Cyber Security/network Security Engineer Resume
Plainsboro, NJ
PROFESSIONAL SUMMARY:
- Expertise in management of entire IT operations with experience in setting up / maintaining networks and networking devices administration.
- Deft in the management of operating system, network and applications with experience in configuring and troubleshooting various hardware and software related issues.
- Experience in planning, designing and implementing state of art network solutions with cutting edge technologies.
- Hands on in Confidential and External Audits & ISO 20001 & 27001 Information & Security Audit.
- Knowledge on Business Impact Analysis(BIA) and Risk Assessment(RA).
- Possesses broad competence in strategic management with the distinction of driving new IT initiatives, designing corporate infrastructures & contributing in achievement of organizational objectives.
- Hands on Experience on Vulnerability and Penetration testing using Different Tools.
- Coordinated IT related HIPAA compliance processes, accessing IT general controls in connection with program development, change management, computer operations, security and configurations as well as vendor service providers.
- Hands on Experience on Vulnerability and Penetration testing using Different Tools.
- Knowledge on OWASP Top 10 web application security risks.
- Responsible for auditing POA&M closures to ensure that identified weaknesses/vulnerabilities are remediated as scheduled and the information system's security requirements are satisfied.
- As network security engineer; responsible for configuration, installation, testing, deployment, performance monitoring, troubleshooting, and documentation of network security, utilizing industry best practices for security, and business continuity, change control, and client support.
- Coordinated IT related HIPAA compliance processes, accessing IT general controls in connection with program development, change management, computer operations, security and configurations as well as vendor service providers.
- In - depth knowledge of HIPAA Compliance and knowledge on CISSP and CISM.
- Responsible for auditing POA&M closures to ensure that identified weaknesses/vulnerabilities are remediated as scheduled and the information system's security requirements are satisfied.
- As security professional, research and analyze violations, and vulnerabilities within the network and infrastructure; working with Splunk, Wireshark to capture packets, McAfee, Remediation Issues, Anit-Virus/Worm/Malware. Process and procedure knowledge of governance, compliance, risk management and audit control systems and functions.
- As security engineer; facilitates the development of efficacy measures of cyber security programs to convey the overall security posture and maturity of the program; identify and vet new or emerging technologies necessary to assure success and security of services and products. They will fulfill the strategic security plan and deliver technical objectives of across multiple security roadmaps.
- Hands on Experience on Vulnerability and Penetration testing using Different Tools.
TECHNICAL SKILLS:
Routing Protocols: RIP, EIGRP, OSPFV2/V3, BGP
Switching Protocols: VLAN, VTP, STP/RSTP, HSRP/VRRP, GBLP, Ether Channel
Load Balance: BIG-IP F5
Tools: Backup Utility, CA Spectrum, ConnectWise, Splunk, QRadar, Qualys, Syslog
Datacenter Technologies: VDC, VPC, FEX, Fabric-path, DCI-OTV,VMDC(Arch), POD services
WAN Technologies: MPLS, VPLS Technologies, T3 / E3 standards, PRI links
Security Technologies: AAA, IPS, IPSEC/SSL VPN Protocols, DMVPN, GRE Tunnels, NAT, ACLs, ANXPositivePro, ProofPoint Advanced Email security, Confidential SourceFire
Optimization: Security Contexts using ASA firewalls
Voice: Confidential UCCM 6.0
IP Services: IP Subnetting, VLSM, IPV4,IPV6
Packet Analyzer Tools: Wire shark, Nessus, FireEye, Metasploit, Nmap, Burp Suite
Management Tools: Spectrum, PRTG, SolarWinds NPM, Confidential PRSM, ASDMPutty,Kali Linux: Virtualization
VMWARE ESXi: Routers
Security Products: Confidential ASA 5500, ASA 5500-X Series Firewall, FORTIGATE, PALO ALTO UTM Devices
PROFESSIONAL EXPERIENCE:
Confidential - Plainsboro, NJ
Cyber Security/Network Security Engineer
Responsibilities:
- Monitor phone and email ticket queues; work with analysts to ensure service levels are met.
- Ability to problem solve, ask questions, and discover why things are happening.
- Monitoring and analyzing logs and alerts from a variety of different technologies (Splunk, QRadar, IDS/IPS, Firewall, Proxies, Anti-Virus, Qualys etc) across multiple platforms.
- Provide 24/7 on call for SOC.
- Analyzes and escalates (as appropriate) relevant Information Security Event information. Takes action to handle high severity issues including escalating to other business areas as necessary and providing potential resolution or areas of improvement.
- Responding to security events and security alerts.
- Investigating security incidents and aiding in the incident response process.
- Developing detailed reports on security investigations.
- Managing and improving the SIEM and Incident Response platforms.
- Making improvements and suggestions to advance the overall security processes in place.
- Offering remediation and mitigation solutions based on vulnerability discoveries.
- Managing Confidential policies and procedures.
- Triage the incident details and provide support to Business Managers.
- Managing Confidential IOS Routers, Switches.
- Managing Confidential ASA firewall and Palo Alto with various IOS software’s.
- Managing Confidential WLC and standalone wireless access points.
- Managing PA with various models.
- Managing FortiGate device with various models.
- Managing Confidential switch with 7k/5k/2k devices.
- Install, configure, manage, and troubleshoot Confidential Sourcefire IPS appliances
- DMVPN / GRE tunnels implementation and administration.
- IPSEC (remote, Site-Site) /SSL VPN tunnels implementation and administration using different technologies like Confidential, paloalto and AXNPostivePro.
- Administration of MPLS links. Point-Point links and ISP Links with WAN edge devices.
- Troubleshooting Day-Day Networking issues.
- Projects handled with small to large enterprise s and technical support services.
- Monitor the customer devices using CA - software’s.
- Hand on End-End life cycle of Ticket creation / updating and closing service using CA software.
- Vendor’s follow-ups.
- Knowledge on CISSP and CISM
- Technical lead duties and management of technical projects.
- Designing and implementing customers’ network infrastructure.
- Confidential CEP Process and cross domain coordination services.
- Design and implementation of High available / failover Network setup.
- Tech-support to end uses over mail/phone/remote assistance.
- Solution delivery as per the customer requirement.
- Design the networks.
- Participated in deployment of data center LAN and worked Confidential 7k, 5k, 2k switches.
- Implementation of Network as per the design.
- Implemented a Disaster Recovery Plan to ensure data backup and recovery.
- Configuration solution documents and Project plan preparation.
- Knowledge sharing and Training classes for New Edge Networking technologies.
- Performing Vulnerability and Penetration testing on Network Devices using Nessus.
- Implementing traffic filters using Standard and Extended access-lists, Distribute-Lists, and Route Maps.
- In-depth knowledge of phishing attack methodologies, malware propagation or other relevant online fraud activities
- Experience in phishing, online fraud, Internet security, identity theft or other relevant work within a security operations center or security company.
- Implementing ProofPoint Advanced email security solutions for email threats and continuity.
- Installation and configuration of SQL server 2012/2008/2005.
- Configuring the High Availability features on SQL Server.
- Performing Backup and Restore activities on SQL Server.
Environment: Confidential Catalyst series 3850, 4500, 6500; Confidential 2k, 5k, 7k; VMware vSphere 6, Confidential routers 2900, 3800, 4000; Palo-alto Next-Gen PA-5000; Routing Protocols EIGRP, OSPF, BGP; VPNs, MPLS, Acme SBC, VoIP, Wireless APs, Big-IP F5, citrix NetScaler, Wireshark, Spectrum, ConnectWise.
Confidential, Indianapolis, IN
Security Engineer
Responsibilities:
- Primary responsibility includes maintaining and Securing the LAN & WAN setup in the organization.
- Evaluate user needs and system functionality, and help develop IT security strategies associated with security monitoring, detection, and incident response.
- Lead the assessment of Firewall security auditing, monitoring, and performance; which included analysis of firewall policies groups and groups. Validation of rule set effectiveness and optimization to improve performance monitoring.
- Ensured compliance with established Confidential control procedures by examining records, reports, operating practices, and documentation.
- Verified assets and liabilities by comparing items to documentation; completed audit workpapers by documenting audit tests and findings; appraised adequacy of Confidential control systems by completing audit questionnaires.
- Maintained Confidential control systems by updating audit programs and questionnaires; recommending new policies and procedures; communicated audit findings by preparing a final report; discussing findings with auditees.
- Complies with federal, state, and local security legal requirements by studying existing and new security legislation; enforcing adherence to requirements; advising management on needed actions; prepared special audit and control reports by collecting, analyzing, and summarizing operating information and trends.
- Maintains professional and technical knowledge by attending educational workshops; reviewing professional publications; establishing personal networks; participating in professional societies; contributed to team effort by accomplishing related results as needed.
- Conducted risk-based audits including all aspects of the audit lifecycle, including risk assessment, planning, client coordination, fieldwork, data analysis, workpaper documentation, reporting, and remediation validation, with direction from senior team members.
- Strong focused on information technology and information security controls in executing integrated, risk-based audits to evaluate the design and effectiveness of Confidential controls.
- Detailed understanding of IT managed processes, including technology architecture, system build, and provisioning, configuration management, performance monitoring, incident management, change management, user access management, disaster recovery, etc.
- Prepare and submit Security Assessment Plan (SAP) for approval.
- Analyze cyber security events, including threat model development and resulting security risk analysis of systems
- Involved in ISO 27001 Audits.
- Ensured security logs and audit trails are reviewed in accordance with established schedules and procedure.
- Responsible for any network changes in GSS devices.
- Implementing the new projects & client’s connectivity.
- Assisting & troubleshooting day-to-day connectivity related issues
- Implementing & Troubleshooting IPSEC VPN Tunnels .
- Managing and Administrating ILL and IPLC Links using Confidential, F5 and Pep Routers.
- Configuring pools and Virtual servers in F5 based on client requirement.
- Configuring and Maintaining of ASA Firewall includes creating of Network objects and ACL Rules.
- Maintaining and configuring the Vonage Devices.
- Implementing ProofPoint Advanced email security solutions for email threats and continuity.
- Performing Vulnerability and Penetration testing on Network Devices using Nessus.
- Monitoring Lease lines, Bandwidth usage and Confidential Network using Solar Winds & PRTG.
- Troubleshooting Day-Day Networking issues.
- IOS Upgradation on Confidential Devices.
- Install and configuring the Network Devices such as Switches, Routers and Firewalls.
- Creating the VLANS for the new Departments.
- Implemented a Disaster Recovery Plan to ensure data backup and recovery.
- Performing Side-by-side upgradation on SQL Server instances.
- Configuring Replications on SQL Server.
- Participate in the Information Security Incident Response process.
- Conduct advanced computer and network forensic investigations relating to various forms of malware, computer intrusion, data breaches, etc.
- Participate in threat hunting activities to proactively search for threats in the enterprise environment.
- Provide analysis of network packet captures, DNS, Proxy, Net flow, malware, host-based security and application logs, as well as logs from various types of security sensors.
Environment: Confidential Catalyst series 3850, 4500, 3750; Confidential 2k, 5k, 7k; VMware vSphere 6, Confidential routers 2900, 3800, 4000; Palo-alto Next-Gen PA-5000; Routing Protocols EIGRP, OSPF, BGP; VPNs, MPLS, Acme SBC, VoIP, Wireless APs, Big-IP F5, citrix NetScaler, Wireshark, Spectrum, Logic Monitor.
Confidential, New York, NY
Network Administrator
Responsibilities:
- Network Administrator solely responsible for all aspects of IT Support to multiple company site locations on a 24hr a day, 7 days a week basis.
- Configures, monitors, upgrades and maintains all network and client side equipment.
- Maintains all physical network equipment, updates and configuration of switch stacks, routers, servers, WIFI and VOIP devices.
- Performing Vulnerability and Penetration testing on Network Devices.
- Participated in the installation, configuration, and post installation routine operational tasks and configuration of the Confidential Switches Provided 24x7 On Call support to the application team.
- Confidential ASA/Checkpoint Firewall troubleshooting and policy change requests for new IP segments that either come on line or that may have been altered during various planned network changes on the network.
- Configured and installed VoIP CUCM and Confidential unity system, prepared network assessment for testing utilization for VoIP traffic and deployment and trained the user with more value-added services.
- Monitored and managed networks using Confidential Works tools and Wireshark.
- Troubleshooting Day-Day Networking issues.
- IOS Upgradation on Confidential Devices.
- Install and configuring the Network Devices such as Switches, Routers and Firewalls.
- Creating the VLANS for the new Departments.
- Configured IP addressing scheme and coordinated with LAN/WAN engineers to develop and implement various security policies.
- Installing and configuring windows servers and SQL Servers.
- Performing Backup and Restore activities on SQL Server Databases.
Environment: Confidential Catalyst series 3850, 4500, 2960; Confidential ASA 5510; VMware vSphere 6, Confidential routers 2900, 3800, 4000; Palo-alto Next-Gen PA-3000; Routing Protocols EIGRP, OSPF, BGP; VPNs, MPLS, Acme SBC, VoIP, Wireless APs, Big-IP F5, citrix NetScaler, Wireshark, NimSoft, PRTG.
Confidential -NJ
Network Administrator
Responsibilities:
- Provided support for complex layer 2, layer 3 issues and other services (STP, VLAN, IPsec, VPN, NAT, MPLS, BGP, EIGRP, OSPF).
- Worked with support team to troubleshoot and maintain servers and network Ops.
- Participated in L2/L3 Switching Technology Administration, creating and managing VLANs, Port security, Trunking, STP, Inter-Vlan routing, LAN security and server management.
- Worked on RADIUS, TACACS+ authentication serves and DNS, DHCP servers.
- Modified Confidential infrastructure by adding switches to support server farms and added servers to existing DMZ environments to support new and existing application platforms.
- Monitored network for optimum traffic distribution and load balancing using Solar winds.
- Completed service requests on IP readdressing, bandwidth upgrades, IOS/platform upgrades.
- Worked on Confidential routers series 7200, 6500, 4500, 1700, 2600 and 3500 series to perform bridging, switching, routing, Ethernet, NAT, and DHCP, customer LAN /WAN support.
- Configuring static NAT, dynamic NAT, inside Global Address Overloading, TCP overload distribution, Overlapping Address Translation.
- Experience working with Active Directory (as a centralized system) to automate network security management and user data.
- Experienced in working with Session Initiation Protocol (SIP) for voice over IP (VoIP) to facilitate the connection of a Private Branch Exchange (PBX) to the Internet.
- Experience in Server building both physical & virtual, troubleshooting, capacity planning, application monitoring, patch management, password and security management.
- Installation, configuration and Maintenance of Dedicate server's (Web Server, Mail Server, Proxy Server) using Remote Administration, manage packages, apply security patches, analyze network traffic to identify performance and resource utilization problems, IP management, giving technical support by attending technical call directly as well as through e-mail, troubleshooting/installation procedures.
- Installing, configuring and maintaining the Window server and SQL Servers.
- Configuring the DR Features on SQL Server Databases.
Environment: Confidential Catalyst series 3750, 4500, 2960; Confidential ASA 5508; Windows Server2008/2003, Confidential routers 2900, Palo-alto Next-Gen PA-3000; Routing Protocols EIGRP, OSPF, BGP; VPNs, MPLS, Acme SBC, VoIP, Wireshark, SolarWinds, PRTG.
Confidential
Systems Engineer
Responsibilities:
- Managing and Administrating ILL and IPLC Links using Confidential Routers 2600, 3600 Series.
- Managing and Monitoring Leased Lines using management software namely “What’s Up Gold” and escalating the task with concern vendors as per the process, for making the links up and keeping less downtime of connectivity.
- Managing VLANs using Confidential Switches 2950, 3550 Series.
- Troubleshooting & management of Confidential Routers, Confidential Catalyst & Switches.
- Managing and Administrating Windows 2003 Server as Domain with ADS and Mail Servers.
- Managing and Administrating Merak Mail Server and Providing Client Support for Microsoft Outlook Express.
- Installing VOIP Phones and Configuring through Confidential Call Manager administration software.
- Tech-support to end uses over mail/phone/remote assistance.
- Experience in Server building both physical & virtual, troubleshooting, capacity planning, application monitoring, patch management, password and security management.
- Responsible for client server implementations and support.
- Extensive Desktop and Laptop hardware and software maintenance.
- Preparing reports and drawing network diagrams using Office Suite and Microsoft Visio.
- Upgraded the antivirus and malware product.
- Worked hand-in-hand with different vendors for company products, solutions and performance.
- Co-ordinated work with Network, Storage and Database teams on critical application failure issues.
- Implemented VLANS for the installation of VOIP.
- Administering the whole IT infrastructure - switches, firewalls, routers, and servers.
- Looking after complete Windows Servers Management at our site office.
- Windows 2003 Servers playing role of Active Directory, DNS, DHCP.
- Software and Patch Management using Windows Automatic updates and Software update services (SUS).
- Installing, configuring and upgrading the SQL Servers.
- Migrating the SQL Servers and configuring the Log Shipping on SQL Server Databases.
Environment: Confidential Catalyst series 3750, 2960; Confidential ASA 5508, Sonic Firewall; Windows server2003, Confidential routers 2900, 3800, Routing Protocols EIGRP, OSPF, VPNs, MPLS, Acme SBC, VoIP, Wireless APs, Big-IP F5, Wireshark, KnoahSoft, PRTG.