We provide IT Staff Augmentation Services!

Soc Security Engineer Resume

3.00/5 (Submit Your Rating)

SUMMARY:

  • Over 17 years of experience in Cyber Security Consulting.
  • Experienced in Strategizing Defense Measures to protect Automated Information Systems against Cyber Security Threats.
  • Expert in Information Systems Memory Analysis and Forensic Review.
  • Proficient in Reverse Engineering Malware.
  • Skilled in identifying rogue Information Systems' Behaviors indicative of compromised Enterprise Assets, Behavior Analysis.
  • Expert Instruction Detection Systems Engineer/Architect.
  • Experienced in issuing Security Warnings and Alerts to raise Enterprise Security Awareness.
  • Proficient in identifying rogue traffic flows indicative of Unauthorized Access, misconfigured and/or compromised Information Systems.
  • Skilled in developing Security Policies and Procedures to enforce and maintain efficient Enterprise Security Measures.
  • Keen ability to review Security Compliance and effectiveness of Enterprise Information Security requirements resulting from Audits and Inspections.
  • Competent in installing and configuring various Operating Systems, including: Linux and Windows clients and servers.

COMPETENCIES:

  • Malware Analysis
  • Forensic Review
  • Memory Analysis
  • Intrusion Detection Analysis
  • GIAC Intrusion Detection Analyst
  • Information Security
  • Agency Liaison
  • Leadership
  • Cryptography
  • Wireless Network Security
  • E - Commerce Security
  • Security Compliance Reviews
  • Operating System Configuration
  • Decision Making
  • Policy Development
  • IT Infrastructure
  • Enterprise Perimeter Assessment
  • Systems Analysis
  • Troubleshooting
  • Communication
  • Customer Service
  • Problem Solving
  • Attention to Detail
  • Vulnerability Assessment
  • SIPRNet
  • Risk Assessment
  • Intrusion Detection
  • Security Engineering
  • Develop Deployment Plans to optimize operation mode of Malware technology
  • Sensor Configuration, Deployment and Fine-Tuning

WORK EXPERIENCE:

SOC Security Engineer

Confidential

Responsibilities:

  • Providing Engineering support to the Confidential .
  • Managing, Maintaining, and Optimizing Enterprise SIEM/ Confidential /Logging Infrastructure.
  • Supporting Continuous Monitoring requirements for Cloud Environments.
  • Supporting Vulnerability Management and Compliance Requirements.
  • Performing Forensics Reviews in support to Confidential and Incident Response.

Senior Cyber Security Consultant Representative

Confidential

Responsibilities:

  • Developed Business Model for Consulting Services.
  • Coordinated/seeked Consulting Contracts.

Senior Security Consultant

Confidential

Responsibilities:

  • Responsible for reviewing malware infections and taking pertinent Incident Response (IR) Actions to mitigate Security Incidents.
  • Performed Cyber Forensics services in support to SOC requirements/Mission.
  • Provided recommendations to enhance Enterprise Infrastructure Security Posture.
  • Provided day-to-day Incident Response support.

SOC Lead / Senior Security Engineer

Confidential

Responsibilities:

  • Led Bureau of Industry and Security SOC and provided oversight to Security analyst.
  • Reviewed SOC Controls and supported Application License management requirements.
  • Performed Discovery and Enumeration scans in support of Enterprise Monitoring.
  • Recommended Critical Security Control(s) to optimize BIS Enterprise Security Posture.

SOC Senior Security Engineer

Confidential

Responsibilities:

  • Designed the International Trade Administration (ITA’s) New Generation Network ( Confidential ) Amazon Web Services (AWS) Cloud Security Architecture - Designed Approved by CISO.
  • Performed review of Critical Security Control(s) and provided recommendations for Enterprise Integration.
  • Supported Deployment/Integration/Operations of Data Loss Prevention (DLP) Controls.
  • Assessed Intrusion Detection Policies and performed review of intrusion events.
  • Performed Memory review of Information Systems.

SOC Cyber Forensics Lead

Confidential

Responsibilities:

  • Security Operations member responsible for responding to/handling Cyber Security Incidents.
  • Forensics Lead responsible for review of Information Systems involved in Cyber Security Incidents.
  • Review artifacts traversing Enterprise for malicious content, malware analysis.
  • Performed computer forensics and technical analysis of compromised systems.
  • Performed computer forensics including detailed technical analysis of media such as Hard Drives, USB Drives and similar media of compromised systems.
  • Drafted Fire-Eye Malware Intelligence Architecture Deployment Strategy.
  • Developed Deployment Plans to enhance Enterprise Malware Defense Technology.
  • Integrated and configured Intrusion Detection Sensors.
  • Provided recommendations to enhance Enterprise Security requirements.
  • Supported day-to-day IR/Security Operations.

SOC Security Analyst

Confidential

Responsibilities:

  • Provided Risk Assessment Reviews of Enterprise Change Requests (CRs).
  • Made Recommendations to the Chief Information Security Officer (CISO) to reduce Security Impact caused by CRs .
  • Developed Enterprise Level Confidential Trend Reports to Augment Monitoring Capabilities.
  • Supported DHS Security Event Notification (SEN) Process.
  • Performed Malware Analysis and Forensic Reviews of Network Assets identified in Cyber Security. Incidents.
  • Analyzed malicious code in support of incident analysis and response.
  • Performed dynamic and in depth static analysis and reverse engineering of identified malware.
  • Performed malware analysis on files of interest and suspected new instantiation of malicious code.
  • Responsible for forensic examinations to include; static and dynamic malware analysis.
  • Performed computer forensics and technical analysis of compromised systems.

SOC Senior Security Analyst / Liaison

Confidential

Responsibilities:

  • Department of State ( Confidential ) Computer Incident Response Member.
  • Analyzed network traffic to detect anomalies indicative of intrusions to the Confidential Enterprise.
  • Enhanced CIRT monitoring capabilities.
  • Coordinated security efforts between the Computer Incident Response Team and other Bureaus to protect the Confidential Enterprise against pertinent threats, key team member who facilitates effective communication among stakeholders.
  • Prepared and presented daily cyber security briefings on the status of security events and incidents, demonstrated a keen ability to communicate to a broad range of audiences at all levels of the organization on complex topics.

Senior Security Analyst

Confidential

Responsibilities:

  • Ensured that cyber attacks and breaches against client IT infrastructures were detected and addressed in a timely manner, commended for proactively planning and implementing security measures to ensure breaches and attacks were minimized.
  • Performed high-level configuration/logic of SIM tool to enhance detection of BotNet activities within clients’ Enterprise.

Some Control(s)/Tool(s): Confidential Enterprise

Senior Security Consultant

Confidential

Responsibilities:

  • Performed a broad range of Network Security Consulting Services to various Confidential partners and customers throughout the Caribbean, North America, and Latin America.
  • Provided guidance on the implementation of numerous security technologies and assisted clients with System Security Requirements.
  • Provided Intrusion Detection Analysis and other network security support to subcontractors in the Washington Metropolitan area.
  • Monitored IT protocols, identified network anomalies, and reported network activity that violated security policy.

Senior Information Security Analyst

Confidential

Responsibilities:

  • Provided security analysis support to the Intelligence Community.
  • As one of the Technical Shift Leads of a 24x7 Network Enterprise monitoring operation, led a team of analysts responsible for detecting intrusions and other network anomalies.
  • Verified detected anomalies, escalated events of interest, monitored network traffic, helped develop various processes and procedures required to formalize the Enterprise’s monitoring operations.
  • Optimized and maintained sensors deployed throughout the Enterprise

Information Security Analyst

Confidential

Responsibilities:

  • Provided comprehensive support to various Information Assurance requirements needed to optimize the security posture of the Confidential Network

Information Security Specialist

Confidential

Responsibilities:

  • Contributed substantial work toward the efforts of establishing the Computer Security Incident Response Center ( Confidential ).
  • Developed Confidential policies, processes, and procedures.
  • Provided timely and effective response to network security incidents.
  • Optimized Confidential sensors to enhance monitoring capabilities.
  • Performed vulnerabilities assessments for the entire Enterprise and reported findings to management.

Information Assurance Specialist

Confidential

Responsibilities:

  • Evaluated cyber threats and disseminated US Mint security advisories and pertinent vulnerability alerts provided by various Federal and Commercial Advisory Centers.
  • Provided security-engineering support to the Department of State’s Bureau of Consular Affairs ( Confidential ) Information Systems Security Officer, led and supported various Confidential systems that were undergoing State Department certification and accreditation processes.
  • Conducted threat and vulnerability assessments, risk analyses, and security surveys
  • Supported various security requirements for deployed Confidential systems, as well as those under development.
  • Developed Concept of Operations and Project Plan documents for Confidential systems.
  • Prepared Systems Security Authorization Agreements, System Security Plans, Security Test and Evaluation documents, and other required security documentation needed to support Confidential systems.

Principal Engineer

Confidential

Responsibilities:

  • Conducted traffic analysis reviews and was responsible for defining and developing security policies and configuring the respective security controls.

Network Security Analyst

Confidential

Responsibilities:

  • Provided security analysis support to the Environmental Protection Agency (EPA), assessed and recommended security measures to optimize the security integrity of EPA’s Enterprise.
  • Performed assessments of perimeter security controls, evaluated/assessed the Intrusion Detection Systems ( Confidential ) infrastructure, and reviewed Enterprise services.
  • Provided ongoing relevancy analysis, reviews, and mitigation strategies of FedCert Advisories pertaining to EPA’s enterprise.
  • Also, disseminated FedCert Advisories to pertinent customers.

Network Security Consultant

Confidential

Responsibilities:

  • Supported the Confidential ’s Global Information Grid/Global Information Systems by providing evaluation analysis of system deployment efficiency and Intrusion Detection Systems data collection.
  • Served as one of two National Security Team members selected for a company invested Intrusion Detection Systems Immersion program.
  • Assessed and evaluated the capabilities, efficiencies, and performance of various Intrusion Detection Systems.
  • Performed vulnerability assessments on Unix Solaris and NT workstations to evaluate all Confidential ’s proper locked-down mode, used hacking techniques to test the security integrity of the Confidential platforms.
  • Served as a member of the Enterprise Wide Log-in/Single Sign On Team, assisted in the implementation of encryption solutions and security controls, including VPN technology.
  • Provided PKI implementation assistance through the integration of VPN and Confidential /Entrust technologies.

We'd love your feedback!