It Compliance Auditor Resume
Philadelphia, PA
TECHNICAL SKILLS:
Sotware: Windows OS, Office 365, Microsoft Project, Visio, SSH, Tripwire, FIGIPS, IDS, Secure SAML - based Single Sign-On, 2-factor/multifactor authentication, log rhythm, GF SIEM, Magic Quadrant, Active Directory, Tenable Nessus, Arcsight, Splunk, Metasploit, QRadar, Secure Socket Layer, Palo Alto firewall, SOC, Polo Alto FW, Check Point Firewall, Sonic Wall, Microsoft Azure, British Telecom, McAfee EPO, QualysGuard, Cloud computing service models (e.g. PaaS, IaaS, SaaS), FedRamp, PCI DSS, NIST, Kerberos, IPSEC, PKI, Symantec, Norton, Malware, PGP, RSA Secure Id
Hardware:: Windows Server, UNIX, Servers, Linux servers, Juniper, Barracuda, Federation Servers, Citrix Server, VMware ESX, AirCheck Wi-Fi Tester, Sun Solaris system, Federated Sun Servers, RSA ACE/Server, Radius, TACAS server, RSA key fob, Cisco ASA 5000, ASA 5500-series, Cisco Routers, Cisco Switches, 3DS sensor 7030.
Profciency in: Information security standards plan, IT Security Polices PCI DSS, NIST Framework, ISO 27000-series, FedRamp, SOC, vulnerbility and incident response.
PROFESSIONAL EXPERIENCE:
Confidential, Philadelphia, PA
IT Compliance Auditor
Responsibilities:
- Responsible for the auditor efforts to internally assess, evaluate and make recommendations to management regarding the adequacy of the security controls for the company's information and technology systems for PCI-DSS.
- Work with Internal Audit, External Auditors and outside consultants as appropriate on required security assessments and audits for PCI-DSS.
- Coordinate efforts and track all information technology and security related PCI DSS audits including scope of PCI-DSS audits, Confidential payment stores involved, timelines, auditing agencies and outcomes. Work with auditors as appropriate to keep audit focus in scope, maintain excellent relationships with audit entities and provide a consistent perspective that continually puts the institution in its best light. Provide guidance, evaluation and advocacy on audit responses.
- Work with leadership and relevant responsible compliance department leadership to build cohesive security and compliance programs for the company to effectively address global statutory and regulatory requirements.
- Develop a strategy for dealing with increasing number of audits, compliance checks and external assessment processes for internal/external auditors, PCI-DSS, FCPA and SOX.
Confidential, King of Prussia, PA
IT Security Architect lead
Responsibilities:
- Responsibilities pertained to the coordination and the implementation of endpoint protection technology products and solutions, continuous management and monitoring of software, analyzing and remediation of security incidents and access control for the development of Seqirus access control globally.
- Subject Matter Expert (SME) supporting technical interchanges, project planning, issue resolution, task tracking, and communication and strategy support with regards to Seqirus security compliance and technical approaches.
- Responsible for the comprehensive analysis and assessment of the physical security at multiple facilities across the newly developed Seqirus organization, taking into account requirements for badge / key card access systems, environmental and video security/surveillance monitoring (card access, security tokens) for physical access security, and building access & perimeter control.
- Provided security guidance across the system development life cycle, including security architectural reviews and case studies.
- Planned security systems by evaluating network and security technologies; to develop requirements and security policies for local area networks (LANs), wide area networks (WANs), virtual private networks (VPNs), routers, NG Palo Alto firewalls, and related security and network devices for virtual cloud development of Seqirus Data Center.
- Contributed the design plan and IT Security architecture for the c loud computing service models (e.g. PaaS, IaaS, SaaS) to support compliance
- Contributed to the development and implementation of security technology solutions for complicated and more complex environments and architecture.
- Conducted technical research on system access control network to upgrade and assess compatibility, cost, and time required to implement a global access card system. Leading the road mapping and strategy planning.
- Evaluated and designed user requirements for card access system, which was implemented globally for all Seqirus Physical Security systems.
- Analyzed business impact and exposure based on emerging security threats, vulnerabilities and risks, and recommended technologies and solutions to mitigate them.
- Developed security architecture strategies that would align to enterprise architecture strategy for Seqirus business strategies.
- Provided security guidance as an information security subject matter professional for the creation and implementation of Security documents and writing of the Security policies pertaining to the NIST SP Framework, PCI-DSS, ISO 2 series, and HIPAA compliance.
- Wrote and published GxP Security Policies for Seqirus.
- Responsible for the selection of Global Security integration vendors.
- Wrote Request for Proposal (RFP), Request for Information (RFI), Request for Quotation (RFQ) and Capital Approval Request (CAR).
Senior IT Security Analyst
Confidential, PA
Responsibilities:
- Implemented the infrastructure components supporting emerging technologies and applications
- Perform IT Audits and compliance, SSAE16 SOC1Type II/SAS 70 Type II
- Responsible for analyzing PCI-DSS assessment findings, owner identification, remediation planning and validation.
- Work with all IT functional groups to insure all PCI compliance requirements, such as Internal PCI DSS, External PCI Scans, and PCI Segment Network documentation was executed in a timely manner as required by the PCI-DSS standards.
- Prepared activity and progress reports ensuring issues were properly escalated and resolved to maintain delivery schedules, project cost, and desired results; provide actionable after-incident analysis to ensure root cause issues was logged and remediated.
- Responsible for compliance resolution and audit and vulnerability remediation; as well as maintain effective external relationships with vendors, consultants, and service providers.
- Was responsible for the continual analysis of the confidentiality, availability and overall integrity of various aspects of the computing environment including servers, network components, individual workstations and controls and protections provided at the perimeter of RevSpring.
- Maintained local Remote Access for RSA hardware and software.
- Responsible for configuration of Group Policy and other Centrally Managed Policy based systems to ensure consistent baselines.
- Deployed, implemented and configured Polo Alto firewalls and NG sensors.
- Responsible for service and software update releases and processes for Patch Management on servers.
- Maintained IT Security Change Management process providing security oversight for changes and modifications to the infastructure environment.
- Developed and was responsible for Security Authorization activities for the client in accordance with National Institute of Standards and Technology (NIST) 800 series and DHS Sensitive Systems Policy (4300A).
- Responsible for Investigating into problematic activity in LogRythm and finding the solutions remediate and secure the perimeter.
- Designed and design and execution of vulnerability assessments, penetration tests and security audits.
- Developed a comprehensive SIEM architecture to support daily real-time security monitoring operations with tailored event correlation criteria.
- Supported efforts in the coordination with development teams and other Cyber Security personnel. Performed automated code scans using security analysis tools to identify vulnerabilities in a code set, prioritize those vulnerabilities, propose solutions, and then coordinating remediation with development team.
- Performed monthly in house IT Security test controls to test the validity of controls that were in place.
- Reviewed GFI logs and reports of all in-place devices, whether they be under direct control (i.e., security tools) or not (i.e., workstations, servers, network devices, etc.).
- Maintained knowledge of current and upcoming regulatory requirements which impacted SOX/PCI compliance.
Network Security Administrator
Confidential, Moorestown, New Jersey
Responsibilities:
- Monitor and configure security systems, including but not limited to IPS, VPN, SIEM and netflows, in order to protect the Confidential network from malicious activity and to identify compromised staff, and vendor machines.
- Responsible for access to Cada and Radius
- Maintain and update current status of each ticket in the ticketing system Jira.
- Responsible for configuration of server devices of FQND (DNS), DHCP, IP Provisioning and IP Management for CRAN, CET, CMTS in UNIX and Linux environment
- Work with IT groups to make appropriate improvements to the systems we use to improve productivity, effectives, and efficiency.
- Configure, and administer access control across multiple instances for development, test, production systems.
- Maintain user accounts, password protocols.
- Delete terminated employee records.
- Perform auditing for proper system usage and conducts periodic systems purge.
- Maintain proper naming conventions for in-line components.
- Maintain and ensures proper licensing for all accounts.
- Ensure local database maintenance is performed on a scheduled basis.
- Responsible for assisting users with access related issues to the following systems:
- Cisco VPN Client
- CADA (Kerberos)
- Juniper SSLVPN
- Responsible for setting up configuration/policy management on both Check Point VPN-1 and Juniper Networks SRX240 Services Gateway firewalls.
- VPN RSA SecureID token
- Troubleshooting localized system problems on Radius and LDAP
- Responsible for first care implemention of patch management initiated Vulnerability Scans on nodesng usi.
- Develop, maintain and update procedures for proper operation and administration of local systems.
- Hands-on management of a security system comprising of server systems and 1000s of agents e.g. Tripwire/Symantec CSP Console with 1000+ agents.
- Manage MPLS/VPLS across the CRAN and CMTS in support of network security.
- Responsible for the configuration of TACACS+ for allowing remote access server to communicate with an authentication server in order to determine if the user had access to the network and system
- Implemented RSA Authentication Manager 7.1
- Upon approval, implement the correction to meet user specific needs
- RSA 5.2.1 and RSA 7.1 including hardware and software tokens
- Day to day adds, configuration, IP and password changes on servers and routers consisting of: RedHat/Solaris servers
- Cisco Routers, CRS, ASR, uBR servers
- Motorola BSR, servers
- Arris CMTS servers
IT Security Officer
Confidential, Wilmington, Delaware
Responsibilities:
- Acted as a hands-on technical resource for the Confidential team globally. UNIX and Linux environment.
- Handled multiple projects and deadlines in a timely manner for BAU process.
- Designed, tested, and implemented secured operating systems, networks, security monitoring, tuning and management of IT security systems and applications, incident response, digital forensics, loss prevention, and eDiscovery actions.
- Conducted risk and vulnerability assessment at the network, system and application level.
- Conducted threat-modeling exercises.
- Developed and implemented security controls and formulates operational risk mitigations along with assisting in security awareness programs.
- Elaborated on a wide range of security issues including architectures, firewalls, electronic data traffic, and network access.
- Researched, evaluated and recommended new security tools, techniques, and technologies and introduced them to the enterprise in alignment with IT security strategy.
- Prepared security reports to regulatory agencies.
- Prepared audits and managed access management.
- Coordinated access request with offshore areas of AZ IT Security IBM/ Bangalore support (Help- Desk). Worked closely with the 3rd party vendor (IBM), business users and technical support teams for the migration of technical support duties.
- Maintained the integrity of the operating system environment; monitored, troubleshooted, and maintained systems; analyzed exception-based events and developed proactive solutions.
- Developed and lead the Data Loss Prevention program on a global basis to detect exfiltration of sensitive data for Cyber Security and risk team.
- Supported key Information Security technologies, such as SIEM, DLP, Vulnerability and Audit Management.
- Performed computer and/or network security vulnerability assessments to identify, evaluated and mitigated security risks, threats and vulnerabilities. Designed, implemented, integrated, configured and teste computer and network security solutions to manage the network/system’s firewalls and intrusion detection systems.Designed and implemented integration with Oracle Waveset wherever applicable.
- Conductied vulnerability scanning at the enterprise level, and proficiency analyzing scan results to generate actionable risk- rated findings reports.
- Responsible for responding and reporting local IS security incidents, taking whatever local action necessary to contain any serious incident and practical response to wider security incidents.
- Responsible for the scanning of nodes using Nessus and or Retina Eye.
- Established and maintain business relationships with external QSA firms as needed to provide AstraZeneca with the proper guidance on PCI-DSS compliance requirements.
- Perform IT Audits in regards to FedRamp,NIST, FDA,HIPAA and SOX compliance
- Responsible for the day-to-day deliverables that support the ongoing compliance needs related to Compliance and Security, risk management, as well as any new regulatory and security requirements
- Developed compliance programs and conduct training and monitoring.
- Responsible for the reviewing risks, business impact, dependencies, prioritization and scheduling of application change management requests.
- Created, compiled, and maintained working and SOP documents for specific E&V enterprise products and tools.
- Responsible for ensuring the continued operations of the vulnerability (McAfee Vulnerability Manager) and compliance (McAfee ePolicy Orchestrator/Policy Auditor) scanning tools.
- Configured and manageed host-based intrusion detection systems, log management tools, and alerting tools.
- Installed and configured, Cisco PIX and/or ASA 5500-series firewalls, and Cisco routers.
- Support ed Cisco PIX / ASA 7.x and Cisco IOS 12.x command syntax.
- Managed firewall rules/policy.
- Designed, implemented and supported Active Directory 2008 and Exchange 2007/2010.
- Conducted system maintenance activities, including monitoring parameters, maintaining security quality assurance and audit control access.
- Responded to client requests and system operation issues, providing assistance to operations personnel in the resolution of user or systems problems
- Managed other e-mail related systems, including but not limited to Cisco Ironport Email SPAM filter appliance, Anti-virus and Malware.
- Implemented and deployed McAfee DLP solutions.
- Installed, modified, upgraded and configured, enterprise anti-virus solutions performing admin, policy creation utilizing McAfee ePO v3.6-v4.0 and McAfee Virus Scan Enterprise v8.0, v85i, and v8.7i
Senior IT Security Analyst
Confidential, Berwyn, PA
Responsibilities:
- Security Information Event Management Engineer. Responsible for the Re-modification, development and deployment of an in house Identity Management, Web based system, called System Access Request (SAR). A multi departmental security profile web based identity access management system and Audit controls.
- Implemented and configured Oracle Application Server 10g (10.1.3.3.0 ) to function with Oracle Identity Manager. creating access privileges for user groups to resources within the Confidential and Gold.
- Maintained the optimization of the change control process for all production system changes.
- Conducted penetration/valunerbility scanning using QualysGuard and Nessus.
- Properly migrated and remediated vulnerabilities conducting forensic Analysis in support of discovery requests and investigations.
- Developed and lead the Security Intelligence team(InfoSec) to ensure security threat information, system log information, and sources of external intelligence are combined to provide real time response to cyber events.
- Implemented AD Forest, Group Policy (GPO). For authentication of secured access to software and application of the specified Global business departments.
- Troubleshoot, analyzed, resolved and documented reported IT incidents
- Maintained between internal tools and enterprise wide reporting dashboard
- Resolved user request issues from Helpdesk, through Remedy and OpensSource tickets.
- Implemented the compliance schedule for major initiatives such as FDICIA and PCI-DSS with company-wide efforts; staggers work plan to balance out resource impact.recommendedf or the compliance program.
- Controlled rationalization and optimization initiatives Identify and execute improvements to the company wide IT SOX/PCI approach and methodology
- Responsible for vulnerbility and risk analysis compliance on significant enterprise projects by determining potential risk issues for audit assesments for the FFIEC Regulations.
- Responsible for setting up IT Security Audits test controls.
- Upgraded Snort IDS/IPS (Sourcefire) from version 2.6.1 to 2.6.1.2. 3ds sensors 7030, updated rules.
- Engineered, coordinated, and performed upgrade of NGX R65 Check Point Provider-1 and all Check Point NG R55 firewalls
- Investigationed system failures, utilizing TapRooT to identify root causes and effectively taking corrective actions.
Unix Security Administrator
Confidential
Responsibilities:
- Responsible for the DuPont’s Infrastructure and LDAP in a UNIX/Linux environment.
- Responsible for creating new architectural design operational technical documents.
- Responsible for technical support through Sun Access Manager.
- Monitored and serving in a tier 3 role in the maintaining of PHP/Apache, Websphere, Java Tomcat, Jini, Linux and Solaris servers.
- Responsible for Incident management process identify, log, categorize, prioritize.
- Responsible for removes all old agent data and upgrades to the 6.4.0.253 PatchLink Update Agent (Zenworks)
- Monitored Nagios and responded to alerts
- Responsible for responding to issues in the Enterprise LDAP directories, directory schemas for backup and recovery strategies.
- Provided shell scripts for back end processes of web applications.
- Installed and configured the Federation Core Services for the migration from Intranet SAM 6.3 environment to SAM 7 servers:
- Sun Web Server 6.1 SP5
- Sun Directory Server 5.2 SP4
- Sun Java Access Manager 7
- Sun Java Access Manager SAML 2.0 Plug-in
- Sun Java Message Queue 3.6 SP3
- Installed two Sun Java Access Manager instances in DEV/QA, one SAM instance served as a service provider, and the other as an identity provider. In Staging and Production, both SAM instances were load balanced and serve as DuPont’s Identity Provider for the initial integration with the Early Adopter.
- Implemented and configured SAN Federated Identity Servers and web services security concepts such as SAML, Liberty ID-FF
- Documented and released changes in the infrastructure relating to any auditing of Sarbanes Oxley Compliances in reference to DuPont and Creative Constructs responsibility.
IT Security Administrator
Confidential, Wayne, Pa
Responsibilities:
- Communicated with Business Units, Team Leads and IT management to implement, support, and monitor defined applications throughout the conversion lifecycle.
- Responsible for the IT Governance, Risk and Compliance strategy and solutions.
- Attained compliance by isolating and resolving non-compliance issues; recommending compliance process changes.
- Performed PCI compliance assessments and serving as a PCI subject matter expert providing remediation guidance.
- Responsible for metrics, KPIs and incident reports.
- Effectively discerned source of repeat issues and call drivers through root cause analysis
- Set up business and user profiles for each business department in CA-Identity Management Suites and CA-Administration Manager. The project was completed in 9 months.
- Created 900 AD Group Domains and 868 objects for system deployment.
- Created standard process for group policy (GPO)deployment.
- Responsible for troubleshooting Active Directory replication problems.
- Reset user passwords and modified user accounts through Active Directory.
- Created and documented technical specifications for user request processing on Visio flow chart for helpdesk compliance standards.
- Implemented vulnerability and remediation scanning, utilizing McAfee Foundstone v6.5 and GFI LanGuard v3.x-v6.x to analyze and verify technical accuracy and consistency of configuration changes in Confidential ’s systems
Computer Systems Specialist
Confidential, Princeton, New Jersey
Responsibilities:
- Supported users by analytically resolving issues (TCPDump, NMAP, IDA etc.,
- Supported customers through the STAR System.
- Some retail sales support of related CA product, (eTrust CA-7 Top Secret Security)
- Responsible for operational process in high pace, high SLA 24 by 7 environments, strong understanding of operational processes and best practices.
- Supported clients in stopping unauthorized access, modifications, disclosures, misuse, manipulation, or destruction of their systems, networks, applications and data.
- Responsible for root cause analysis in a large scale, high volume services with multiple dynamic components including web servers, SQL databases, application servers.
- Responsible for assisting clients in the resolution of system errors, failovers and false positives
- Remitted and installed CA root SSL Certificates and PKIs.
- Maintained CA ’s integrity by achieving high quality of technical support, adhering to SLA Standards.
Data Security Support
Confidential, Mount Laurel, New Jersey
Responsibilities:
- 3 rd level technical support for CUH; in-house, remote users as well as 3 rd party vendors.
- Responsible for the processing access request through the STAR system, VMS portal, email, Sky-page, cell phone and on-call.
- Responsible for technical documentation of full-cycle system development, networking security and web application.
- Responsible for SSL VPN for Lawson lab (Medical Systems and CHU business offices)
- Coordinated and implemented Novell Access Manager for single sign-on capabilities.
- Implemeted Active Directory provisioning and group policy(GPO).
- Installed and configured Active Directory and related domain level components and protocols (DNS, DHCP, SMTP, POP, IMAP, WINS, HTTP(S), and LDAP)
- Responsible for the creation, replication, modification and removal of user accounts for all Cooper personal in AD.
- Responsible for the Administrative rights on all workstations in CUH.
- Investigated and resolved security incidents using Symatec AV logs.
- Responsible for the installation and configuration of the Domino/Legacy servers over to MS Exchange server 2003.
- Installed, configured, monitered Checkpoint firewall that supported, evaluated and monitored traffic in CUH DMZ
- Implemented the framework around the ISO 2700 security standards, and then incorporated other existing compliance areas such as SOX, HIPAA.
- Created an assessment and testing program that incorporates all aspects of PCI scanning, assessing, and testing.
- Implemented RSA Manager.
- Responsible for the distribution, configuring and monitoring of RSA Securid
- Distributed key fobs for Secured Remote Access.
- Resposible for Internal Audit reports on all systems in Data Center for SOX compliance.
IT Security Administrator
Confidential, Camden, NJ
Responsibilities:
- Responsible for the updating and the installations of AV on all servers.
- Responsible for the provisioning and modification of Novell user accounts.
- Troubleshoot analyzed, resolved and documented reported incidents.
- Maintained the Active Directory structure and all interrelated authentication systems, including the administration of user accounts, shared resources and access permissions.
- Maintained the maintenance and upkeep of Active Directory structure.
- Created Group policy through Windows Group Wise
- Created, set and reset passwords, modified accounts for internal users
- Maintained the Active Directory structure and all interrelated authentication systems, including the administration of user accounts, shared resources and access permissions.
- Responsible for application recovery procedures.
- Established best practices and procedures when processing user request to maintain SLA compliance for helpdesk.
- Responsible for RSA implementation, Authentication Manager 6.1.x. Platforms: Windows 2003; Red Hat Enterprise Linux 4; Red Hat Enterprise Linux 5 (excluding RADIUS server component)
- Regulated the antivirus updates and patch management on RSA ACE/Server, Citrix Server, Wintel Server