We provide IT Staff Augmentation Services!

Information Security Engineer Resume

0/5 (Submit Your Rating)

Carrollton, TX

SUMMARY

  • Over 8+years’ hands - on experience in Web Application Security Risk Assessment, Database Assessment, Intrusion Detection and Vulnerability Analysis and Mitigation using OWASP, NIST and SANS threat preventive methodologies.
  • Experience in collaborating with various product management and development teams to ensure alignment between security and development practices.
  • IT Professional Security /Risk Analytic and Architectural skills, IT Governance and Security Operations expertise overseeing the alignment of enterprise IT Security Strategy in meeting the Company’s IT Security efforts for dynamic Business Goals. Additionally, proficient in security policy write up, procedures and control review to attain optimal maturity level.
  • Expertise in Security assessment on the applications, web sites, and web applications to determine the security posture.
  • Experience in performing manual exploitation using different tools like NMAP AND Kali Linux.
  • Expertise in Penetration Testing and established a formal vulnerability management process.
  • Experience in monitoring and recommended solutions for correcting issues related to security technologies such as to monitor viruses, malware, and intrusions.
  • Expertise in Highlighting Best Security Practices, Procedures and Metrics - KPIs, KRIs Enterprise-wide for effective Risk and Vulnerability Control
  • Experience on maintaining better administer, secure and monitor user access privileges and activities using IBM IAM(Identity Access Management) Tools like IDI,IDS,ISAM.
  • Experience in Security Audit proactive mindset for Risk Mitigation and proven ability to using Information Technological Solutions and Tools to Optimized different Information Security Frameworks and approaches through Practical Application to evolving Business needs. Experienced in Developing, Documenting and Deploying Security Controls against IT Cyber Threats such as Data Exfiltration, Security Non-Compliance Issues and Social Engineering Antics.
  • Experienced in Security Assessment tools: Nessus, Burp Suite, NMap, Netcat, and WireShark etc.
  • Experience and also have strong working knowledge on various information security standards and compliances such HIPPA, HITRUST, PCI-DSS, FISMA, GLBA, SOC2, NIST and other GRC's.
  • Additionally, passionate in Enterprise Data Classification, Identity and Access Control management (IAM) deployment solutions, IT Risk Management, Governance, Security Compliance Methodologies.

TECHNICAL SKILLS

SIEM Tools: McAfee ESM, Splunk.

Penetration Testing /IT Security Tools: Burp Suite, Wireshark, Nmap, Nessus, Metasploit Framework, Zap Proxy, Netcat, IDS, IPS, SIEM, ColaSoft, Eclipse, MS Visual Studio and also includes tools for Footprinting & Reconnaissance, Network Scanning, Enumeration, System Hacking, Sniffing, Denial of Service Attacks, Session Hijacking, Hacking (Web serveres Applications, Wireless Networks), SQL Injections etc

Tools: Nmap, Wireshark, Ettercap, Nessus, Burp Suite Pro, Metasploit, Openvas, Splunk, Appscan, and Kali linux

Protocols And Compliance: UDP,HTTP, SNMP,SSL/TLS,VOIP, SMTP, SMB, DHCP, DNS, SOAP, TCP/IP V4.

Compliance: ITIL, ISO/IEC 27002,HIPAA

Scripts: Python. Shell Scripting (BASH, SH, CSH etc )

Cloud Services: VPC, S3, IAM, Cloud Formation, Cloud Watch.

Penetration Tests: HTTP Injection, Social Engineering, Dumpster Diving, LDAP Injection, XSS, Radiation Monitoring

PROFESSIONAL EXPERIENCE

Information Security Engineer

Confidential - Carrollton, TX

Responsibilities:

  • Coordinated with development team to ensure closure of reported vulnerabilities by explaining the ease of exploitation and impact of the issue.
  • Performed Security assessment of various web applications using Burp Suite, Zap Proxy manually using kali linux.
  • Performed Vulnerability assessment of various online applications to identify the vulnerabilities in Input Data Validation, Session management, Authentication, Authorization, Auditing and logging.
  • Performed infrastructure security on internal and external IP addresses and done manual exploitation using different tools like NMap AND Kali Linux.
  • Performed tools review for FIREYE, Trend Micro and BLUECOAT and modified some security rules to get better results.
  • Performed firewall rules review by obtaining firewall configuration files from SOLARWINDS and used to modify the configuration files.
  • Performed data base assessments using App Scan, Metasploit in Kali Linux.
  • Prepared reports with security breaches and the extent of the damage caused by the breaches to brief higher management and also clients.
  • Performed active monitoring and investigation of network and host-based intrusion alerts from SOLARWINDS Management console as a part of the Global Security Operations Center team as a defense in depth policy.
  • Performed Malware detection to identify any suspicious activities by implementing Trend Micro end point security.
  • Worked closely with Security operations, network and system administrators, and other appropriate Information Security groups to mitigate the risk and impact of the critical incidents reported in the production.
  • Developed effective procedures and also modifies the existing procedures for handling each new security event detected.
  • Demonstrated effective incident handling using knowledge base of documented common probing and attack methods, network/service discovery attack, viruses, malware and worms.
  • Developed a lab for training the team on the use of Metasploit using KaliLinux to perform penetration testing and also to improve knowledge of the team to demonstrate various new attack tactics, techniques and procedures.

Environment: Burp suite, zap proxy, Nessus, McAfee ESM, Vulnerability Assessment, Security Assessment, Kali Linux, and Penetration Testing.

Security Engineer ( IT Ops)

Confidential - Philadelphia, PA

Responsibilities:

  • Performed Root Cause Analysis for the incidents reported at Security Operations Center.
  • Performed Security event monitoring of heterogeneous networks such as Firewalls, IDS/IPS, Cisco ASA, DLP devices using Splunk.
  • Provided solution to many problems on a call with the best of my knowledge on the applications using event logs on the system/server and telemetry logs on the server, later started using Splunk for health monitoring, analysis, and reporting.
  • Wrote load balancing scripts on servers using PowerShell on Windows Server 2008 in order to perform Network load balancing and later started Network load balancing using Citrix NetScaler ADC.
  • Used Remedy Information Technology Service Management (ITSM) tool for managing the incidents based on the priorities and solved issues which are in the security domain.
  • Experience in performing authenticated and unauthenticated testing.
  • Generated Vulnerability reports to monitor the health of the applications and also reported High, Medium and low vulnerabilities in this system.
  • Troubleshoot network application inbound/outbound connectivity utilizing Cisco WSA proxies and Wireshark.
  • Actively involved on Bridges in solving High / Severe incidents reported in the application or in the environment. Reported all my findings on the incident status to the higher management, clients in timely fashion.
  • Held Responsibility for Securing and Maintaining 14 legacy applications, 10 geographically separated application servers and around 200 Citrix Servers along with a small team.

Environment: Firewalls, IDS/IPS, Cisco ASA, DLP, ITSM, WireShark, NetScaler, Splunk.

Confidential - San Jose, CA

Cloud Security Engineer (IT Ops)

Responsibilities:

  • Performed Root Cause Analysis for the incidents reported at Security Operations Center.
  • Performed Security event monitoring of heterogeneous networks such as Firewalls, IDS/IPS, CiscoASA, DLP devices using Splunk.
  • Solved many problems on call with my knowledge on the applications using event logs on the system / server and telemetry logs on the server, later started using Splunk for health monitoring, analysis and reporting.
  • Wrote load balancing scripts on servers using PowerShell on Windows Server 2008 in order to perform Network load balancing and later started Network load balancing using Citrix NetScaler ADC.
  • Used Remedy Information Technology Service Management (ITSM) tool for managing the incidents based on the priorities and solved issues which are in security domain.
  • Generated Vulnerability reports to monitor health of the applications and also reported High, Medium and low vulnerabilities in these system.
  • Troubleshoot network application inbound/outbound connectivity utilizing Cisco WSA proxies and Wireshark.
  • Actively involved on Bridges in solving High / Severe incidents reported in the application or in environment. Reported all my findings on the incident status to the higher management, clients in timely fashion.
  • Held Responsibility for Securing and Maintaining 14 legacy applications, 10 geographically separated application servers and around 200 Citrix Servers along with a small team.

Environment: Firewalls, IDS/IPS,Cisco ASA, DLP, ITSM, WireShark, NetScaler, Splunk.

Application Security Analyst

Confidential, Woodland Hills, CA

Responsibilities:

  • Provided project planning, guidance and technical expertise in program, policy, process, and planning; risk management, auditing, and assessments; A&A; and quality planning and control.
  • Researched and analyzed known hacker methodology, system exploits and vulnerabilities to support Red Team Assessment activities
  • Performed advanced security testing of F5 load balancers, Websense V10K & BlueCoat Proxies using virtual machines, security tools, and URL generator.
  • Assisted with the update and administration of all SOX audit requirements from an IT internal controls perspective.
  • Provided with Threat profiling of the application to the Client and prepared combined reports of level of risks, their trend, and frequency to the client
  • Conducted white/gray box penetration testing on the financial systems using Kali Linux, Cobalt Strike for OWASP top 10 Vulnerabilities like XSS, SQL Injection, CSRF, Privilege Escalation and all the test-case of a web application security testing

Environment: Load Balancers, OWASP,Kali Linux.

System Security Engineer II

Confidential, Simi Valley, CA

Responsibilities:

  • Developed penetration testing tactics, techniques, and procedures and performs penetration tests against various systems which include web applications, databases, web services, and networks.
  • Performed routine vulnerability scans against specified systems, analyzes the results and works with business units to remediate systems.
  • Executed Web Application Vulnerability Assessments for various Web Applications to check out for the various vulnerabilities in the existing application
  • Analyzed and Informed security vulnerabilities identified and recommendations proposed to fix the same: SQL Injection, Cross-site scripting, HTML Injection, Parameter manipulation, information disclosure, directory traversal, banner grabbing, default username/passwords etc.

Environment: Penetration Testing, Vulnerability Assessments, Security Assessment

Network Engineer

Confidential - Atlanta, GA

Responsibilities:

  • Designed and tested, administered F5 Load balancers for enclave
  • Troubleshoot layer 2 and 3 switches and routers.
  • Configured and implemented firewall devices such as Cisco ASA 5510 and Firewall IOS.
  • Monitored wide area network (WAN) and local area network (LAN) for circuit outages, network component failure, and user-reported network issues daily.
  • Configured cisco routing devices ranging from 2600's to 7200 series and Cisco Catalyst Switches.
  • Configured and troubleshoot Trunks, VLAN's, OSPF and other Cisco Protocols.
  • Interacted with clients and senior level Engineers to resolves IT issues.
  • Establishes networking environment by designing system configuration; directing system installation; defining, documenting, and enforcing system standards.
  • Maximizes network performance by monitoring performance; troubleshooting network problems and outages; scheduling upgrades; collaborating with network architects on network optimization.
  • Secured network system by establishing and enforcing policies; defining and monitoring access

Environment: Load Balancers, Switches,Routers,Cisco ASA, Firewall IOS, VLAN,OSPF.

Systems Engineer

Confidential

Responsibilities:

  • Install and configure computer and network hardware and software packages to users' workstations or laptops.
  • Provide network troubleshooting and support utilizing a variety of hardware and software testing tools and techniques.
  • Provide technical support and training to end-users at a Tier 1-2 level and record all incident information in detailed format via ticketing system; may provide guidance to less-experienced technicians.
  • Provide application support for Outlook and the MS Office Suite and assist with disaster recovery tasks including periodic validation of disaster.
  • Provide hardware support for network attached devices to include: routers, switches, servers, desktops, laptops, printers, scanners, wireless devices, and tablets.
  • Provide remote support to users by utilizing extensive enterprise tools. Support Windows 2000, XP, Win 7, Win 8, and OS X Systems.
  • Monitor and troubleshoot LAN&WIFI connectivity, switches, and firewalls.
  • Set up Outlook/Exchange accounts; Set up new users and delete old users from the network, granting permissions in Active Directory.

Environment: MS Office, Windows 2000, Troubleshooting, Active Directory, LAN.

We'd love your feedback!