Data Security Analyst Resume
3.00/5 (Submit Your Rating)
Carrollton, TX
SUMMARY:
- Cyber Security professional with proven expertise in implementing cyber security measure, troubleshooting network infrastructures and allocating staff resources.
- Respectable record that includes recommending security improvements, evaluating and identifying vulnerabilities and improving overall system efficiency.
- Impressive capacity to thrive in fast - paces environment while delivering quality results.
- Spearheaded creation of new information-security department: Risk Assessment, Vulnerability, Penetration Testing and Security Engineering Services
- Instrumental in developing and Implementing Business Continuity and Disaster Recovery Plans.
- Deployed enterprise Data loss Prevention(DLP) to protect clients data
- Re-designed VPN connections for remote users with improved security
- Deployed honeypots across the network
SKILL, TECHNOLOGY:
- Regulatory Compliance
- Wireshark, Metasploit, Nmap
- Threat modeling/intelligence
- Nessus, IDS/IPS
- Pen Tester
- Snort/Cisco firewall, Sonicwall,
- Firewall & Security Log Analysis
- OpenVAS, Kali Linux
- Intrusion Detection & Prevention
- ESXi Virtual Server systems
- FortiAnalyser, SIEM(Splunk, Radar)
- Data Integrity / Disaster Recovery
- McAfee ePolicy
- Web applications vulnerability testing
- Burp suite
- Encryption
- Windows, Linux OS
- Active Directory
- Forcepoint DLP
- Identity access management
- BlueCoat Proxy, Barracuda VPN
PROFESSIONAL EXPERIENCE:
Data Security Analyst
Confidential, Carrollton, TX
Responsibilities:
- Monitored Snort IDS alert system and update signature rules
- Secured critical servers and Remote users access with 2FA authentication
- Implement approved security policies that encompass configuration of users access and permissions across system
- Regular monitoring of Active Directory security log for suspicious activities using fortiAnlyzer
- Performed vulnerability assessment using Kali Linux and Nessus
- Regularly test and deploy critical security updates on windows and Linux servers
- Gather reports on targeted threats from all sources, including CVE and vendor publications
- Captured and analyzed network traffic for any weaknesses using wireshark
- Monitor users compliance with cyber security policies
- Scanned the network using openVAS to maintain network security
- Collaborate with high profile clients to thoroughly evaluate security risks and recommend cost-effective preventive measures
- 24hrs monitoring of critical network devices and confirm compliance with acceptable Data Security Standards (DSS)
- Improved corporate wifi security by implementing RADIUS authentication server
- Testing in-house applications with Burb suite for security flaws
- Monitor for insider threat with UBA
- Test and document system behavior, Performance and security
- Update inbound/outbound rules on Cisco firewall
- URL blacklisting/whitelisting using BlueCoat proxy
- Setup full system disk encryption using TrueCrypt and Bitlocker for remote users to secure company's data in compliance with HIPAA
- Presented analysis findings both verbally and in written reports
- Familiar with ISO, COBIT 5, NIST Cyber security Framework
Cyber Security Analyst
Confidential, Denton, TX
Responsibilities:
- Performed vulnerability scanning and assessments
- Configured and support security tools such as firewalls, enterprise Anti-virus software, patch management systems
- Trained users in security awareness and procedures
- Published PKI soft and hard certs used to authenticate smart card
- Managed network intrusion detection and prevention systems
- Deployed Webknight WAF to enhance web application security
- Followed internal policy on change management, incident management and escalation
- Deployed forcepoint DLP to secure critical data from exfiltration on corporate network
- Analyzed several security logs using splunk
- Configured and monitor remote users login via barracuda VPN
- Followed ITIL process on incident, problem and change management.
System Security Administrator
Confidential, Houston, TX
Responsibilities:
- Member internal security audit team and made policy recommendations
- Test security control randomly for any weakness
- Scanned network at regular interval using Nmap for open ports
- Reverse engineered several email attachments captured by spam filter for suspicious contents
- Installed and configured computer hardware, software and peripherals
- Issued Internal/External PKI Certificates to users.
- Monitored ESET endpoint database for high risk threat reports
- Developed secure baseline for server 2003 and 2008R2
- Regularly Audit Cisco ASA firewall rules to meet ever increasing network threat