to confidential systems and proprietary company data.

Sr. Network (NOC) Systems Engineer

Confidential

Responsibilities:

  • 24x7 Global Enterprise Network monitoring via Service Management tools.
  • Windows 2000/2003/ XP & Sun Solaris Server Troubleshooting &configuration.
  • Information Technology Infrastructure Library (ITIL) for Change Managementenvironment with emphasis on IT support service.
  • Maintain end user accounts, profile permissions, access rights and security settings.
  • Protocol analyzers/Network Sniffers to decipher traffic & security.
  • Disaster Recovery business, application and network recovery testing exercises.
  • Work with customers on a tactical and strategic level to prepare for data security projects (Data Classification, Data Discovery, Data Mapping, Data Loss Prevention integration)
  • Remote software distribution, for anti-virus agents and signature files,software patches, remote control, and remote administration of workstations.
  • Exchange 2003 & corporate anti-virus support.
  • PCI Compliance: Prevention, Detection and Security Incidents; Self AssessmentQuestionnaires, PIN Transaction Security & Payment Application Security.
  • SOX Compliance: Independent Auditing, Corporate Governance, Internal Control Assessments, and Secure Financial Disclosures.
  • Perform triage on tickets assigned to system operations and engineeringgroups.
  • Remedy Call Tracking /Management system.
  • Supported Microsoft Office/Outlook using Web Ex plug-in.
  • Configured Firewalls, VPNs, and switches.
  • WebEx Incident meetings for enterprise system outages and resolutions.
  • Incident reporting/escalation of critical alarms to engage support based onalerts.
  • Assist in maintaining off-site data backups.

Information Systems Security Analyst

Confidential

Responsibilities:

  • Security Policy and Program security standards, procedures, and guidelines.
  • Desktop support of applications Windows 2000, XP, Vista & 2003 andhardware.
  • Disaster Recovery business, application and network recovery testing exercises.
  • Work with customers on a tactical and strategic level to prepare for data security projects (Data Classification, Data Discovery, Data Mapping, Data Loss Prevention integration)
  • Maintain end user accounts, profile permissions, access rights and security settings.
  • Remedy Call Tracking /Management system.
  • Monitoring of access control systems to ensure security compliance.
  • Company security awareness and program.
  • Support for Law Enforcement, Emergency Services & outside security.
  • HIPAA compliance: SSAQ’s, Internal/External Network & Security Audits, PENTesting.
  • SOX compliance: Information Access Management, Internal Audits/Controls.
  • PCI compliance: Network Security, Access Control Measures, Penetration Tests.
  • Information Technology Infrastructure Library (ITIL) for Change Managementenvironment with emphasis on IT support service.
  • Help Desk support for Network and Windows Security Administrators.
  • Implementation of appropriate and cost effective security controls.
  • Create a risk assessment methodology and to identify security exposures.
  • Develop an effective monitoring program to track security issues.
  • Security safeguards based on risk analysis and mitigating controls.
  • Direct or coordinate the investigation and reporting of security breaches.
  • BCP (Business Continuity Planning) and DR (Disaster Recovery) Exercises.
  • Network IDS/IPS Firewall Web monitoring.
  • Internal and External A-RISC, Risk Assessments & SSAQ IT Security Audits.
  • RFI & RFP (Request for Information/Proposal) questionnaires.
  • Incident monitoring documentation and reporting.

DSL LAN Administrator

Confidential

Responsibilities:

  • Network Topologies, ADSL, Help Desk & PC Desktop Support.
  • Active Directory support.
  • Maintain Service Level Agreements.
  • LAN/WAN Technology/Methodologies, Tech Docs/ Materials.
  • Remedy Documentation & Problem Tracking software.
  • Install, Configure and Maintain Communication Protocols/Capabilities.
  • Windows 2000/XP/2003 Server Installation, Troubleshooting & Configuration.
  • Remote software distribution, for anti-virus agents and signature files, software patches, remote control, and remote administration of workstations.

Systems Administrator

Confidential

Responsibilities:

  • Windows 3.11, 95, 98, NT 4.0, 2000, 2003, XP Pro & Active Directory.
  • Network connectivity & infrastructure for Novell Netware 3.12 to 5.5.
  • Windows Installation, Troubleshooting & Configuration.
  • Managed user accounts, profile permissions, access rights and security settings.
  • Email, Antivirus, documentation, tape backups, firewall management.
  • Peripheral support.
  • Remote software distribution, for anti-virus agents, software patches, and administration of workstations.

Network (NOC) Systems Engineer

Confidential

Responsibilities:

  • 24x7 Customer Support/Interface for Global Internet/Network support via satellitecommunications.
  • Help Desk Remedy Call Tracking/Management system.
  • Cisco 2600 router & Satellite receiver installs configurations, programming & monitoring via Ethernet to Catalyst 5500 Switches.
  • Configurations/Troubleshooting of clients Networks, monitoring real timesatellite frequency, backbone & remote host satellite carrier traffic graphs.
  • Wireless Network Installation Setup & Support.

Sr. Desktop/Network Technician

Confidential

Responsibilities:

  • rHelp Desk, Desktop & Network Support.
  • LANDesk remote deployment.
  • AS400 applications, printers, controllers/devices, user profiles andconnectivity.
  • Ghost imaging; file transfers, Remote Ware, Email Accounts & RAS Accounts.
  • NEC 8000/8100. PC’s, IBM & Compaq Laptops.

We'd love your feedback!