Post Job Free

Resume

Sign in

Security Engineer

Location:
Collegeville, PA
Posted:
March 02, 2020

Contact this candidate

Resume:

Anvesh

Phone: 973-***-****

Email: adb3pr@r.postjobfree.com

Career Objective:

A dedicated, motivated and determined network security ACI engineer who have proved the capabilities in the area of expertise for 6 years. Looking forward to utilize my knowledge coupled with experience to convert organizational goals into reality to also ensure a steady growth for self.

Professional Summary:

Good Knowledge and understanding of Software Defined Networking (SDN) and Cisco ACI Technology.

Experience with Cisco ASA/Checkpoint/Palo Alto Firewall (PA200, PA2000 series, PA3000 series, PA4000 series, PA5000) troubleshooting and policy change requests for new IP segments that either come on line or that may have been altered during various planned network changes on the network.

Worked on Authentication and termination of IPSec or SSL VPNs using RADIUS, TACACS, and/or IPSec

Experience in Configuration and maintenance of SIM/SIEMS tool - QRadar, and Arcsight

Hands on experience on Utilizing network analysis tools such as TcpDump, WireShark.

Experience in Configuration, maintainence and design network security solutions including firewalls (CheckPoint and Cisco ASA), IDS/IPS (CheckPoint and SourceFire), VPN, ACLs, Web Proxy.

Good knowledge on Internet working, OSI model, TCP/IP, DHCP, network architecture, system security and firewall infrastructure.

Experience in Performing network analysis to detect intrusions, malware and other security threats using Intrusion detection tools and make appropriate changes usingMcAfee EPO, ESM and NSM.

Have a Experience in Managing LAN & WAN and BlueCoat proxy servers.

Experience in Managing the entire Network Security Products deployed in the network such as CheckPoint (GAIA R75.40/77.20), Cisco ASA (5510/5520/5550)

Experience in Stage Firewall policies and migrate them from one platform to another including Cisco ASA and router (7200/3800 and ASR 1000 series) access-list to Check Point.

Worked on various advanced blades on the checkpoint including IPS, ANTI-VIRUS, ANTI-BOT and Threat Emulation (Sand box environment) and tweak false positives.

Experience working with high availability and implemented it on F5 load balancer

Have a experience in the Rapid7 NeXpose Insight VM vulnerability Management tool.

Experience in working with Nexus 7010, 5020, 2148, 2248 switches and Configuration of VLAN Trunking 802.1Q, STP (802.1d), Port Security on Catalyst 6500 switches.

Experience in monitoring changes and analyze configurations, optimize firewall rules across the network using Tufin.

Experience in Configuration VLANs, RPVST+, Inter-VLAN routing, HSRP and LAN security for Layer-2 and Layer-3 switching domains as per the organization's requirement plan. IP Allocation for all applications and servers with high availability throughout the company.

Professional Experience:

Network SecurityEngineer Pfizer, Collegeville, PA Sep 2017 – Jan 2020

Responsibilities:

Troubleshoot various issues in the firewalls including related to syslog servers, RADIUS, LDAP, user-IDs, High-Availability issues, Dynamic Updates like Anti-virus, Application and threat Content, License.

Migration with both Checkpoint R77 and Cisco ASA to Palo Alto 7.0 using the Palo Alto Migration tool 3.0.

Experience securing and managing remote access using various VPN technologies like IPSec, SSL, and GRE.

Configuring and Administration of Intrusion Prevention System (IPS) developing, maintaining and documentation, IPS backup and Intrusion Detection System (IDS) Fortinet & Checkpoint UTM.

Install, configure, manage, and troubleshoot Firepower, Cisco Sourcefire IPS & FireEye appliances.

Worked on Blue Coat by adding websites to blocked list on the bluecoat proxies based upon business requirements.

Worked on PCI and SOX security baseline support and as Information Security Professional.

Worked on integrate feeds and features like Net Flow Feeds Traffic Analyzer PRTG from NGFW (Palo Alto and Checkpoint).

Monitor and investigate SOC incidents and alerts with SourceFire and McAfee EPO.

Analyzed network traffic with ArcSight tools on network traffic, firewall (Source Fire defense center) and AV (McAfee) logs.

Experience in Security Information and Event Management Tools like IBM QRadar, and RSA Archer.

Configuration and maintenance of SIM/SIEMS tool - QRadar, and Arcsight.

Utilize network analysis tools such as TcpDump, WireShark, QRadar, and ArcSight SIEM .

Knowledge of Intrusion Detection, DMZ, encryption, IPsec, proxy services, Site to Site VPN tunnels, MPLS/VPN, SSL/VPN.

Practical knowledge about TCP/IP, DHCP, DNS, SMTP, POP3, RIPV1, RIPV2, OSPF, IGRP. EIGRP, BGP Routing Protocol Static, default and dynamic.

Real time analysis using ArcSIght SIEM with Arcsight Express, ESM, Logger, Connector and ArcMC.

Cleaning up log sources auto-discovered in Qradar by identifying duplicates, correcting mis-identified log sources, and identifying log sources from their logs.

Understanding to develop the complex Use Cases, Universal device support Modules on the QRadar SIEM.

Experience configuring and deploying McAfee modules and products like McAfee ePO, McAfee VSE, McAfee HIPS, McAfee Endpoint Encryption, McAfee Network DLP, McAfee DLP Endpoint, McAfee SIEM.

Analysis of various use cases in the Qradar console like Malware, ADrelated issues.

Experience with Symantec DLP web security gateway to provide security for outbound web content.

Experience working with Watchguard, Symantec End Point Protection, Sophos, Symantec Backup, Barracuda Spam Filter, Message Archiver and Web Filter.

Experience in creating virtual servers, nodes, pools and rules on BIG-IP F5 in LTM module.

Worked on F5 LTMs pools, SNATS, health monitors and virtual servers.

Experience working with high availability and implemented it on F5 load balancer.

Involved in both Sever System analyze and Security support on CyberArk as well as Support on Security on Windows servers.

Manage the day to day operations of CyberArk solutions including adding and deleting accts. Coordinate with CyberArk support teams for escalation and resolution issues.

Troubleshooting and maintenance of the Password Vault, Central Password Manager (CPM), Privileged Session Manager (PSM), Application Identity Manager(AIM).

Monitor CyberArk reports and respond to failed password verification alerts and work with system account owners to resolve failure alerts.

Worked on Disaster Recovery Vault (DR) and CyberArk Enterprise vault.

On-boarding of Privilege Accounts to Cyber-Ark, Configured Cyberark to MySQL, Oracle databases.

Proficient in SQL programming - Stored Procedures, Functions, Packages, SQL tuning, and creation of Oracle Objects - Tables, Views, Triggers, Database Links, and User Defined Data Types.

Creating service - vendor accounts inside Active Directory. Adding all to CyberArk. Sending guidelines to the End Users.

Respond and escalate open tickets to track and document resolution on internal and external threats.

Remediated vulnerabilities by decommissioning assets and by performing normal Rapid7 Nexpose cleanup.

Managed multiple complex security implementations such as evaluating and adopting securityBaseline standards and a Rapid7 Nexpose to Service Now integration to automate the reporting of vulnerabilities.

Managed and configured Rapid7 NeXpose Insight VM vulnerability Management tool.

Extensive Packet level debugging and troubleshooting on Palo Alto Firewalls to resolve numerous network issues.

Implemented many number of security policy rules and NAT policy rules on Palo Alto, created Zones, implemented Palo Alto Firewall interface, Palo Alto IDS and VLAN.

Worked with Palo Alto firewalls PA250, PA4050, PA3020 using Panorama servers, performing changes to monitor/block/allow the traffic on the firewall.

Worked on Panorama firewall management tool which provides centralized monitoring and management of multiple Palo Alto devices from single window.

Environment:Cyberark, SQL programming, ArcSight SIEM, F5 LTYMs pools, Palo Alto Firewell,Rapid7 NeXpose,TCP/IP, DHCP, RSA Archer, IPSec, SSL, Wireshark, IPS, IDS.

Network Security Engineer P3 Communications INC, San Jose, CA Sep 2016 – Aug 2017

Responsibilities:

Complete renaming of all firewall objects and rules.

Good understanding of policies in CyberArk Central Policy Manager along with almost all of the SIEM tools.

Managing CyberArk Password Vault Web Access(PVWA).

Good knowledge in IAM and experience in installation of various Operating systems such as Solaris, Red Hat (LINUX) and Windows.

Efficiently Managed Active Directory implementations across multiple domains.

Experience in Privileged Access Management solutions particularly CyberArk, network security and administration.

Privileged Access Management of CyberArk, including working with components such as vaults, CPMs, accounts, policies, safes, usages, PACLI and providers.

Experience with setting up multi factor authentication like LDAP, RSA, RADIUS and has managed sessions in Privileged Session Management (PSM).

Performed network analysis to detect intrusions, malware and other security threats using Intrusion detection tools and make appropriate changes usingMcAfee EPO, ESM and NSM.

Analyze, review, research on data from SIEM - Qradar tool and send security alerts for suspicious activity to the concern teams.

Work with tools such as Solarwinds Orion, Cisco ACS, Cisco Prime, Palo Alto Panorama, Fortinet.

Review and optimize firewall rules using Secure Track Tufintool and firewall audit reports.

Daily responsibilities included design, implementation, support and administration of multiple security products running CheckPoint Provider-1 and VSX, Source Fire, and ISS Realsecure

Provide best practice security consulting for multiple compliance initiatives, with a focus on highly resilient solutions

Primary responsibility for the Core Security of the Network. Managing the entire Network Security Products deployed in the network such as CheckPoint (GAIA R75.40/77.20), Cisco ASA (5510/5520/5550)

Work on CheckPoint Platform including Provider Smart Domain Manager

Worked on configuring, managing and supporting CheckPoint Gateways.

Regularly performed firewall audits around CheckPoint Firewall-1 solutions for customers

Strong knowledge and understanding with IPsec, Remote Access VPN, and SourceFire intrusion prevention systems.

Troubleshoot and hands on experience on security related issues on Cisco ASA/PIX, CheckPoint and Palo Alto Firewalls.

Distributed and maintained endpoint security tools (virus protection, HIPS, NAC, encryption, FIM, IDS, web content inspection, log management)

Configured and managed QRadar to manage logging centrally.

Configuring the high availability of QRadar.

Installed and worked on administration of McAfee web gateways.

Manage LAN & WAN and BlueCoat proxy servers.

Environment:QRadar, Linux,BlueCoat proxy servers, cyberark, Cisco ASA/PIX, HIPS, NAC, ESM, NSM, Checkpoint Gateways, Checkpoint Firewalls, GAIA R75.40/77.20.

Network Security Engineer Apple, Cupertino, CA Feb 2015 – Aug 2016

Responsibilities:

Deploy new Check Point security gateways in the network and build high availability running Gaia R76 and R77 on Check Point 15k, 12k, 4k and 2k appliances.

Work with various Firewall Migration projects including in place upgrades and cross platform migrations from Cisco to Check Point and Cisco to Fortinet.

Experience working with implementing and configuring Checkpoint VSX for security gateways.

Configuration of checkpoint firewalls in MDS and VSX environment. Worked with creating firewall policies

In addition, managing licenses on those checkpoint devices.

Configured IPSec site-to-site VPNs to ensure security between B2B partners and remote access VPN like ANYCONNECT.

Work with various advanced blades on the checkpoint including IPS, ANTI-VIRUS, ANTI-BOT and Threat Emulation (Sand box environment) and tweak false positives.

Build and configure Smart Center Management High Availability with Active/Standby.

Work in a Checkpoint VSX environment with Virtual firewalls.

Configure High Availability Checkpoint ClusterXL on VSX as well as perform Upgrades.

Stage Firewall policies and migrate them from one platform to another including Cisco ASA and router (7200/3800 and ASR 1000 series) access-list to Check Point.

Troubleshooting connectivity issues on checkpoint using Smart View Tracker, Smart Log and Smart View Monitor as well as CLI utilities such as TCP DUMP.

Work with application owners to troubleshoot application connectivity issues.

Work in a Provider-1 / MDS environment with multiple CMA's.

Convert branch WAN links from TDM circuits to MPLS and to convert encryption from IPSec/GRE to Get VPN.

Experience in monitoring changes and analyze configurations, optimize firewall rules across the network using Tufin.

Configuration, Troubleshooting and Maintenance of Palo Alto firewalls PA200, PA2000 series, PA3000 series, PA4000 series, PA5000.

Configure new routes for new endpoints into Palo Alto Firewalls.

Performed up gradation of Palo Alto firewall from old platforms to new platforms

Perform rule utilization analysis to identify unused rules and objects in a firewall policy.

Work with NAT and Access-list in Cisco ASA firewall to allow only authorized users.

Revalidate firewall rule misconfigurations across the network as well as redundant rules using Tufin.

Worked on widest range of network devices, operating systems, databases and applications in physical, virtual and cloud infrastructures.

Experience on managing Network-based Intrusion Detection/Prevention Systems (IDS/IPS).

Configuring and troubleshooting OSPF routing protocol on the corporate network.

Configuring OSPF and static routes on firewalls like checkpoint, Cisco ASA.

Environment:MDS, VSX, Sand-box environment, Palo Alto Firewalls, CISCO ASA Firewall, Checkpoint Firerwall, Smart view tracker, smart log, Smart view monitor, Tufin.

Network Engineer Data Solutions,India January 2014 – Dec 2014

Responsibilities:

Troubleshooting issues related to Layer 1/2/3 skills like switching / routing, WAN /Hardware and critical network links by coordinating with the vendor.

Managing and upgrading IOS image files and taking configuration back-up.

Configuring Static, IGRP, EIGRP, RIP and OSPF Routing Protocols

Experience working with Nexus 7010, 5020, 2148, 2248 switches.

Experience configuring Virtual Device Context in Nexus 7k series switch.

Design, and configuring of OSPF, BGP on Juniper Routers and SRX Firewalls.

Configured Site to Site IPsec VPN tunnels to peer with different clients and each of client having different specifications of Phase 1 and Phase 2 policies using Cisco ASA 5500 series firewalls.

Used IPSec VPN tunneling to provide access to user machines and partners in another network. Provided application level redundancy and availability by deploying F5 load balancers LTM.

Provide Tier III Level Load Balancer expertise on F5 BigIP Local Traffic Managers (LTM). Designing F5 solutions/support for migration work of applications and websites from Cisco CSS Load Balancers to the F5 BigIP Load Balancers.

Configured VLAN Trunking 802.1Q, STP (802.1d), Port Security on Catalyst 6500 switches.

Worked extensively in Configuring, Monitoring and Troubleshooting Check point security appliance, Failover DMZ zoning & configuring VLANs/routing/NATing with the firewalls per design.

Planned and implemented network designs, including WAN, LAN, MPLS.

Remediation of firewall rules from checkpoint firewalls to Cisco ASA firewalls and their implementation

Configured and managed VLANs, 802.1Q Trunk, RPVST+, Inter-VLAN routing, HSRP and LAN security for Layer-2 and Layer-3 switching domains as per the organization's requirement plan. IP Allocation for all applications and servers with high availability throughout the company.

Participate in all technical aspects of LAN, WAN, VPN and security Internet Service projects including, short and long term planning, implementation, project management and operations support as required.

Having Data Center Design Experience, installing and Configuring Network Devices in a Data Center including patching the cables in the Patch Panel. Design and implemented network

Hands-on experience in the network management of circuits using TDM and Frame Relay network, performing configuration and provisioning management, fault management and performance monitoring

Expertise in developing Complex Automated Script Framework, utility functions manually for HTTP(S) Protocol.

Configuring Virtual Chassis for Juniper switches EX-4200, Firewalls SRX-210

Deploying Layer 2 security in Server Farms by configuring switch for 802.1x port based authentication.

Implemented, configured BGP WAN routing, converting OSPF routes to BGP (OSPF in local routing).

Used load balancers ACE and load balancing technique with multiple components for efficient performance and to increase reliability through redundancy.

Performing network monitoring, providing analysis using various tools like Wireshark, Solarwinds etc.

Implementation and configuration of F5 Big-IP LTM-6400 load balancers.

Environment: Cisco 2600/2800/3600/3800 Routers, Cisco 2950/3700/6500/7613 switches, RIP, OSPF, BGP, EIGRP, VLAN, MPLS, ASA 5500, F5 Load Balancer 6400, STP, RPVST, LAN, WAN and HSRP

Certifications::

ICND1, Splunk Power User, Fidelis Network Core-Admin 121

Technical Skills:

Firewall: CheckPoint GAIA, Palo Alto, CISCO ASA/PIX, Juniper

Monitoring & Management Tools: Wire shark, TCP dump, Fiddler, Microsoft Network Monitor, web application scanning,

Protocols & Standards: NAT, TCP, UPD, VTP, STP, VRRP, Ethernet, Token Ring, VLAN, FDDI, L2/L3/L4/L7 Switching

TCP/IP Protocol Suite, UDP, SNMP, SEP, NTP, IPv4, IPv6, ARP, WCCP, EIGRP, OSPF, BGP, ISIS, RIP v2,

LAN technologies Ethernet, Fast Ethernet, Gigabit Ethernet, & 10 Gigabit Ethernet, Wifi, FDDI, Token Rings

WAN technologies Frame Relay, ISDN, ATM, MPLS, leased lines & exposure to PPP, DS1, DS3, OC3, T1 / T3 & SONET

Operating Systems: Windows XP/7/8/10, WWindows Server […] Linux, Unix.

Microsoft Software: Microsoft Office, Visio.

Routers: Cisco 2600, 3600, 3800, 7200, 7600, ASR 9001, Juniper SRX series.

Switches: Cisco 2960, 3750, 4500, and 6500, Nexus 2K/3K/5K/7K series and Juniper EX series.



Contact this candidate