Post Job Free

Resume

Sign in

Security Analyst Active Directory

Location:
Woodland Hills, CA
Posted:
June 02, 2021

Contact this candidate

Resume:

Information Security Analyst

Qualifications Profile

Hardworking, analytical, and solutions-focused professional, with a more than 20 years of experience in information analysis, testing and implementation, and security administration; complemented with comprehensive background in improving systems and applications. Adept at minimizing high-volume backlogs, with in-depth knowledge of software development in multiple platforms. Skilled at designing and implementing application solutions for the improvement of operations and performance. Effective at working with end users to determine requirements, address their needs, and resolve occurring issues.

Core Competencies

Software Analysis Technical Support and Troubleshooting Quality Assurance Testing

Network/LAN Administration User Account Management Trouble Ticket Resolution

SOX Compliance Audit System Implementation Client Service and Relations Process Improvement

Professional Experience

Harbor Freight Tools, Headquarters HQ, Calabasas CA

Information Security Compliance Analyst, Payment Card Industry (PCI) Data Security Standards, Nov 2016–Present

Carry out accurate payment card industry (PCI) internal self-assessments, quarterly analysis, as well as ad hoc tests and audits

Administer the documentation and maintenance of PCI compliance as well as monitoring and evaluation of IT Security controls to determine operational efficiency

Organize internal and external audits, scanning, penetration testing, and other security reviews

Apply best practices in enforcing Payment Card Industry Data Security Standard (PCIDSS) into business-as-usual processes, while assessing PCIDSS of the environment in compliance with the testing procedures for each requirement

Conduct systematic tracking and monitoring of all access to network resources and cardholder information

Execute consistent testing of security systems and processes as well as annual periodic analysis and communications to confirm placement of PCIDSS requirements and compliance of all personnel to secure processes

Take charge of determining PCIDSS requirements applicable to systems and networks affected by the changes as well as to update its scope and enforce security controls as needed

Perform annual review of hardware and software technologies to ensure support from vendor and adherence to the entity’s security requirements, including PCIDSS

Collaborate with the PCI auditor in guaranteeing effective management of the continuous compliance deliverables throughout the year

Keep an compliance documents updated for PCI by conducting monthly reviews as well as apply Information Technology General Computer Controls Audit Program (ITGC) in confirming existing controls for the analysis of control operating value

American Honda Motor Company HQ, Torrance, CA

Information Security Analyst EISO (Consultant), Identity and Access Management IAM–SOX Validation and Compliance, Aug 2016–Nov 2016

Determined security requirements by working on business units and other risk functions through the use of diverse methods, such as risk and business impact reviews

Rendered assistance in organizing and completing information security operations and documentation

Partnered with the information security leadership in generating strategic plans for the implementation of security requirements and resolution of identified risks

Verified key performance indicator (KPI) as well as captured IBM ITIM Tivoli Identity Manager records for all removals and/or terminations and for any refined in-scope Sarbanes-Oxley (SOX) request

Informed the management regarding residual risk, vulnerabilities, and other security exposures, such as the misuse of information assets and non-compliance

Guaranteed on-time addressing of security issues in the project life cycle by working directly on critical IT projects

Addressed all requests, such as:

oDevelopment, modification, suspension, removal, and verification of end user identities (user IDs) to determine users of several information system resources and applications’ as well as end user access to specific resources and functions in supported information systems and applications; and

oAd hoc requests for the resolution of identity or access issues

Executed thorough research, investigation, and reporting of any ad hoc requests to determine or access data

Analyzed the original request and validated the user's IBM ITIM Tivoli Identity Manager record to determine the status of audit ]

Southern California Edison, Irwindale CA

Identity and Access Management Administrator, Security Information Event Management, Dec 2014–Aug 2016

Took charge of properly maintaining the provisioning processing while overseeing and de-provisioning users across various internal and external applications

Managed the IBM ITIM Tivoli Identity Manager 4.6.; Cisco Secure ACS v4.2 remote access dial-in user service (RADIUS); and terminal access controller access control system (TACAS+)

Developed accounts; handled terminations; and validated SOX

Guaranteed adherence of all executed requests to the process as defined with appropriate approvals

Oversaw the enterprise active directory account management and application accounts

Supported and maintained the system as wells as added Windows Active Directory and deleted file shares folders

Applied the CyberArk RSA in securing the ID password of vault access management privileged account security

Utilized Splunk Enterprise search and reporting version 6.3.3 in overseeing and assessing security events

Worked as an integral part of the team, responsible for handling diverse accounts, such as key, elevated access, and local admin

Ensured accurate and on-time oversight and resolution of requests in the Remedy Case Management system

Live Nation Entertainment, Hollywood CA

Technical Operations Analyst, Technical Operations Center (TOC), Aug 2014–Dec 2014

Conducted keen monitoring, support, escalation, and tracking of mission critical servers, systems, and applications used globally, such as Live Nation Technical Infrastructure

Oversaw and resolved all internal mail servers, other mission-critical servers, as well as external ticketing data centers deployment and staging systems

Executed systematic gathering, review, and reporting of metrics information gathering from third-party service providers, such as keynote and Akamai

Utilized third-party; and supported the technical environment by managing an enterprise ticketing system

Escalated tickets to tier two technical personnel

IBM Global Services, Woodland Hills, CA

Systems Engineer, eSIEM Enterprise Security Information Event Management

Identity and Access Management Consultant, Tivoli Security Information and Event Manager (TSIEM), Oct 2014–Feb 2014

Performed various functions, such as the following

oDirect compliance access and identity oversight of the IBM Delivery Team;

oSemi-annual ITCS104 DB2 WebSphere application server (WAS) middleware health verification and remediation on TSIEM 2.0;

oIssue identification and resolution as well as root cause analysis to any reported Tivoli Security Information and Event Manager (TSIEM) system or environment problems; and

oEvent source data gathering configuration, which included components Target

Oversaw all servers for availability, including backup and recovery and performance

Aided customers at diverse accounts, including Morgan Stanley Bank, State Street Bank, Banco Itau, and Miller-Coors

Installed and configured the IBM TSIEM monitoring agents to endpoints across the data center network

Conducted testing of endpoint to Tivoli infrastructure connectivity as well as took part in monitoring of Tivoli Enterprise on Windows 2003, Windows 2008-R2 AIX, Linux, HP/UX, and Solaris-based operating systems

Administered audit machines and event sources, users, and roles at Tivoli Enterprise Portal

Aided with the implementation of critical systems monitoring for IBM Tivoli’s multicustomer community

Collected and reviewed information regarding system failures as warranted

Ensured the receipt of data at the TSIEM servers from all of the in-scope event sources

Enforced policy changes required by the modifications to the SARM global privilege monitoring policy

Applied the needed modifications for adding newly commissioned servers and removing decommissioned servers

WellPoint Health Networks, Woodland Hills, CA

Senior Data Security Analyst, Active Directory Engineering Information Security Consultant, Nov 2011–Aug 2012

Ensured precision in conducting the following initiatives:

oDomain consolidation project retirement and decommissioning of legacy Windows domains;

oLegacy domain controllers’ reports/traffic review;

oInventory for Infrastructure to determine the dependent applications and servers on each WLP domain; and

oDomain controllers’ inventory and dependencies, server owners, and application owners

Worked on the IBM TSRM incident tickets from help desk level 3-4 along with all work orders

Drafted daily check reports on domains to determine domain controller names, ping status, IP address, host name, and drive list, as well as submitted status reports of servers from both traffic and computer report

Used Hyena tool in extracting and querying information from Active Directory computers/groups and stale IDs as well as utilized DumpSec tool in extracting extract data from Active Directory for groups with or without members on Windows serversq

Managed query directory attributes as well as coordinated and prepared the reporting of data security events and incidents

Offered data on SOX, compliance, and IT security within IT and to IT security management

Dealt with providing master active domain inventory as well as system and network architecture assistance to data and network security technologies

Providence St. Joseph Medical Center, Burbank, CA

Systems Account Management Specialist Information Systems (Consultant), Aug 2011–Oct 2011

Administered the Forefront Identity Management (FIM) and provided enterprise active directory and exchange account administration

Handled and maintained the security log-on IDs and information assets

Rendered provisioning to Lawson (Lawson Systems Foundation 9), Meditech Camis 6.0, Citrix, Awaris, Isite, CPN, Epic, Microsoft Office communicator applications

Managed the HP system management ticketing system (HPSM)

American Honda Motors Company HQ, Torrance, CA

Enterprise Information Security Systems Administrator EISO (Consultant), Feb 2010–Jun 2011

Assumed tasks in user login scripts for network drive mapping

Directed the restoration of shared files from accidental deletion or file corruption

Gave New Lotus notes and instant messaging account and granted the access to Lotus notes existing databases, applications, groups calendars, and groups mailboxes

Conducted the periodic access review (PAR) for all accounts as well as supported Blackberry issues and synced contacts

Rendered 2nd-level assistance with 100% accuracy to CCSC, Deskside, and TAC for password and login issues,

Administered a multiplatform environment and executed active network administration in generating and changing inter network user and administrator accounts

Enhanced the efficiency and accuracy of mainframe/RACF, TSO, ISPF resource, and dataset rule creation, maintenance, testing and troubleshooting

Earlier Career

AIG Insurance Group (21st Century Insurance Group), Woodland Hills, CA

Applications Security Administrator (Consultant)

American Honda Motor Company HQ, Torrance, CA

Enterprise Information Security Analyst EISO (Consultant)

Countrywide Financial Corporation, Simi Valley, CA

Enterprise Information Security Engineer, IT Operations

WellPoint Health Networks, Woodland Hills, CA

Senior Data Security Analyst

Professional Development

IBM Net view Users Workshop

IBM Delivery Team Compliance Access and Identity Management

Administrating Window 2000 Server

ITIM/TAMeSSO Overview

Novell 4.11 Administration

IBM User ID and Access Administration

ACF2 Fundamentals of Daily Administration

IBM ITIM/TAMeSSO for Practitioners

ACF2 Advance Rule Writing Techniques

IBM Tivoli Identity and Access Management

Windows NT Administration

IBM User ID Revalidation Tool URT for Practitioners Unix Fundamentals

IBM Managing Risk in the user ID Management Environment

Unix TCP/IP

IBM Privilege Authorization Review Process

Data Communications I

IBM EV, CBN, and Privilege Revalidation Process

Data Communications II

IBM Privilege Monitoring Process

Peoplesoft

IBM Password General Security and Requirements

Maxmc System Administration and Configuration

IBM Shared ID Database Overview

Achieving Extraordinary Customer Relations

IBM Shared ID Re-Justification and Password

Technical Skills

Blackberry Enterprise JES2, HASP, RJE, APL Citrix Metaframe ICA Exchange Management Console

CRYPTOCard Admin VPN Enterprise User Management Tool (EUM) Exchange Server Account Administration

File-net Imaging/Ultera Gramm–Leach–Bliley Act (GLBA) FIM MS Identity Forefront Identity Management

Health Information Trust Alliance (HITRUST) Health Insurance Portability and Accountability Act (HIPPA)

IBM ITIM/TAM/TFIM and TCIM HPSM System Management Ticket System Hyena / DumpSec Tools

IBM Mainframe ACF2/RACF/Vanguard IBM Tivoli ITIM 4.6 IBM Directory Integrator (IDI)

IBM NetSpy/Netview/OpenView/VTAM IBM Tivoli Service Request Manager (TSRM)

IBM Tivoli Monitoring Manager IBM Tivoli Identity Manager 4.6 Interactive Network Administration

LAN/WAN Environments IRAM Identity Resource Access Management Meditech / Camis 6.0

MacAfee Endpoint Encryption Lightweight Directory Access Protocol LDAP Office Communicator

Microsoft Windows Active Directory Group Policies and Trust Lotus Notes Administration

NetIQ DRA Console One Microsoft Active Directory Domain Trust, Policies Folders and Permissions

Magic Service Desk Novell Netware Microsoft Lync 2010 Microsoft Office Suite Oracle SQL Plus

Microsoft Windows 2000, 2003, 2008 R2 Servers Microstrategy8 Desktop PeopleSoft PC Anywhere

OS/ISPF/OS/MVS/IMS/CICS Mainframe Systems RAS/VPN User Token RSA Certificate Authority SSL Administration

Remedy Software Tracker Remedy Tracking System Scripps -based tools CSH/KSH/Perl SOX

Remote Desktop Single Sign-On Systems UNIX Operating System AIX Linux Security Siebel e-Business 6.0

Tivoli Security Information and Event Manager (TSIEM) Vanguard Terminal Server Virtual Private Network (VPN)

VERITAS Backup Tivoli Compliance Insight Manager (TCIM) WebConnect Windows XP, Vista 7 Splunk Enterprise Vanguard Rio Vision Security Center 7.1 Websense Internet Web Filtering Serena TeamTrack



Contact this candidate