Cyber Security Systems Engineer /system Administrator Resume
3.00/5 (Submit Your Rating)
Beltsville, MD
PROFESSIONAL SUMMARY:
- Passionate cybersecurity engineer with over 6 years of experience working in government contracting and corporate network space.
- Experienced working side by side with engineering and Operations team to support Cybersecurity Operations Center.
- In addition, experienced working at Confidential in JITC testing lab as a cybersecurity tester on multiple programs performing source code scanning, vulnerability scans, IAVM requirement, User Acceptance Testing, and applying STIGs on Windows and Linux environments.
- Experienced in Network typology, network design, TCP/IP protocol and other concepts.
- Working knowledge of Splunk, FireEye, Force Point, Source Fire, Sophos Antivirus, Blue Vector Proxy, McAfee NSM, MEG, RSA, SolarWind, Bit9, UTMP, App Detective Pro, Snort, Cryptool, ACAS/ Nessus, Nmap, AppScan, Wire Shark, Linux, Windows, Ubuntu, people soft, and Microsoft office.
- Experienced building, running and administrating FireEye CM, EX, NX and AX series appliances.
- Experienced in administrating ForcePoint Proxy database, policy manager, SQL server, and maintained HA cluster.
- Experienced reviewing security logs on appliance and in SIEM environment.
- Troubleshoot critical hardware and applications for failure including up/down, traffic flow between nodes/ interfaces.
- Developed QSP, SOP, IR and TE documents to educate and develop training program for day to day operational activities.
- Performed leadership role in multiple projects & completed Executive Leadership Development Programs.
- Result oriented with minimal supervision and team player in collaborating with others.
- Excellent communication, organizational and analytical skills.
- Bilingual fluency in both English and Urdu.
EXPERIENCE:
Cyber Security Systems Engineer /System Administrator
Confidential, Beltsville, MD
Responsibilities:
- Built, tested, monitored and troubleshoot a variety of platforms, OS and applications using established procedures.
- Provided operation, management and monitoring system support including (un)scheduled maintenance, addressed performance issues and monitored all cybersecurity tools using Solarwinds and Splunk.
- Troubleshoot day to day many critical applications including RSA (Broker, Decoder & Concentrator), UTMP, bro, Suricata, Moloch, FireEye (HX, NX, AX, EX and CMS), IBM ISS Sensors and others.
- Provided full scope of vulnerability report using Nessus scan to customers and implement a remediation strategy to mitigate risk.
- Deployed patches on different enclaves via WSUS and manually installed Non - Microsoft patches.
- Upgraded hardware and applications to mitigate bugs and apply new functionalities.
- Engaged vendor support to perform troubleshooting and provide tested solutions.
- Worked with other engineering groups in the implementation of application and assured UAT performed to meet appropriate standards and procedures.
- Upgraded FireEye HX, NX, EX, AX & CM series appliances quarterly.
- Experienced in developing QSP, SOP, IR and TE documents for day to day troubleshooting and training new hires.
Cyber Security Tester
Confidential, Fort Meade, MD
Responsibilities:
- Planned, directed, and coordinated IA controls assessments during all phases of JITC testing.
- Performed multiple ACAS and Fortify scans on source code
- Identified and recommended fixes for known vulnerabilities found in source code and on individual OS.
- Tested and approved Microsoft and Non-Microsoft patches in the lab to comply with Information Assurance Vulnerability management (IAVM) guidelines.
- Applied STIGs to Windows and Linux systems in a test environment and performed other hardening activities such as applying application hotfixes.
- Helped writing JITC reports on each tested software release included screenshots, verifying developer test cases, created internal test cases, and provided recommendation.
- Helped Risk Management Framework (RMF) SME in identifying gaps based on NIST guidelines.
Cyber Systems Engineer
Confidential, Annapolis Junction, MD
Responsibilities:
- Directly administered ForcePoint Proxy, FireEye NX, EX, AX & CM series appliances, McAfee Email Gateway and Source Fire and McAfee IDS IPS on a daily basis.
- Provided daily maintenance including applying patches, upgrade software and hardware, and manage uptime at all times.
- Continuously advanced in products such as ForcePoint Proxy, FireEye EX & NX appliances deployment, E-mail gateway and IDS IPS.
- Used Splunk SIEM tool to review logs and provide support for Internet Access related tickets.
- Worked closely with SOC for analysis and block all malicious content on perimeter appliances.
- Involved in various projects includes setting Up/Down Monitoring of ForcePoint Proxies & FireEye appliances, determine ForcePoint SIEM suitability, evaluate FireEye Web Capacity, FireEye Code Upgrade, Pilot Yara Rules on FireEye Email devices, implementation of Lumeta appliances, review and update BIA/ISCP.
- Completed the “Executive Leadership Development” program in between .
Network System Administrator
Confidential
Responsibilities:
- Working knowledge of multiple platforms (i.e., workstations, servers) and OS (i.e., Windows, Kali Linux, and Ubuntu).
- Managed offsite lab network for Cyber Assessment Team; responsible for up keep of the LAN and WAN environment, active directory, switches, firewall and multiple ESXI and RHEL servers.
- Directly managed vulnerability scans using Nessus to apply system upgrades and patching; provide Bi-weekly report to management.
- Identified and captured high-level hardware issues, providing system preventative maintenance to implement system software upgrade and patches.
- Managed Off network environment; working with VM Workstation to build test environment for pen-testers.
- Documented all network configurations and apply updates per approval.
- Learned new concept including network design, network hardware infrastructure, and network topology.
Security Monitoring Analyst
Confidential
Responsibilities:
- Served as Tier 1 support in area of network intrusion prevention and detection in CSOC under SMT.
- Continuously monitored threat data using various analytical methods and SIEM tools such as Splunk, FireEye, SourceFire, Sophos, Blue Vector, McAfee NSM, and Bit9 to find anomalous or malicious activities.
- Analyzed threat data and communicated risk to relevant business units and leadership including SISO, mail gateway team, on-site security technician, and intelligence team for remediation.
- Escalated issues to ATAC team for further investigation on security related breaches.
- Working knowledge of Information Security policy and procedures concepts and technologies; network data processing design, general database concepts, process documentation, intrusion detection tools, hardware and software troubleshooting and open source alternatives.
- Involved in separate project with Sophos End Point team as Sophos Administrator for applying and maintaining appropriate anti-virus policies approved by SISO for all machines reporting into the Sophos Console.
Security Analyst
Confidential, Chantilly, VA
Responsibilities:
- Supported on-going research to develop a proof-of-concept of an advance Cyber-Early Warning System (CEWS), compliance research, and provided quality reviews for the Civil, Commercial and Defense Consulting teams.
- Executed tasks independently and conscientiously to provide highest quality.
- Generated vulnerability scans and penetration testing reports using AppDetectivePro, Nessus, and AppScan to uncover configuration mistakes, identification and access control issues.
- Used penetration tools such as Nmap and BackTrack to create network map by analyzing packet response.
- Developed content based on the NIST Special Publication Rev-4 for RMS application that helps management team to generate various compliance reports.
- Communicated all deliverables objectives at the daily development team conference and precisely present progress report to assigned mentor.
Application Requirement Gathering Engineer
Confidential, White Marsh, MD
Responsibilities:
- Migrated applications from Windows XP to Windows 7 operating system for Dell end client.
- Collected media and installation instructions from application owners/ vendors
- Tested and installed each vendor provided MSI and EXE using Windows 7 virtual machine.
- Preparing Packaging Workstations with clean Windows 7 (64-bit) operating System.
- Interacting with Users/Application owners for Application Packaging/Distribution support for the implemented packages.