Post Job Free

Resume

Sign in

Security Officer Devops Engineer

Location:
Hyattsville, MD
Posted:
February 09, 2024

Contact this candidate

Resume:

EDMOND ASSI

INFORMATION SYSTEMS SECURITY OFFICER (ISSO)

Lanham, Maryland ad3h4b@r.postjobfree.com 240-***-**** LinkedIn SUMMARY:

• Cybersecurity Professional with 5+ years of experience as an Information System Security Officer (ISSO), and 2 years of experience as a Cloud Security/DevOps Engineer, including Cyber Defense Frameworks, Cyber Threat Intelligence, Network Security and Traffic Analysis, Endpoint Security Monitoring, Security Information and Event Management, Digital Forensics and Incident Response with Phishing.

• Hands-on experience in implementing AWS Security Best Practices, focusing on IAM security, VPC, Data Security, Security of servers, Application security, Monitoring, logging, and auditing, and AWS CAF. Proven track record of successful execution of cybersecurity initiatives to mitigate risks and protect valuable assets.

• Certified Information Systems Security Manager (CISM), AWS Certified DevOps Engineer Professional, and CompTIA Security+

• Proficient in deploying and managing Imperva security solutions, emphasizing data and application security.

• Applied comprehensive understanding of NIST Cybersecurity Framework, ISO 27001, and CIS Controls to establish and enhance cybersecurity policies and procedures.

• Enhance data security through encryption mechanisms (KMS, S3, EBS), AWS Secrets Manager, and AWS Certificate Manager

• Safeguard applications using AWS WAF, AWS Shield, and secure coding practices.\

• Implement robust monitoring, logging, and auditing using CloudWatch, AWS Config, and AWS CloudTrail.

• Adhere to the AWS Well-Architected Framework, with a focus on the Security Pillar, ensuring a secure and scalable cloud infrastructure.

• Harness Threat Intelligence Platforms, conducts Threat Hunting and utilizes OSINT to proactively identify and counteract potential threats.

• Implements and manages network security measures, including Firewalls, and IDS/IPS, and conducts in-depth traffic analysis using tools such as Wireshark and TCP/IP.

• Utilize Java and Bash Shell Scripting skills to develop and implement security measures, contributing to the robustness of security controls.

• Perform vulnerability scanning, and risk assessment analysis using NIST 800-53 and prepare responses to Plan of Action and Milestones (POA&Ms)

• Manages security on Linux (Ubuntu, Unix) and MacOS systems, ensuring a secure operating environment EDUCATION:

Bachelor of Science – BS, Computer Science

University of Buea

CERTIFICATIONS:

Certified Information Systems Security Manager (CISM)

AWS Certified DevOps Engineer Professional

CompTIA Security+

SKILLS:

Cyber Defense Frameworks: NIST Cybersecurity Framework, ISO 27001, CIS Controls Programming Languages: Java, Bash Shell Scripting

Cyber Threat Intelligence: Threat Intelligence Platforms, Threat Hunting, OSINT Network Security and Traffic Analysis: Firewalls, IDS/IPS, Wireshark, TCP/IP Endpoint Security Monitoring: Endpoint Protection Platforms, EDR Solutions SIEM: Splunk, QRadar, ArcSight

Digital Forensics and Incident Response: Volatility, Encase, Autopsy, Incident Handling Phishing: Phishing Simulations, Email Security, User Awareness Training Operating Systems Linux (Ubuntu, Unix), MacOS

AWS SECURITY KNOWLEDGE:

IAM SECURITY: AWS Identity, Access Management (IAM), Role-Based Access Control (RBAC) VPC: Virtual Private Cloud, Network Acls, Security Groups, VPC Flow Logs Data Security: Encryption (KMS, S3, EBS), AWS Secrets Manager, AWS Certificate Manager Security Of Servers: EC2 Instances, AWS Systems Manager, AWS Inspector Application Security: AWS WAF, AWS Shield, Secure Coding Practices Monitoring, Logging, And Auditing: CloudWatch, AWS Config, AWS CloudTrail AWS CAF: AWS Well-Architected Framework, Security Pillar EXPERIENCE:

Information Systems Security Officer,full-time,40hrs/week McKinsey & Company, Summit, NJ Aug 2020 - Present

• Successfully implemented NIST Cybersecurity Frameworks across the organization, improving overall security posture by 30%.

• Led the development and deployment of a threat intelligence platform, enabling proactive identification and mitigation of emerging threats.

• Implemented a comprehensive SIEM solution (Splunk), reducing incident response time by 40% and improving threat detection capabilities.

• Conducted digital forensics and incident response investigations, leading to the successful identification and prosecution of a malicious insider.

• Used NIST 800-37 Risk Management Framework (RMF) as a guide to implementing security Assessment and Authorization and continuous Monitoring

• Analyzed the threats to information security and systems including security findings and data. Published reports and kept metrics for client systems

• Ensured that the Information Systems Security department’s policies, procedures, and practices as well as other systems, and user groups comply with FISMA, NIST, and general agency standards

• Conduct threat-hunting activities and utilize Open-Source Intelligence (OSINT) to enhance threat awareness

• Configure and maintain Firewalls, IDS/IPS to monitor and protect the organization's network

• Utilize tools like Wireshark, IDS/IPS, and SIEM solutions for real-time threat detection

• Orchestrate the configuration and management of SIEM solutions such as Splunk, QRadar, and ArcSight for unparalleled log analysis and correlation capabilities.

• Perform vulnerability scanning, risk assessment analysis using NIST 800-53 and prepare responses to Plan of Action and Milestones

(POA&Ms)

• Interpreted, advised, and implemented cyber security and compliance policies with cybersecurity frameworks including NIST, National Cyber Strategy, and DoD doctrine (DODD, DODI, DODM) for enhanced risk mitigation. Information Systems Security Officer, full-time, 40hrs/week Dell Technologies, McLean, VA Feb 2018 - Jul 2020

• Designed and implemented a secure AWS VPC architecture, reducing the risk of unauthorized access and enhancing network security.

• Implemented IAM best practices, including least privilege and multi-factor authentication, resulting in a 50% reduction in security incidents related to compromised credentials.

• Implemented data encryption at rest and in transit using AWS KMS and SSL/TLS, ensuring the confidentiality and integrity of sensitive data.

• Conducted regular vulnerability assessments and penetration testing, identifying and remediating critical vulnerabilities in server configurations.

• Used NIST 800-18 to develop System security plan, Risk Assessment, and Incident Response Plans

• Worked with Security Operation Center Analysts to ensure intrusion detection and prevention systems (IDS/IPS) such as SNORT are used to analyze and detect Worms, viruses other Vulnerability exploit attempts

• Utilize tools like Volatility, Encase, and Autopsy for incident handling and digital forensics.

• Investigate and respond to security incidents, ensuring proper documentation and analysis.

• Take charge of implementing and managing Endpoint Protection Platforms and Endpoint Detection and Response (EDR) solutions.

• Maintain operational security posture for system(s) through customized Risk Management Framework (RMF) to ensure established security processes and procedures are followed

Cloud Security/DevOps Engineer full-time,40hrs/week Adient, Holland, MI Feb 2016 – Jan 2018

• Implemented application security best practices, including secure coding guidelines and regular security code reviews, resulting in a 30% reduction in application vulnerabilities.

• Developed and implemented a centralized logging and monitoring solution using AWS CloudWatch, enhancing visibility into security events and enabling timely response to incidents.

• Led the migration of on-premises infrastructure to AWS, ensuring a secure and compliant cloud environment.

• Conducted security awareness training programs and simulated phishing exercises, reducing successful phishing attacks by 70%.

• Analyze and resolve conflicts related to the merging of source code for Git.

• Decreased manual configuration efforts by 40% by developing infrastructure as code (IaC) using Terraform and Ansible.

• Monitored and managed cloud resources on AWS to optimize performance and cost through auto-scaling, load balancing, and resource allocation.

• Managed and maintained containerized applications using Docker and orchestrated them with Kubernetes for efficient resource utilization and scalability.



Contact this candidate