Post Job Free

Resume

Sign in

Security Information

Location:
Toronto, ON, Canada
Posted:
June 10, 2018

Contact this candidate

Resume:

Efte Nasher

416-***-**** ac5tpa@r.postjobfree.com

*MEng *CCNA Security *ITIL *Problem-solver *Analytical

11+ year’s hands on experience and extensive knowledge in LAN/WAN Network architectures, Planning and implementation of Information security as well as backup and disaster recovery plans.

MEng, CISSP, MCSE, CCNA Certified professional with progressive expertise on Network, Security and SDLC.

Advance knowledge and expertise on analyzing Alerts and event logs in VA, SIEM, DLP, IPS/IDS and antivirus tools of different vendors such as HP, Splunk, Symantec, IBM and Cisco.

Innovative and enthusiastic technical personnel to test, deploy and implement industry standard project management principles and methodologies on Agile and Waterfall environments.

Good understanding about,14 core chapters of ISO 27002, 8 domains of CISSP, CVSS, Cyber Kill Chain and Threat Intelligence.

Proven Analytical skills, able configure and implement different Firewall, Intrusion Detection, Anti-virus, Anti-spam and Intrusion Prevention systems and ability to solve critical problems in a complex environment to ensure KPI & Customer SLA.

Passionate expertise in Operation, Maintenance & Troubleshooting to ensure problems are prevented where possible and resolved according to Service level agreement.

Highly organized, enjoy working in a team and can easily establish rapport with team.

Networking and Security technologies: ISO27001/2, PCI DSS, 802.1x, Firewalls, WAF, IDS/IPS, ISA Proxy server, Encryption/ cryptography technologies (RSA, PKI), Authentication systems (Kerberos, TACACS+, RADIUS, AAA, multi-factor authentication), VPN (SSL, IPSec, Site to Site, DMVPN), DHCP, DNS server, SMTP Server, FTP server, Virtualization, Cloud, Azure.

Network/Security Tools: HP ArcSight, Splunk, Alienvault, Qualysguard, Nessus, Kenna, Wireshark/Ethereal, Metasploit, Kali Linux tools, NETQoS, PRTG, Nmap, CyberArk, Solarwinds.

Applications: Symantec Endpoint Protection, Symantec DLP, McAfee Vulnerability Manager, ePO, SCCM, SecureDoc Encryption, RSA SecurID, Cisco AnyConnect, MS Office 2013, Visio, Exchange 2013, Citrix, Skype for Business, Secure File Transfer, VMware workstation.

Hardware: Cisco ISE, Cisco StealthWatch, Cisco Nexus 1000V, Nexus 7K, 5K, Cisco Adaptive Security Appliance 5550, 5506, Cisco Secure IIDS/IPS, Firepower, Cisco UCS, Cisco ACS 5.7, Catalyst Switches 3850, 2940, Cisco Prime, PaloAlto 3050, Checkpoint 4200, FortiGate 60E.

Protocols: IS-IS, MPLS, BGP, OSPF, RIP, IPSec, PPPoE, GRE, HSRP, NAT, NTP, SNMP, SPAN, RSPAN, STP and RSTP.

Operating Systems: Windows Server 2012, 2008, Windows 10, 8, 7, Unix, Linux (RedHat, Debian).

Programming: Windows PowerShell, Python, HTML, XML, C, JAVA and basic Linux.

Security Analyst April’15 – present

KPMG

Reviewing and analyzing alerts and system notifications on Vulnerability management tools, SIEM, Data Loss Prevention, Antivirus, IPS/IDS and preparing security incidence response reports.

Working with Security Incident Response Team to find correlation of the Security Event logs from Windows Event, Syslog, Nagios, and Cisco Prime. Analyse the Common Vulnerability Score and documenting those correlation in Excel using different charts and pivot tables and comparing the results and sharing those documentation with different IT teams to find remediation of incidence.

Working closely with project management team to test and analyze risk on different IT projects. Overcoming obstacles to progress all phases of the project life cycle while incorporating SDLC practices that are suitable for each project.

Performing IP discovery scan for new/unknown devices, Compliance scan on Network Devices, Vulnerability Scan on Servers (DMZ) and Privileged Account Discovery. Preparing report on the scan results and assist Network, Server and Operations teams to mitigate security vulnerabilities.

Penetration testing with several testing tools and prepare reports on that test result and take action based on management decision. Query AD directory and servers to gather and analyze data using various scripting languages such as Python and PowerShell.

Managing and maintaining privileged accounts, passwords and control solutions with CyberArk. Maintaining user/computer accounts including rights, permissions and different Security Groups in AD.

Evaluating Security Threat and Risk Assessment on new projects and preparing reports based on the evaluation. Organizing end user security awareness training and testing based on Global Information Security Policy to enforce ISO controls.

Communicating with Network, Operations and Architecture & Implementation teams to ensure Enterprise level support are completed based on the business requirements such as change in Firewall/Proxy entries, Malware detection, Email/Spam filter, File server access and Telecom issue.

Maintain data security using various encryption and security applications and tools such as Bitlocker, SecureDoc or Safeboot encryption, RSA SecurID, Secure file transfer. Explaining and guiding users, through the process to keep information secure.

Technical Support Representative Aug’13 – Mar’15

DependableIT

Ensured Incidence resolution and documentation for IP network and security related technology platforms. Maintained efficient and timely completion of Tickets and adherence to Standard Operating Procedures to ensure quality.

Responded, evaluated and troubleshoot technical issues of users experiencing problems with networks, softwares and hardwares via remote tools (LogMeIn, GoToAssist), phones and emails.

Installed softwares, patching, upgrading, diagnosing and repairing different operating systems and hardwares using company proprietary tools and resources.

Coordinate with internal and external parties in executing Network and Security infrastructure projects.

Senior Technical Security Engineer Mar’06 – Apr’13

AMADEUS

Administered and managing multiple Vulnerability management tools, SIEM solutions including HP ArcSight and Alienvault. Preparing proper documentation on events from the SIEM and shared with IT team.

Supervised the operation of multi-user computer network. This involves, establish wired or wireless network for different travel agencies, understand their networking requirements and provide guidance in their planning.

Design and Configure LAN, WAN and WLAN network infrastructure for Small & corporate office for WiFi and Internet support. Capture data by using Wireshark and Analysis data/packets of Wireless routers and prepare MOP (Method of Operation) for each device with throughput for Troubleshooting.

Gathered, analyzed and evaluated existing system, worked with vendors to maintain and improve hardware performance based on business requirements. Planned pro-actively for needs of network expansion, record inventory and reporting faults and ensuring repairs.

Created and implemented recommendations to improve software scalability through migrations and solving complex technical problems. Responsible for network equipment selection, requisition, and network configuration standards for all devices.

Managed network and security projects, including cost analysis and resource estimation.

Master of Engineering in Computer Networks 2017

Ryerson University

Bachelor of Science in Computer Engineering 2006

American International University – Bangladesh

CISSP

CCNA Routing & Switching

CCNA Security

ITIL

MCSE



Contact this candidate