Post Job Free
Sign in

Information Security Analyst

Location:
Mankato, MN
Posted:
June 13, 2018

Contact this candidate

Resume:

Dewan M Zahid

214-***-**** *********@*****.*** https://zahidewan.github.io

**** ***** ***, *******, ** 56001

EDUCATION

Minnesota State University, Mankato, MN May 2018

Bachelor of Science, Computer Information Technology Minor: Technical Communication

TECHNICAL SKILLS

Security & Networking:

Network Security–IDS/IPS, Identity & Access Management, Data Security, Firewall, WAF, Proxies, DDoS, Cloud Security, Advanced Wireshark

Ethical Hacking & pen testing: Metasploit, Nessus, Burp Suite Pro, ZAP (OWASP Top 10), Incident Response–SIEM, Splunk, LogRhythm, Syslog; Scripting–Bash, AWK, Python, Batch, Sql

Forensic Imaging, Data leak prevention, Risk Management, Security Research, Office365 ATP, MS ATA Programming Languages: Java, Python, PL/SQL

Web Application & UI: Full-stack web development(JavaScript), Prototyping DBA, QA & Testing: PL/SQL, MSsql, Server 2016, System & Unit Testing, Test Automation & Data Analysis, System Analysis, Create & Execute End to End Test Plans Technical Tools & OS Platform: Microsoft Project, Usability Testing, Desktop Publishing, Technical Writings & Editing, LaTeX; Linux: Ubuntu, Debian, Kali, OpenSSH; MacOS, Windows 10 & Server 2016 PROFESSIONAL EXPERIENCES

Information & Technology Services, Minnesota State University, Mankato MN Aug 2016 – Present Information Security Lead Analyst Intern, Dec 2017 – Present

• Analyze security alerts/incidents and tickets for malicious traffic and events on the network

• Perform initial incident investigation/response at the request of CISO

• Manage a group of five security analysts to provide excellent service & assist CISO

• Evaluate web application firewall(WAF) configurations

• Utilize strong TCP/IP networking skills to isolate and diagnose network issues

• Perform risk assessments to help create optimal prevention and management plans

• Perform & Investigate Forensic Imaging

• Identify & evaluate potential threats and vulnerabilities

• Preform pen-testing in existing web applications and report to DevOps team

• Execute vulnerability scans of all Information Technology assets

• Ensure secure disposal and destruction of data

• Monitor and analyze firewall logs to ensure any risks are responded to immediately

• Make recommendations for mitigating identified risks Dewan M Zahid

Information Security Analyst Intern, Dec 2016 – Dec 2017

• Monitored firewall logs to ensure any risks are responded to immediately

• Modified existing bash scripts to automate daily tasks and respond to incidents immediately

• Assisted in improving security awareness on campus through active campaigns and interactive training.

• Performed hands-on HIPAA Risk Assessment with aid of supervisor to ensure new dental building at the university met HIPAA Compliance Standards.

• Worked with web development team to investigate security vulnerabilities

• Performed patching, EMS Heat Agent, Forensic Imaging, Web Application Pen-testing

• Executed routine automated vulnerability scans of all Information Technology assets.

• Communicated daily basis with system administrators to ensure student data integrity when completing a DMCA, SOC, Malware and Phishing tickets.

IT Solutions Service Desk Consultant, Aug 2016 – Dec 2016

• Resolved any technical issues over the phone, and/or in person for Faculty, Staff & Students

• Troubleshooting printers, network connectivity, operating systems

• Assisted in Lab deployment with required software and application configurations ACTIVITIES

• CCDC– Collegiate Cyber Defense Competition 2018 (BLUE TEAM) PROJECTS

• Microsoft Advanced Threat Analytics –ATA, Office365 –ATP, Windows Defender Advanced Threat Protection–WDATP

• Summer Patching Deployment–EMS Heat Agent (3000 machines)

• HIPAA compliance (Written Policy) for MSU Dental

• Network Automation–Using Python Scripts

• Network Design Proposal

• Scenery Generator–Vulnerable VMs generator (Dr. Z Cliffe)

• Lab Simulation –Worked on Kali Linux OS to infiltrate an actual system over the course of a full semester

• Security Strategies–Created and shared a presentation on security strategies to demonstrate knowledge of security threats in a business forum



Contact this candidate