Intrusion Detection Systems Analyst Resume
4.00/5 (Submit Your Rating)
TECHNICAL SKILLS:
- Infrastructure engineering and administration
- Security auditing
- Disaster recovery
- Cisco IronPort
- FireEye email and web appliances
- Nessus s
- Splunk
- DbProtect
- BigFix
- EnCase
- Proofpoint
- Wireshark
- ArcSight
- NetWitness
- Firepower
- Unix
PROFESSIONAL EXPERIENCE:
Confidential
Intrusion Detection Systems Analyst
Responsibilities:
- Monitor and analyze infrastructure traffic, IDS alerts and system logs for threats via SIEMs.
- Investigate cyber security incidents such as breaches, data spills, infrastructure traffic anomalies, suspicious emails, URLs and attachments.
- Provide threat and damage assessment for security threats which may impact the customer infrastructure.
- Determine and recommend appropriate response action(s) required to mitigate risks to customer infrastructure.
- Communicate with system administrators to contain systems, remediate threats and/or reimage if necessary.
- Follow up with system administrators to ensure incident has been properly remediated.
- Perform definition file updates for McAfee Enterprise Policy Orchestrator.
Confidential
Senior Information Security Specialist
Responsibilities:
- Cyber Security team lead.
- Monitored the organization's and intrusion detection systems.
- Monitored the infrastructure for unauthorized infiltration, modification, destruction or disclosure.
- Performed security incident handling utilizing six step incident response methodology.
- Investigated cyber security incidents such as breaches, data spills and infrastructure traffic anomalies.
- Provided threat and damage assessment for security threats which may have impact on the customer infrastructure.
- Determined and recommended appropriate response action(s) required to mitigate risks to customer infrastructure such as system isolation.
- Communicated with system administrators to contain systems, remediate threats and/or reimage if necessary.
- Researched and evaluated new security solutions.
- Developed, implemented, enforced and communicated security policies and/or plans for data, software applications, hardware, and telecommunications.
- Created and maintained security documentation and incidence response procedures.
- Conducted contingency planning exercises.
- Provided information to management regarding the negative impact caused by theft, destruction, alteration or denial of access to information.
- Provided recommendations on information assurance engineering standards, implementation dependencies and changing information assurance related technologies.
- Performed system vulnerability scans and coordinated with network administrators to implement vulnerability remediation.
Confidential
Systems Engineer
Responsibilities:
- Maintained Cisco IronPort perimeter email relay security appliances for enterprise environment.
- Performed IronPort implementations, configurations, OS updates and upgrades.
- Implemented data loss prevention measures to bring Johns Hopkins into compliance with HIPAA, PCI and FERPA regulations.
- Implemented procedure for encrypting email messages sent to external recipients.
- Responded to security breaches such as compromised email accounts, phishing and Spam attacks by investigating and utilizing six step incident response methodology.
- Created and modify message and content filters to mitigate Spam attacks.
- Investigated and resolved issues with organizational email delivery.
- Analyzed packet captures using Wireshark.
- Configured and monitor FireEye email and web threat analysis appliances.
- Performed Proof - of-Concept tests and evaluation of new security appliances.
- Collaborated with Infrastructure Security team to mitigate attacks.
Confidential
Systems Engineer
Responsibilities:
- Provided Infrastructure and Windows Systems Administration support for small to medium sized businesses.
- Supported Microsoft Exchange (2003/2007/2010 ) and Outlook (2003/2007/2010 ).
- Created/modified Active Directory user and computer accounts.
- Installed new software updates and patches for Windows operating systems and applications including anti-virus.
- Performed hardware installations at client sites.
- Configured routers/firewalls (SonicWALL) and switches (HP and Dell).
- Configured wireless access points.
- Performed data backup and recovery.
- Performed site assessments for potential and new clients.
- Maintained client infrastructure documentation.
- Provided technical recommendations and consultation on aging and problematic systems.
Confidential
Technical Consultant
Responsibilities:
- Provided Infrastructure and Windows Systems Administration support for small to medium sized businesses.
- Monitored client infrastructure health and performance via hosted solutions (Zenith/LabTech) and made recommendations/improvements where necessary.
- Performed IronPort configuration for spam filtering.
- Supported Microsoft Exchange (2003/2007/2010 ) and Outlook (2003/2007/2010 ).
- Created/modified Active Directory user and computer accounts.
- Installed new software updates and patches for Windows operating systems and applications including anti-virus.
- Performed hardware installations at client sites.
- Configured routers/firewalls (SonicWALL) and switches (HP and Dell).
- Configured wireless access points.
- Performed data backup and recovery.
- Performed site assessments for potential and new clients.
- Maintained client infrastructure documentation.
Confidential
Infrastructure Analyst
Responsibilities:
- Reviewed Interconnection Service Agreements and other security related documentation including infrastructure diagrams and policies for accuracy and compliance to allow various law enforcement agencies to transmit data between one another securely.
- Reviewed specifications for hardware and software requested for implementation into CBP technology matrix.
- Tested hardware and software under review for implementation into CBP technology matrix. Reviewed Enterprise Architecture documentation.
- Reviewed and recommended hardware requirements for the CBP Modernization program.
- During deployments performed hardware and software upgrades of new Customs and Border Protection (CBP) workstations at U.S. points of entry.
- Verified hardware and software functions were in compliance with CBP requirements.
- Provided post installation on-site technical support to U.S. points of entry CBP personnel.
- Occasionally provided support to Field Technical Officers to resolve infrastructure issues.
Confidential
Technical Consultant
Responsibilities:
- Provided Infrastructure and Windows Systems Administration support for small to medium sized businesses.
- Monitored client infrastructure health and performance and made improvements where necessary.
- Performed server migrations.
- Performed security audits and applied necessary security updates and patches.
- Oversaw ISP cut-overs.
- Configured VPN connections.
- Performed router configuration (Cisco/WatchGuard).
- Supported Microsoft Exchange (2003/2007/2010 ) and Outlook (2003/2007/2010 ).
- Created/modified Active Directory user and computer accounts.
- Installed new software updates and patches for Windows operating systems and applications including anti-virus.
- Installed hardware at client sites.
- Configured wireless access points.
- Performed data backup and recovery.
- Performed site assessments for potential and new clients.
- Maintained client infrastructure documentation.