We provide IT Staff Augmentation Services!

Senior Consultant Resume Profile

3.00/5 (Submit Your Rating)

Milpitas, CA

Professional Summary

  • Quickly align with business strategies to perform effectively in the market place. Provide full assisted migration/new deployment support to accelerate deployment with increased confidence, maximizing the potential of products, making them work harder to secure business with minimal risk.
  • Subject matter expert in leadership on definitions of security architecture, including the development, implementation effective security administration processes for all platforms.
  • Develop and recommends security designs and frameworks for technology system by defining process and architecture for creating secure networks, building firewalls and implementing intrusion-detection systems.
  • Serves as an internal information security consultant to the organization.
  • Participates on projects and recommends secure solutions based on policies, standards and best practices.
  • Excellent knowledge on various Information Technologies IT Operation Security Domain, Infrastructure Operation Support and Enterprise/Manage Security Services Management ESS/MSS for Banking, Automotive and Manufacturing Sectors.
  • Excellent working experience with large Networks IT Security with global companies.
  • Many years Data Center experience and having advanced understanding on how IT Security Infrastructure solution works for Data Centers.
  • Architecture design, development and implementation for scalable IT Security strategic Infrastructure services deployment for a global network.

Technical Skills

Technologies/ Tools

Product Names and Description

Firewalls

Palo Alto Networks PAN ,

Juniper SRX, Juniper NetScreen,

Cisco ASA,

Checkpoint and

McAfee Firewall

VMWare

ESXi and vSphere

Amazon AWS

Amazon Web Services

SSL VPN

Juniper SSL and Cisco

Intrusion Detection/ Prevention System IDP/IDS

Juniper and Palo Alto Wildfire

MPS

FireEye Malware Protection System Management MPS

Two Factor Authentication

RSA SecurID System Management

Integrity Management

Tripwire System Management

Internet/ Proxy

Microsoft ISA, McAfee proxy firewalls, and McAfee Web Gateways

Single Sign On SSO

CA SiteMinder Policy servers and Ping Federation services

MS-RMS

Microsoft Digital Rights Management System ADRMS

Digital Certificate

Digital Certificate Management PKI

Anti-Virus Management

Trend Micro OfficeScan and Symantec Endpoint Protection

Vulnerability Assessment Penetration Testing VA/PT

ISS, Qualys Guard, Nessus VA Scanner, Metasploit, WireShark, Back Track, Cain Abel, Retina and Nmap,

Operating Systems

Windows, Linux, Unix and Sun Solaris

SIEM Tool

Symantec Security Information Manager

Network Router/Switches

Cisco Routers and Switches operating knowledge, LAN, WAN, Routing and Switching

Remote Access

IP Sec VPN, VPN, Remote/Secure client, Site to site VPN

Endpoint Protection

Symantec SEP, ISS Real Secure HIPS and Trend Micro Deep Security

Content Filtering

WebSense, McAfee Web Gateway and Palo Alto

Development Tools

MS-SQL, Visual Basic, .Net C

Database

Oracle, MySQL and MS-SQL

Scripting

PowerShell, Java, VB and Python

Professional Experience

Confidential

Senior Consultant IT Security

Role: New IT Security technologies Proof of Concept PoCs , Migration/ Upgrade and L3 support for IT Security Escalated Issues/Incidents:

  • Confidence through excellence, deploy with extensive experience in deploying IT Security end to end solutions across the enterprise, with a scalable solution witch works with you and for you.
  • Providing preliminary discussion to asses exact requirements, full or assisted deployment work or give team members the opportunity to deploy with a hand throughout the procedure with complete knowledge transfer.
  • Pre-deployment check list Business/project to be fully prepared for the deployment process.
  • Post-deployment report detailing the deployment outcome and associated configuration choices.
  • Ensures delivery of a quality solution on time, at budget.
  • IT Security Operation management, architecture design, development, implementation.
  • Network security review and troubleshooting.
  • Resolve network and system security issues using computer host analysis, forensics, and reverse engineering. Perform security research.
  • Project security representation, Maintain security requirements, Monitor, Review and Troubleshoot alerts.
  • Manage Vulnerability tools, scans and Security compliance monitoring
  • Test security measures including OS patches, system hardening, and application configuration.
  • Develop whitepapers, Produce security standards, Network security audit
  • Participate in project meetings to advise business stakeholders and IT staff on best practices.
  • Escalation for technical security questions and problems.
  • Resolve network and system security issues using computer host analysis, forensics, and reverse engineering.
  • Define and maintain standards and product selection/ PoC methodology, review and approve solution architecture and design from a security perspective.
  • Understand and develop countermeasures against network attacks using vulnerability analysis and knowledge of exploit techniques.
  • Acquisition and new office security review.
  • Produce security risk advisories based on newly identified threats and risk assessment.
  • Security tool evaluation, testing, selection, certification, and integration.
  • Mobile Security Solutions: Mobile Security BYOD program PoC using Bitzer, BTC Hub and MobileIron solutions.
  • Migration and Integration: Juniper SRX and Cisco ASA firewalls to Palo Alto migration and multiple firewalls integration in single Palo Alto Firewall.
  • PAN Firewall Deployment: Data Center network segmentation and new Palo Alto Networks 7050 high end Firewall cluster deployment.
  • Current Projects:
  • IT SOX compliance management
  • SSL VPN, SSO CA SiteMinder and PingFed
  • FireEye MPS
  • Tripwire
  • RSA SecurID
  • Intrusion Prevention System and Intrusion Detection System
  • Juniper SSL VPN
  • Firewalls Juniper SRX primary and Cisco ASA firewalls
  • Tools used:
  • Create lab environment and automate test procedures associated with above testing
  • Cloud setup: Cloud connectivity setup between corporate network and Amazon Web Services.
  • Akamai Fast DNS/ GLB: Akamai fast DNS setup using Luna.

Confidential

Senior Engineer -

  • Management, monitoring and support of IT Security Infrastructure that include :
  • Firewalls: Checkpoint Firewall, Juniper Netscreen, Cisco ASA
  • Real Secure Internet Security System Siteprotector/ HIDS/ NIDS/ Proventia
  • Juniper SSL VPN Server
  • BlueCoat Proxy
  • Microsoft ISA Proxy

We'd love your feedback!