We provide IT Staff Augmentation Services!

Senior Cyber Security Engineer Resume

5.00/5 (Submit Your Rating)

SUMMARY:

  • Demonstrated knowledge of information security principles, standards, practices and subject areas.
  • Over 15 years of IT experience; 13 years of hands - on diverse security experience ranging from security analyst, security engineer, incident manager, vulnerability, Computer Network Defense, identification/remediation, and compliance.
  • As well as a knowledgeable foundation from undergraduate, graduate, and professional level s.

PROFESSIONAL EXPERIENCE:

Confidential

Senior Cyber Security Engineer

Responsibilities:

  • Review and ensure compliance with customer security policies and requirements
  • Conduct vulnerability and generic security scans of both systems and networks to identify and mitigate security vulnerabilities
  • Analyze and mitigate network-related risks
  • Review new and existing system designs for compliance with security standards and best practices
  • Conduct vulnerability assessments on new and existing systems
  • Lead system and application architects through security acceptance testing
  • Develop plans for vulnerability mitigation
  • Document and communicate security policy to enterprise organizations
  • Develop mitigation plans and security implications for vulnerabilities
  • Provide architectural and technical guidance and recommendations for securing systems and networks
  • Implement securing and hardening recommendations
  • Produce threat reports
  • Provide information security expertise and consulting
  • Implement an information security framework
  • Gain organizational commitment for security plans
  • Plan, design, and implement security-related technologies
  • Ensure new and existing products conform to information security policies, standards, and best practice

Confidential

SENIOR CYBER SECURITY ENGINEER

Responsibilities:

  • Perform cybersecurity assessments of the Marine Corps Enterprise Networks (MCEN) General Support Systems, Sites, and Major Applications for Assessment & Authorization (A&A).
  • Perform the United States Marine Corps (USMC) Risk Management Framework (RMF) and Department of Defense (DOD) Information Assurance and Accreditation Process in accordance with the DOD Instruction 8510.01, National Institute of Standards and Technology (NIST) Special Publication (SP), and SP Rev 4
  • Document and complete the RMF packages using the Marine Corps and Accreditation Support Tool (eMASS) throughout the A&A lifecycle.
  • Develop Defense Information Systems Agency (DISA) Security Technical Implementation Guides (STIG) Test Plans to assess the technical and non-technical security features in the accreditation boundary.
  • Perform security scans using ACAS tool and analyze a variety of network devices, applications, and operating systems for STIG compliance.
  • Review routers, firewall policies, Intrusion Prevention Systems (IPS) and Intrusion Detection systems to ensure appropriate network traffic and unauthorized protocols are filtered, and encryption and authentication algorithms are FIPS 140-2 compliant.
  • Review Cybersecurity authorization artifacts such as COOP, Contingency Plans, System Security Plans (SSP), Configuration Management Plans, Information Assurance Vulnerability Management Plans, account management, Physical security, MOU/SLA’s, network diagrams for compliancy with RMF IA controls, DOD, and USMC Headquarters Marine Corps (HQMC) policies, procedures, orders, and directives.
  • Document security assessment results and perform risk assessments using CVSS based calculations.
  • Prepare Security Assessment Reports (SAR) based on the Plans of Action & Milestone (POA&M) findings, category levels, mitigations and determine the risk level of systems to provide to the USMC Authorizing Official (AO) for an authorization decision.
  • Assisted in implementing the defense levels, security categorizations, and overlays required for systems and the RMF control selection per the Committee on National Security Systems (CNSSI) 1253 standards.

Confidential

SENIOR CYBER SECURITY ENGINEER

Responsibilities:

  • Perform vulnerability assessment of Confidential Assets using Tenable NESSUS scanner
  • Analyze Nessus scan results and produce a detailed operational report for mitigation
  • Investigate offenses, source and destination IP Addresses, Network behaviors and anomalies on Confidential Network
  • Correlate events and flows that are sourced from multiple networks to the same destination IP Address
  • Determine the unique events that caused an offense
  • Tune false positive vulnerabilities using the Log source
  • Create, distribute and manage reports for QRadar SIEM data
  • Create customized reports for operational and executive use
  • Configure DSMs to send logs in a format that QRadar SIEM supports
  • Create Custom rules to perform tests on events, flows and offenses to detect unusual activity in Confidential Network

Confidential

Information Security Engineer

Responsibilities:

  • Provided and Accreditation support for the 5th Army Signal Brigrade
  • Guided System Owners and ISSOs through the and Accreditation (C&A) process, ensuring that management; operational and technical controls for securing either sensitive Security Systems or IT Systems are in place and are followed according to federal guidelines (NIST ).
  • Conducted the IT risk assessment using Nessus Scanning tool and documented the control, Conducted meetings with the IT client team to gather evidence, developed test plans, testing procedures and documented test results and exceptions.
  • Conducted walkthroughs, formulated test plans, documented gaps, test results, and exceptions; and developed remediation plans for each area of testing.
  • Developed the audit plan and performed the General Computer Controls testing of Information Security, Business Continuity Planning, and Relationship with Outsourced Vendors.
  • Implemented information security requirements for IT systems throughout their life cycle from the requirements definition phase through disposal.
  • Created or updated the System Security Plan and conducted an Annual Self-Assessment.
  • Conducted Systems Risk Assessment through Risk Analysis, assessed the various Assets within the systems boundaries and rigorously identifying all the possible vulnerabilities that exist within the system.

Confidential, Virginia

Information Security Engineer

Responsibilities:

  • Ensure all IT system security controls are in place and functioning properly in accordance with NIST A publication via independent assessment audit
  • Familiarity conducting security assessments utilizing Security Risk Traceability Matrix (SRTM)
  • Experience implementing and documenting NIST Revision 3 or 4 Security Controls to secure systems
  • Conducting Vulnerability assessment of systems/network utilizing Assured Compliance Assessment Solution tool (ACAS)
  • Conduct manual external and internal penetration testing using Kali LINUX. Carried out web application pen tests and social engineering testing using METASPLOIT, WEB-Inspect and App DetectivePro
  • Identify and exploit vulnerabilities by using tools like Nmap and RAPID 7 NESSUS to determine exploitable ports, protocols and services.
  • Carry out exploitation attacks based on vulnerabilities and open services/ports
  • Manage internal and external security assessments, risk analysis, and system or application level vulnerability testing, reviews, and mitigation.

Confidential

Information Security Analyst

Responsibilities:

  • Perform Internal IT Audit for compliance with NIST using SCAP and STIG tools
  • Experience working with HBSS Tools
  • Perform real-time vulnerability assessment and remediation of network devices via IAVA compliance scans and security patching of systems at risk
  • Troubleshoot/resolve issues with -enabled applications, such as SSL/TLS, S/MIME
  • Incident response involving classified data spills, i.e., Secret Data to Unclassified Network including but not limited to reporting documentation of the incident, exmerge of the Microsoft Exchange Mail System, and full or partial sanitization of all servers and host systems involved in the spill
  • Conducts assessment of threats and vulnerabilities, determines deviations from acceptable configurations, enterprise or local policy, and assesses the level of risk; recommends risk mitigations
  • Perform system-wide Risk assessment (scanning and patching using cyber security tools -Retina, Web-Inspect, Tenable Nessus, PSExec scripts, and SCCM)
  • Scanning and tracking network virus infections and malicious code proliferation with the use of the Symantec System Console
  • Ensures network meets STIG, IAVA, IAVM and SIEM requirements

Confidential

Information Assurance/Computer Network Defense

Responsibilities:

  • Coordinates resources during enterprise incident response efforts, driving incidents to timely and complete resolution
  • Oversees the analysis, development, testing, implementation and maintenance of all Information Assurance (IA) solutions and processes with technical expertise, support and administration.
  • Ensure post event/incident follow-up actions are addressed
  • Improve the security posture of networks by analyzing exploits and countermeasures, and identifying poor security practices
  • Responsible for protecting, monitoring, analyzing, detecting, and responding to unauthorized activity
  • Provide recommendations and strategies for material and/or non-material solutions to improve the system and/or organizational IA posture
  • Scanning/Remediation of Systems for vulnerabilities using Retina/Nessus tools
  • Advise and recommend corrective measures when an IA incident or vulnerability is discovered
  • Report security metrics and milestones
  • Disseminate IA information and alerts

Confidential

Information Assurance Security Engineer

Responsibilities:

  • Performed security assessments and analysis
  • Recommended mitigation steps as a result of security analysis, and interact with existing operations staff in designing and implementing mitigation steps.
  • Participate in analyzing, processing and fulfilling audit requests
  • Provide technical advice for information security as it relates to networks and systems
  • Coordinated with network and system administrators to ensure the timely deployment of operating system and application security patches
  • Support general troubleshooting related to information security tasks and provide support to end users as needed
  • Responsible for routine, periodic, and ad hoc scanning, analysis and reviews of resources utilizing the Secure Configuration Compliance Validation Initiative (SCCVI) tool (Retina)
  • Managed a comprehensive Information Assurance Vulnerability Management (IAVM) program
  • Assisted with the management, operation and maintenance of HBSS and Group Policy Objects

Confidential, Alexandria, VA

Vulnerability Analyst

Responsibilities:

  • Applies patches and security updates in accordance with the DCAC Information Assurance Vulnerability Management (IAVM) Program
  • Performs vulnerability assessments (VA) of Linux servers utilizing Security Readiness Review (SRR) scripts
  • Installed SSL, OHS2, HTTP server. Installed Oracle Webgate, Oracle Identity manager and Oracle Access Manager in RedHat Enterprise Linux running in Dell 1950 and 2950 platforms
  • Technical support of Operating System

Confidential

Security Engineer

Responsibilities:

  • Remediation of Linux, Solaris, Windows and Oracle components in support of IAVM efforts
  • Responsible for enforcing the security policy across the network infrastructure
  • Provide guidance to network users on policy and procedure for implementing effective information security on all information systems
  • Responds to Network violation alerts, such as NDCI, CDV, Unauthorized USB device and MALWARE incidents are remediated by conducting effective Battle Drill response procedures
  • Responsibilities for information and physical security include the identification of potential threats to systems and network devices,
  • Enforce policies and procedures to mitigate threats, conduct audits to monitor compliance for security baselines, grant access based on established criteria, ensure role based access controls are in place to limit access to functional data, and conduct regular and unscheduled inspections
  • Provided IA/CND concept of operations in regard to core network architecture service like SCCM, Bluecoat, Firewall and HBSS

Confidential, Fairfax, VA

Systems Administrator

Responsibilities:

  • Administration and maintenance of Windows based environment aboard Naval ships
  • Low level administration and maintenance of Cisco based switches and routers
  • Remote Administration and assistance using terminal service and Damware
  • Configuring, troubleshooting, and updating desktops, laptops and servers
  • Administration and maintenance of Windows XP, Server 2003, and Exchange server 2003 operating systems
  • Backup Management, Reporting and Recovery with VERITAS Netbackup
  • Active Directory users, groups, and computer management

We'd love your feedback!