We provide IT Staff Augmentation Services!

Information Security Officer/network Engineer Resume

2.00/5 (Submit Your Rating)

Phoenix, AZ

SUMMARY:

Seeking responsibilities to meet the needs of business security strategies requirements by further developing their security programs and security architecture. My desired role would allow me to learn newly developed security methods and technologies for use in protecting business services based on security risks identified. I believe through strong collaboration with business management and business department owners, we can find a balance to meet business growth while maintaining security policies and procedures without negatively impacting business goals.

TECHNICAL SKILL SUMMARY:

Security Frameworks: and Guidelines HITRUST CSF, NIST SP 800 - 30/800-53/800-88 , ISO-27001, PCI, COBIT, HIPAA, HITECH

Cloud Systems: Microsoft Azure, Azure Active Directory, Microsoft Office 365, Amazon AWS, Salesforce, CloudAlly, Citrix ShareFile, Google G Suite Enterprise, Okta, AlienVault, MimeCast, HITRUST MyCSF, LogicManager, Kisi, Gusto, Concur

Operating Systems: Azure Windows 2016 Datacenter, Azure Linux VMs, Windows 2012 R2 Standard Server, Windows R2 Standard Server, Windows Professional 10, 8.1, MS DOS, macOS 10, Apple iOS 10, 9, 8

Networking Devices: Firewalls, Routers, WiFi and Managed Switches from Cisco, SonicWall, Cisco Meraki, Ruckus, NETGEAR, Linksys, HP, including Azure Virtual Firewalls, Load Balancers, Route Tables, VPNs, VLANs, APIs and Network Security Groups, Cisco Firewall Management Console in AWS

Servers/Computers: Wyse, IBM, HP, MS Surface Books/Tablets, Lenovo, Compaq, Samsung, Toshiba, Dell, Gateway, Intel and Athlon Clones, Apple MacBook Pro, iPADs

Virtual and Packaging/Imaging Software: VMware ESXi, Citrix Xenclient, Appsense Manager, VMware Thinapp, VMware Workstation, Thinstall, Microsoft Application Virtualization and Softgrid, Windows Deployment System and Business Desktop Deployment, RIS,System Center Configuration Manager and Systems Management Server, Marimba, Winstall, Ghost

Security and Backup Utilities/Devices: Azure Security Center, Azure Key Vault, Azure Backup, MimeCast, AlientVault, Snyk, Qualys, TrendMicro, Unitrends, Symantec, Kaspersky, McAfee

Remote Software Utilities: Team Services, Cisco VPN, RDP, Telnet, AnyConnect, DameWare, LogMein, ReachOut, PcAnywhere, Radmin

Suite Products: MS Office 365, 2016, 2013, 2010, MS Outlook/Exchange, RightFax, Fax SR, Adobe Creative Suite, AutoDesk 2017, 2015, 2014

Database and Financial Applications: Azure SQL SaaS, SQL Server 2014, Oracle v14, Sybase ODBC, SQL Server 2008 R2, Crystal Reports/Info, Maxwell, Quicken, Quickbooks

Other Utilities: WSUS, Acronis True Image, Deepfreeze

Programming Languages and Scripting: PowerShell, Visual Basic, OSD, Assembly, C, C++

WORK EXPERIENCE:

Confidential, Phoenix, AZ

Information Security Officer/Network Engineer

Responsibilities:

  • Supported company business objectives to implement HITRUST CSF as a single benchmark to facilitate internal and external security controls measurements that meet requirements of NIST, ISO, PCI, HIPAA, HITECH and COBIT.
  • Obtained HITRUST CSF certification for Confidential and maintained status of HITRUST CSF certification during HITRUST CSF interim assessments.
  • Performed HITRUST CSF self-risk assessment and scoring of organizations Policies, Procedures, Implementation and in-scope systems in preparation for HITRUST CSF readiness validated assessment.
  • Managed HITRUST CSF restructuring of Confidential Security Policies, Procedures, and Implementation with multiple departments to correct GAPs identified during HITRUST CSF advisory assessment.
  • Identified and scoped the HITRUST CSF full validated assessment project objectives, assumptions, processes, activities, deliverables, RFIs and inventories requirements, to complete the HITRUST CSF full validated assessment.
  • Coordinated with multiple departments to collect HITRUST CSF request of Policies, Procedures, Implementation screen shots, generated reports and inventories for on-site HITRUST CSF assessors.
  • Performed self-quality assurance review of all Confidential Policies, Procedures, generated reports, and recorded inventories prior to submitting RFIs to HITRUST CSF assessors for scoring.
  • Reviewed draft HITRUST CSF validated assessment report scores and coordinated with multiple department to draft corrective action plans (CAPs) to address HITRUST CSF GAPs identified.
  • Performed QA reviewed of all draft corrective action plans (CAPs) to address HITRUST CSF GAPs identified prior to submitting HITRUST CSF for final scoring.
  • Finalized all HITRUST CSF CAPs from multiple departments and entered scoring into HITRUST MyCSF for final validated assessment QA review.
  • Reviewed HITRUST CSF final validated assessment report and continually execute implementation of corrective action plans (CAPs) to address HITRUST CSF GAPs identified.
  • Performed Physical, Data, Service Breach and Security Incident investigations including off-shore violations, de-identification issues, inadvertent disclosures, unauthorized disclosures, compromised computer and physical systems, unsupervised access, physical tailgating, lost facility access badges, unattended and unlocked computer systems, impersonation, phishing/malware/virus, brute force, and suspicious attacks, unencrypted data and systems, 3rd party and partners, permission issues, unapproved software and websites uses, event logs and alerts.
  • Followed Security Incident Handling Policy and Procedures for conducting security incident investigations to collect details, document who, what, where, when, how and why, validate collected details, containment to stop or limit impact, restore and/or recover data/services/assets, and remediate to prevent recurrences.
  • Reviewed security vulnerabilities and approved/rejected developer programming code, scripts, use of open source and repository library files, configuration of services, system connections such as APIs and their policies and procedures used for software development life cycle.
  • Conducted security evaluation and risk assessments of new hardware and software requests and approved or rejected.
  • Responded to Health Care Client Security questionnaires, assessments, collected documents and data for request for information (RFI)
  • Executed Security risk assessments on Providers, Partners, and Vendors including a reviewing their Security questionnaire responses.
  • Utilized LogicManager system to conduct vendor risk assessments and setup Security Knowledgebase Questionnaire Response repository.
  • 25% Travel to multiple Business Associates and Partner Main Office locations within the United States
  • Collaborated with new Business Associates and Partners to assess their Information Security Program requirements and prepared robust on-boarding HIPAA education material to accelerate business growth for establishing business partnerships.
  • Created security training material for HIPAA, First Tier Down Stream Requirements (FDR), changes to Policies and Procedures, including workflow processes.
  • Monitored, reviewed and updated Information Security Program to ensure changes as needed were adopted to meet HITRUST CSF and applicable standards and regulations including NIST, and ISO.
  • Implemented NIST 800-53, HITRUST CSF, and HIPAA Security Awareness Training into Information Security Policies and Procedures.
  • Adopted NIST 800-88 guidelines to enforce proper disposal of sensitive information contained on media.
  • Referenced NIST 800-30 as a formal methodology to define criteria for determine risk treatments and corrective action plans based on risk definitions of low, medium and high-risk scoring matrix.
  • Performed reviews of Information Flow Control to validate that adequate security controls are in place to meet HITRUST CSF and NIST 800-54 guidelines.
  • Documented, reviewed and approved network, software and hardware change control to production systems.
  • Utilize Azure Security Center to maintain security controls and identify system vulnerabilities.
  • Configured and maintained Azure firewalls to protect SQL databases, Network Groups, Key Vaults, and Virtual Machines.
  • Configured Azure load balancers with redundancy to maintain business continuity.
  • Assisted developers with configuring SQL SaaS environments in Azure.
  • Assisted developers with building Windows 2016 Datacenter for use with Azure Datawarehouse.
  • Configured Azure key vault to maintain encryption keys for multiple Azure systems.
  • Created Azure Virtual Firewalls, VPNs, VLANs, Load Balancers and Route Tables.
  • Assisted developers with creating and securing Azure API connections.
  • Configured, and maintained Azure backups for multiple Azure systems.
  • Managed groups, roles and accounts via Azure Active Directory.
  • Assisted Developers with configuring security controls in Salesforce.
  • Assisted developers with configuring Snyk dependency vulnerability scanner and integrating into Team Services workflow process.
  • Utilized Snyk to analyze, review and approve opensource dependencies or provide remediation for dependencies with vulnerabilities
  • Configured Qualys to perform vulnerability scans on multiple systems.
  • Utilized Trend Micro end point protection to generate reports and track malware issues.
  • Navigate Cisco Firewall Management Console in AWS to monitor network traffic and identify security intrusions and violations
  • Configured and maintained Amazon Web Services, AWS instances, AWS CloudFront, and AWS advanced web access firewall (WAF)
  • Configured and maintained MimeCast Email Protection systems policies, alerts, and performed investigations using email message trace tools.
  • Managed and monitored AlienVault SIEM sensors, policies, alerts for suspicious activities.
  • Reported to the Compliance Committee regarding status of HITRUST certification, breaches, security incidents, resource needs, security policy and procedure changes, implementation of security systems and remediation changes made.
  • Managed information security team of 5-8 employees and mentored them in performing information security analysis, information security administration duties, and adopting technical writing skill sets.
  • Reviewed Information Security candidates via Gusto management application
  • Coordinated, and managed GDPR data mapping of all PII used within the Business.
  • Integrated and Managed Cisco Meraki WiFi system using Cisco Meraki Dashboard console.
  • Integrated Kisi electronic security door badge system to isolate restricted areas.
  • Worked full time remotely from my personal home office.

Confidential, Farmington, CT

Network Engineer/Server Administrator/Desktop Technician

Responsibilities:

  • Coordinated relocation of Company Infrastructure and Data Center.
  • Architected and Implemented Cat6 Network with Cisco ISR4331 Router, Cisco SG500 Managed Switches with 10GBASE SFP+ Modules, Cisco SG 300 POE Switches and Ruckus ZoneFlex 1106 WiFi to Manage Ruckus R300 Access Points.
  • Supported Internet Connectivity over Multiple ISP Connections with Cisco Dual WAN Load Balancing Router, Microsoft VPN Server and Linksys switches.
  • Implemented VMware ESXi v5.5 and Configured Multiple VM’s as Virtual Servers.
  • Imaged and Maintained Multiple VM hosts via vSphere Hypervisor v5.5 and v6.0.
  • Utilized VMware vCenter Standalone Converter for Server P2V conversions.
  • Imaged and Maintained Windows 2012 R2 and 2008 R2 Servers.
  • Deployed SkyKick Office Assistant and performed migration of On-Prem Exchange 2010 to Exchange 365 Cloud Environment.
  • Utilized MS Azure AD Connect to migrate Local AD to Azure AD.
  • Managed Users and Licenses in Azure Ad and Exchange Admin Center.
  • Administration and Maintenance of Exchange 2010 Server.
  • Administration of Domain Active Directory, and Exchange Mailboxes.
  • Configured DHCP, DNS and Domain Group Policies.
  • Utilize WSUS for OS Security and Critical Stability Patching.
  • Managed Symantec Backup Exec and LTO Tape Backup Retention System.
  • Implemented Unitrends 822 Disk Backup System and RXDA Offline Archiving.
  • Supported SQL 2008 Server and Oracle running Primavera Contract Management.
  • Maintained DNS IP A and MX records using Internet Domain Name Services.
  • Installed and Managed Remote Site Routers and WIFI Connectivity.
  • Coordinated Network Installation of Remote Offices with other Departments & Vendors.
  • Implemented Paessler’s PRTG Network and Server Monitoring System.
  • Maintained and Updated Symantec End Point v12.1.
  • Implemented Kaspersky End Point Security Center 10 to PC’s in Local and Remote Sites.
  • Deployed & Maintained Panasonic KX-TDE200 PBX & KX-TVA50 VBX phone system.
  • Performed Oracle Database Conversion from version 8 to version 14.
  • Utilized PowerShell commands and Modified Scripting to support Environment.
  • Rolled out Lenovo, and Samsung Desktops/Laptops with Windows 10 & 7 Professional.
  • Rolled out Microsoft Surface Pro Tablets with Windows 10 & 8.1 Professional.
  • Rolled out and Maintained upgrades for Apple iPAD's with iOS.
  • Desktop Technical Support for 90+ Employee’s and 40+ Remote Sites.
  • Resolved Technical Issues in MS Office 365, 2016, 2013, 2010, Maxwell Accounting, Accubid Classic 13, Autodesk 2017, 2015, 2014 and CAD MEP, Navisworks and Revit 2017, 2015, 2014.
  • Created Network and Software Documentation and IT Restructuring Goals.

Confidential, Hartford, CT

OS and Application Package Engineer, Desktop/Network Technician

Responsibilities:

  • Developed Virtual Application Packages utilizing Microsoft App-V 4.6 and Softgrid 4.2
  • Designed Business Desktop Deployment OS images for multiple PC and Laptop models.
  • Managed BDD Images and Application Packages using SMS and SCCM.
  • Scripted Application and OS Image Installations using VBScript, OSD, Rif, Reg and Batch.
  • Microsoft Active Directory Administration of User accounts, Group memberships, and Organizational Units.
  • Desktop Support for 3500+ Employee’s using Wyse/Windows Embedded/XP.
  • CAT5 Cable Management and Cisco Port Activation in Network Closets.
  • Diagnose Cisco AnyConnect and VPN Client Issues.
  • Utilized VMWare Virtual Machines for testing Softgrid/MS App-V Virtual Applications.
  • Implemented New Applications and Upgrades with Project Managers into IT environment.
  • Managed daily Microsoft App-V updates on SharePoint Web Site.
  • Diagnose and Manage Citrix Xenclients and XenApp Groups.
  • Diagnose Virtual Environments using Appsense Manager.
  • Resolved Technical Issues in MS Office 2007/2003, Dictaphone, Oracle, Peoplesoft, Calysto, Visio, Callpilot, Tempus, Carelink, Crystal Reports, Encentuate single sign-on, Sentillion Single Sign-on, Essential Fax, RightFax, Kronos, McKesson HPM, Hummingbird NFS Maestro 2006, IDXRAD, Metriq, Mosaiq, IMPAC, Impath.
  • Remotely Diagnose Field Offices using SCCM, SMS, RDP, Dameware, GoToAssist.
  • Utilized Magic problem management database to close problem tickets and track projects.

We'd love your feedback!