Post Job Free
Sign in

Security Analyst Information

Location:
Anaheim, CA
Posted:
August 16, 2022

Contact this candidate

Resume:

Zeeshan Ahmed Khadeer

Career Summary

Has around 5 years of experience implementing security in different phases of SDLC; hands-on experience in Incident management, vulnerability assessments, and OWASP using security testing tools. And has experience working in an Incident response and NOC environment, using tools like ArcSight and Splunk.

Highlights:

Prioritization and assignment of all Incidents, Service Requests, Changes, and Problems assigned to the team’s Service Now queue

Investigation and diagnosis of all Incidents, Service Requests, Changes, and Problems assigned to the team, documenting findings in ServiceNow and reassigning to appropriate groups where required

Resolution of all Incidents, Service Requests, Changes, and Problems that fall within the scope of the team access and ability to provide recovery of service

Worked through the DREAD approach which is used for ranking the threads as per the CVE calculator and applying them mitigation as required.

Experience with network infrastructure architecture and administration

Strong knowledge of manual and automated security testing for web applications

Good experience in exploiting recognized vulnerabilities, CSRF, XSS, SQL Injection, session management, input validations, output encoding, cookie attributes, encryption, privilege escalations

Resolved escalated tickets in ServiceNow ensuring clients had uninterrupted access to web applications

Involved in implementing and validating the security principles of minimum attack surface area, least privilege, secure defaults, avoiding security by obscurity, keeping security simple, fixing security issues correctly

Experience in Threat Modeling during requirement gathering and design phases

Performed software Licensing audit

Excellent problem-solving and leadership abilities

Experience working in a 24/7 support monitoring environment

Had worked on Service now as a ticketing system for solving the issues.

Technical Skills

Security Standards

OWASP, SANS, NIST.SOX, ISO 27001

Tools

Web Inspect, Checkmarx, Nmap, Nessus, Burp Suite, Splunk, FireEye, Nessus Vulnerability Scanner, Wireshark, ServiceNow, OWASP, BURP Suite, ITIL, Splunk, SaaS

Operating Systems

Windows 7/8/10, Kali Linux, Mac, Unix

Networking

TCP/IP architecture, OSI model

Cloud Technologies

AZURE, AWS

Professional Accomplishments

Rivian Automotive, LLC Oct 2021 to Present

Major Incident and NOC Analyst

Has the duty to manage incidents with a priority of 1 or 2 and communicate with stakeholders while upholding SLAs.

Establish major incident communication channels with all stakeholders and make sure the resolution teams are adhering to the incident management methodology.

Take the initiative to resolve the issue within SLA and adhere to the problem management process.

Collaborated with other teams to identify improvement opportunities and make sure the incident management process is successful from beginning to end.

Analyzed the extended managed service providers' operational support and oversee the corrective actions.

Created incident-related performance analysis and reports for IT managers to analyze.

Performed other tasks relevant to the job that was assigned

In depth understanding of necessary technologies, including phone and data networks, LAN/WAN, security infrastructure, Windows, and Unix platforms, etc.

Worked closely with other teams in the development of business-aligned incident management processes

Creates policies and processes to make sure action items related to incident management and the service desk are tracked and completed.

Management and oversight of Incidents and communications at various levels during the incident life cycle

Understanding business needs and assisting in adjusting internal processes to meet these needs

Monitoring Incident Management team levels of performance against agreed quality standards and KPIs

Ensuring the development of the Incident Management team, proactively identifying areas for improvement

Acting as a point of escalation for any technical issues within the team

Highly skilled in all aspects of Incident Management. (ITIL)

Ability to coordinate various levels of IT Services personnel across multiple locations and cultural backgrounds

Ability to multitask time-critical tasks whilst maintaining the highest levels of quality

Knowledge of current IT infrastructure and application technologies.

Nexa IT Resources March 2019 to Aug 2021

Vulnerability Analyst

Deployed, completed, and created reports of IT risk profiles and risk assessments

Identification of injection, business logic, authentication, session management-related flaws in applications and encased attack scenarios and associated risk to the business

Provided preventive, mitigation, and compensation controls to ensure the appropriate level of protection and adherence to the goals of the overall information security strategy

Worked closely with application development teams to participate in design reviews and provided inputs from the security point of view at the early phases of development

Conducted security assessment for all user roles efficiently

Conducted rigorous security assessments for the application using tools such as Burp Suite, SQL Map, Fi Map, Directory Buster, OWASP ZAP, Nessus, NMap, Kali Linux

Actively searched for potential security issues and security gaps that were beyond the ability of detection by any security scanner tool; initiated and developed new mechanisms to address unidentified security holes and challenges

Used standards such as CVSS (Common Vulnerability Scoring System), CVE, and DREAD approaches to provide the criticality (Critical, High, medium, Low) rating to the vulnerability identified

Good knowledge of network and security technologies such as Firewalls, TCP/IP, LAN/WAN, IDS/IPS, routing, and switching

Assisted in IT security compliance policies framework reviews (such as ISO 27001/2, NIST, SOX COBIT, HIPPA) for various IT platforms, developed and interpreted IT security policies, technical security standards, security operating procedures, and processes for various technologies to stakeholders

Maintained, created, and operated a schedule of vulnerability scanning, including business coordination with IT stakeholders, established vulnerability scanning resolution on the server, AZURE cloud, and desktop environments

Experience with ITIL tasks using the JIRA ticketing tool and tasks given through managers (procedure, task, and checklist).

Familiar with AWS and instance.

Fairbit LLC August 2017 to January 2019

Security Analyst I

Managed and monitored real-time events for the security devices (Firewall, Routers Servers) using ArcSight

Performed log monitoring and analysis for devices such as Cisco firewalls, IDS, IPS, Windows servers, Unix servers, and proxies

Incident analysis and management in the Security Operations Center

Prepared daily reports and security advisory for devices

Prepared monthly incident reports with a complete analysis of client devices which included the top virus-infected machines and top attacks on vulnerable ports

Monitored all critical ports of firewalls for continuous security threats and performed false-positive analysis/troubleshooting for known less critical security incidents

Performed security analysis and vulnerability assessments with Nessus

Participating in monthly customer review meetings to discuss various networking equipment performance

Used SPLUNK Enterprise to perform to establish network baselines and alerts and carried out Network monitoring tasks as per requirements.

Knowledge of the NAGIOS tool for overall network and appliance monitoring.

Experience working in a 24/7 support monitoring environment.

Education/Certifications

University of Cumberland

Master of Science in Information Security



Contact this candidate