Summary
Overview
Work History
Education
Skills
Certifications
Work Availability
Timeline
Generic

ALAN TANGAH

Greenbelt,MD

Summary

Dedicated and driven security professional with a passion for information security. Known for strengths in building productive customer relationships to understand requirements and deliver long-term solutions. Knowledgeable with Ten plus years of experience designing and implementing critical security solutions in high-availability environments. Skilled in endpoint security, network security, Infrastructure security, cloud security, and identity and access management management.

Overview

12
12
years of professional experience

Work History

Senior Cybersecurity Engineer

TMNAS
Bala Cynwyd, PA
03.2017 - Current
  • Developed and executed a vulnerability management program
  • Identify gaps in security controls, researched and implemented security controls to remediate them within budget.
  • Design, Implemented and audited security controls including endpoint security (Microsoft defender), web filtering/proxy (Forcepoint web cloud), data loss prevention( Forcepoint DLP), endpoint detection and response( Carbon black EDR), Intrusion prevention/detection system (Cisco Firepower), vulnerabilities scanners (Rapid 7 nexpose), and Microsoft endpoint manager(Intune).
  • Created security policies, standards, standard operational procedures(SOP) and quick reference guides(QRG)
  • Reviewed applications designs, network/architecture diagrams and make security recommendations for secure development and implementation.
  • Conducted record searches and coordinated with other units on procedural problems involving complex cases
  • Audit networks and infrastructure systems to identify vulnerabilities, document findings and track remediation efforts.
  • Implemented azure security controls base on center for internet security(CIS) standards.
  • Train security operations team members on newly implemented tools, programs and procedures. In addition, I also provide hands on training students on internship with the company.

Security Engineer

First Data
Hagerstown, MD
09.2013 - 03.2017
  • Lead the design, implementation and operation of privilege access management solution across 17000+ servers in a mixed environment comprising windows, RedHat, Centos, AIX, and Solaris
  • Manage the day to day operation of privileged access management controls and identity management solutions
  • Ensured all systems were in compliance with security controls
  • Created privileged access management policies, standards and quick reference guides
  • Trained both internal and external operations team members, and new team members
  • Completely eliminated local administrator's accounts from 10000+ systems with the exception of service accounts

UNIX/LINUX Systems Administrator

IX - Solutions
Largo, MD
03.2012 - 03.2013
  • Administered user accounts and password
  • Manage File Systems on Solaris 9, 10 and 11 and Red hat Linux 6
  • Configure and implement hardware RAID storage
  • Utilize kick start and ignite for systems builds and recovery
  • Jumpstart Solaris servers, custom configure, install packages, patches, and harden
  • Creating LDOMs, installing Solaris, creating volumes, and installing packages
  • Install and implement new patches to the Solaris/Linux operating system software
  • Maintain system accounting files, application logs and error log files
  • Installing and configuring Apache and WebLogic and supporting them on Linux/UNIX production servers
  • Experience with Solaris Zones, Role Based Access Control and Systems Security Administration
  • Responsible for performance monitoring and tuning using top, iostat, vmstat, sar for performance
  • Setup and configure network TCP/IP on UNIX including RPC connectivity for NFS
  • Create mount points for Server directories, and mounted these directories on UNIX Servers
  • Experience in using various network protocols like HTTP, UDP, POP, FTP, TCP/IP, and SMTP
  • Helped to establish standards, policies and procedures for all aspects of UNIX server environment (e.g., configuration, administration, documentation, etc.)
  • Created and assigned file attributes & permissions, defined network protocols and insuring TCP/IP and router connectivity

Education

Bachelor of Science - Cyber Security and Information Assurance

Western Governors University

Cloud security, Incident handling, Implementing and auditing critical security controls. -

The SANS Technology Institute
Bethesda, MD

Skills

  • Endpoint security
  • Cloud security
  • Network security
  • Email security
  • Identity and access management
  • Data loss prevention
  • Critical thinking
  • Troubleshooting
  • Problem solving
  • Documentation
  • Windows administration
  • Linux administration
  • Powershell
  • python
  • SIEM
  • Firewall
  • Intrusion prevention system (IPS)
  • Intrusion detection system (IDS)
  • Team Management
  • Critical Thinking
  • Supervision & Leadership
  • Customer Service
  • Training & Development
  • Microsoft 365
  • Microsoft endpoint configuration manager (Intune)
  • Microsoft defender for cloud, defender for endpoint, defender for identity, defender for cloud apps
  • Architecture review
  • Risk mitigation strategies
  • Security logging
  • Security regulations compliance
  • Security infrastructure architecture
  • Security vulnerability assessment

Certifications

CISSP
GIAC GCCC
GIAC GSEC
EC-Council ECIH (Certified Incident Handler)
EC-Council CES (Certified encryption specialist)
CompTIA A+
CompTIA Network+
CompTIA Security+
CompTIA Project+
CompTIA CIOS
CompTIA CSIS

ITIL V3
CIW Web Development Certification
CIW Web Security Certification

Work Availability

monday
tuesday
wednesday
thursday
friday
saturday
sunday
morning
afternoon
evening
swipe to browse

Timeline

Senior Cybersecurity Engineer

TMNAS
03.2017 - Current

Security Engineer

First Data
09.2013 - 03.2017

UNIX/LINUX Systems Administrator

IX - Solutions
03.2012 - 03.2013

Bachelor of Science - Cyber Security and Information Assurance

Western Governors University

Cloud security, Incident handling, Implementing and auditing critical security controls. -

The SANS Technology Institute
ALAN TANGAH