Summary
Overview
Work History
Education
Skills
Professional Experience Profile
Technical Skills Profile
Timeline
Generic

Khader Madani

Glendale Heights,Illinois

Summary

Four years of information security experience in application delivery and network security. Strong team player who can analyze systems for vulnerabilities and harden systems, maintain patches, and investigate threats.

Overview

14
14
years of professional experience

Work History

Vulnerability Management Analyst

UIS Consulting LLC (Client: Exelon)
2018.02 - Current
  • Managed vulnerabilities across applications, endpoints, databases, networking devices, and mobile, cloud and third-party assets
  • Conducted continuous discovery and vulnerability assessment of enterprise-wide assets
  • Documented, prioritized and formally reported asset and vulnerability state, along with remediation recommendations and validation
  • Communicated vulnerability results in a manner understood by technical and non-technical business units based on risk tolerance and threat to the business
  • Procured and maintained tools and scripts used in asset discovery and vulnerability status
  • Leveraged vulnerability database sources to understand each weakness, its probability and remediation options, including vendor-supplied fixes and workarounds
  • Supported internal and external auditors in their duties that focus on compliance and risk reduction
  • Collaborated with security groups such as red teams, threat intelligence and risk management to form a holistic team dedicated to thwarting attackers and reducing attack surface
  • Regularly researched and learned new TTPs in public and closed forums, and work with colleagues to assess risk and implement/validate controls as necessary
  • Maintained an active database comprising third-party assets, their vulnerability state, remediation recommendations, overall security posture and potential threat to the business
  • Arranged and provided support to business units launching new technology applications and services to verify that new products/offerings are not at risk of misconfiguration, compromise or information leakage
  • Attended and participated in change management policy discussions and meetings.

Support Analyst (Security Operations Center)

Capital One Financial Services (McLean VA)
2013.09 - 2018.01
  • Responsible for completing threat analysis using Security tools (Bluecoat, Qradar, FireEye, Symantec Endpoint Protection, LogRhythm)
  • Provided weekly status reports
  • Performed incident handling and documentation within the incident response lifecycle detection, triage, analysis, mitigation, reporting and documentation)
  • Inventory of Authorized and Unauthorized Software
  • Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers
  • Continuous Vulnerability Assessment and Remediation
  • Malware Defenses
  • Application Software Security.

SYSTEM ADMIN

VERIZON(HCL)
2010.04 - 2013.05
  • Installed, configured, maintained, and troubleshooted hardware and software
  • Provided IT security knowledge to system owners
  • Assisted users with desktop applications (Microsoft Office and SharePoint)
  • Created Users accounts in office 365
  • Created local accounts for users in the active directory
  • Reset user's passwords for both Microsoft and domain accounts
  • Troubleshoot storage, and applications
  • Troubleshoot and resolved hard and soft phone issues {Cisco}
  • Created SOP, s for various tasks completed and issues resolved
  • Diagnosed and resolved issues related to DNS, SSH, HTTP, DHCP and SNMP
  • Attended production meetings with senior system administrators and engineers
  • Prepared outage and weekly reports
  • Performed systems administration, maintenance/technical support for Local Areas Networks (LANs), Wide Area
  • Submitted, tracked, escalated, and closed IT trouble ticket (Salesforce)
  • Maintained accurate hardware and software inventories
  • Performed reviews of the current infrastructure on an ongoing basis
  • Troubleshot networking DNS, DHCP, Email, HTTP, SSL, OSI Model, and TCP/IP protocols
  • Administers and troubleshoots web-based tools and applications
  • Provides remote technical support to clients for network, server, desktop, and mobile device issues
  • Administers Office 365 and Active Directory
  • Created Users accounts in office 365.

Education

Bachelor’s Degree in Cyber Security -

DeVry University
12.2012

Skills

  • Applies current Information Assurance technologies to the architecture, design, development, evaluation and integration of systems and networks to maintain system security using SANS top 20 security guidelines.
  • Assist with the development of processes and procedures to improve incident response times, analysis of incident, and overall SOC.
  • Conduct analysis, cyber threats, the discovery of IT vulnerabilities, monitoring for cyber intrusions, troubleshoot and response to security incidents detected and other security applications.
  • Documented and reviewed System Security Plan (SSP), Security Assessment Report (SAR), Security Plan of Action and Milestones (POA&M), Authorization letter/memorandum (ATO).
  • Sound understanding and experience with NIST Risk Management Framework (RMF) process.
  • Worked with management to ensure security recommendations complied with company procedures and performed security impact analysis of proposed changes
  • Provided remediation recommendations for any new weaknesses on assigned systems
  • Performed risk assessment and ensured that proper protection or corrective measures are in place for vulnerabilities identified during assessment and audits process
  • Reviewed and updated system artifacts like Contingency Plan (CP), Continuity of Operations Plan (COOP) Disaster Recovery Plan (DRP), Business Continuity Plan (BCP) to ensure they remain current with respect to the resource requirements and recovery priorities based on conducted Business Impact Analysis (BIA)
  • Trained users on risks, social engineering, security controls and best practices to ensure security and safety of assets.
  • Working on Real time threat management using Splunk ES. Real Time Log analysis from different devices such as Firewalls, IDS, IPS, Proxy Servers, Windows Servers, System Application, Databases, Web Servers, and Networking Devices.

Professional Experience Profile

  • Vulnerability Management Analyst, UIS Consulting LLC (Client: Exelon), 02/2018, Present, Managed vulnerabilities across applications, endpoints, databases, networking devices, and mobile, cloud and third-party assets., Conducted continuous discovery and vulnerability assessment of enterprise-wide assets., Documented, prioritized and formally reported asset and vulnerability state, along with remediation recommendations and validation., Communicated vulnerability results in a manner understood by technical and non-technical business units based on risk tolerance and threat to the business., Procured and maintained tools and scripts used in asset discovery and vulnerability status., Leveraged vulnerability database sources to understand each weakness, its probability and remediation options, including vendor-supplied fixes and workarounds., Supported internal and external auditors in their duties that focus on compliance and risk reduction., Collaborated with security groups such as red teams, threat intelligence and risk management to form a holistic team dedicated to thwarting attackers and reducing attack surface., Regularly researched and learned new TTPs in public and closed forums, and work with colleagues to assess risk and implement/validate controls as necessary., Maintained an active database comprising third-party assets, their vulnerability state, remediation recommendations, overall security posture and potential threat to the business., Arranged and provided support to business units launching new technology applications and services to verify that new products/offerings are not at risk of misconfiguration, compromise or information leakage., Attended and participated in change management policy discussions and meetings.
  • Support Analyst (Security Operations Center), Capital One Financial Services, McLean, VA, 09/2013, 01/2018, Responsible for completing threat analysis using Security tools (Bluecoat, Qradar, FireEye, Symantec Endpoint Protection, LogRhythm), Provided weekly status reports., Performed incident handling and documentation within the incident response lifecycle detection, triage, analysis, mitigation, reporting and documentation)., Inventory of Authorized and Unauthorized Software., Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers., Continuous Vulnerability Assessment and Remediation., Malware Defenses., Application Software Security.
  • SYSTEM ADMIN, VERIZON(HCL), 04/2010, 05/2013, Installed, configured, maintained, and troubleshooted hardware and software., Provided IT security knowledge to system owners., Assisted users with desktop applications (Microsoft Office and SharePoint)., Created Users accounts in office 365, Created local accounts for users in the active directory, Reset user's passwords for both Microsoft and domain accounts, Troubleshoot storage, and applications, Troubleshoot and resolved hard and soft phone issues {Cisco}, Created SOP, s for various tasks completed and issues resolved, Diagnosed and resolved issues related to DNS, SSH, HTTP, DHCP and SNMP, Attended production meetings with senior system administrators and engineers, Prepared outage and weekly reports, Performed systems administration, maintenance/technical support for Local Areas Networks (LANs), Wide Area., Submitted, tracked, escalated, and closed IT trouble ticket (Salesforce)., Maintained accurate hardware and software inventories., Performed reviews of the current infrastructure on an ongoing basis., Troubleshot networking DNS, DHCP, Email, HTTP, SSL, OSI Model, and TCP/IP protocols., Administers and troubleshoots web-based tools and applications., Provides remote technical support to clients for network, server, desktop, and mobile device issues., Administers Office 365 and Active Directory., Created Users accounts in office 365

Technical Skills Profile

  • Risk Management (Followed NIST Risk Management Framework to ensure quality in Cyber Security Risk Management, SANS 20)
  • Network Security (Worked with NAC, Virtualization, Endpoint Security, DLP, Email Security, Mobile Security, Wireless Security and Firewalls to create and maintain and completely secure environment. OWAPS TOP 10)
  • Threat Assessment (Used various threat assessment tool such as Akamai and Fortinet to analyze and determine potential for harm, to prevent data breeches and external intrusions, OWAPS TOP 10)
  • Vulnerability Assessment (Performed compliance checks, sensitive data searches, IPs scans, website scans and general weaknesses. Nessus, AppScan, Onapsis Scan, SANS TOP 20)
  • Security Event Management (Leveraged various SIEM platforms to automate and analyze a daily throughput of terabytes (TBs) of ingested data to provide network enumeration, monitoring, and analysis on various Enterprise network environments to endpoints. (AWS CloudWatch, LogRhythm, QRADAR, Kibana and Splunk))
  • Analysis and Assessment (Threat assessment, event analysis, active analysis, log analysis, Vulnerability Assessment, Threat Intelligence)
  • Monitoring (Snort, Security Onion, pfSense, Sguil, Squert, Email and Endpoint Security, Proofpoint, FireEye HX, Cylance, McAfee, Forescout)
  • Proxies (Bluecoat Proxies)
  • Open Source Intelligence (virusTotal, Talos Intelligence, Any.run Sandbox)
  • Firewalls (Barracuda WAF, SourceFire, Palo Alto.)
  • Documentation (Plan of Action and Milestones (POA&M), Standards Development Organizations (SDOs))

Timeline

Vulnerability Management Analyst

UIS Consulting LLC (Client: Exelon)
2018.02 - Current

Support Analyst (Security Operations Center)

Capital One Financial Services (McLean VA)
2013.09 - 2018.01

SYSTEM ADMIN

VERIZON(HCL)
2010.04 - 2013.05

Bachelor’s Degree in Cyber Security -

DeVry University
Khader Madani