We provide IT Staff Augmentation Services!

Cyber Security Systems Engineer /system Administrator Resume

3.00/5 (Submit Your Rating)

Beltsville, MD

PROFESSIONAL SUMMARY:

  • Passionate cybersecurity engineer with over 6 years of experience working in government contracting and corporate network space.
  • Experienced working side by side with engineering and Operations team to support Cybersecurity Operations Center.
  • In addition, experienced working at Confidential in JITC testing lab as a cybersecurity tester on multiple programs performing source code scanning, vulnerability scans, IAVM requirement, User Acceptance Testing, and applying STIGs on Windows and Linux environments.
  • Experienced in Network typology, network design, TCP/IP protocol and other concepts.
  • Working knowledge of Splunk, FireEye, Force Point, Source Fire, Sophos Antivirus, Blue Vector Proxy, McAfee NSM, MEG, RSA, SolarWind, Bit9, UTMP, App Detective Pro, Snort, Cryptool, ACAS/ Nessus, Nmap, AppScan, Wire Shark, Linux, Windows, Ubuntu, people soft, and Microsoft office.
  • Experienced building, running and administrating FireEye CM, EX, NX and AX series appliances.
  • Experienced in administrating ForcePoint Proxy database, policy manager, SQL server, and maintained HA cluster.
  • Experienced reviewing security logs on appliance and in SIEM environment.
  • Troubleshoot critical hardware and applications for failure including up/down, traffic flow between nodes/ interfaces.
  • Developed QSP, SOP, IR and TE documents to educate and develop training program for day to day operational activities.
  • Performed leadership role in multiple projects & completed Executive Leadership Development Programs.
  • Result oriented with minimal supervision and team player in collaborating with others.
  • Excellent communication, organizational and analytical skills.
  • Bilingual fluency in both English and Urdu.

EXPERIENCE:

Cyber Security Systems Engineer /System Administrator

Confidential, Beltsville, MD

Responsibilities:

  • Built, tested, monitored and troubleshoot a variety of platforms, OS and applications using established procedures.
  • Provided operation, management and monitoring system support including (un)scheduled maintenance, addressed performance issues and monitored all cybersecurity tools using Solarwinds and Splunk.
  • Troubleshoot day to day many critical applications including RSA (Broker, Decoder & Concentrator), UTMP, bro, Suricata, Moloch, FireEye (HX, NX, AX, EX and CMS), IBM ISS Sensors and others.
  • Provided full scope of vulnerability report using Nessus scan to customers and implement a remediation strategy to mitigate risk.
  • Deployed patches on different enclaves via WSUS and manually installed Non - Microsoft patches.
  • Upgraded hardware and applications to mitigate bugs and apply new functionalities.
  • Engaged vendor support to perform troubleshooting and provide tested solutions.
  • Worked with other engineering groups in the implementation of application and assured UAT performed to meet appropriate standards and procedures.
  • Upgraded FireEye HX, NX, EX, AX & CM series appliances quarterly.
  • Experienced in developing QSP, SOP, IR and TE documents for day to day troubleshooting and training new hires.

Cyber Security Tester

Confidential, Fort Meade, MD

Responsibilities:

  • Planned, directed, and coordinated IA controls assessments during all phases of JITC testing.
  • Performed multiple ACAS and Fortify scans on source code
  • Identified and recommended fixes for known vulnerabilities found in source code and on individual OS.
  • Tested and approved Microsoft and Non-Microsoft patches in the lab to comply with Information Assurance Vulnerability management (IAVM) guidelines.
  • Applied STIGs to Windows and Linux systems in a test environment and performed other hardening activities such as applying application hotfixes.
  • Helped writing JITC reports on each tested software release included screenshots, verifying developer test cases, created internal test cases, and provided recommendation.
  • Helped Risk Management Framework (RMF) SME in identifying gaps based on NIST guidelines.

Cyber Systems Engineer

Confidential, Annapolis Junction, MD

Responsibilities:

  • Directly administered ForcePoint Proxy, FireEye NX, EX, AX & CM series appliances, McAfee Email Gateway and Source Fire and McAfee IDS IPS on a daily basis.
  • Provided daily maintenance including applying patches, upgrade software and hardware, and manage uptime at all times.
  • Continuously advanced in products such as ForcePoint Proxy, FireEye EX & NX appliances deployment, E-mail gateway and IDS IPS.
  • Used Splunk SIEM tool to review logs and provide support for Internet Access related tickets.
  • Worked closely with SOC for analysis and block all malicious content on perimeter appliances.
  • Involved in various projects includes setting Up/Down Monitoring of ForcePoint Proxies & FireEye appliances, determine ForcePoint SIEM suitability, evaluate FireEye Web Capacity, FireEye Code Upgrade, Pilot Yara Rules on FireEye Email devices, implementation of Lumeta appliances, review and update BIA/ISCP.
  • Completed the “Executive Leadership Development” program in between .

Network System Administrator

Confidential

Responsibilities:

  • Working knowledge of multiple platforms (i.e., workstations, servers) and OS (i.e., Windows, Kali Linux, and Ubuntu).
  • Managed offsite lab network for Cyber Assessment Team; responsible for up keep of the LAN and WAN environment, active directory, switches, firewall and multiple ESXI and RHEL servers.
  • Directly managed vulnerability scans using Nessus to apply system upgrades and patching; provide Bi-weekly report to management.
  • Identified and captured high-level hardware issues, providing system preventative maintenance to implement system software upgrade and patches.
  • Managed Off network environment; working with VM Workstation to build test environment for pen-testers.
  • Documented all network configurations and apply updates per approval.
  • Learned new concept including network design, network hardware infrastructure, and network topology.

Security Monitoring Analyst

Confidential

Responsibilities:

  • Served as Tier 1 support in area of network intrusion prevention and detection in CSOC under SMT.
  • Continuously monitored threat data using various analytical methods and SIEM tools such as Splunk, FireEye, SourceFire, Sophos, Blue Vector, McAfee NSM, and Bit9 to find anomalous or malicious activities.
  • Analyzed threat data and communicated risk to relevant business units and leadership including SISO, mail gateway team, on-site security technician, and intelligence team for remediation.
  • Escalated issues to ATAC team for further investigation on security related breaches.
  • Working knowledge of Information Security policy and procedures concepts and technologies; network data processing design, general database concepts, process documentation, intrusion detection tools, hardware and software troubleshooting and open source alternatives.
  • Involved in separate project with Sophos End Point team as Sophos Administrator for applying and maintaining appropriate anti-virus policies approved by SISO for all machines reporting into the Sophos Console.

Security Analyst

Confidential, Chantilly, VA

Responsibilities:

  • Supported on-going research to develop a proof-of-concept of an advance Cyber-Early Warning System (CEWS), compliance research, and provided quality reviews for the Civil, Commercial and Defense Consulting teams.
  • Executed tasks independently and conscientiously to provide highest quality.
  • Generated vulnerability scans and penetration testing reports using AppDetectivePro, Nessus, and AppScan to uncover configuration mistakes, identification and access control issues.
  • Used penetration tools such as Nmap and BackTrack to create network map by analyzing packet response.
  • Developed content based on the NIST Special Publication Rev-4 for RMS application that helps management team to generate various compliance reports.
  • Communicated all deliverables objectives at the daily development team conference and precisely present progress report to assigned mentor.

Application Requirement Gathering Engineer

Confidential, White Marsh, MD

Responsibilities:

  • Migrated applications from Windows XP to Windows 7 operating system for Dell end client.
  • Collected media and installation instructions from application owners/ vendors
  • Tested and installed each vendor provided MSI and EXE using Windows 7 virtual machine.
  • Preparing Packaging Workstations with clean Windows 7 (64-bit) operating System.
  • Interacting with Users/Application owners for Application Packaging/Distribution support for the implemented packages.

We'd love your feedback!