We provide IT Staff Augmentation Services!

Information Security Risk Analyst/vulnerability Management Resume

4.00/5 (Submit Your Rating)

SUMMARY:

  • IT professional with strong experience in Information Security solutions.
  • Sound experience in administrating, monitoring and troubleshooting log management tools like Arcsight and Tripwire.
  • Proficient experience with Identity and Access Management technologies practices and procedures.
  • Proficient experience in Risk, Threat and technical vulnerability scans of network infrastructure.
  • Well versed in implementing Tripwire monitoring and scans on servers and devices.
  • Monitored and reported data metrics on several infrastructure monitoring tools including F5 Big Data, Netwitness, Checkpoint, SourceFire, Guardium, Vormetric, envision, ePo, and Tripwire and Splunk.

TECHNICAL SKILLS:

  • Vulnerability Scanning
  • ArcSight 6.5
  • VMware
  • Vulnerability Management Specialist
  • Rapid 7 Nexpose
  • Deep Security Deep Packet Inspection
  • Tripwire File Change Management 8.0
  • Threat Analyst
  • Penetration Testing
  • Virus Scanning
  • HTML Programming
  • Wireshark
  • Cisco Router/Switch Configurations
  • Windows Server 2003/2008
  • Directory Services
  • Firewalls Rules Management
  • User Access Management
  • Network Troubleshooter
  • JavaScript
  • Active Directory
  • Sourcefire
  • Symantec DLP

PROFESSIONAL EXPERIENCE:

Confidential

Information Security Risk Analyst/Vulnerability Management

Responsibilities:

  • Reviewed Security Risk information in Archer eGRC Database.
  • Reviewed Remediation Plan and Mitigating Controls
  • Search on QIDs and IPs in Qualys and research assets not found in Qualys Remediation.
  • Review Remediation Tickets in Qualys for False Positives, request evidence as needed.
  • Batch close tickets in Qualys with approved remediation plan in place.
  • Reassigns tickets to Requestor if more information is needed due to incomplete request.
  • Close tickets in Qualys and approved risk exceptions for certain time periods in Archer.
  • Met and discussed with host and application owners details of machine remediation.
  • Determine if the remediation plan required Patching or an upgrade, granting an exception.
  • Met with requestors to insure remediation plans are solidly on track.
  • Troubleshoot and Analyze Qualys scan reports for scan host IPs and hosts not scanned.
Confidential Marietta, GA

Information Security Risk Analyst

Responsibilities:

  • Research Risk findings in Archer Database
  • Working with New, Current and Old Risk findings making Assessments, determine if Acceptances needed.
  • Reviewed scans reports on vulnerabilities to determine cause of vulnerability
  • Query Archer database for key specific information
  • Drove risk findings to closure with evidence of remediation.
  • Performed and categorized data in using root cause analysis into Protocols(S/FTP, HTTP/HTTPS, and SSL 1.0/2.0), Encryptions and Authorizations and Authentications, Servers, Scan exceptions, sensitive PAN data, data masking, PCI/PII data at rest/motion, Firewall and Proxy issues, and logging and monitoring efforts.
  • Searched for Application ID in database for details, Application Owners, Security and Infrastructure Development and Patching
Confidential, Atlanta, GA

Security Center OPS Analyst

Responsibilities:

  • Monitoring Client Networks for anomalies and breach attempts.
  • Responded to incidents of possible security breach. Follow up and provide resolution ideas.
  • Worked with business leaders and stakeholders to stop possible attacks.
  • Review procedures to distinguish between known users and potentially unknown users identity.
  • Attending Dell Secureworks Security Analyst University
  • Analyzed raw data logs for potential port, vulnerability scans, cross site scripting and sequel injection
  • Intermediate working knowledge of Remedy Ticket System.
  • Investigated incidents of probing, attacks, breaches of security, scans, and penetration attacks based on priority and of importance to the client.
  • Received Queue, New, and Reassigned Tickets to perform triage and ticket validation including remediation.
  • Provides in depth information to other teams for possible remediation and/or resolution.
  • Speaking directly with client representative on resolving tickets on escalated issues of host and server infections, outbreaks trojans, viruses, worms, malware and adware.
  • Escalated tickets within established SLA time frames.
  • Recognized known and unknown scans based on client network data and escalation policies.
  • Created and implemented firewall rules, SIEM rules to block resolve suspicious traffic on Juniper, Palo Alto, Checkpoint, and Cisco ASA 5500 firewalls.
  • Security+, Network+, Linux+, SQL database queries training.
  • Created and implemented SIEM rules to block potentially bad traffic and tune out client specific regular traffic.
Confidential Atlanta, GA

Security Analyst

Responsibilities:

  • Monitored and reported data metrics on several infrastructure monitoring tools including F5 Big Data, Netwitness, Checkpoint, SourceFire, Guardium, Vormetric, envision, ePo, and Tripwire and Splunk.
  • Recorded data metrics on from F5, Guardium S - Taps, Sourcefire engines.
  • Recorded data from HP Gary Active Defense.
  • Recorded data on the health and welfare of each system.
Confidential Norcross, GA

Security Analyst

Responsibilities:

  • Monitored and annotated events in ArcSight through an active channel
  • Provided immediate response to possible attacks.
  • Responding to various incidents of possible breach and attacks.
  • Worked with engineers and business owners to resolve incidents.
  • Investigated many incidents of outside penetration testing and malware attacks as well as possible security breaches.
  • Created active channels on events and alerts for investigation.
  • Created ArcSight cases on USE cases to be escalated to proper business units
  • Collaborated and provided other business units with information on alerts and events
  • Searched and investigated events using IP, hostname, URL, Source, Destination IP and ports
  • Created cases, Bridge calls for high priority events with potential to harm network
  • Created database of Blacklisted IPs and Domains in ArcSight
  • Created lists of assets to check for availability
  • Received updated information on various suspicious events identified as possible Trojans, worms, and viruses
  • Worked with Remedy Ticketing Systems create/update change request for black/white lists of suspicious IPs, Hosts, and URLs
  • Used Networking Tools such as URL Query, IPVoid, IP and URL Scanners for investigation
  • Analyzed events with high priority for Confidential and company business data leakage.
  • Created Remedy tickets for medium and high priority changes to Security Monitoring Tools such as ArcSight
  • Determined if internal sources are sending data out of network and finding the destination of a possible sensitive data leakage.
  • Escalated and created facets cases on high priority events and sent to forensics team for investigation and resolution.
Confidential, Portsmouth, NH

Tripwire Analyst/Administrator

Responsibilities:

  • Search assets in multiple database listings
  • Policy tagged over 2400 servers, network devices
  • Ensured 100% Tripwire availability on the servers, routers, switches, and firewalls
  • Provided support for enterprise installation groups, upgrades, validating configurations and resolved installation related issues
  • Implemented Tripwire monitoring and scans available on over 2400 servers and devices and reporting to the appropriate device monitors
  • Accessed network through Global VPN
  • Provided Tripwire status reports at daily, weekly, monthly management meetings
Confidential Atlanta, GA

Monitoring Analyst

Responsibilities:

  • Monitored and troubleshoot offline agents using ArcSight
  • Monitored for possible incidents of breach and attacks, follow through and follow up to resolution.
  • Monitored ArcSight USE Cases to automatically create cases and analyze data
  • Investigated many incidents of malware attacks on client systems and follow up to resolution.
  • Checked Arc Sight for external scans and suspicious users
  • Created incident response investigation and follow through.
  • Analyzed ArcSight logs for suspicious payloads and prepare report on findings
  • Recognized and identified potential threats to the network
  • Investigated potential security risks and breaches
  • Downloaded Arc Sight Loggers logs in Excel for analysis of destination and source address, URLs, ports, and custom strings
  • Met strict company compliance guidelines under CMM, ITIL, Six Sigma, PCI, Sarbox, GBLA, and HIPPA
  • Monitored ArcSight connectors, agents, and other performance databases
  • Identify users with privileged and root users.
  • Analyzed and monitored database entry and movement of data using database queries.
  • Checked databases for top authentication of login failures and analyzed their trends
  • Monitored Arcsight dashboard for web application, scanning and probing, and malicious IP attacks
  • Monitored ArcSight for Imperva, Sourcefire, Deep Security malicious events
  • Monitored ArcSight active lists for malicious users and databases created
  • Created Active Channels on events that appear suspicious and added events to cases
  • Created cases in ArcSight for suspicious activity which are escalated to the L2 Analyst for further analysis
  • Security Tools Experience:
  • Tripwire Monitoring
  • Found discovered offline nodes in Tripwire, validate, check status and generate report
  • Performed base lining operations on discovered nodes
  • Created cases on unvalidated changes
  • Source fire Defense Center Monitoring Experience
  • Checked Dashboard for disk usage, CPU system load, and memory usage
  • Checked Virus and worm outbreaks, DNS attacks, brute force attempts, and DDS attacks
  • Performed Packet Analysis suspicious events
  • Researched true client IP address found in packet analysis
  • Symantec CSP Monitoring Experience
  • Monitored for infrastructure nodes offline
  • Attempted refresh of nodes offline, created a case to have nodes restarted.
  • Provided installation support for Symantec monitoring and virus scanning of nodes.
  • Monitored 2000+ nodes, servers, and other network devices.
  • Updated and Updated Agent software, signatures and provided rule recommendations and changes.
  • Threat Vulnerability Management Experience:
  • Performed Threat Vulnerability Management scans through Qualys Guard and Nexpose, as well as App Scan
  • Configured QID, Ports For each scan.
  • Performed port, host, UDP/TCP/IP scans individually for remediation
  • Performed multiple server scans to determine if vulnerabilities are fixed or active
  • Rescanned servers to determine if hosts are alive or if new vulnerabilities appear
  • Provided reports to engineering teams on recommendations to fix vulnerable hosts
  • Monitored email for vulnerability reports
  • Verified and Maintained resolved vulnerabilities with a rescan, and closed Remedy tickets and other documents

We'd love your feedback!