Senior Consultant Resume Profile
Milpitas, CA
Professional Summary
- Quickly align with business strategies to perform effectively in the market place. Provide full assisted migration/new deployment support to accelerate deployment with increased confidence, maximizing the potential of products, making them work harder to secure business with minimal risk.
- Subject matter expert in leadership on definitions of security architecture, including the development, implementation effective security administration processes for all platforms.
- Develop and recommends security designs and frameworks for technology system by defining process and architecture for creating secure networks, building firewalls and implementing intrusion-detection systems.
- Serves as an internal information security consultant to the organization.
- Participates on projects and recommends secure solutions based on policies, standards and best practices.
- Excellent knowledge on various Information Technologies IT Operation Security Domain, Infrastructure Operation Support and Enterprise/Manage Security Services Management ESS/MSS for Banking, Automotive and Manufacturing Sectors.
- Excellent working experience with large Networks IT Security with global companies.
- Many years Data Center experience and having advanced understanding on how IT Security Infrastructure solution works for Data Centers.
- Architecture design, development and implementation for scalable IT Security strategic Infrastructure services deployment for a global network.
Technical Skills
Technologies/ Tools | Product Names and Description |
Firewalls | Palo Alto Networks PAN , Juniper SRX, Juniper NetScreen, Cisco ASA, Checkpoint and McAfee Firewall |
VMWare | ESXi and vSphere |
Amazon AWS | Amazon Web Services |
SSL VPN | Juniper SSL and Cisco |
Intrusion Detection/ Prevention System IDP/IDS | Juniper and Palo Alto Wildfire |
MPS | FireEye Malware Protection System Management MPS |
Two Factor Authentication | RSA SecurID System Management |
Integrity Management | Tripwire System Management |
Internet/ Proxy | Microsoft ISA, McAfee proxy firewalls, and McAfee Web Gateways |
Single Sign On SSO | CA SiteMinder Policy servers and Ping Federation services |
MS-RMS | Microsoft Digital Rights Management System ADRMS |
Digital Certificate | Digital Certificate Management PKI |
Anti-Virus Management | Trend Micro OfficeScan and Symantec Endpoint Protection |
Vulnerability Assessment Penetration Testing VA/PT | ISS, Qualys Guard, Nessus VA Scanner, Metasploit, WireShark, Back Track, Cain Abel, Retina and Nmap, |
Operating Systems | Windows, Linux, Unix and Sun Solaris |
SIEM Tool | Symantec Security Information Manager |
Network Router/Switches | Cisco Routers and Switches operating knowledge, LAN, WAN, Routing and Switching |
Remote Access | IP Sec VPN, VPN, Remote/Secure client, Site to site VPN |
Endpoint Protection | Symantec SEP, ISS Real Secure HIPS and Trend Micro Deep Security |
Content Filtering | WebSense, McAfee Web Gateway and Palo Alto |
Development Tools | MS-SQL, Visual Basic, .Net C |
Database | Oracle, MySQL and MS-SQL |
Scripting | PowerShell, Java, VB and Python |
Professional Experience
Confidential
Senior Consultant IT Security
Role: New IT Security technologies Proof of Concept PoCs , Migration/ Upgrade and L3 support for IT Security Escalated Issues/Incidents:
- Confidence through excellence, deploy with extensive experience in deploying IT Security end to end solutions across the enterprise, with a scalable solution witch works with you and for you.
- Providing preliminary discussion to asses exact requirements, full or assisted deployment work or give team members the opportunity to deploy with a hand throughout the procedure with complete knowledge transfer.
- Pre-deployment check list Business/project to be fully prepared for the deployment process.
- Post-deployment report detailing the deployment outcome and associated configuration choices.
- Ensures delivery of a quality solution on time, at budget.
- IT Security Operation management, architecture design, development, implementation.
- Network security review and troubleshooting.
- Resolve network and system security issues using computer host analysis, forensics, and reverse engineering. Perform security research.
- Project security representation, Maintain security requirements, Monitor, Review and Troubleshoot alerts.
- Manage Vulnerability tools, scans and Security compliance monitoring
- Test security measures including OS patches, system hardening, and application configuration.
- Develop whitepapers, Produce security standards, Network security audit
- Participate in project meetings to advise business stakeholders and IT staff on best practices.
- Escalation for technical security questions and problems.
- Resolve network and system security issues using computer host analysis, forensics, and reverse engineering.
- Define and maintain standards and product selection/ PoC methodology, review and approve solution architecture and design from a security perspective.
- Understand and develop countermeasures against network attacks using vulnerability analysis and knowledge of exploit techniques.
- Acquisition and new office security review.
- Produce security risk advisories based on newly identified threats and risk assessment.
- Security tool evaluation, testing, selection, certification, and integration.
- Mobile Security Solutions: Mobile Security BYOD program PoC using Bitzer, BTC Hub and MobileIron solutions.
- Migration and Integration: Juniper SRX and Cisco ASA firewalls to Palo Alto migration and multiple firewalls integration in single Palo Alto Firewall.
- PAN Firewall Deployment: Data Center network segmentation and new Palo Alto Networks 7050 high end Firewall cluster deployment.
- Current Projects:
- IT SOX compliance management
- SSL VPN, SSO CA SiteMinder and PingFed
- FireEye MPS
- Tripwire
- RSA SecurID
- Intrusion Prevention System and Intrusion Detection System
- Juniper SSL VPN
- Firewalls Juniper SRX primary and Cisco ASA firewalls
- Tools used:
- Create lab environment and automate test procedures associated with above testing
- Cloud setup: Cloud connectivity setup between corporate network and Amazon Web Services.
- Akamai Fast DNS/ GLB: Akamai fast DNS setup using Luna.
Confidential
Senior Engineer -
- Management, monitoring and support of IT Security Infrastructure that include :
- Firewalls: Checkpoint Firewall, Juniper Netscreen, Cisco ASA
- Real Secure Internet Security System Siteprotector/ HIDS/ NIDS/ Proventia
- Juniper SSL VPN Server
- BlueCoat Proxy
- Microsoft ISA Proxy