Summary
Overview
Work History
Education
Skills
Certification
Timeline
Generic

ABDOUL AHAD MBAYE

BUFORD,GA

Summary

Multi-faceted Technology Consultant, senior security analyst with experience developing strategic and business requirements for the creation and delivery of new technology applications in regard to security. Teamed in implementing and enforcing security policies and procedures in accordance with federal, state, and institutional standards. Experience in aligning new acquisitions in term of security standards and best practices. Managed successful projects over the years that contributed to the retention of a significant number of company customers. Also I developed a solid skill of customers facing over the years by client sites consulting that helped solidify business relationship and trust. From system engineering to programming, from ethical hacking to Vulnerability Management, PCI compliance to Web Application Security with my active security , public trust clearance and my language ability (fluency in French and in Spanish), I helped deliver numerous projects that helped organizations gain competitive advantage and be ahead the game

Overview

23
23
years of professional experience
1
1
Certificate

Work History

Senior Security Analyst – Security Architecture and Consulting

ACI WORLDWIDE
ATLANTA, GA
07.2015 - Current
  • Plan, research and design robust security architectures for most of IT projects
  • Work side by side with Security engineers in regard to project implementations
  • Oversee security awareness programs and educational efforts
  • Setting up encryption environment with Vormetric Data Security Manager, providing a high degree of security for data at rest on storage systems using techniques like VTE (Vormetric Transparent Encryption)
  • Years around security assessments on Company enterprise network regarding security architecture
  • Participate in the maintenance and enforcement of security policies; perform security awareness tasks, risks assessments, VLM, Web Application Security supporting the program in place
  • Perform risk assessments and executes tests to ensure functionality and effectiveness of security measures or techniques if existent or throw recommendations for improvements
  • Implement, maintain, and monitors vulnerability scanning program with part of the business; ensures scans run appropriately; works with system owners with the lead of the Business Continuity group as needed to prioritize and implement required corrective actions
  • Have tremendous experience with Qualys, Trustwave, Acunetix, Imperva, Rapid 7 Nexpose, Nessus Vulnerability Management and Web Application Scanning programs at an enterprise level
  • Creates and publishes security metrics, reports to teams, to executive leadership as needed
  • Work closely with internal audit in rectifying gaps by closing opened audit items against our department
  • Follow up on noncompliant items discovered during scans
  • Works with other internal teams and departments to ensure their systems are in compliance
  • Coordinate with other teams and internal departments on security responsibilities
  • Develop and maintain accurate documentation related to processes and procedures
  • Monitors security industry news, vulnerabilities and trends by collaborating with the team to address issues identified appropriately within our organization
  • Works with vendors regarding the evaluation of new technologies, develops functional testing plans, and makes recommendation on future technology purchases
  • Also Coordinates with other teams on evaluating new security technology
  • Works with application development team in requirements definition and help them mitigate vulnerabilities detected thru dynamic scanning using OWASP framework and best industry practices
  • I also introduced and implemented the OWASP Risk Rating Management with the web application security program
  • Provide metrics for measuring progress and risk mitigation maturity thru vulnerabilities severity and aging
  • Meet on monthly basis with different teams within application development to talk about approach of safe coding based on vulnerabilities or holes found within application they own
  • Participate in architecture and firewall review
  • Participate in ops DDoS tabletop exercises.

Production Engineer /Key encryption Manager

GEMALTO INC
ALTLANTA, GA
10.2014 - 07.2015
  • Manage Gemalto cryptographic key management processes, including those for the DNSSEC Root Key Signing Key (KSK), KEK (Key Encryption Key), ZMK (Zone Management Key) etc
  • Manage certificate authority hierarchy and certificate profiles, including Certificate Authority (CA) for Gemalto Clients in partnership with Master Card, VISA etc
  • Lead Risk Assessments for compliance with third party vendors
  • Write, review, edit, approve and maintain documentations and policies of these processes
  • Plan and execute KMS (Key Management System) ceremonies as needed, including logistical coordination
  • Manage and test disaster recovery plans for key management operations
  • Propose process improvements to maintain maximum security and maintain continuing operations
  • Manage the lifecycle of certificates and cryptographic keys
  • Minimize risks associated with managing cryptographic keys, including coordination of physical security
  • Prepare responses to third-party audits of Gemalto KMS functions
  • Prepare briefings and attend meetings to discuss Gemalto KMS execution of its key management responsibilities
  • HSM (hardware Security Module) management thru Affina
  • Financial Card Instant Issuance production Engineer, logical security, server installation and management of the platform in regard to EMV (Europe MasterCard Visa) Technology
  • Customer profile setup thru with SQL server utilizing Stored procedure and data modeling with input and output file
  • Customer facing and coordination for projects accomplishments
  • Perform vulnerability scans, penetration testing and remediation tracking of IT systems and technologies
  • Review of Security access rights, IT system logs, encryption standards to ensure the integrity of customer data transmissions and recommend corrective actions as needed
  • Assist in conducting technical security assessments for networks, systems, applications and databases according to Visa/MC/PCI standards
  • Prepare and/or remediate corrective action plans as directed by Gemalto management
  • Participate/cooperate with regional internal audit plans as directed by Gemalto management
  • Review Information Security policies, procedures, standards and guidelines based on knowledge of Gemalto's guidelines, best practices and compliance requirements
  • Evaluate new and proposed security systems and technologies
  • Reviews circumstances surrounding data security incidents and designs corrective actions
  • Remain current with technology and security advances within the technology arena.

IMAGE MANAGEMENT /PROGRAMMER ANALYST

CEGEDIM INC
DULUTH, GA
01.2007 - 10.2014
  • Manage a group of 8 build engineers on the production environment
  • Windows Scripting for PC automation
  • Macros engineering (using web batch, win batch, VB Script, PowerShell, Java) that facilitate the daily tasks for the production and quality assurance technicians in customizing laptops and desktops according to our customer needs
  • Server configuration and control the build check sheet application maintenance (application written in Visual Basic.net and ASP.net)
  • Projects coordination thru their full life cycle development for internal applications such Clarify using SQL server 2005-2008(stores procedures) and Oracle SQL, Windows batching, power shell scripting and Visual Basic.net
  • Participate in SQL server backups (full, differential) and recovery model (full, simple and bulk-logged)
  • SQL Scripting with store procedures creation
  • Participate in Installing, Configuring, and Patching and Upgrading SQL Server Software instances
  • Experience with WebSphere server doing basic administration, security related task, distribution list and messaging channels
  • Project lead when it is time for execution by coordinating groups of technicians by making sure they know how the deployment scripts work in doing the build
  • I also work with active directory and Microsoft exchange doing back end programming thru tasks automation
  • Work with server clustering and SAN implementation for our internal applications
  • DAC (Dynamic Access Control) with active directory administration (Windows Server 2008 and 2012)
  • Experience with web services technologies like XML, SOAP, and AJAX
  • Microsoft Project for project management
  • Active Directory Administration with Citrix and 2X Client
  • Some experience also in mobile application development with IOS using objective C and Android using Eclipse and Android Studio.

INFORMATION SYSTEM /SECURITY ANALYST

UNITED STATES NAVY
07.2004 - 07.2012
  • Monitored security threats and risks involving critical infrastructures
  • Utilized both proprietary and third party (Wireshark, backtrack, Nessus etc.) applications to review customer security incidents on a real-time basis
  • Assessed the impact of potentially malicious traffic on customer networks
  • Develop basic IDS / IPS rules to identify and/or prevent malicious activity using Snort or other open source product
  • Adhered to established internal procedures and guidelines
  • Articulated security issues to customers, both verbally and written
  • Responded to customer security questions
  • Understanding current vulnerabilities, attacks and countermeasures
  • Knowledge of identified operating system platforms; routers, network protocols, and security architecture
  • Programming with Snort lightweight intrusion detection for networks
  • Firewall configuration thru scripting with PowerShell and Win batch for a number of our clients to provide a layer of defense which monitors network traffic for predefined suspicious activity or patterns, and alert administrators when potential hostile traffic is detected
  • Experience with McAfee endpoint encryption and SGN encryption (Safeguard- with full disk encryption), Sophos Endpoint Security Control for Intrusion Detection Prevention
  • TCP dump report for packets analysis, identification of patterns or anomalies that can lead to intrusion based on a set of rules in regard to signatures databases
  • Many Short deployments to Norway working with NATO Joint Warfare Command (JWC Stavanger) as Information System Technician
  • Engineering of Windows deployment of ISAF (International Security Assistance Force) exercises for joint military forces for Afghan War
  • Virtual windows environment setup using thin Client hardware at Joint Warfare Command Stavanger
  • Active Directory management with account creation and access permission
  • Email accounts and profile creation using Microsoft Exchange Server
  • Deployed to Africa with the Naval Research office in the cadre of AFRICON for application software testing on UNIX environment (Received award from general 2 stars for leadership and Job well done)
  • Actively monitored security threats and risks involving critical infrastructures
  • Utilized both proprietary and third party (Wireshark, backtrack, Nessus etc.) applications to review customer security incidents on a real-time basis thru packets and log analysis
  • Assessed the impact of potentially malicious traffic on customer networks
  • Develop basic IDS / IPS rules to identify and/or prevent malicious activity using Snort, and Nessus etc… Adhered to established internal procedures and guidelines
  • Articulated security issues to customers, both verbally and written by preparing security reports to security manager
  • Understanding current vulnerabilities, attacks and countermeasures
  • Adhered to established internal procedures and guidelines
  • Knowledge of identified operating system platforms; routers, network protocols, and security architecture
  • Snort programming for intrusion detection with customization
  • Firewall configuration thru scripting with PowerShell and Win batch for several our clients to provide a layer of defense which monitors network traffic for predefined suspicious activity or patterns, and alert administrators when potential hostile traffic is detected
  • Experience with McAfee endpoint encryption and SGN encryption (Safeguard- with full disk encryption), Sophos Endpoint Security Control for Intrusion Detection Prevention
  • Experience with NBTScan, Wire shark, Nessus, Metasploit, back Track for penetration testing
  • Experience to uncover software vulnerabilities, demonstrate the impact of the weaknesses, and provide recommendations for mitigation using tools like Metasploit, Nmap, Wireshark, backtrack
  • Obtained unauthorized access and proceeded to the retrieval of sensitive information thru web application and network infrastructure thru white and black box testing.

SUPPORT ANALYST /MESSAGING ENGINEER

COCA-COLA
MARIETTA, GA
12.2009 - 12.2011
  • Messaging engineer on Microsoft Exchange Environment
  • Managed and troubleshooted user accounts issues for resolution
  • Served as liaison between Coca-Cola and Microsoft Support with incident related issues in order to avoid downtime for users
  • Support of Mobile devices for the entire Coca-Cola Enterprise
  • Supported also many UNIX and SAP based applications around the Coca-Cola production environment
  • Support and maintenance of Coca-Cola Web SSO with a range of applications on an enterprise scale
  • Mobile device configuration such IPAD, blackberry, IPhone
  • Microsoft Lync Application configuration
  • Support Cisco -Juniper VPN technology
  • Outlook mailbox allocation size.

COMPUTER /DATA RECOVERY SPECIALIST

DENDRITE INC
NORCROSS, GA
12.2001 - 12.2006
  • Lead technician, coached about 4 other technicians to improve their work ethic in the result of increasing productivity by being more efficient
  • Maintained the hardware of more than 10.000 users for Novartis, which is one of our major clients
  • As lead technician, parts of the duties were to fix and refurbish printers (HP, Epson, Dell, Brother and Xerox)
  • Repaired and refurbished Toshiba, Dell, NEC, Compaq, Hp, Sony, NEC and Lenovo laptop, tablet models
  • Advanced data recovery by making sure that the customers get the maximum data when their computers crash thru software capture
  • Supported the application build check sheet in the Hardware Services written in Visual Basic.net and ASP.net
  • Build check sheet is the software that contains windows application requirements for each of our client regarding build requirements.

Education

Bachelor of Science in Information Technology -

American InterContinental University
01.2002

Graduate certificate in Information Security and Assurance -

Southern Polytechnic State University

Master of Science in Information Technology, Concentration Information Security -

Southern Polytechnic State University

Skills

  • Security architecture and consulting
  • Security policies and procedures
  • Security awareness programs
  • Encryption environment setup
  • Security assessments
  • Risk assessments
  • Vulnerability scanning program implementation and maintenance
  • Qualys
  • Trustwave
  • Acunetix
  • Imperva
  • Rapid 7 Nexpose
  • Nessus Vulnerability Management and Web Application Scanning programs
  • Security metrics and reporting
  • Internal audit coordination
  • Noncompliant item follow-up
  • Security responsibilities coordination
  • Documentation management
  • Monitoring security industry news and trends
  • Vendor evaluation and technology testing
  • Application development requirements definition and vulnerability mitigation
  • OWASP Risk Rating Management implementation
  • Safe coding approach discussions
  • Architecture and firewall review participation
  • Ops DDoS tabletop exercises participation
  • Cryptographic key management
  • Certificate authority hierarchy and certificate profiles management
  • Risk assessments for compliance
  • Disaster recovery planning
  • Process improvement proposals
  • Certificate and cryptographic key lifecycle management
  • McAfee endpoint encryption and SGN encryption
  • TCP dump report analysis
  • Snort programming for intrusion detection
  • Firewall configuration
  • Metasploit
  • Nmap
  • Wireshark
  • Backtrack for penetration testing
  • Software vulnerability identification and mitigation
  • Microsoft Exchange messaging engineering
  • Mobile device support
  • UNIX and SAP application support
  • Web SSO support and maintenance
  • Microsoft Lync application configuration
  • Cisco-Juniper VPN technology support
  • Outlook mailbox management
  • Computer and data recovery
  • Hardware maintenance and repair
  • Printer repair and refurbishment
  • Data recovery through software capture
  • Microsoft Access and Oracle database administration and programming
  • TCP/IP technology and network enterprise implementation
  • Information security concepts and administration
  • Ethical hacking and penetration testing
  • Database security and auditing
  • Database administration and maintenance
  • Wireless network security
  • MS Office
  • HTML editors
  • MS Front Page
  • Excel
  • MS Project proficiency
  • Project management and strategic management applied to information technology

Certification

  • 2005, A+ Certified
  • 2015-2016, Qualys Certified Specialist
  • 2017, CCNT CISCO Certified
  • 2017, CCNA CISCO Switching and Routing
  • 2017, CCNA CISCO Security
  • 2023, CISM ( Certified Information Security Manager )

Timeline

Senior Security Analyst – Security Architecture and Consulting

ACI WORLDWIDE
07.2015 - Current

Production Engineer /Key encryption Manager

GEMALTO INC
10.2014 - 07.2015

SUPPORT ANALYST /MESSAGING ENGINEER

COCA-COLA
12.2009 - 12.2011

IMAGE MANAGEMENT /PROGRAMMER ANALYST

CEGEDIM INC
01.2007 - 10.2014

INFORMATION SYSTEM /SECURITY ANALYST

UNITED STATES NAVY
07.2004 - 07.2012

COMPUTER /DATA RECOVERY SPECIALIST

DENDRITE INC
12.2001 - 12.2006

Bachelor of Science in Information Technology -

American InterContinental University

Graduate certificate in Information Security and Assurance -

Southern Polytechnic State University

Master of Science in Information Technology, Concentration Information Security -

Southern Polytechnic State University
ABDOUL AHAD MBAYE