We provide IT Staff Augmentation Services!

Eystems Engineer Resume Profile

2.00/5 (Submit Your Rating)

OBJECTIVE: Obtain a position in the Information Technology field where I can use my skills and experience to benefit your organization.

PROFESSIONAL EXPERIENCE:

Senior systems engineer IV

Confidential

  • Conduct and participate in several meetings weekly with project managers, government leads and various IT staff in different duty locations.
  • Work with several stakeholders, PM's, system admin's and SME's to migrate user exchange mailboxes worldwide on the DoD network. Working with sites end point to end point on several steps like information gathering , desktop configurations, network configurations, correct provisioning techniques, EDS-P tool configuration for each site, performing migrations and post migrations. Review and provide engineering support to the current and future DEE, and DEE architecture to ensure stability, availability, and flexibility
  • Provide engineering support to project design, development, execution, and any accompanying technical documentation, including, but not limited to, post test reports, executive summaries, and design plans.
  • Use proprietary tool DEPO Department of Defense Enterprise Provisioning Online to provision and de-provision user accounts
  • Perform any other engineering task for Enterprise email migration and sustainment

Confidential

  • Providing incident response analysis and support, Identify and remediate any threats and/or vulnerabilities to corporate networks ,Document existing and new processes, mature existing documentation, research, analyze and understand log sources from security and networking devices such as firewalls, routers, anti-virus products, and operating systems. Assist with the tuning ArcSight Content performance and event data quality to maximize system efficiency
  • Research and analytical background and an analytical approach, especially with respect to event classification, event correlation, and root cause analysis.
  • Using several tools and applications such as ArcSight, McAfee EPO,Wireshark,RTIR,BMC Remedy ITSM , Proofpoint, Linux,Wins 8, SysInternalsSuite, Notepad and several other tools for data analyst
  • Proficient with NID implementations, various host isolation methods, packet and log analysis, enterprise anti-virus solutions, virus outbreak management, and the ability to differentiate commodity malware from Advanced Persistent Threats
  • Investigating events that are reporting from the SIEM, deep malware infection analyst, IP blocking PHP attacks, Sipvious scanners. Port scanners ect , Proxy blocking domains that have drive-bys or have malicious intent and policy violations. Taking numerous steps in investigations for any security incident that occurs enterprise wide and ensuring resolution from start to finish

Senior Data IT Security Analyst

Confidential

  • Conducting and performing IT system security audits as required by DOD/Army on all platforms applications, OS, network devices using DoD security checklist.
  • Assist with risk analysis and other vulnerability testing, assisting with the new SIEM/ security center ACAS running compliance/vulnerability scans from the centralized ACAS center using Nessus
  • Trained some in HBSS/ DISA HBSS Admin 201 MR5 course 2013
  • Running SCAP Security Content Automation Protocol benchmarks against all applicable systems for STIG compliance audits
  • Managing IAVA's issuing alerts and task working with SA NM to resolve
  • Using knowledge of Army approved IA tools Retina, Nessus, BNA for DISA STIGS for task. Implementing of DOD, FISMA and NIST standards.
  • System audits using E-Retina Nessus Q-tip tools. Complete network security audits Performing IT system auditing as required by DOD/Army Identification and remediation of security related risks on IT systems Supports certification and accreditation initiative. Review Network changes and perform risk assessments help with mitigation plans
  • Conduct systems, network, and Application Audits using applicable DISA Security Technical Implementation Guides STIG and Army Best Business Practices

Confidential

  • Assist in the DOIM effort of Execute and implement Command, Control, Communications, Computers and Information Management policies, standards, architectures, programs. Assist with SMS updating and distributing patches.
  • Manage Microsoft Windows Server Update Services, push patches out along with handling admin duties or problems with the server
  • Maintain the integrity and security of servers and systems by maintaining configurations and applying patches and updates to maintain network compliance.
  • Manage GPO group policy
  • Conduct systems analysis and development to keep systems current with changing technology. Install new software, apply patches and updates, perform troubleshooting, grant permissions to applications and train users.

Network security engineer/analyst

Confidential

  • Information and research. Once complete, the EIA is used as a basis for a CoN recommendation. Analyst includes determining Application functions and capabilities Vendor Information, Application ports and protocols, Funding Plan Computer Hardware Enterprise Solution Software Solutions previously Army Small Computer Program . Availability Fielding Implementation Plan, Bandwidth Utilization, Server Locations, Completed DISA Security Technical Implementation Guideline Checklists Test and Scan Results. Reviewing Commercial-off-the-Shelf software, Government off-the-Shelf and Systems during CoN process.
  • Researching security posture on all products submitted

IT security DIACAP Accreditation

Confidential

  • Analyze information on the system's functions, diagrams, descriptions, organizational processes, and documentation, review and validate MAC and Confidentiality Levels and validate applicable DoDi 8500.2 IA Controls and AR 25-2 requirements. Evaluate likelihood of successful Certification test based on review of Security Engineering activities and the state of the documentation.
  • Penetration methodology, assess vulnerabilities and risks, and develop mitigations
  • Work with the Security Engineer if available to assist the PM/SO to implement selected IA Controls or risk mitigations. Coordinate and conduct Risk Assessment Working Group meeting with stakeholders to finalize risk ratings, identify false positives, do so what analysis, and develop mitigations.
  • Prepare formal Certification Report Assist the PM/System Owner and Security Engineer in preparing POA Ms if system is still non-compliant with any IA Controls or requirements. Develop, coordinate, and submit Agent of the Certification Authority ACA recommendation IATT, IATO, ATO, and expiration date and documentation package to Certification Authority CA
  • Tools used Retina, Appdectective, Nessus, SRR scripts, gold disk, Nmap , SFTP Web IIS Scripts, AppSecInc, AppDetective, CIS Router Assessment Tool, STAT Guardian VMS, Retina Security Scanner, SuperScan ,Sybase Drivers, TCPDump, Tenable ,Nessus , WatchFire ,AppScan,WireShark and LanSurveyer

Data Security Analyst

Confidential

  • Served as a Tier 2 Data Security Analyst for the NAC /APC, a component team
  • in the enterprise data center. Audit security logs for anomalies in network traffic
  • and to ensure IAVA compliance
  • Manage vulnerability scanning systems and Anti Virus's MacAfee Reviewing
  • Still Secure reports, assisting users and address connectivity and VLAN
  • Incidents involving Safe Access via Remedy action request. Assist Director of Information Management, data center Service Desk and Information Systems Engineering Command ISEC engineers with all Safe Access ticket resolution.

Network event malware

Confidential

  • Evaluated possible attacks on network systems, intrusion prevention detection, network traffic analysis investigated and analyzed scans for denial of service DOS attacks, malware, and other types of malicious behavior.
  • Administered IDS / IPS to maximize network security, pushing and updating policies, and analyzing traffic. Troubleshot IDS/IPS output, analyzing events
  • Complete tasks in a highly professional manner, monitored outages, security alerts, and network intrusions.
  • Experience with Tivoli, secure shell, site protectors, sensors, database servers, Knowledge and troubleshooting skills on PCs and servers. Employed vulnerability management software such as NMaP scanner, DISA STIG, port scanners, NetBus/port detection, Etherreel, rootkit detection, Nessus, Dsniff, Hping, Retina scanner, wireshark

TECHNICAL SKILLS:

Software: Working knowledge in the following operating systems: Windows 2000, XP, Linux Red Hat , UNIX. Certified as Advanced Microsoft user. Working knowledge in the following software: Retina, Nessus, Gold disk MS Office Suite, Tivoli, Remedy, Spectrum, ArcSight, SQL, HP Open View, Intrusion Detection System IDS , Intrusion Prevention System IPS , Real Secure, and Site Protector. Operating Systems: Windows 2000/2003, MS Exchange 2003,07,10 UNIX, 100's of software protocols relating to ethical hacking and hacking defense.

We'd love your feedback!