We provide IT Staff Augmentation Services!

Security Engineer / Cirt Analyst Resume

0/5 (Submit Your Rating)

Washington, DC

TECHNICAL SKILLS:

MCITP: Enterprise Desktop Administrator 7 (D ) Comptia Security+ Certified (Comp 001020130367 ) Active SECRET security clearance Security and vulnerability scanning with data analysis Superior troubleshooting, repair, upgrade, and regular maintenance of workstations/PCs, laptops, printers, & faxes, to include hardware, software, & configuration Extremely proficient in Microsoft Active Directory Management (adding/creating/permissions for users and objects), REMEDY, Symantec Endpoint Protection, Symantec Antivirus, McAfee Antivirus, JAVA, Microsoft Office Suite, Microsoft Outlook, DameWARE, Adobe Products, FormFlow 2.1, & PureEdge ICS Viewer, Winzip, Disk Imaging, Patch/ Hotfix management, NUMARA Footprints, Visual Basic Proficient in utilizing SNORT, NESSUS, RETINA, NUMARA NAMPS, RiverBed Extensive knowledge of Windows (95, NT, 2000, XP, Vista, & Windows 7) Operating Systems Extensive knowledge of NIST, ITIL, Army Regulations Intimate knowledge of Microsoft 2003 server & Exchange Mail Server, SCCM (package compilation, deployment, updates, and report generation), McAfee ePolicy Orchestrator Superb ability to communicate with technical and non - technical LAN users to resolve conflicts, teach end users, & provide and instructions.

PROFESSIONAL EXPERIENCE:

Confidential

Security Engineer / CIRT Analyst

Responsibilities:

  • Provide consultation to Accenture Federal Services (AFS) on reconfiguring, managing, and maintaining their Security Information and Events Management (SIEM) implementation, by providing analytical, architectural, and technical expertise and recommendations.
  • Design, deploy, and maintain Dell SecureWorks, a security information and events management (SIEM) service, within AFS’ architecture. Worked closely with SIEM program manager to develop the SIEM monitoring strategy, utilizing the National Institute of Science and Technology (NIST) - Risk Mitigation Framework. Identify requirements, based upon need or as the result of a security issue that puts the organization's systems at risk. Meet with key stakeholders and management to help specify and negotiate network and system security requirements, review current policies and procedures for applicability, and ensure successful implementation of
  • Develop and maintain SIEM technology/services to automate security monitoring. Participate as an active member in technical workgroups to recommend effective security configuration and architecture. Liaison to various AFS teams to effectively communicate and architect security solutions. Work with and coordinate appropriate IT staff to implement solutions which will meet or exceed customer expectations. Provide risk and root cause analysis for vulnerabilities, incidents, and change requests. Function as technical expert during a security incident response. Conduct monthly analysis of vulnerability and threat data from SIEM tool to maintain and enhance the defenses for AFS information systems.
  • Develop incident response plans, processes, and procedures. Develop materials and other forms of knowledge transfer. Conduct to the AFS Service Desk of incident response processes and procedures. Develop documentation to support ongoing security systems operations, maintenance, and specific problem resolution.

Confidential

Cyber Security Analyst/SOC Lead

Responsibilities:

  • Served as technical analyst for cyber security threats and/or incidents, and provide resolution procedures to Senior Management, Mid Level Management, and technical staff for the Port Authority of New york and New Jersey. Provided services and/or consultation in: 1) Research of industry best practices for application to PA information security/cyber security program, and 2) Analysis of network traffic (via Riverbed, packet analysis). Provided guidance, installation/upgrade method suggestions, and trend analysis for PA baseline and non-baseline applications. Provided analysis of malware trends and report issues which may pose a threat to PA's overall security posture utilizing various tools to include McAfee ePolicy Orchestrator. Managed New York State, Multi-State Information Sharing and Analysis Center (MS-ISAC), New Jersey State and US-CERT Cyber Security Alerts. Researched technical aspects of alert messages and delegate to sections for remediation. Researched technical aspects of incident messages and delegate to sections. Generated all technical reports to identify PA assets affected by cyber security incidents using PA network tools (i.e. Riverbed). Reviewed findings (to include traffic and packet analysis), and suggest potential remediation efforts. Documented and process NYS, NJS, QUALYS, and MS-ISAC incident advisories as generated by PA perimeter log. Track, follow-up, ensure remediation, and closeout incidents for documented incidents. Coordinated with points of contact to ensure version updates of core build software as needed. Reviewed agency approved (non-core build) software to ensure currency. Coordinated all technical aspects of software and hardware patching initiatives that affect Cyber Security to the PA (i.e. McAfee update prior to EOL, core software). Escalated to Port Authority
  • Project Manager where additional information or assistance from PA staff or vendors is required. Coordinated all technical aspects of software and hardware projects with technical staff of the Technical Service Department (TSD) and vendors to TSD. Performed all root cause analysis of malicious logic/incidents, reporting results to TSD section analysts and relevant management. Suggest remediation efforts to thwart potential/active threats. Identified the key technical threats relevant to PA as reported via Cyber News advisories and report findings to management. Suggested remediation efforts to section leads and relevant management as necessary. Provided guidance and on hardware and software resolution procedures, ensured trouble call/ticket resolution was completed in a timely manner and to customer satisfaction.

Confidential, Washington DC

IT Security Analyst

Responsibilities:

  • Implemented IT security measures throughout the Department of Commerce. Focal point of contact for all IT security matter, policies, and procedures. Spearheaded implementation of IPv6, Trusted Internet Connection (TIC), DNS Security (DNSSEC), DHS Cyber Hygiene Service, and Risk and Vulnerability Assessment Commerce wide (to 14 different organizational units). Ensured all IT security procedures are followed, reporting units not in compliance to ensure successful remediation Briefed the Chief of Information on IT Security projects, prioritizing the projects based upon Department of Commerce needs, goals, and quarterly objectives.
  • Tracked status of projects, provide leadership for completing projects, and also provide assistance as necessary to the organizational units in order to ensure successful completion/implementation. Utilized Microsoft Excel and Access to monitor, track, and analyze raw data provided from the Department of Homeland Security Cyber Hygiene Scan. Performed data analytics of raw data to disseminate to the 14 different organizational units which fall under the Department of Commerce, to identify, classify, and rank security incidences for remediation, and brief Chief Information Officer Security Council on pertinent information, necessary action, and forthcoming actions. Provide analysis and implementation of NIST Controls. Utilize Risk Management skills to develop and implement mitigating safeguards when needed. Effectively assisted system owners to operate under NIST SP 800 guidelines and improve FISMA scores.

Confidential, Fort Meade, Maryland

IT Security Analyst

Responsibilities:

  • Served as primary point of contact for Security matters for the Integrated Resources Information System (IRIS). Prepared for Authorization To Operate (ATO) inspection for the IRIS software via the DOD DIACAP inspection process. Ensured all applicable Information Assurance controls were met in accordance with DOD regulation, STIGs, and IAVAs. Remediated and properly documented deficiencies immediately.
  • Prepared required documentation for submittal for ATO. Suggested remediation recommendations to team members (from a security standpoint) on issues that prevented proper resolution/implementation of Information Assurance controls. Implemented and tracked Plan of Action and Milestone (POA&M), and submitted to Designated Approving Authority (DAA) upon completion. Updated and tracked statuses in Vulnerability Management System (VMS). Assisted in revamping Service Level Agreement (SLA), and Continuity of Operations Plan (COOP) between DISA/ Confidential and the Defense Enterprise Computing Centers. Managed IRIS Helpdesk by prioritizing and assigning trouble tickets to developers and associate staff for remediation of IRIS issues.

Confidential, Brooklyn, New York

IT Specialist

Responsibilities:

  • Assisted with the delivery of Information Assurance and Vulnerability Assessment (IAVA) patches to ensure systems were in compliance with the established Information Assurance awareness program. Assisted with applying information security/information assurance policy, principles and practices. Reviewed and analyzed RETINA scans to assist with the delivery of appropriate Information Assurance and Vulnerability Assessment (IAVA) patches to ensure systems were in compliance with the established Information Assurance awareness program. Assisted with applying and enforcing information security/information assurance policy, principles and practices by consistent monitoring of workstation compliance as reported by the Information Assurance Division. Completed assigned tasks identified via Plan of Action and Milestones (POA&M). Conducted validation activities (via RETINA scanning tool; by performing vulnerability scans and data analytics of scan results and mitigation measures). Mitigated system weaknesses and shortcomings identified by applicable audits, IAVAs, and STIGs. Compiled information necessary for justifying why information systems possess operational necessity despite having an IT security weakness and provide results to IAM for determination of acceptance or denial of risk acceptability.
  • Tested and verified IA controls. Provided analysis and implementation of NIST controls, AR 25-1, and AR 25-2 . Utilized Risk Management skills to develop and implement mitigating safeguards when needed. Effectively assisted federal system owners to operate under NIST SP 800 controls, AR 25-1, and AR 25-2 guidelines and improve C&A approval score. Performed testing of IA controls to ensure compliance with DoD and NIST compliance standards. Provided solutions for remediation procedures for any controls found not in compliance. Documented/managed risks in accordance with SP and SP using steps to evaluate the threats, vulnerabilities, and security controls surrounding the information system as well as the likelihood of an exploit and the impact it will have to the system operations. Provided reactionary and remediation procedures for vulnerabilities. Performed analysis and security configuration in direct accordance with Operating System STIG requirements. Ensured standard environment settings as established via baseline, and applied configuration settings as necessary, identified potential risks, and mitigated as necessary. Performed testing on applications to ensure they met established requirements and functioned correctly as per Application Security and Development STIGs. Maintained applications and updated as necessary as per Application Security and Development STIGs. Completed DIACAP via Defense Information Systems Agency (DISA) Local Area Networks (LAN) administration.

Confidential, Fort Stewart, Georgia

IT Specialist (GS-09)

Responsibilities:

  • Provided technical guidance, advice, and assistance to organization personnel. Supported a full range of hardware and software applications including personal computers, and network servers. Served as an Information Technology Specialist within an assigned hub/sector, responsible for network administration and support of automated information technology activities and related telecommunications requirements. Assisted with administration of the Local Area Networks (LAN). Provided technical guidance, advice and assistance to organization personnel. Supported a full range of hardware and software applications including personal computers, and network servers.
  • Planned and delivered a full range of information technology customer support services, including installation, configuration, troubleshooting, customer assistance, and/or, in response to customer requirements. Diagnosed and resolved problems in response to customer reported incidents. Installed, configured, upgraded, set up, and troubleshooted all hardware and software components, ensuring compatibility with existing systems and other system interfaces, and tested for system malfunctions. Installed, upgraded, configured, and tested off-the-shelf, locally developed, and other agency developed computer software. Received, responded to, and ensured resolution of all types of help center calls. Documented actions taken in the help desk problem tracking system database. Provided computer and associated software .

Confidential

Client Support Administrator

Responsibilities:

  • Was responsible for all aspects of the installation, troubleshooting, and necessary upgrades of local area networks (LAN), wide area network (WAN), connectivity issues, PCs, laptops, printers, and faxes. Directly supported of 1200+ personnel for the entire facility and 385 personnel in my immediate work center. Performed enhancements (both hardware and software) on information systems. Provided on-call PC and LAN support for approximately 385 employees. Met with department heads on an individual basis to determine their exact upgrade needs for their units. Extensive hands-on time as a supervisor, operator, and principal troubleshooter for 650 information systems valued at $450K. Created, managed and monitored user accounts, network rights, and access to computer systems and equipment using Active Directory. Allocated system resources to users and programs to include on how to use computer systems and software/programs.
  • Consistently recognized by management for superior performance, management, analysis/problem-solving skills. Other primary duties included: Functional Area Records Manager, Automated Data Processing Equipment Custodian, Building Telephone Control Officer, Human Resource point of contact for resolving IT related issues, Information Assurance Monitor, and instructing new employees in the Information Management career field, both military and civilian. Revamped the entire database system for tracking internal performance evaluations and decorations.

Confidential, Parris Island, South Carolina

System Deployment Team

Responsibilities:

  • Was responsible for the setup, configuration of new computer systems. Tracked all system upgrades and changes in centralized system database. Trained end users on usage and policies regarding their new systems. Migrated user data and information from old systems to new systems. Ensured proper accountability for old and new systems during and after migration.

Confidential, Savannah, Georgia

Counter Operations Agent

Responsibilities:

  • Repaired customer owned computers (remove viruses and spyware, install necessary hardware (i.e. hard drives, memory, video and sound cards, etc.). Directly assisted customers with IT issues at the counter. Installed software (antivirus, anti-spyware, specified software), as well as hardware (memory, video cards, hard drives, motherboards, etc.) on both newly purchased computers as well as customer owned ones. Troubleshoot customer issues via telephone. Trained customers on usage of installed software; recommend software that suits their needs/focus. Shipped computers to Confidential service center for further repair.

We'd love your feedback!