Four years of information security experience in application delivery and network security. Strong team player who can analyze systems for vulnerabilities and harden systems, maintain patches, and investigate threats.
Overview
14
14
years of professional experience
Work History
Vulnerability Management Analyst
UIS Consulting LLC (Client: Exelon)
02.2018 - Current
Managed vulnerabilities across applications, endpoints, databases, networking devices, and mobile, cloud and third-party assets
Conducted continuous discovery and vulnerability assessment of enterprise-wide assets
Documented, prioritized and formally reported asset and vulnerability state, along with remediation recommendations and validation
Communicated vulnerability results in a manner understood by technical and non-technical business units based on risk tolerance and threat to the business
Procured and maintained tools and scripts used in asset discovery and vulnerability status
Leveraged vulnerability database sources to understand each weakness, its probability and remediation options, including vendor-supplied fixes and workarounds
Supported internal and external auditors in their duties that focus on compliance and risk reduction
Collaborated with security groups such as red teams, threat intelligence and risk management to form a holistic team dedicated to thwarting attackers and reducing attack surface
Regularly researched and learned new TTPs in public and closed forums, and work with colleagues to assess risk and implement/validate controls as necessary
Maintained an active database comprising third-party assets, their vulnerability state, remediation recommendations, overall security posture and potential threat to the business
Arranged and provided support to business units launching new technology applications and services to verify that new products/offerings are not at risk of misconfiguration, compromise or information leakage
Attended and participated in change management policy discussions and meetings.
Support Analyst (Security Operations Center)
Capital One Financial Services (McLean VA)
09.2013 - 01.2018
Responsible for completing threat analysis using Security tools (Bluecoat, Qradar, FireEye, Symantec Endpoint Protection, LogRhythm)
Provided weekly status reports
Performed incident handling and documentation within the incident response lifecycle detection, triage, analysis, mitigation, reporting and documentation)
Inventory of Authorized and Unauthorized Software
Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers
Continuous Vulnerability Assessment and Remediation
Malware Defenses
Application Software Security.
SYSTEM ADMIN
VERIZON(HCL)
04.2010 - 05.2013
Installed, configured, maintained, and troubleshooted hardware and software
Provided IT security knowledge to system owners
Assisted users with desktop applications (Microsoft Office and SharePoint)
Created Users accounts in office 365
Created local accounts for users in the active directory
Reset user's passwords for both Microsoft and domain accounts
Troubleshoot storage, and applications
Troubleshoot and resolved hard and soft phone issues {Cisco}
Created SOP, s for various tasks completed and issues resolved
Diagnosed and resolved issues related to DNS, SSH, HTTP, DHCP and SNMP
Attended production meetings with senior system administrators and engineers
Prepared outage and weekly reports
Performed systems administration, maintenance/technical support for Local Areas Networks (LANs), Wide Area
Submitted, tracked, escalated, and closed IT trouble ticket (Salesforce)
Maintained accurate hardware and software inventories
Performed reviews of the current infrastructure on an ongoing basis
Troubleshot networking DNS, DHCP, Email, HTTP, SSL, OSI Model, and TCP/IP protocols
Administers and troubleshoots web-based tools and applications
Provides remote technical support to clients for network, server, desktop, and mobile device issues
Administers Office 365 and Active Directory
Created Users accounts in office 365.
Education
Bachelor’s Degree in Cyber Security -
DeVry University
12.2012
Skills
Applies current Information Assurance technologies to the architecture, design, development, evaluation and integration of systems and networks to maintain system security using SANS top 20 security guidelines
Assist with the development of processes and procedures to improve incident response times, analysis of incident, and overall SOC
Conduct analysis, cyber threats, the discovery of IT vulnerabilities, monitoring for cyber intrusions, troubleshoot and response to security incidents detected and other security applications
Documented and reviewed System Security Plan (SSP), Security Assessment Report (SAR), Security Plan of Action and Milestones (POA&M), Authorization letter/memorandum (ATO)
Sound understanding and experience with NIST Risk Management Framework (RMF) process
Worked with management to ensure security recommendations complied with company procedures and performed security impact analysis of proposed changes
Provided remediation recommendations for any new weaknesses on assigned systems
Performed risk assessment and ensured that proper protection or corrective measures are in place for vulnerabilities identified during assessment and audits process
Reviewed and updated system artifacts like Contingency Plan (CP), Continuity of Operations Plan (COOP) Disaster Recovery Plan (DRP), Business Continuity Plan (BCP) to ensure they remain current with respect to the resource requirements and recovery priorities based on conducted Business Impact Analysis (BIA)
Trained users on risks, social engineering, security controls and best practices to ensure security and safety of assets
Working on Real time threat management using Splunk ES Real Time Log analysis from different devices such as Firewalls, IDS, IPS, Proxy Servers, Windows Servers, System Application, Databases, Web Servers, and Networking Devices
Professional Experience Profile
Vulnerability Management Analyst, UIS Consulting LLC (Client: Exelon), 02/2018, Present, Managed vulnerabilities across applications, endpoints, databases, networking devices, and mobile, cloud and third-party assets., Conducted continuous discovery and vulnerability assessment of enterprise-wide assets., Documented, prioritized and formally reported asset and vulnerability state, along with remediation recommendations and validation., Communicated vulnerability results in a manner understood by technical and non-technical business units based on risk tolerance and threat to the business., Procured and maintained tools and scripts used in asset discovery and vulnerability status., Leveraged vulnerability database sources to understand each weakness, its probability and remediation options, including vendor-supplied fixes and workarounds., Supported internal and external auditors in their duties that focus on compliance and risk reduction., Collaborated with security groups such as red teams, threat intelligence and risk management to form a holistic team dedicated to thwarting attackers and reducing attack surface., Regularly researched and learned new TTPs in public and closed forums, and work with colleagues to assess risk and implement/validate controls as necessary., Maintained an active database comprising third-party assets, their vulnerability state, remediation recommendations, overall security posture and potential threat to the business., Arranged and provided support to business units launching new technology applications and services to verify that new products/offerings are not at risk of misconfiguration, compromise or information leakage., Attended and participated in change management policy discussions and meetings.
Support Analyst (Security Operations Center), Capital One Financial Services, McLean, VA, 09/2013, 01/2018, Responsible for completing threat analysis using Security tools (Bluecoat, Qradar, FireEye, Symantec Endpoint Protection, LogRhythm), Provided weekly status reports., Performed incident handling and documentation within the incident response lifecycle detection, triage, analysis, mitigation, reporting and documentation)., Inventory of Authorized and Unauthorized Software., Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers., Continuous Vulnerability Assessment and Remediation., Malware Defenses., Application Software Security.
SYSTEM ADMIN, VERIZON(HCL), 04/2010, 05/2013, Installed, configured, maintained, and troubleshooted hardware and software., Provided IT security knowledge to system owners., Assisted users with desktop applications (Microsoft Office and SharePoint)., Created Users accounts in office 365, Created local accounts for users in the active directory, Reset user's passwords for both Microsoft and domain accounts, Troubleshoot storage, and applications, Troubleshoot and resolved hard and soft phone issues {Cisco}, Created SOP, s for various tasks completed and issues resolved, Diagnosed and resolved issues related to DNS, SSH, HTTP, DHCP and SNMP, Attended production meetings with senior system administrators and engineers, Prepared outage and weekly reports, Performed systems administration, maintenance/technical support for Local Areas Networks (LANs), Wide Area., Submitted, tracked, escalated, and closed IT trouble ticket (Salesforce)., Maintained accurate hardware and software inventories., Performed reviews of the current infrastructure on an ongoing basis., Troubleshot networking DNS, DHCP, Email, HTTP, SSL, OSI Model, and TCP/IP protocols., Administers and troubleshoots web-based tools and applications., Provides remote technical support to clients for network, server, desktop, and mobile device issues., Administers Office 365 and Active Directory., Created Users accounts in office 365
Technical Skills Profile
Risk Management (Followed NIST Risk Management Framework to ensure quality in Cyber Security Risk Management, SANS 20)
Network Security (Worked with NAC, Virtualization, Endpoint Security, DLP, Email Security, Mobile Security, Wireless Security and Firewalls to create and maintain and completely secure environment. OWAPS TOP 10)
Threat Assessment (Used various threat assessment tool such as Akamai and Fortinet to analyze and determine potential for harm, to prevent data breeches and external intrusions, OWAPS TOP 10)
Vulnerability Assessment (Performed compliance checks, sensitive data searches, IPs scans, website scans and general weaknesses. Nessus, AppScan, Onapsis Scan, SANS TOP 20)
Security Event Management (Leveraged various SIEM platforms to automate and analyze a daily throughput of terabytes (TBs) of ingested data to provide network enumeration, monitoring, and analysis on various Enterprise network environments to endpoints. (AWS CloudWatch, LogRhythm, QRADAR, Kibana and Splunk))
Analysis and Assessment (Threat assessment, event analysis, active analysis, log analysis, Vulnerability Assessment, Threat Intelligence)
Technical project manager at KDM Engineering LLC (Contract w/ Exelon through West Monroe)Technical project manager at KDM Engineering LLC (Contract w/ Exelon through West Monroe)