Salma Liakhat
Jackson Heights, NY
****************@*****.***
• Information Security Consultant
• Experience in IT security and Risk Management including Internal Audit.
• Performed risk based monitoring covering a range of operational security activities.
• Experience of producing documents on System Security compliance report.
• Hands on experience leading all stages of system registration, including compliance requirements definition, and initial security check and support. Outstanding Team leader able to coordinate and direct all phases of server- security based while managing, motivating, and guiding teams.
• Insightful, results-driven professional with notable success directing a broad range of corporate IT security initiatives while participating in planning, analysis, and implementation of solutions in support of business objectives including 100 quality results through frequent Internal Audits.
• Experience in Risk Management Compliance, Internal Auditing, Policy making, Education Awareness and BCP/DR and others.
• Lead a team of 5 members in conducting the risk management/assessment for the servers and network devices in the EMEA segment while working for IBM.
• Consistently top performed among peers, in terms of qualitative service delivery. Willing to relocate: Anywhere
Authorized to work in the US for any employer
Work Experience
Profit Generation, Sales Techniques, and Product Promotion Traders - Manhattan, NY
2017 to 2019
• Budget development and control
• Employee recruitment and training
• Customer service and complaint resolution
• Operational analysis and supervision
Security Analyst
Cheers Technology - Chennai, Tamil Nadu
2013 to 2014
• Conduct security assessments on OS, network, and application vulnerability assessments to identify security weaknesses.
• Support monitoring and reporting mechanisms to effectively communicate accurate and current status of the environment and respond accordingly.
• Create, maintain and ensure adherence to baselines, security policies, procedures, guidelines and control standards.
• System security monitoring and response to system and Server security incidents
• Work closely with IT teams on identifying and remediation of systems with security issues.
• Assist in or facilitate the implementation of protective and mitigating controls.
• Analyze proactive system vulnerability and recommend corrective measures
• Participate in the evaluation, design, and deployment of security solutions.
• Day to day management of Information security platforms
• Participate in both internal and external audits. Education
masters in Information Technology management
University of potomac - Washington, DC
September 2017 to October 2020
Skills
• Platforms: Security Health checks for Windows NT/XP/2000, UNIX Solaris, Aix, Linux Red Hat, DB2
• Have knowledge on HIPAA Security and Privacy rule, Omnibus Rule August 2013, PHI, NPP, TPO
• Deploy, operate, and monitor Qualys Guard to implement and manage global vulnerability management, policy compliance and web application systems, PCI Payment Card Industry Compliance
• Daily operations supervision
• Staff evaluations and training programs
• Scheduling
• Promotional campaign development
• Leadership and delegation
• IBM Tivoli
• Lotus Notes
• Microsoft Office suite Word
• Excel
• PowerPoint
• Outlook
• Ping
• Telnet
• NS Lookup
• Hacking Tools
• ESM
• Microsoft SQL Server
• SQL
• Security Analysis
• Business Continuity Planning
• Information Security
• System Security
• Agile
• Operating Systems
• Business Requirements
• Network Firewalls
• Network Security
Additional Information
Certification in Business Analyst