Lead Systems Engineer Resume Profile
2.00/5 (Submit Your Rating)
Technical Competencies
- Programming and Scripting Language Proficiencies
- .net, ASM, C , CSS, FORTRAN, HTML, IOS, Java, JavaScript, Perl, PHP, Python, Regex, Shell, SQL, VB, VHDL, XML
- Operating Systems and Application Proficiencies
- Android, Backtrack, Chrome, DOS , Linux, Mac OS, Unix Solaris , VMware, Windows, AD, Apache, Citrix, Cygwin, Eclipse, IDA, IIS, Lotus, Matlab, Microsoft Office, Outlook, Project, SharePoint, Visio, Quality Center, SPICE
- Cyber Security Assessment Tool Proficiencies
- AV, AppScan, Arcsight, Burp, Bluecoat, Cain, Cisco WCS, Encase, EnVision, Fireeye, FTK, ISS, Kismet, Loglogic, LOIC, IDS, MIR, Nessus, Netcat, Nmap, Ollydbg, Qualys, Snort, SPLUNK, Vontu, WebGoat, Whitehat, Wireshark
- Network Standards and Protocol Proficiencies
- ARP, BGP, Cisco, Cryptography, DHCP, DNS, IMAP, IPsec/VPN, P2P, PKI, RFC, SFTP, SNMP, SSL, TCP/IP, WIFI
- Professional Certifications
- C EH, C HFI, E CSA, LPT, SANS Certified Proctor, Security
Work Experience
confidential
Penetration Testing Engineer
- Gather and apply cyber intelligence pertaining to emerging threats in the cyber security landscape
- Document and enforce OWASP based application security policies and standards for all of JPMC
- Organize and maintain daily malware scans for all active JPMC domains
- Develop contracts with 3rd party vendors to complete monthly vulnerability scans of all JPMC domains
- Run ad hoc tests against web applications for fuzzing, parameter manipulation, SQL injection, XSS, XSRF
- Build and maintain secure database of application vulnerabilities and remediation status
- Generate monthly metrics reports for web application vulnerabilities and malware scans
confidential
Senior Information Security Analyst
- Technical lead, SME, and incident responder for a global team of 20 security analysts in a SOC
- Responsible for bluecoat proxy server whitelist/blacklist administration for over 250,000 users
- Provided real-time monitoring and analysis of security events from multiple log sources
- Designed and implemented network security systems and infrastructure such as McAfee IDS
- Collaborated with other teams in a 24X7 global environment for resolution and mitigation of issues
- Generated Vontu data loss prevention DLP reports and handled DLP policy violation resolution
- Engineered custom VB scripts, reverse engineered obfuscated and encoded scripts
- Utilized Cisco switch port tracing to discover location of malicious or rogue network devices
- Conducting network vulnerability scanning requests and providing insight into scan results
- Constructed a SharePoint documentation library and wrote operational process documentation
- Provided feedback to support teams to enhance processes such as wireless monitoring feedback
- Trained teammates regardingexploit identification, understanding policies, and IT risk procedures
- Assisted in the implementation of new tools including Arcsight, Systrack, Mandiant MIR, and Qualys
- Performed code review, alert development, and software security assurance using HP Quality Center
- Developed metrics and reporting process consistent with IT risk and security standards
confidential
Research Engineer
- Utilized X-ray and CT scans to examine circuits and reverse engineer wireless video systems
- Analyzed, designed, and presented wireless video system specifications based on military requirements
- Researched aircraft GPS integration via power and size analysis relevant to a UAV flight control system
confidential
Lead Systems Engineer
- Created, directed, and maintained an entrepreneurial IT consulting business called Computica
- Supported small businesses and consumers by providing quality IT, voice, and data security services
- Performed data recovery, information security, networking, web design, and end user training
confidential
Information Systems Analyst
- Security operations contractor for the United States Air Force held secret clearance
- Assisted in implementation of the United States Air Force Security Operations Center
- SOC design included real time monitoring of secure and non secure networks NIPR and SIPR networks
- Security design included two factor authentication systems and adherence to military standards
- Conducted cutting edge cyber defense research projects and presented at cyber security conferences
confidential
Physics Research Assistant
- Wrote, tested, and executed Fortran source code to compare quantum physics research to theory
- Utilized parallel processing techniques to complete complex computational tasks efficiently
- Analyzed numerical analysis data, tuned systems, and wrote technical papers about results
confidential
Senior Computer and Networking Technician
- Provided exceptional hardware, software, and network support to thousands of campus users
- Developed and executed action plan to convert entire campus to lotus email system