Post Job Free

Resume

Sign in

Senior Cyber Scurity Engineer

Location:
Irving, TX, 75039
Posted:
April 08, 2024

Contact this candidate

Resume:

ARTHUR J MUSGROVE

CYBER SECURITY ENGINEER/ ARCHITECT/ CONSULTANT.

Phone: 470-***-**** Email: ad22g0@r.postjobfree.com

Professional Summary.

A seasoned cybersecurity professional with 18+ years of experience spearheading critical initiatives in network defense, risk mitigation, and threat intelligence. Proven expertise in vulnerability assessment, penetration testing, incident response, and security awareness training. Possesses a deep understanding of cloud security, encryption methodologies, and common network protocols. Adept at leading and collaborating with diverse teams to build and maintain a robust security posture.

My skills and experience:

•Vulnerability Management: Conducted comprehensive security assessments and audits, identifying vulnerabilities, and recommending effective countermeasures. Utilized tools like Nessus, OpenVAS, and Retina CS for vulnerability scans and reporting.

•Penetration Testing: Performed ethical hacking engagements to simulate real-world attack scenarios, uncovering weaknesses and validating security controls. Skilled in foot printing, scanning, social engineering techniques, and tools like Nmap, Hping3, and Whois Lookup.

•Incident Response: Led incident response efforts, implementing the Incident Response Plan, documenting findings, and conducting post-incident analysis to improve future preparedness. Experience with SIEM tools like ArcSight, Splunk, and AlienVault.

•Threat Intelligence: Gathered and analyzed threat intelligence to stay ahead of emerging cybersecurity trends and adapt defenses accordingly. Possesses a strong understanding of malware analysis techniques (static and dynamic) and common attack vectors.

•Compliance & Risk Management: Ensured compliance with security frameworks like NIST RMF through proactive assessments and audits. Skilled in risk identification, mitigation, and control implementation.

•Security Awareness & Training: Developed and delivered engaging security awareness training programs to educate employees on cyber hygiene best practices and potential threats.

•Cyber Security Solutions: Well versed in fostering integration and collaboration among Zscaler, SentinelOne, and Tanium for a unified cybersecurity strategy.

•Skills: Proficient in network protocols and packet analysis, cloud security (AWS), encryption tools, and various security scanners and detection systems.

I am confident that my extensive experience, diverse skillset, and unwavering commitment to cybersecurity make me an asset to any organization seeking to strengthen its defenses against evolving threats.

Technical Skills

Foundations:

Operating Systems: Unix, Linux, Windows, macOS

Networking: Firewall: PfSense Firewall Manager for Cyber Security

Directory Services: Entra ID

Information Security:

Security Technologies: Symantec Endpoint Protection (SEP), Public Key Infrastructure (PKI)

Security Frameworks: NIST Risk Management Framework 800 Series

Compliance: Intrusion NIST Risk Management Framework

Security Processes and Methods:

Security Assessment: Vulnerability Assessment, Penetration Testing, Root Cause Analysis, Risk Assessment, Threat Assessment

Incident Management: Incident Response, Access Control, Identity Access Management (IAM), Security Policy, Security information and event management (SIEM)

Security Operations: SOC Analysis, Cyber Security Audit, Detection, Incident Response & Planning, SOAR (Security Operations, Automation and Response

Cyber Security Tools:

Network Analysis: WireShark, Network Miner

Vulnerability Assessment and Penetration Testing: Nessus, Nmap, Core Impact

Intrusion Detection & Prevention: SNORT, Alien Vault

Other Tools: Metasploit, Splunk

Programming & Scripting:

Programming Languages: Java, Python, C/C++

Scripting Languages: HTML/CSS, Python, JavaScript

Databases: SQL, MySQL, PostgreSQL

Scripting & Automation: Unix Shell Scripting

Development and Deployment:

IDE/Environments: VS-Code, Eclipse, PowerShell

Professional Experience

Verizon Communication Inc., Irving, Tx since July 2023 – Present

Lead Cyber Security Specialist

(Verizon is an American wireless network operator that previously operated as a separate division of Verizon Communications under the name Verizon Wireless.)

Responsibilities:

•Lead the design, implementation, and maintenance of security infrastructure to safeguard Verizon's networks, systems, and applications.

•Design, implement, automate, and document secure solutions leveraging AWS and other third-party technologies.

•Install, maintain, and optimize SIEM and security tools in diverse cloud environments.

•Provide subject matter expertise on new cloud platforms and emerging technologies to various business lines.

•Educate and communicate cloud security requirements, policies, and procedures to internal stakeholders.

•Drive secure migration of workloads, infrastructure, and business processes, identifying potential threats and exposures.

•Conduct thorough security architecture reviews and develop high-quality threat models for planned cloud migrations.

•Own functional architectures, design specifications, and implementation plans for cloud initiatives.

•Balance business needs with security concerns, offering practical and achievable risk-based recommendations to enhance cloud security.

•Guide penetration testing and vulnerability scans with internal and external teams.

•Offer strategic direction to development and operations teams to address security weaknesses and identify new solutions.

•Integrate threat intelligence feeds into Zscaler for proactive threat prevention.

•Ensure seamless collaboration between SentinelOne and Tanium for endpoint protection and management.

•Leverage insights from Tanium to inform security policies within Zscaler, creating a cohesive cybersecurity ecosystem.

•Represent security interests in the global enterprise cloud architecture development.

•Hold expert-level knowledge of I/P/SaaS platforms with 3+ years of experience in each deployment model.

•Possess direct experience with information security frameworks like ISO 27002, NIST, PCI, and COBIT.

•Design and develop secure architectures for cloud and hybrid cloud systems using AWS and Azure offerings with appropriate controls.

•Lead technical forums, sharing knowledge and mentoring others across security and technology teams.

•Continuously seek improvement opportunities for existing cloud security solutions.

•Provide thought leadership in Public Cloud Architecture and its large-scale enterprise implementation.

•Assist in developing the Enterprise Architecture for the Cloud program.

•Support Information Security and Cyber Security programs.

•Execute security architecture for external cloud technology.

•Serve as a trusted advisor to key business and technology partners across various departments.

Capgemini, Cambridge, MA Oct 2020 – Jun 2023

Cyber Security Architect

(Capgemini is a global consulting and technology services company).

Responsibilities:

•Design and develop comprehensive security architectures for the Capgemini’s IT infrastructure, ensuring alignment with business goals and compliance requirements.

•Design and implement secure cloud architectures, leveraging knowledge of cloud platforms such as AWS, Azure, or Google Cloud.

•Proactively assessed risks using NIST RMF, ensuring adherence to regulatory frameworks including HIPAA, FISMA, CFAA, CIPPA, COPPA, SOX, and GLBA.

•Incorporated risk management principles into the design and development of network security, perimeter protection, Wi-Fi, MDM, endpoint security, DLP, and business continuity plans.

•Categorized systems based on NIST SP 800-37, meticulously gathering information during kick-off meetings for accurate assessments.

•Developed and implemented effective security controls, leveraging the NIST 800 framework.

•Conducted thorough assessments of management, operational, privacy, and technical controls, providing comprehensive reports for stakeholders.

•Updated System Security Plans (SSPs) and generated Security Assessment Reports (SARs) to ensure compliance and ongoing security.

•Designed and implemented strategic IT security architectures to protect enterprise systems.

•Developed actionable Plan of Action & Milestones (POA&Ms) to address security gaps and guide remediation efforts.

•Hardened network infrastructure through firewall rules, port settings, and robust configuration of Cisco routers, switches, and Windows/Linux servers.

•Integrated OWASP Top 10 guidelines into web portal security plans for comprehensive protection.

•Actively participated in Business Continuity Plan (BCP) tests and reviewed Disaster Recovery (DR) plans to ensure organizational resilience in the face of disruptions.

•Collaborated with stakeholders to create matrices mapping project requirements to NIST security controls, ensuring compliance and robust security measures.

•Reviewed and updated System Security Plans (SSPs) based on NIST 800 series requirements.

•Refined IPS/IDS rules to enhance threat detection capabilities, proactively identifying and mitigating potential risks.

IGATE, Dallas, TX Feb 2018 – Sep 2020

Lead Cyber Security Consultant

(IGATE is an IT services company)

Responsibilities:

•Develop and implement security plans and strategies based on industry best practices and IGATE security policies.

•Define cloud network architecture using Azure virtual networks, VPN, and ExpressRoute to establish seamless connectivity between on-premises and cloud environments.

•Assist leadership in the continuous development of policies and procedures, ensuring consistent product delivery.

•Develop custom features in Visual Studio based on specifications and technical designs.

•Create PowerShell scripts and ARM templates to streamline the provisioning and deployment processes.

•Participate in internal and customer meetings, contributing to the ongoing evolution of technology offerings.

•Provide technical guidance on building solutions using Azure PaaS and other services.

•Troubleshoot and identify performance, connectivity, and other issues for applications hosted in the Azure platform.

•Leverage Azure services including API Management, Security, and Cloud-to-Cloud Integration (Public and Private).

•Utilize Windows Azure for website, web roles, and worker roles.

•Play a critical role in our core team defining and launching "Next Generation" services.

•Take responsibility for shaping the cloud vision, providing thought leadership in cloud infrastructure, and architecting cloud services to meet operational objectives.

•Educate customers on the value proposition of managed services on Azure, participating in architectural discussions for successful cloud deployment.

•Demonstrate advanced knowledge of databases (SQL Server and MySQL) and relevant web services, mail, backup, and application monitoring.

•Act as a liaison between customers, sales, service engineering teams, and support.

•Define cloud architecture, design, and implementation plans for hosting complex application workloads on MS Azure.

•Architect solutions using MS Azure PaaS services such as SQL Server, HDInsight, service bus, etc.

•Provide technical oversight and guidance during client engagement execution.

•Offer Cloud/Azure thought leadership through regular publications and speaking engagements.

•Provide Azure technical expertise, including strategic design and architectural mentorship, assessments, POCs, etc., supporting the overall sales lifecycle or consulting engagement process.

•Perform a discovery of the environment and design a technical onboarding process for Azure/O365 tenants.

•Integrate Salesforce, Workday, and other SaaS application REST APIs with Microsoft Cloud App Security to manage and enforce DLP policies over sensitive data.

•Leverage password less authentication to mitigate the risk of password attacks from privileged accounts and enable MFA on accounts not capable of password less authentication.

•Enable Azure Defender on subscriptions to protect Azure and hybrid resources, implementing Just-in-Time and adaptive application controls for VM management ports.

•Utilize Azure/O365 Security Center – Compliance Manager (Azure Benchmark, CIS, O365/Azure GDPR, NIST 800-53).

•Protect virtual machine data using Azure Disk Encryption (ADE) with BitLocker for Windows VMs and DM-Crypt for Linux VMs.

•Leverage Azure Sentinel to integrate various security tools for vulnerability scans, authentication, and threat protection.

•Configure Endpoint Protection ATP, EXO ATP policies, Email Security, and implement post-breach defense with ATA, DLP, Mail flow, Information governance, AIP, and SIEM.

•Manage Microsoft Endpoint Manager, including InTune, MDM, and MAM, covering device enrollment, configuration, security, Conditional Access policies, and device compliance.

•Ensure that security architectures align with industry standards, client requirements, and IGATE security framework.

Cymbal Corporation, Freemont, CA Jan 2015 – Jan 2018

Sr. Cyber Security Subject Matter Expert

(Cymbal Corporation is an information technology and services company)

Responsibilities:

•Collaborated with clients to ensure strict adherence of controls to the overall solution architecture.

•Developed cybersecurity leading practices to establish secure access to project systems and data.

•Engaged with key stakeholders, including project managers, architects, and other technical leads, to integrate cybersecurity requirements seamlessly throughout the project lifecycle.

•Worked directly with senior management to clarify mission scope, establish milestone schedules, and ensure clear focus on technical work deliverables.

•Provided recommendations to mitigate risks during both development and production cycles.

•Ensured meticulous compliance with IT structures, processes, guidelines, and technologies.

•Advised on analyzing security situations and environments, mapping out solutions, and integrating cybersecurity controls within the solutions.

•Planned, budgeted, oversaw, and comprehensively documented all aspects of ongoing projects.

•Optimized processes for the cybersecurity program, encompassing document control reviews, change management processes, auditing/assessment preparation for controls, staff communications coordination, threat artifact finding, coordinating with data owners on vulnerability remediation plan development, tracking remediations for vulnerabilities, and reporting and incident response escalation.

•Supervised the development of training content related to IT Cybersecurity issues.

•Identified threats, assessed risks, and recommended best practice solutions and cybersecurity controls to meet client requirements.

•Deployed and maintained cyber controls to ensure the project development team's adherence to established cybersecurity and development standards.

•Oversaw the troubleshooting of complex technical situations by providing solutions based on established cybersecurity standards.

•Monitored technical risks and provided mitigation plans aligned with established cybersecurity controls.

•Evaluated security measures to protect against threats or hazards to data.

•Engaged with external auditors and third parties to support security activities.

•Developed comprehensive project plans, estimations, specifications, flowcharts, and presentations.

•Performed in-depth analysis to validate security requirements and recommended additional security measures and safeguards.

•Assisted multiple departments in project planning and scheduled timetables for deliverables.

•Evaluated Quality of Service (QoS) for products and delivered an exceptional level of technical assistance that benefited the company.

•Identified resources needed to reach objectives and managed resources effectively and efficiently.

•Tracked project expenses meticulously to maintain alignment with projected budgets.

•Presented detailed project updates to stakeholders, conveying strategy, adjustments, and progress.

•Worked closely with contracts and Service Level Agreements (SLAs) within the supply chain.

•Communicated the gravity of threats and proposed remediation recommendations to upper management and other cybersecurity personnel through articulate written and spoken means.

•Calculated project performance metrics to pinpoint areas for improvement.

•Monitored and managed all installed systems and infrastructure.

•Established, configured, tested, maintained operating systems, application software, and system management tools.

•Conducted thorough scans and monitoring of network vulnerabilities on servers and network infrastructure devices using advanced vulnerability scanning solutions.

•Led scrum meetings, delivered impactful presentations to stakeholders, and provided training to staff on the latest security best practices.

IONA Technologies, Plc Sep 2011 – Dec 2014

Cyber Threat Detector/ Hunter

(IONA Technologies is an Irish software company that specializes in distributed service-oriented architecture (SOA) technology.)

Responsibilities:

•Identified vulnerabilities and suspicious activity through gap analysis, log data analysis, and traffic monitoring.

•Supported incident response and monitoring, contributing to 24/7/365 Level 2 support for security incidents.

•Improved incident response capabilities by simulating attacks and analyzing emerging cyber threats.

•Vetted and ingested Indicators of Compromise (IOCs) to enhance threat detection.

•Remediated identified threats and vulnerabilities using Splunk and implemented effective Plan of Action & Milestones (POA&Ms).

•Managed Artifacts and ensured proper control implementation.

•Evaluated systems against Risk Management Framework (RMF) standards.

•Implemented and maintained Splunk for Information System Continuous Monitoring (ISCM).

•Designed and implemented search rules on SIEM using Tanium and SCCM.

•Configured Palo Alto firewall and monitored security patch levels across servers, workstations, and networks.

•Utilized industry-standard tools like Splunk, Nessus, Alien Vault, Nmap, WireShark, Metasploit, and pfSense for testing, monitoring, and investigation.

•Deployed, configured, and maintained Splunk forwarders across platforms.

•Onboarded applications to Splunk, ensuring functional logging capabilities.

•Educated colleagues on security best practices.

•Performed network and security systems audits, including vulnerability assessments and Identity Access Management (IAM) reviews.

•Audited data location and permissions, verifying user access compliance.

Essilor International, Dallas, TX Dec 2008 – Aug 2011

Threat Hunter

(Essilor International S.A. is a French-based international ophthalmic optics company that designs, manufactures, and markets lenses to correct or protect eyesight.)

Responsibilities:

•Protected client environments and data through comprehensive vulnerability assessments and penetration tests.

•Ensured compliance with regulatory requirements, conducting thorough security assessments of management, operational, and technical controls.

•Executed security vulnerability assessments, configuration testing, and penetration testing using industry-leading tools (Cobalt Strike, Metasploit, Burp Suite) and best practices (PTES, NIST).

•Crafted clear and actionable SSL certificate management policies to enhance security practices.

•Composed detailed reports outlining discovered vulnerabilities and actionable remediation plans.

•Demonstrated strong communication skills, effectively authoring security alert notifications and advisories.

•Utilized WireShark to troubleshoot and investigate network issues, identifying potential security incidents.

•Advised incident responders on effective investigation and resolution of computer security incidents.

•Maintained compliance by tracking authorization termination dates, reviewing organizational policies, and providing expert advice on adequacy and accuracy.

•Developed robust security strategies through IT risk and vulnerability assessments, working closely with business stakeholders to mitigate risks.

•Proactively managed and updated Plans of Action and Milestones (POAMs), ensuring timely mitigation and remediation of vulnerabilities.

•Demonstrated proficiency in Splunk configuration, tuning rules for effective alerting and establishing security baselines to reduce noise.

Asus, Fremont, CA Oct 2005 – Nov 2008

SOC Analyst

(Asus is a multinational computer and phone hardware and electronics company.)

Responsibilities:

•Analyzed and documented contingency plans (CPs), privacy impact assessments (PIAs), and risk assessments (RAs) adhering to NIST 800 guidelines for various agencies.

•Updated the System Security Plan (SSP) incorporating NIST SP 800-18 best practices.

•Maintained and reviewed cybersecurity documentation ensuring regulatory compliance.

•Served as a key member of the A&A team, performing reviews, analyses, and reporting to ensure system authorization.

•Collaboratively determined security categorizations using FIPS 199 as a framework.

•Developed PIAs, PTAs, and updated SSPs, adhering to A&A requirements.

•Leveraged understanding of security policies, threats, risks, and vulnerabilities to optimize security posture.

•Implemented and executed security data management plans for efficient data collection, scheduling, and reporting.

•Monitored and audited information security controls for effectiveness and compliance.

•Mapped project requirements to NIST security controls for seamless integration.

•Analyzed security breaches to identify root causes and implement mitigation strategies.

•Recognized and assessed intrusion attempts and compromises through review of event data.

•Prioritized and remediated discovered infrastructure and software vulnerabilities based on risk analysis.

•Monitored and analyzed network traffic and logs using WireShark, Nmap, and pfSense to detect anomalies.

•Monitored SCCM and SIEM reports for trends and potential vulnerabilities.

•Performed penetration testing and vulnerability analysis to identify security weaknesses.

•Managed SA&A processes ensuring continuous monitoring aligned with NIST guidelines.

•Tracked evolving IT regulations and assessed their impact on security controls and strategies.

•Conducted IT testing using appropriate tools to ensure regulatory compliance.

•Maintained and monitored computer programs and systems, including installation coordination.

•Possess extensive experience developing and updating security plans (SSPs), contingency plans, disaster recovery plans, incident response plans, and configuration management strategies.

•Skilled in performing FedRAMP-based assessments using customer documentation and cloud provider controls.

•Specialized in the entire FISMA RMF process, performing system control assessments using NIST SP 800-60 and NIST SP 800-53A, and preparing/reporting SSPs, SAPs, PTAs, PIAs, E-Authentication ST&E, and POA&Ms.

•Developed and conducted security test & evaluations (ST&E) adhering to NIST SP 800-53A, including on-site evaluations and support.

MCI Inc., Ashburn Virginia Mar 2003 – Sep 2005

Technical Manager - IT

(MCI Inc., is a telecommunications Company)

Responsibilities:

•Led a team of 5 developers in designing, developing, and deploying critical network-facing systems for the Local Services Organization (LSO).

•Played a significant role in the actual development, leveraging C++ proficiency to build robust systems.

•Ensured seamless communication with various switch platforms - Ericsson AXE-10, Nortel DMS-100/200/500, and Lucent 5ESS.

•Led the development and deployment of LSDS, enabling near real-time inventory updates via AXE-10 and DMS surveillance.

•Contributed directly to efficient network activation, translation, and monitoring within the LSO.

•Developed a global network trouble management system for MFS’s data network.

•Utilized C and C++ programming languages on Sun Solaris platform.

•Integrated with Remedy ARS front-end for streamlined issue tracking and resolution.

•Enhanced network visibility and operational efficiency for MFS.

•Proven ability to lead and mentor development teams, driving successful project execution.

•Strong command of C++, combined with experience in network protocols and switch integration.

•Demonstrated capabilities in designing, building, and deploying critical network systems.

•Successfully transitioned to new teams and technologies, delivering impactful results in both MFS and MCI-WorldCom environments.

Education

Bachelor’s in computer science

Director's Business School, University of British Columbia, Vancouver, BC, Canada

Certifications

•CISSP

•Security+

•CCNA

•Price2

•Certified Scrum Master (CSM)



Contact this candidate