Summary
Overview
Work History
Education
Skills
Certification
Workpreference
Timeline
Generic

Ray Amirvafaei

Port St Lucie, Plano ,FL,TX

Summary

IT professional with 10+ years of experience developing and implementing security solutions in fast-paced environments. Skilled in Identity Access, IT Security and IT Audit and Compliance with proven history of delivering exceptional risk management support.

Overview

18
18
years of professional experience
1
1
Certification

Work History

Senior Cybersecurity Analyst

TRUIST FINANCIAL CORP
01.2020 - Current
  • Responsible for Oracle identity access management, Sailpoint access, analyzing roles and sharing data with management and stakeholders, Microsoft Excel data mining, Access policy management, providing subject matter expertise on technical documentation, interpreting information security policy, audit compliance, and other cybersecurity analyst functions.
  • Conducted security audits to identify vulnerabilities.
  • Improved incident response times by developing and maintaining cybersecurity playbooks for common attack scenarios.
  • Performed regular reviews of user access rights, minimizing the risk posed by insider threats or compromised accounts.
  • Performed risk analyses to identify appropriate security countermeasures.

IT Security Analyst

FLORIDA BLUE CROSS
01.2020 - 01.2020
  • Responsible for system administration, overseeing access controls, managing system security, risk management, managing security requests, provisioning user security roles, analyzing existing role structures, escalation management, and other related assignments.
  • Simplified the process of rolling out security updates to end-users by creating an easy-to-follow update schedule and corresponding documentation.
  • Managed firewall configurations to maintain optimal levels of network protection while allowing for necessary business operations.
  • Conducted thorough risk assessments for proposed projects or changes in technology infrastructure, highlighting potential vulnerabilities before implementation could begin
  • Managed approximately 30 incoming calls, emails, faxes per day from customers
  • Conducted thorough risk assessments for proposed projects or changes in technology infrastructure, highlighting potential vulnerabilities before implementation could begin.
  • Established a robust patch management process that ensured timely updates to software and hardware components across the organization.
  • Performed regular audits of user access rights, ensuring only authorized personnel had access to sensitive information.
  • Implemented multi-factor authentication measures for all users, adding an extra layer of defense against unauthorized access attempts.
  • Collaborated with cross-functional teams to address complex security incidents, minimizing potential damage.
  • Reduced potential security risks by proactively monitoring systems for suspicious activity and taking appropriate action.
  • Created customized reports for stakeholders detailing key metrics related to IT security performance, fostering transparency and accountability within the organization.
  • Identified areas requiring improvement through detailed analysis of past incidents, preventing future occurrences through targeted remediation efforts.
  • Worked closely with legal and compliance departments to ensure adherence to relevant regulatory requirements pertaining to data privacy and information security practices.
  • Assisted with the successful migration of company data to a secure cloud-based storage system, enhancing overall data protection capabilities.
  • Developed and implemented IT security policies, ensuring compliance with industry standards and best practices.
  • Provided comprehensive training to employees on cybersecurity awareness, promoting a culture of vigilance.
  • Conducted security audits to identify vulnerabilities.
  • Spearheaded the development of an incident response plan, significantly reducing downtime in the event of a breach.
  • Evaluated new technologies to strengthen IT security infrastructure, maintaining cutting-edge protection against threats.
  • Streamlined communication channels between IT staff members during critical incidents by developing clear escalation paths based on severity level classification.
  • Improved overall IT security posture by regularly reviewing and updating protocols in alignment with industry best practices and emerging trends.
  • Performed risk analyses to identify appropriate security countermeasures.
  • Recommend improvements in security systems and procedures.
  • Developed plans to safeguard computer files against modification, destruction, or disclosure.
  • Encrypted data and erected firewalls to protect confidential information.

VA IAM BPMO Consultant

MBL Technologies
01.2019 - 01.2020
  • Supported the Department of Veterans Affairs (VA) Business program Management Office
  • Responsible for ensuring that information security awareness, compliance to security policies, and security risks occurred as planned for areas of duty.

IT Security Analyst

INOVA Health Systems
01.2017 - 01.2019
  • Responsible for managing day to day provisioning and de-provisioning of medical applications, managing daily and monthly metrics for IT Security Department, creating company policies and procedures governing corporate security, and incident response.
  • Conducted thorough risk assessments for proposed projects or changes in technology infrastructure, highlighting potential vulnerabilities before implementation could begin.
  • Performed regular audits of user access rights, ensuring only authorized personnel had access to sensitive information.
  • Evaluated new technologies to strengthen IT security infrastructure, maintaining cutting-edge protection against threats.

Identity Management Analyst

FANNIE MAE
01.2011 - 01.2016
  • Served as Team Lead, managing daily operations, and allocating personnel to needed areas to meet service-level agreements
  • Managed unique and non-unique IDs and their access to Active Directory, LDAP, Unix, Exchange, Sybase, and Oracle entitlements, Sailpoint, OIM, Training new employees.
  • Improved operational efficiency by streamlining processes and implementing best practices in management analysis.
  • Developed comprehensive reports, providing valuable insights into business performance and aiding in strategic planning efforts.
  • Collaborated with cross-functional teams to identify opportunities for process improvement and increased productivity.

Identity Access Analyst

MEDSTAR
01.2014 - 01.2014
  • Worked on implementation SSO projects for Vengeance Software), and worked on audits and reviews of identity management compliance.
  • BIometrics implementation for Medstar Georgetown hospital

Resident Engineer

MCS Nortel
01.2010 - 01.2011

VoIP Protocols and Standards
VoIP System Installation and Maintenance
VoIP Optimization and Troubleshooting
VoIP Security
Configuring, Testing, and Maintaining VoIP Systems
Providing Technical Support and Customer Service
Communicating Effectively
Taking Initiative
Working with teams

IT Security Specialist

Federal Home Mortgage Corporation (Freddie Mac)
01.2007 - 01.2010

Served as Team Lead, managing daily operations, and allocating personnel to needed areas to meet service-level agreements
Managed unique and non-unique IDs and their access to Active Directory, LDAP, Unix, Exchange, Sybase, and Oracle entitlements, Sailpoint, OIM, Training new employees.
Improved operational efficiency by streamlining processes and implementing best practices in management analysis.
Developed comprehensive reports, providing valuable insights into business performance and aiding in strategic planning efforts.
Collaborated with cross-functional teams to identify opportunities for process improvement and increased productivity.

Education

Bachelor of Arts -

JANUS UNIVERSITY/NEWPORT INTERNATIONAL UNIVERSITY
Los Angeles, CA
06.1993

Completed Cybersecurity Program -

UNIVERSITY OF WASHINGTON
Seattle, WA
12.2020

Skills

  • Windows 2000, Windows 8 and 10, Windows XP, Tivoli Access Manager/TAM, PeopleSoft Financials Application user provisioning, Access 2003, Excel 2003, PowerPoint 2003, Word 2003, Lotus Notes user provisioning
  • RSA/Secure user provisioning, OIM Oracle Identity Manager, familiar with UNIX commands, McAfee Virus Admin, Windows NT, Console One, Lexis Nexis, Biometrics setup configuration, VOIP, Sailpoint user provisioning, JP Morgan account auditing and user provisioning, and Bank of America account auditing and user provisioning
  • MS Office 2010 Suite
  • Bank Of America, JP Morgan App provisioning and analysis, EPIC Health System provisioning and DE provisioning, Cerner medical application configuration
  • OIM (Oracle Identity Manager), Sailpoint, Remedy Tracking System, Service Now Tracking System, LDAP, Active Directory, RSA Setup/Provisioning Support, EPIC Access Provisioning, Cerner Access Provisioning, and Lawson Access Setup, EPIC Security Provisioning, ADFS provisioning, Service Now, IOT devices, Cloud, Identity Now, ISO 17799, ITIL or NIST, Sarbanes-Oxley (SOX)
  • Active Directory, EPIC/EMR Systems, Staff Training, SSO
  • Information Technology
  • Threat Assessment
  • Escalation Management
  • Cybersecurity
  • Access Provisioning
  • User Support
  • Access Management
  • Change Management
  • Stakeholder Relations
  • Data Analysis
  • Risk Management
  • Report Preparation
  • Policy Management
  • System Security
  • Team Leadership
  • Sailpoint
  • Oracle Identity Manager
  • Okta
  • IAM Governance/Policies
  • PAM
  • Azure/AWS
  • Active Directory
  • EPIC/EMR Systems
  • Staff Training
  • SSO
  • MFA
  • Scripting powershell
  • Workday
  • Risk Controls
  • NIST Controls 850-30
  • Working knowledge of SAML
  • OpenID Connect, Oauth
  • Service Now
  • CyberArk
  • Collaboration skills
  • Jira ticketing
  • Sailpoint IIQ Experience
  • API
  • Create and manage Workgroups
  • Incident Response
  • Network Security
  • Phishing Detection
  • Vulnerability Assessment
  • Threat Intelligence
  • SIEM management
  • Incident Response Management
  • Identity Management
  • Log Analysis

Certification

  • CCNA Certification with Routers and Switches
  • Windows 2000 Certification
  • A+ Certification in Software and Hardware
  • INET+ Certification
  • MCDST Certification
  • HP Certification
  • Network+ Certification
  • Security+ Certification
  • CIPA Certification
  • Certified Red Flag Specialist
  • Microsoft Certified Professional
  • CISCO Certified

Workpreference

Open to Hybrid and Remote roles.

Timeline

Senior Cybersecurity Analyst

TRUIST FINANCIAL CORP
01.2020 - Current

IT Security Analyst

FLORIDA BLUE CROSS
01.2020 - 01.2020

VA IAM BPMO Consultant

MBL Technologies
01.2019 - 01.2020

IT Security Analyst

INOVA Health Systems
01.2017 - 01.2019

Identity Access Analyst

MEDSTAR
01.2014 - 01.2014

Identity Management Analyst

FANNIE MAE
01.2011 - 01.2016

Resident Engineer

MCS Nortel
01.2010 - 01.2011

IT Security Specialist

Federal Home Mortgage Corporation (Freddie Mac)
01.2007 - 01.2010

Bachelor of Arts -

JANUS UNIVERSITY/NEWPORT INTERNATIONAL UNIVERSITY

Completed Cybersecurity Program -

UNIVERSITY OF WASHINGTON
  • CCNA Certification with Routers and Switches
  • Windows 2000 Certification
  • A+ Certification in Software and Hardware
  • INET+ Certification
  • MCDST Certification
  • HP Certification
  • Network+ Certification
  • Security+ Certification
  • CIPA Certification
  • Certified Red Flag Specialist
  • Microsoft Certified Professional
  • CISCO Certified
Ray Amirvafaei