Post Job Free

Resume

Sign in

Security Engineer Information

Location:
Rosemount, MN, 55068
Salary:
135000
Posted:
August 02, 2023

Contact this candidate

Resume:

Rick

Prairie CISM, MSCSIA

adyolt@r.postjobfree.com

www.linkedin.com/in/rick-prairie-6541831

Results-driven Certified Information Security Manager (CISM) with a master’s degree in IT Security and Assurance; successfully leading, developing and implementing technology-based business initiatives and solutions that elevate corporate capabilities and competitiveness. Possess a detailed knowledge of security tools, technologies and best practices. Strengths

• Successful history of taking on industry challenges and developing secure business-focused secure solutions.

• Ability to explain and present highly technical concepts with all levels of IT, business and customers.

• Have led and developed many IT related initiatives and technologies which include analysis, review, and implementation of tools and products in support of business requirements and security initiatives.

• Demonstrated ability to develop high performance teams who understand updates in technology and how to execute them as the business needs change.

• Extensive network of IT professionals, leaders, and vendors relationships to provide significant value-add to any organization.

Experience

03/2023 – 05/2023

Associate Security Architect (Contract)/QSI/API Group Inc, New Brighton, MN

• Assist with conducting Risk Assessments and documentation creation.

• Detect and report weaknesses in existing protocols, recommending, and implementing modifications & improvements.

• Working with GRC Team to drive efforts for mapping of industry frameworks and standards for security controls, including NIST CSF/NIST 800-171-NIST SP800-171 controls.

• Create/build Secure Baseline Program for identifying hardening practices to the IT remediation teams for hardening workstations and servers.

• Mature API’s Cloud Security Posture Management (CSPM). Identify rogue subscriptions, triage/prioritize/remediate findings to increase secure score and reduce critical risk. 2021 – 2023

Senior Security Engineer/Finastra, Lake Mary, Florida (100% Remote)

• As a team member of the Security Architecture & Engineering CISO Group, was responsible for achieving, meeting, and maintaining regulatory compliance.

• As an organization that provides a portfolio of products and solutions to the retail banking sector, application and OS hardening was a primary focus. 2

• Create and maintain CIS Compliant hardening policies for multiple operating systems to include Windows Servers, Domain Controllers, VMware, RedHat Enterprise Linux, FortiGate Firewalls and more.

• Provide technical oversight for several problems and issues across the enterprise.

• Senior technical and systems integrator working with subject matter experts, while focusing on securing vulnerabilities and reducing risk to the organization.

• Monitor and analyze security controls and procedures across the enterprise related to the use of assets and information systems for compliance.

• Assist in architecture design for CyberArk to force vendor connections through recorded auditable sessions that only allow specific connectivity to allowed systems during agreed upon timeframes.

• Provide on-going support for Z-scaler and similar security tools in multi-tenant Azure environments for our global organization.

• Create 0365 DLP rules that align with organizational goals and policies. 2020 – 2021

IT Senior Security Engineer/CVR Energy Inc, Sugar Land, Texas

• Maintain day to day Systems Administration/Engineering responsibilities while being involved in architecting systems solutions to meet business needs per policy and compliance needs

• Work alongside security engineers, vendors, auditors, and other third parties to ensure security technologies are professionally designed, implemented, and configured

• Develop vulnerability management program utilizing Rapid7/Nessus/InsightVM security scans to remediate and harden system vulnerabilities across the environment while classifying and prioritizing findings for remediation.

• Maintain technical skillset by initiating and providing hands-on support for technologies including Palo Alto Networks Cortex/Traps, Netskope Cloud Access Security Broker, CyberArk, Tripwire and Varonis

•Work with external auditors/vendors while conducting internal/external penetration testing to aggressively test our enterprise from critical vulnerabilities and conduct necessary remediation efforts.

• Implement and configure CyberArk system to manage privileged accounts and service accounts resulting in greater protection to critical systems, IAM (Identity Access Management) and PAM

(Privileged Access Management) solutions.

• Administer Proofpoint security gateway and targeted attack protection service to greatly improve email security including DLP (Data Loss Prevention) in information protection module. 2017 – 2020

Cyber Security Engineer/MDU Resources Inc, Bismarck, North Dakota (100% Remote) Develop Information Security Plans and Policies-Critical Security Controls, SANs, and NIST. Establish and continually refine the information security and risk management/governance framework while building and managing our security posture. Decommission of current MSSP

(Managed Security Service Provide) and McAfee Nitro SIEM. POC and build out of new LogRhythm SIEM and on-board new MSSP. Work with all the internal teams creating “Use Cases” for all of our technologies including Checkpoint and Palo Alto, O365, Azure and many more. Strong vendor management, leadership, and team building skills. Provide enhanced SIEM security measures to facilitate our OT (Operational Technology), ICS

(Industrial Control Systems) networks and SCADA (Supervisory Control and Data Acquisition) environments. Create learning rules in the SIEM to detect anomalous traffic to learn of unwelcome protocols and activity in these isolated environments. 3

Implement Protections-Implement, plan, monitor, and manage our Enterprise SIEM for the protection of systems, networks, and organizational data. Build an enterprise DLP (Data Loss Prevention) program to protect data leaving our organization. Configure Advanced Threat Protection (ATP) in O365 for cloud security.

Test for Vulnerabilities-Conduct Nessus Scanning, Carbon Black, Red Canary, Varonis and Pen Testing.

Security Breach-Build call escalation procedures and troubleshoot documentation for Threat Response Analysts (TRA’s) for security and network related issues. Work with Internal Audit and third-party auditors for removing risk to the organization. Knowledge of disaster recovery technologies and methodologies.

2006 – 2017

IT Security Engineer (3 Years) Prime Therapeutics LLC, Eagan, Minnesota As an IT Security Engineer at Prime Therapeutics LLC, have responsibilities for selection, build and implementation of many of the security tools that are required by our organization. Conducting RFP's (Request for Proposal's), POC's (Proof of Concept) and product selection is only a small part of my role. Not only does my team build the products that we use within the organization, but we also ensure their usefulness. Selection of the correct vendor (vendor negotiation) and product is important, but you also need to know how these products integrate into existing technologies to ensure proper ROI.

• Driving the SIEM (Security Information and Event Management system) upgrade, replaced RSA Envision Appliances with IBM Q-Radar SIEM with side-by-side implementation. Port over all log sources (more than 4000 in total), identify missing sources, create new rules, test rules and fail-over HA/DR (High Availability/Disaster Recovery) for successful product implementation and advanced logging and monitoring for our Incident Response Team.

• Lead Engineer on the DLP (Data Leakage Protection) Project, wrote requirements, selected vendor and Implemented Enterprise DLP Solution and rule tuning. This implementation served as an enforcer of data security policies and helped us understand how data was leaving the organization. Writing custom scripts using regular expression, we could quarantine emails that contained sensitive content and stop them from leaving the organization saving thousands of dollars to the organization on violations and ultimately fostering an environment where we could educate our employees.

• Responsible for oversight of regulatory adherence; work with internal and external auditors on a consistent basis to identify security gaps in our environment. Engaged businesses where and when needed to produce requested data and prioritized importance and necessity of remediation.

• To educate our internal users and reduce risk to our organization; served as technical lead engineer for Phish-Me Environment for reporting enterprise phishing emails. Worked with security training personnel to develop criteria to educate our users and create specialized training in our new hire process for employees specifically working with sensitive data.

• Technical Lead to ensure proper compliance; setup Tripwire Enterprise Environment to conduct vulnerability and remediation scans. Install and configure all CIS, PCI, and HIPAA Policies. Create hardening policies and FIM (File Integrity Management) guidelines. Create custom policies for IBMi and Open VMS environments for successful policy scoring and determination. Worked with all business units to ensure proper reporting and scoring of devices and wrote custom dashboards for upper management. This closed a PCI gap in our environment that was previously determined in an audit finding.

• For PCI Data Security Standard (PCI DSS) and DAR (data at rest) scanning; Installed Varonis 4

Infrastructure to protect cardholder data where it is processed, stored and transmitted. Setup monitoring all our file servers for sensitive data; created custom reporting for GRC (Governance Risk and Compliance) Team for remediation and data matrix for management so sensitive data was accurately reported. This was done for successful implementation of Blue Cross Blue Shield of Alabama Implementation.

• Maintain existing security environments to include IDS/IPS (Checkpoint and Dell SecureWorks). FireEye NX and HX, Tufin, CyberArk (password vault), ITIM and ITAM

(Identity and Access Management). This was necessary to ensure the health and uptime of these tools from a reporting and health perspective.

IT Senior Systems Engineer (8 Years) Prime Therapeutics LLC, Eagan, Minnesota As a Senior Systems Engineer, was responsible for the health and uptime of more than 1400 Windows and Unix based systems. While ensuring uptime worked with our internal audit and compliance teams to ensure and maintain standards to help safeguard against data exposure of PCI, PHI, SSN, and Member Data. Managed many environments to include Financial, McKesson, FileNet, WebSphere, Apache Tomcat, Cisco, Voice and IIS related applications.

• Responsible for all Microsoft Active Directory Domain functions. Participated in large scale domain migration to include site topology, trust relationships, OU Structure, including Wins, DNS, DHCP, User and Group creation, Group Policies and permissions.

• Maintain and Build VMware ESX, ESXi, and View environments.

• Served as Lead Engineer while completing Data Center build out (to Primary DC from Texas) in Eagan, MN and co-location Disaster Recovery Site in Minnetonka, MN.

• Build out of DR/HA tiering and standards for all tier 1-3 applications and hardware.

• Provide support for all Windows versions and administer IBM Director, Net Cool, TSM, and IIS

• Citrix XenApp support for Script Med, Case Trakker, Assurance, and VMware View environments.

• Provide third level support to Service Desk, EOC (Emergency Operations Center), and Field Operations support teams.

• Leader in vendor management, standards determination, and change management using ITIL Standards.

Certifications

CISM-ISACA’s Certified Information Security Manager/2023 A+ Certification-CompTIA/2000

5

Education

MAY 2011

Master of Science in IT Security and Assurance/Capella University, Minneapolis, Minnesota

DECEMBER 2009

Bachelor of Science in Strategic Management of Information Systems/Cardinal Stritch University, Milwaukee, Wisconsin

AUGUST 2008

Associate of Science in Business/Cardinal Stritch University, Milwaukee, Wisconsin Military Experience

JANUARY 1984-JANUARY 1988

U.S. Army-Honorable Discharge (previous security clearance) OCTOBER 1988-OCTOBER 1992

U.S. Army-Honorable Discharge (previous security clearance)



Contact this candidate