Post Job Free

Resume

Sign in

Cyber Security Expert

Location:
Englewood, CO
Posted:
January 18, 2023

Contact this candidate

Resume:

PROFESSIONAL SUMMARY

Experience as a Cyber Security Expert.

Log aggregation, data analysis, Splunk queries, dashboard design, correlation queries.

Set up and configure Splunk ES along with monitoring and reporting using Splunk dashboards.

Configure Splunk in tandem with Snort for a comprehensive SIEM (IDS/IPS).

Use log data from SIEM tools (Splunk, AlienVault) to conduct analysis of Cyber Security incidents.

Conduct detailed vulnerability analysis and provides support documentation to per NIST Risk Management Framework.

Understand control types (administrative controls, technical controls, physical controls).

Implement virtualization using VMWare, Virtual Box.

Use command-line tools in Linux, Windows OS, and various tools such as Nessus and Nmap.

Experience in Network Intrusion detection/Intrusion Prevention System and Firewalls.

Responsible for SIEM systems, rules, and actions in Snort for incident response and set alerts to intrusion attempts.

Experience implementing & managing Data Loss Prevention.

Perform network traffic analysis using Wireshark and manages Firewall Vulnerability with pfSense firewall manager.

Adheres to NIST guidelines in continuous monitoring as part of Cyber Security program.

Enforces Cyber Security best practices per NIST guidelines and SOC procedures.

Execute risk-based Cyber Security audit programs, to assess the design and effectiveness of key technology and/or security controls for critical systems and processes.

Knowledgeable of IAM Concepts and IAM Models; Access Protocols and Account Practices.

Knowledgeable about Kerberos Authentication Protocol.

Risk mitigation and use of necessary controls proactively address vulnerabilities and threats, through intrusion detection, controls and security assessment and training.

Familiar with various cyber security tools including, Splunk/Snort IDS/IPS, Nessus, Wireshark, and Metasploit.

Expertise in Mobile Security and Access Control Identity Management.

In-depth understanding of attack scenarios and common vulnerabilities.

Active in continuously updating knowledge with new security procedures and protocols and adapting to rapid changes in the security landscape.

Skilled in use of Symantec Endpoint Protection (SEP) and PfSense.

Access Control Identity Management, Penetration Testing, Vulnerability Assessment, SOC Analysis, Incident Response and Threat Mitigation.

Experience with policy exceptions with management of Business Unit requesters.

Experience in risk mitigation and deployment of necessary controls proactively address vulnerabilities and threats, through intrusion detection, controls and security assessment and training.

Use of different Vulnerability Assessment and Penetration Testing (V.A.P.T.) tools.

Use of Cyber Kill Chain and Diamond Model in threat intelligence.

Support of security compliance initiatives and assessments including responses to client security organization audits, questionnaires.

Strong analytical skills, including the ability to problem solve to make value-added control recommendations.

Understanding with software and security architectures as well as Intranet and Extranet security practices.

Experience developing Incident Response Playbooks/Incident Response Plans (IR Plans).

Experience coordinating annual security exception review process.

Risk Management using NIST guidelines, Security Assessment and Testing, and Continuous Monitoring.

Skillful use of industry tools for traffic monitoring such as WireShark and PFSense.

Assisted with the development of Incident Response Plans (IRP) and implemented tools for each stage.

Skilled in analysis of results of security, vulnerability, and risk management assessments.

Analyze cyber security controls and how they align to business objectives.

Analyze, monitor, and identify security risks to determine their impact.

Trained users on risks, social engineering, security controls and best practices to ensure security and safety of assets.

Experience in NIST Compliance, Security Management and Operations, Vulnerability Assessment, Risk Management Framework, Incident Response, Monitoring, Threat Detection and Mitigation.

Understanding of electronic investigation, forensic tools, and methodologies. Including: log correlation and analysis, forensically handling electronic data, knowledge of the computer security investigative processes.

TECHNICAL SKILLS

Programming: HTML, PHP, Advanced C++, C#, Visual Studio, MATLAB, API, MySQL,

Scripting Languages: JAVA, Python, PowerShell, Bash

Networking: SSL/TLS, DHCP, OSI Model, DNS, TCP, UDP, HTTP, PHP, HTML, CSS, SML, Wireshark, Nmap, Cisco

Software: Microsoft Office Suite, PDF, Active Directory, VMware, Weka, vSphere, NetworkMiner

Operating Systems: Windows, MacOS, Linux, Unix, CentOS, Red Hat, Kali Linux

Technologies: DNS, DHCP, Windows Desktop Environment, Windows Servers Systems, Backup, Recovery, Testing

SIEM Tools: Splunk, Qradar, AWS Guard Duty, Azure Sentinel, Alien Vault, and ArcSight

Threat Hunting Tools: CrowdStrike, Carbon Black, FireEye,

Vulnerability Management Tools: Nessus, Qualys, AWS Inspector, Azure Security Center, Rapid 7, Tenable IO

Risk Management and Auditing Tools: Archer, ServiceNow GRC, Netwrix

Cloud Platforms: Microsoft Azure, Amazon Web Services (AWS), Google Cloud Platform (GCP)

Amazon Web Services (AWS) Resources: Guard Duty, Cloud Trial, Cloud Watch, Inspector, IAM, VPC, S3.

Microsoft Azure Resources: Azure Security Center, Sentinel, Active Directory, Log Analytics Workspace.

Frameworks: NIST Cybersecurity Frameworks, COBIT, SOX, HIPAA, PCI – DSS, ISO / IEC.

Firewalls: Palo Alto, Cisco Meraki, AWS Firewall, AWS WAF, Azure Firewall, Azure WAF

PROFESSIONAL WORK EXPERIENCE

Cyber Security Subject Matter Expert February 2020- Present

Dish network

Englewood, Colorado

Acted as a primary resource and provide detailed/hands-on support to the Cyber Security Engineers working on project at client sites through the United States of America and United Kingdom.

Prepared training modules to mock interview situations to enhance the learning process provided by the company and provided mentorship to ensure value-add at client site.

Interacted with the company’s Executives to ensure that projects and employees are appropriately matched to assignments.

Interviewed Cyber Security Engineers to help with the development and Implementations of Cyber Security.

Responsible for the design, development, and maintenance of the company’s Cyber Security training materials.

Assisted in training and cyber security awareness to organization staff.

Applied qualitative and quantitative risk assessment methods.

Identified and modeled information and network security risks.

Controlled Identity and Access Management for all users in the organization by assigning them with access and privileges based on the groups and assigned licenses.

Articulated information security risks as business consequences based on the impact and likelihood of risk to be reduced to an acceptable level.

Supported all technical subject matters on Cyber Security, while also overseeing information assurance internally.

Used in Advanced threat protection, PKI, and Cryptography.

Experienced with Endpoint Detection and Response, Software integrity, Access control, and volume forensics, Authentication, File encryption, Volume encryption, Network monitoring, POP, DNS, Email security, Network crypto, and Certificates.

Used top Frameworks and Standards (NIST/ITIL/ PCI DSS/ISO/CIS)

Experienced in using SIEM Tools (Splunk, Qradar, AWS Guard Duty, Azure Sentinel, Alien Vault, and ArcSight)

Performed incident response activities such as host triage and retrieval, malware analysis, remote system analysis, end-user interviews, and remediation efforts.

Responsible for making suggestions to change playbooks to keep up with the changing threat landscape.

Fine-tuned and analyzed SIEM and its events to identify trends and potential vulnerabilities.

Produced advisory reports regarding 0-day exploits, CVE vulnerabilities, current network.

Hands-on SIEM tools to protect organization from threats and cyber security attacks. Also, created, and modified Use cases for Splunk.

Evaluated, recommended the acquisition of, implemented, and disseminated IT security tools, procedures, and practices to protect information assets.

Responded to intrusions and threats detected by endpoint security tools.

Performed security vulnerability assessments and penetration tests to ensure environment and data were secure as well as satisfying regulatory compliance requirements.

Met with respective Business OU to discuss updates to DLP policies and rules.

Performed log correlation analysis using Splunk and implemented risk and threat mitigation processes.

Responded to computer security incidents and coordinated efforts to provide timely updates to multiple business units during response.

Utilized Splunk to support dashboard, report, and other capabilities to support the Cyber Security Program.

Monitored and analyzed SIEM events to identify trends and potential vulnerabilities.

Collaborated with system owners, senior management (CIO, CISO etc.,) and executive leadership to determine remediation strategies. Experience in Office 365 Protection to investigate and remediate phishing threats.

Assisted I.T staff with understanding and resolving system vulnerabilities.

Conducted risk assessments and collaborated with Management and technical team to provide recommendations regarding any changes that were being implemented on assigned systems.

Performed and analyzed vulnerability scan reports and worked with stakeholders to establish plans for sustainable resolutions.

Completed tasks such as researching and identifying security vulnerabilities on the networks and systems.

Used Nessus to run scans on operating systems and applications to identify vulnerabilities and compliance.

Monitored controls post authorization to ensure continuous compliance with the security requirements by evaluating vulnerabilities through Nessus scan results and work with the IT staff for mitigation actions.

Cyber Security Engineer September 2018- February 2020

IBM

Armonk, New York

Used log data from SIEM tools (Splunk and Qradar) to conduct analysis of cyber incidents.

Analyzed log data from SIEM tools such as Splunk, and WireShark to identify threats and vulnerabilities on the network to prevent cyber security incidents.

Created a detailed Incident Report (IR) and contribute to lessons learned and mitigations for future attacks of a similar nature.

Documented policies and procedures in support of Risk Management Framework (RMF) process.

Worked with security compliance policies, programs, processes, and metrics.

Monitored and analyzed Intrusion Detection Systems (IDS) to identify security issues for remediation.

Monitored the general support system for vulnerabilities and threats including patch management, weak password settings, and weak configuration settings.

Reviewed the PAOM to validate the items uploaded in the POAM tracking tools supported the closed findings and coordinated promptly with stakeholders to ensure timely remediation of security weaknesses.

Conducted system security evaluations and assessments, documented, and reported security findings using NIST 800 guidance per the continuous monitoring requirements.

Researched emerging threats and vulnerabilities to aid in the identification of network incidents.

Implemented deep drive analyses on alerts received from Splunk and took actions on remediation process.

Participated in the creation of enterprise security documents (policies, procedures, standards, guidelines, and playbooks) under the direction of the Chief Information Security Officer.

Performed incident response activities such as host triage and retrieval, malware analysis, remote system analysis, end-user interviews, and remediation efforts.

Evaluated, recommended the acquisition of, implemented, and disseminated IT security tools, procedures, and practices to protect information assets.

Responded to intrusions and threats detected by endpoint security tools.

Performed security vulnerability assessments and penetration tests to ensure environment and data were secure as well as satisfying regulatory compliance requirements.

Met with respective Business OU to discuss updates to DLP policies and rules.

Performed log correlation analysis using Splunk and implemented risk and threat mitigation processes.

Responded to computer security incidents and coordinated efforts to provide timely updates to multiple business units during response.

Utilized Splunk to support dashboard, report, and other capabilities to support the Cyber Security Program.

Monitored and analyzed SIEM events to identify trends and potential vulnerabilities.

Worked with cross-functional teams to ensure compliance with SOC Team Cyber Security Risk Management procedures throughout the system.

Worked with NIST Compliance, Security Management and Operations, Vulnerability Assessment, Risk Management Framework, Incident Response, Monitoring, Threat Detection and Mitigation.

Worked with IT teams to assess weaknesses, identify solutions and develop security policies.

Completed Threat Intelligence using Cyber Kill Chain, MITRE Attack Framework and Diamond Model.

Delivered accurate and expedient handling of end-user support requests.

Created, maintained, and enforced Information Security Policies and Procedures in compliance with PCI-DSS regulations and NIST cyber security best practices.

Identified and evaluated foreign communications for intelligence purposes, mission support and the handling of classified communications for threat intelligence.

Conducted open-source research to find new threats and IOCs.

Applied understanding the function and content of information security policies, standards, procedures, and practices as well as threats, risks, and vulnerabilities at a functional level.

Adhered to Response Playbooks/Incident Response Plans (IR Plans) used by SOC team, wrote threat reports, and manage recommendations with affected stakeholders.

Used NIST Risk Management Framework as a basis for SOC team Cyber Security guidelines such as Continuous Monitoring.

Created a formal Cyber Weekly Report for reporting to Senior Management/Executives.

Provided Cyber Security support for complex computer network exploitation and defense techniques and conducted e-mail analysis on suspicious e-mails.

Implemented processes to capture both current and historical audit findings to identify systemic failures and patterns for corrective action.

Performed periodic and on-demand system audits and vulnerability assessments, including user accounts, application access, file system and external web integrity scans to determine compliance.

SOC 3 Threat Hunter November 2016 – September 2018

Crowdstrike

Austin, Texas, United States

Coordinated with application and system owners to onboard applications in Splunk and ensure logging capabilities are functional.

Provide administrative assistances during incident response.

Educated other company associates on security best practices.

The locating of malicious software on servers or endpoint symptoms -Use of Tanium and SCCM -Designed and implemented search rules on SIEM.

Monitoring security patch levels of the servers, workstations and network environments, and anti-virus systems.

Monitored and hunted for intrusion and incidents.

Improved upon organization incident response procedures' mitigation and reaction capabilities by emulation and analysis of network intrusion events and incidents from emerging cyber risks.

Provided, tracked, and documented threat attribution to incident response and intelligence reporting activities.

Implemented Splunk for Information System Continuous Monitoring (ISCM).

Remediation of identified cybersecurity threats and vulnerabilities using Splunk.

Managed Artifacts and Plan of Action & Milestones (POA&Ms) to ensure correct implementation of controls.

Evaluated systems covering for Risk Management Framework (RMF).

Worked with industry-standard Cyber Security tools for testing, monitoring and investigation such as, Splunk, Nessus, Alien Vault Nmap, WireShark, Metasploit and pfSense.

Deployed, configured, and maintained Splunk forwarder on different platforms.

Audited network and security systems including Vulnerability Assessment and Identity Access Management (IAM).

Audited data location and permissions; verified end user, service, and administrator access to resources.

Audited EPs to verify compliance with security controls.

Performed gap analysis of cybersecurity business & technical solutions

Analyzed log data and traffic to identify suspicious patterns of activity.

SOC 2 Security Analyst October 2014 – November 2016

Splunk

San Francisco, California, United States

Administered Cyber Security continuous monitoring information security program per NIST framework.

Worked as part of Cyber Security incident Response team as needed, following SOC Incident Response procedures.

Investigated and resolved Cyber Security incidents and events per SOC team policy and procedures.

Utilized Splunk dashboards for Cyber Security incident reports in Splunk and helped create automated reports for greater understanding of, and accountability for, Cyber Security issues and Incident Response Plan and Continuous Monitoring in accordance with NIST 800 series guidelines.

Used WireShark to troubleshoot and investigate Cyber Security threats.

Responsible for troubleshooting various indexing issues by analyzing Splunk logs such as splunkd.log, metrics.log ingested as internal index.

Supported Cyber Security with SIEM tools such as Alien Vault, NMAP, Splunk, Snort, WireShark, pfSense and Nessus.

Reviewed AD and SIEM reports for user account creation, onboarding and separation per Cyber Security policy compliance following NIST guidelines.

Conducted Cyber Security vulnerability scanning and evaluation of controls.

Automated Cyber Security analysis workflow regarding endpoint detections, sandbox results, email scanning.

Detected Cyber Security events and reported on all threats that are directed against systems regardless of classification level or type.

Reviewed audit logs and provided Cyber Security documentation guidelines to business process owners and management.

Conducted Cyber Security Awareness Training with SOC Team for all end-users and management.

Evaluated the adequacy of Cyber Security Programs against NIST guidelines and industry best practices.

Work with SOC team to provide 24/7 Cyber Security coverage, responding to all alerts per SLAs.

Stayed abreast of current updates and patches, and ensured all systems were maintained and tested post update/patch implementation.

Provided technical support for continuous monitoring, computer exploitation and reconnaissance; target mapping and profiling; and network decoy and deception operations in support of computer intrusion defense operations.

In conjunction with the security, deployment, and data management/migration team providing, I led a team that provided next day solutions for misconfigurations, security issues, security events that were reported to our office.

Provided training for medical staff on newly installed solutions and security policies with regards to guidelines governing a new environment focusing on improved access while still in compliance with HIPAA regulations.

I helped to ensure HIPAA security and privacy compliance on networks and devices that stored and transmitted PHI.

Secured government requirements to guarantee information security solutions aligned with HIPAA requirements for critical data assets.

Used FireEye CMS as a network-based security appliance while at the VA hospitals to consolidate the management, reporting a data sharing of web, Email and File malware protection.

Used Detection on Demand threat detection service to provide end users protection to acquired companies during the auditing process before full integration.

Identified and classified PHI data to apply appropriate access controls within network systems and end devices and well as to consult on the policy of least privilege for data access to NPI and PHI.

Helped to ensure that information security personnel adhered to and enforced security policies at each location on campus.

Provided endpoint security on customer facing devices and interfaces at the VA hospitals during the transition to digital records being integrated into the environment.

As the transmission of data through different mediums became more prevalent security solutions had to be developed to ensure that confidentiality, integrity, and availability were maintained.

Antivirus solutions such as Malwarebytes, and the Norton suite of product, as well as MDM solutions for mobile devices that were deployed throughout the hospital.

The backend infrastructure was updated with bot IDS and IPS devices to secure data while at rest network segmentation and data containerization was used to better secure data in transit.

Educated users about HIPAA and cybersecurity best practices.

Conducted security assessments of interoffice programs IAW ISO 27002, NIST, and DoD frameworks for data privacy.

Directed and coordinated with management on security projects to include budget, resource acquisition, and security implementations.

Researched developing technologies and identified use cases for inclusion into the security program on campus which included physical security to critical data assets.

Was responsible for assisting the SOC team in maintaining SIEM tools, hardware for network security and their configurations, change management, security logging, and assisting in incident response.

Provided analysis of cybersecurity as well as physical security policies and procedures depending on departments duties and needs.

Worked closely with managers and security personnel to ensure that security policies and controls were effective with provided services, software, hardware, and updates.

Collaborated with I.T., Security, Record, and Policies departments on the best practices for moving from physical to digital records keeping in a continuous production environment while ensuring continuity of service.

Completed numerous special projects, including Win 7/8/10 deployment and an infrastructure maintenance/update project. Worked with vendors on asset procurement, company location expansion. Infrastructure needs and security compliance while migrating company assets.

Worked as the subject matter expert and team lead on Mac OSX migration.

Worked with the information security team to implement policies and research alternate software to secure mobile devices and Mac hardware in a previously P.C. laptop centric environment.

Support of machines and peripherals related to the medical field.

Provided students and medical professionals with training on security best practices and security solutions available that would allow for availability of data while still providing the necessary level of confidentiality and integrity of data in its different forms/states.

Penetration Tester February 2012 – October 2014

Carbon Black

Waltham, Massachusetts

Participated in the creation of enterprise security documents (policies, procedures, standards, guidelines, and playbooks) under the direction of the Chief Information Security Officer.

Assisted I.T staff with understanding and resolving system vulnerabilities.

Conducted risk assessments and collaborated with Management and technical team to provide recommendations regarding any changes that were being implemented on assigned systems.

Performed and analyzed vulnerability scan reports and worked with stakeholders to establish plans for sustainable resolutions.

Completed tasks such as researching and identifying security vulnerabilities on the networks and systems.

Used Nessus to run scans on operating systems.

Monitored controls post authorization to ensure continuous compliance with the security requirements by evaluating vulnerabilities through Nessus scan results and work with the IT staff for mitigation actions.

Reviewed the PAOM to validate the items uploaded in the POAM tracking tools support the closed findings and coordinate promptly with stakeholders to ensure timely remediation of security weaknesses.

Conducted system security evaluations and assessments, documented, and reported security findings using NIST 800 guidance per the continuous monitoring requirements.

Researched emerging threats and vulnerabilities to aid in the identification of network incidents.

Provided scanning of range operating systems and test beds using SCAP compliance tool and Nessus vulnerability scanner for independent security analysis.

Implemented deep drive analyses on alerts received from Splunk and took actions on remediation process

Experienced in researching emerging cyber threats to understand and present hacker methods and tactics, system vulnerabilities, and indicators of compromise

Supported day to day data security operations

Monitored security patch levels of the servers, workstations and network environments, and anti-virus systems

Performed proactive network monitoring and threat analysis

Recommended and addressed the acceptability of the software products for continuous monitoring project

Monitored and analyzed Intrusion Detection Systems (IDS) to identify security issues for remediation

Assisted in planning, development and security of a system that aims to establish a security infrastructure

Developed and maintained security implementation policies, procedures, and data standards

Completed tasks such as researching and identifying security vulnerabilities on the networks and systems.

Differentiated potential intrusion attempts and false alarms and prioritized response using Splunk and Snort.

Scheduled a Penetration Testing Plan throughout the organization and completed all the tasks in the given time frame.

Performed pen tests over different business applications and network devices of the organization.

Conducted penetration tests on systems and applications using automated and manual techniques with tools such as Metasploit, Burp Suite, IBM App Scan, Kali Linux, and many other open-source tools as needed.

Worked with support teams to address findings because of the tests.

Participated in assigned exercises (e.g., COOP, network vulnerability, "red team/blue team", etc.).

Monitored daily event collection, security intelligence and emerging threat information sources including SIEM, vendors, researchers, websites, newsfeeds, and other sources.

Analyzed security vulnerabilities and impact of mobile devices on network using mobile device management (MDM) tools.

Determined cause and researched attack vectors, extent of exposure, and overall risk to environment.

Demonstrated problem-solving abilities by finding vulnerabilities and risks in computer networks and taking measures to correct or exploit those vulnerabilities.

Supported threat intelligence gathering, processing, correlation, and analysis.

Performed Vulnerability Assessments and Penetration Tests using tools such as Burp Suite, Nessus, and Kali Linux.

Performed security vulnerability assessments and penetration tests to ensure client environments and data are secure as well as satisfying regulatory compliance requirements for such regulations. Burp Suite, DirBuster, Hp Fortify, N-map, SQL Map tools were used as part of the penetration testing, on daily basis to complete the assessments.

Established and improving the processes for privileged user access request.

Promoted a new and cost-effective Plan against Phishing Attacks and successfully reduced the volume of phishing mails up to 60%. Conducted attack analysis on the IDS reports to detect the attacks and reported the analysis.

EDUCATION

Master’s in engineering / Information Assurance

University of Colorado - Colorado Springs, CO GPA: 3.53

Bachelor’s in Business Administration / Information Systems and Technology

Old Dominion University – Norfolk, VA

CERTIFICATIONS

Certified:

oCertified CompTIA Security+ CE

oEC-Council - Certified Ethical Hacker (CEH)

oCertified Microsoft Azure Security Engineer - AZ-500

In Progress:

oCertified Information Systems Security Professional (CISSP)

oCertified Information Security Manager (CISM)

oCompTIA CySA+

oAWS Security



Contact this candidate