We provide IT Staff Augmentation Services!

Cyber Security Analyst Resume

2.00/5 (Submit Your Rating)

Newark, DE

SUMMARY:

  • Approx. 5 years working for a large DOD agency managing thousands of servers across multiple networks. Duties included supporting a 24x7 Linux environment and ensuring service, scalability and reliability of such systems to support the warfighter.
  • Productized an IDS toolkit using Puppet for rapid deployment across DOD networks.
  • Configuring Apache and Tomcat servers to serve out web pages to detect malicious activity on networks (i.e. Confidential ).
  • Created and open source, automated assessment toolkit to scan Health IT Information systems for HIPPA compliance. The toolkit checked for compliance in a Health IT organization’s database, networks, web applications, and infrastructure.
  • Created an automated open - source toolkit that comprehensively scanned (Database, Network, Infrastructure, and Applications) Healthcare Information Systems for HIPPA Compliance using Bash, Perl, and C
  • Used Waterfall model with iterations that is similar to Agile methodology
  • Gathering Software Requirements Specification from the client
  • Developed code on GNU, command line, Eclipse and Microsoft Visual Studio
  • Used MySQL for backend database
  • Conducting vulnerability assessments with tools such as Nessus and NMAP to find potential vulnerabilities.
  • Validating system patches/updates (Yum-updates for Linux systems).
  • Performing risk assessments.
  • Ensure audit logs and backups are being maintained are available.
  • Ran static code analysis tools and database configuration review tools against Internet-accessible applications to identify security flaws.
  • Prepared diagrams for networks that show network components such as routers, firewalls, and switches, along with significant servers and groups of client machine.

TECHNICAL SKILLS:

Operating Systems: Red Hat Enterprise Linux 5 & 6, CENTOS, Ubuntu, Mac OS, BackTrack, Unix, Linux, Windows Server 2008

Databases: SQL

Languages bash, perl, HTML:

Security Tools/Software: tcdump, nmap, wireshark, Fast-Track, Nessus, OpenVAS 4, Metasploit, Snort, Splunk, VMWare, MS Project 2007, Visio 2007

Hardware: Various IBM workstations, tape backup units

Development and Programming Languages: Familiar with languages like, bash, and Perl, Database Management Software MySQL

Model/Design: Object Oriented Design and Modeling Designed and implemented various applications of a library using Object Oriented Design and Modeling approach, Experience using UML, ER Diagram, EER Diagram, Use Case Diagram, Sequence Diagram, Database Schema, and Data Flow Diagrams

PROFESSIONAL EXPERIENCE:

Cyber security Analyst

Confidential, Newark, DE

Responsibilities:

  • Eyes on glass monitoring and resolution of security incidents within established customer Service Level Agreements.
  • Perform daily operational 'eyes on glass' real-time monitoring and analysis of security events from multiple sources including but not limited to events from Security Information Monitoring tools, network and host based intrusion detection systems, firewall logs, system logs (Unix & Windows), mainframes, midrange, applications and databases.
  • Monitors and analyses attempted efforts to compromise security protocols. Identifies and investigates activities and conducts and provides analyses regarding results. Escalates issues to higher level associates.
  • Reviews computer logs and messages to identify and report possible violations of security. Coordinates, documents, and reports on internal investigations of security violations.
  • Interacts with customers to understand their security needs; assists in the development and implementation of procedures to accommodate them. Writes security status reports to provide system status, report potential and actual security violations and provide procedural recommendations.

iOS Developer

Confidential, Havre De Grace, MD

Responsibilities:

  • Demonstrated proficiency of the MVC architecture.
  • Built applications using Interface Builder on Xcode V. 6.1.1
  • Created applications that gets input from user, and from that input, the application took certain actions.
  • Developed applications using Swift.
  • Developing an Health application that will educate healthy minded people about daily proportions for each food group in the food pyramid.

Linux Systems Administrator / Systems Engineer

Confidential, Malibu, CA

Responsibilities:

  • Vulnerability scanning using approved software tools.
  • Performing validation of IA compliant system image and configuration baselines.
  • If required assist in IT security incident response and documentation.
  • Maintains Linux Systems comprised of servers and workstations
  • Administer installation of software, hardware, file system management, backups, process control, user administration, and device management.
  • Responsible for resolving a wide variety of complex system failures, troubleshooting software, hardware, and network problems.
  • Configure Windows desktop and server OS, Configure RHEL OS. Provide DNS, Active Directory and LDAP configuration. Configure hardware and software for servers, RAIDs, storage arrays.
  • Provide operations and maintenance functions such as hard drive removal, print server configuration, performance optimization, and research and installation of current patches, where applicable install and support printers and storage peripherals.
  • Manage group shares and home directories.
  • Conduct system backups and restores.
  • Provide impact assessment for system-level changes on existing infrastructure.
  • Ensure compliance with computer security policy
  • Monitor system usage and perform system tuning
  • Design and Implement Rock Clusters.
  • Manage tools and equipment.
  • Assist users with system problems.
  • Schedule and conduct preventative maintenance on RHEL systems.

Linux DevOps Engineer / Information Systems Security Engineer, Consultant

Confidential, Fort Meade, MD

Responsibilities:

  • Maintain, configure, and implement various engineering solutions for a Department of Defense contract.
  • Provide investigation and analysis for reported problems from the client’s production operations group.
  • Work collaboratively to understand issues, offer suggested work-arounds, analyze and reproduce product failures, develop short-term and long-term resolution to problems insulating the product development team as much as possible.
  • Configuring and managing of enterprise Operating Systems across a large Department of Defense agency.
  • Troubleshooting core internet and networking protocols including, but not limited to TCP/IP, DNS, and HTTP.
  • Execute various tasks on behalf of the customer to ensure 24/7 operations of multiple systems.
  • Some of the tasks include loading and configuring operating systems, updating documentation to ensure accuracy, configuring DNS for proper name resolution across the network, and ensure communications remain intact.
  • Provide network support for many programs.
  • Managing thousands of VMs/KVMs in large government data centers using VMware products and Virt-Manager.
  • Implement and maintain various networks.
  • Develop and Implement Puppet modules.
  • Configuring LDAP TLS/SSL servers.
  • Configuring open source and commercial virtualization solutions into IDS and automating process using Puppet.
  • Creating/editing Bash scripts to automate tasks and solve complex troubleshooting problems.
  • Maintained code in a SVN repository.
  • Configuring, deploying, and supporting web server platforms including Apache, and PHP.
  • Configuring XML files.

DevOps Engineer/ Linux Systems Administrator, Consultant

Confidential, Fort Meade, MD

Responsibilities:

  • Provided Tier 3 support for a Department of Defense contract; performed the following task in the Red Hat Enterprise Linux environment:
  • Maintain, configure, and implement various engineering solutions for a Department of Defense contract.
  • Provide investigation and analysis for reported problems from the client’s production operations group.
  • Troubleshooting core internet and networking protocols including, but not limited to TCP/IP, DNS, and HTTP.
  • Execute various tasks on behalf of the customer to ensure 24/7 operations of multiple systems.
  • Some of the tasks include loading and configuring operating systems, updating documentation to ensure accuracy, configuring DNS for proper name resolution across the network, and ensure communications remain intact.
  • Provide network support for many programs.
  • Configuring and managing of enterprise Operating Systems across a large Department of Defense agency.
  • Creating/editing Bash and Pearl scripts to solve complex troubleshooting problems.
  • Managing thousands of VMs/KVMs in large government data centers using VMware products.
  • Implement and maintain various networks.
  • Configuring open source and commercial virtualization solutions or open source IDS.
  • Creating/editing Bash and Pearl scripts to automate tasks.
  • Editing XML files.
  • Modifying puppet modules and running to Puppet to apply updates.
  • Used Puppet to automate configuration management for Linux Services and specific applications.

Technical Support Engineer

Confidential, Fort Meade, MD

Responsibilities:

  • Identified departmental needs and make suggestions regarding technical direction.
  • Provided after hours support as a Unix Systems Administrator maintaining and supporting backend infrastructure of Intelink’s end user’s applications.
  • Apply knowledge of computing systems and software structure with other TTO engineers.
  • Analyzed users’ needs.
  • Created flowcharts, diagrams, and other documentation.
  • Performing antivirus scans and validating files as a Data Transfer Agent.
  • Analysis of PKI certificates to ensure accuracy and validity.
  • Troubleshoots network connectivity, and accessibility issues.
  • Monitors varying networks to ensure they are constantly up.
  • Performs daily, weekly, and monthly server backups, as well as software archives/data transfers from a range of Networks of varying security levels.
  • Assist users in setting up blogs, remote access accounts, and accesses to several network applications.
  • Creates electronic folders ensuring roles, and permissions are accurate.
  • Provides senior management with any network irregularities.
  • Responds to end user problems regarding account access and password resets

Confidential

Open Source Developer

Responsibilities:

  • Developed and implemented an open source, automated vulnerability assessment toolkit for the HIMMS 7 organization (Healthcare)
  • The toolkit was essential in providing vulnerability assessment scans of the HIMMS 7s healthcare information system and providing mitigation strategies for vulnerabilities found
  • The toolkit was developed and implemented using Bash, C++, and Perl
  • In addition, the toolkit was developed in the Backtrack OS environment

.NET Developer

Confidential

Responsibilities:

  • Developed and implemented a Product Management System for a Tile Company
  • The system was essential in querying a product database so that cost estimations could be provided to the client
  • Task included back-end development including analysis, design, coding, and testing of the Product Management System
  • Coding was done in the Microsoft Visual Studio environment using C# and SQL express for backend database management
  • GUI was coded in C# as well

Service Desk Technician / Help Desk Analyst

Confidential

Responsibilities:

  • Responded to a host of trouble tickets ranging from:
  • Assisting customers with password resets, and system lockouts
  • Installing and maintaining hardware/software
  • Resetting CAC pins
  • Troubleshooting network and printer connectivity problems

We'd love your feedback!