We provide IT Staff Augmentation Services!

Lead Systems Engineer Resume Profile

2.00/5 (Submit Your Rating)

Technical Competencies

  • Programming and Scripting Language Proficiencies
  • .net, ASM, C , CSS, FORTRAN, HTML, IOS, Java, JavaScript, Perl, PHP, Python, Regex, Shell, SQL, VB, VHDL, XML
  • Operating Systems and Application Proficiencies
  • Android, Backtrack, Chrome, DOS , Linux, Mac OS, Unix Solaris , VMware, Windows, AD, Apache, Citrix, Cygwin, Eclipse, IDA, IIS, Lotus, Matlab, Microsoft Office, Outlook, Project, SharePoint, Visio, Quality Center, SPICE
  • Cyber Security Assessment Tool Proficiencies
  • AV, AppScan, Arcsight, Burp, Bluecoat, Cain, Cisco WCS, Encase, EnVision, Fireeye, FTK, ISS, Kismet, Loglogic, LOIC, IDS, MIR, Nessus, Netcat, Nmap, Ollydbg, Qualys, Snort, SPLUNK, Vontu, WebGoat, Whitehat, Wireshark
  • Network Standards and Protocol Proficiencies
  • ARP, BGP, Cisco, Cryptography, DHCP, DNS, IMAP, IPsec/VPN, P2P, PKI, RFC, SFTP, SNMP, SSL, TCP/IP, WIFI
  • Professional Certifications
  • C EH, C HFI, E CSA, LPT, SANS Certified Proctor, Security

Work Experience

confidential

Penetration Testing Engineer

  • Gather and apply cyber intelligence pertaining to emerging threats in the cyber security landscape
  • Document and enforce OWASP based application security policies and standards for all of JPMC
  • Organize and maintain daily malware scans for all active JPMC domains
  • Develop contracts with 3rd party vendors to complete monthly vulnerability scans of all JPMC domains
  • Run ad hoc tests against web applications for fuzzing, parameter manipulation, SQL injection, XSS, XSRF
  • Build and maintain secure database of application vulnerabilities and remediation status
  • Generate monthly metrics reports for web application vulnerabilities and malware scans

confidential

Senior Information Security Analyst

  • Technical lead, SME, and incident responder for a global team of 20 security analysts in a SOC
  • Responsible for bluecoat proxy server whitelist/blacklist administration for over 250,000 users
  • Provided real-time monitoring and analysis of security events from multiple log sources
  • Designed and implemented network security systems and infrastructure such as McAfee IDS
  • Collaborated with other teams in a 24X7 global environment for resolution and mitigation of issues
  • Generated Vontu data loss prevention DLP reports and handled DLP policy violation resolution
  • Engineered custom VB scripts, reverse engineered obfuscated and encoded scripts
  • Utilized Cisco switch port tracing to discover location of malicious or rogue network devices
  • Conducting network vulnerability scanning requests and providing insight into scan results
  • Constructed a SharePoint documentation library and wrote operational process documentation
  • Provided feedback to support teams to enhance processes such as wireless monitoring feedback
  • Trained teammates regardingexploit identification, understanding policies, and IT risk procedures
  • Assisted in the implementation of new tools including Arcsight, Systrack, Mandiant MIR, and Qualys
  • Performed code review, alert development, and software security assurance using HP Quality Center
  • Developed metrics and reporting process consistent with IT risk and security standards

confidential

Research Engineer

  • Utilized X-ray and CT scans to examine circuits and reverse engineer wireless video systems
  • Analyzed, designed, and presented wireless video system specifications based on military requirements
  • Researched aircraft GPS integration via power and size analysis relevant to a UAV flight control system

confidential

Lead Systems Engineer

  • Created, directed, and maintained an entrepreneurial IT consulting business called Computica
  • Supported small businesses and consumers by providing quality IT, voice, and data security services
  • Performed data recovery, information security, networking, web design, and end user training

confidential

Information Systems Analyst

  • Security operations contractor for the United States Air Force held secret clearance
  • Assisted in implementation of the United States Air Force Security Operations Center
  • SOC design included real time monitoring of secure and non secure networks NIPR and SIPR networks
  • Security design included two factor authentication systems and adherence to military standards
  • Conducted cutting edge cyber defense research projects and presented at cyber security conferences

confidential

Physics Research Assistant

  • Wrote, tested, and executed Fortran source code to compare quantum physics research to theory
  • Utilized parallel processing techniques to complete complex computational tasks efficiently
  • Analyzed numerical analysis data, tuned systems, and wrote technical papers about results

confidential

Senior Computer and Networking Technician

  • Provided exceptional hardware, software, and network support to thousands of campus users
  • Developed and executed action plan to convert entire campus to lotus email system

We'd love your feedback!