Bob Philippeau
(***) *** – **** – Eustis FL ***** *************@*****.***
https://www.linkedin.com/in/bob-philippeau-azure-aws-itilv4-cism-47649171/
Summary
14+ years of experience in IT Security leadership positions, with proven success leading highly skilled security teams within a large scale, high-availability IT operation with 24/7/365 accountability and has provided forensic analysis and troubleshooting to assist in the containment and remediation of security incidents working with the Incident Response team. Generating benchmark reports to make meaningful comparison and identify where to improve.
Effectively collaborate with a variety of stakeholders from top management to business and technical teams
Working knowledge of information/cybersecurity, infrastructure vulnerabilities, and network security products (hardware and software)
AI/LLM experience working with AI in cybersecurity, automation, data analysis, using tools like OpenAI Azure and OpenAI.
Familiar with secure code review, SAST/DAST, API security, threat modeling in application security. Also, use tools like Burp Suite, Fortify, Checkmarx, or NoName Security for API protection.
Over 5 years of experience working in the cloud security environment.
Over 8 years providing consulting services for multiple organizations.
Extensive work experience in Identity access management and have good knowledge about their architecture.
Experience with vulnerability assessment, penetration testing, and/or forensic analysis fields
Developing and managing DLP policies that align with the organization's data protection requirements.
Continuously monitoring data traffic and user activities to detect potential data breaches or policy violations using DLP tools.
Familiar with IT/IS standard, policies and guidance, risk standard and industry best practices (ITIL, MITRE, SANS, OWASP, NIST, FISMA, SOX, CIS, PCI DSS, Kill Chain Analysis, ISO, HIPAA, FedRAMP, HITRUST CSF, ISO 27001/270002), Secure Service Edge (SSE)
Tools: Vast experience in using SIEM tools like ArcSight, Splunk, LogRhythm, Tanium, QRadar, AlienVault, Solarwind, Ansible, RSA Netwitness, Terraform, Archer and IAM AWS, SecureID; DLP Websense Forcepoint, Carbon Black EDR/CB Response, CrowdStike (MDR, XDR), SentinelOne (XDR, MDR), Rapid 7 (MDR), Proofpoint, PAM CyberArk, SailPoint (SAP), BeyondTrust Bomgar, RBAC, RSA Aveksa, Algosec etc.
Education & Certification:
BA in Computer Science from Thomas Edison State University, Trenton NJ - 2017
A.A.S in Advertising Art and Computer Graphic from Bronx Community College, Bronx NY – 2003
Certified InterNetwork Engineer, CompTIA A+, Network+, Security+ & Linux+, MCSA, Cisco CCENT & CCNA, CEH from PCAge, Paramus NJ – 2014
Certifications: CISM, ITILv4, AWS, AZURE
Training: Azure AZ-900, SC-500, SC300, SC100; UX Design, AWS Security, AWS Cloud Practitioner, CrowdStrike, Cloudflare Zero Trust, Zero day, ZSCALER, SPLUNK, Netskope, Network Security, Palo Alto Cortex XIAM, XSOAR, SailPoint, CompTIA A+, Security+, Network+ MCSA, MCITP: Enterprise Administrator 2008, CCENT, CCNA, and Linux
Professional Experience:
V2Soft Jan 2024 – Present
Client: Florida State Department of Education (FLDOE)
Sr. Security analyst/Cyber Risk Manager (Remote)
Implemented, configured, monitored, and supported FDOE. Assisted in the role of DEL Solutions Architect to modernize the FDOE EFS Mod application in Azure, focusing on securing the environment and configuring the landing zone.
Leveraging NIST 800-53 Rev 5 publication, ISO2001, MITRE, attack to strengthen security and privacy controls to protect sensitive information, data exfiltration, privilege escalation, credential access, persistence, defense evasion, initial access, execution, lateral movement etc.
Data Discovery: Azure Purview excels in efficiently discovering and cataloging data assets across various sources, enabling organizations to gain comprehensive visibility into their data landscape.
Metadata Management: to offer robust metadata management capabilities, allowing users to capture and maintain metadata attributes, lineage, and relationships, facilitating effective data governance.
DOE Encryption and DLP – MS Purview to provide data governance solutions to help manage and govern the on-premises multicloud, software as a service (SaaS) data, map data landscape and automate data discovery.
Leveraging Palo Alto Strata Cloud, CASB and Proxy Solutions to Enforcing consistent security policies for users accessing cloud applications or websites, regardless of location. Preventing data exfiltration and unauthorized access to SaaS platforms. Advanced threat prevention in real-time for both managed and unmanaged applications. Supporting Zero Trust frameworks with granular access controls.
Data Classification: With built-in data classification tools, Azure Purview assists in identifying and categorizing sensitive data, helping organizations enforce data protection policies and comply with regulatory requirements.
Familiarity with Commercial Off-The-Shelf (COTS) products MS Office, Adobe Acrobat and Salesforce
Familiarity with data visualization tools (e.g., Tableau, Power BI) to present findings.
Policy GRC Enforcement: To enable the implementation of data governance policies and rules, enforcing compliance, access controls, and data usage policies across the organization's data ecosystem.
Configuring and maintaining DLP solutions and tools to ensure optimal performance and protection.
Monitoring the SOC Operation alerts to detect, analyze, and respond to cybersecurity incidents within an organization's network
Worked on CyberArk deployment, configuring the PAM solutions to align with the organization’s policies and compliance, setting up vaults, defining access controls and integrating with existing identity management.
Use CyberArk Vault Provider in Terraform, to manage passwords, credentials, safes, and other resources in the
SSE helps the organization meet regulatory requirements by enforcing consistent security policies and providing detailed reporting and auditing capabilities. increasingly adopt cloud services, SSE provides visibility, control, and protection for cloud-based applications and data.
Conduct digital forensics with Volatility by collecting forensic images of disks, memory analyzing RAM captures to detect malware, rootkits, and other forms of suspicious activities, and network traffic while maintaining chain of custody.
Implementing SSO, MFA, identity governance, adaptive authentication, API security.
Used MS Defender for Endpoint (Asset, MDM, Endpoint Central Cloud, software) management and security control.
FLDS Suite of Security Tools (RQ, Grey matter, Tanium, Armis, Palo Xpanse) Palo Firewall, MS Sentinel One MDR
Configure Microsoft Sentinel in Azure, Connect data sources, such as Azure Active Directory, Microsoft 365 Defender, and other cloud or on-premises systems.
Enable log collection and ensure data ingestion from connected sources In MS Sentinel.
Motoring alerts and investigating threats in Microsoft Sentinel
Use Tanium for real-time visibility to manage endpoints vulnerabilities, suspicious behaviors, incident detection, compliance check, applying security patches and more.
NAC – Aruba Wireless and Aruba ClearPass and familiarity with NAC tools implementation and configuration.
Familiar with AKAMAI cloud computing, security, DDoS mitigation and contend delivery network (CDN), BMC Remedyforce ticketing system for response.
Tools: NIST CSF 800-53, ISO 27001/27002, Mars-E, ITIL, MITRE, Mars-E – GDPR.
Wipro April 2021 to July 2023
Client: US. Bank, Honeywell, Corn Products International, INC (Remote)
Cyber Security Analyst-L4/SOC Lead (Remote
Leveraging NIST 800-53 Rev 5 publication, ISO2001, MITRE, attack to strengthen security and privacy controls to protect sensitive information, data exfiltration, privilege escalation, credential access, persistence, defense evasion, initial access, execution, lateral movement etc. Also, PCI DSS protect cardholder data and prevent credit card fraud.
Monitoring and reporting with Service Now (SNOW), Leverage ServiceNow’s automation features to streamline tasks like ticket routing and incident resolution.
Working with CSIRT and SIRT team to manage incidents, Configure log retention policies. Manage costs related to log storage and data queries.
Incident response, threat hunting, vulnerability management, and SIEM. Administer Bit9 Carbon Black Detection to Investigate, respond to Incident and Hunting for Threats, create rules monitor incidents, respond to them, and remediate using Carbon Black (EDR).
Managing and optimizing the use of Microsoft Sentinel within the organization, Monitor log ingestion for capacity and performance.
Configure alert severity and thresholds and Develop analytics rules to detect threats in Microsoft Sentinel.
Integrate Sentinel with third-party SIEMs, ticketing systems, or security tools.
Use Encase to perform Digital forensic analysis by examining logs, memory dumps and disk artifacts for indicator of compromise (IOCS).
Integrate Sentinel with third-party SIEMs, ticketing systems, or security tools.
Sending random, unexpected, or invalid data to the API to identify how it handles edge cases and potential security flaws.
Managing data loss prevention (DLP) policies, encryption, and identity management.
I triaged and investigated alerts to differentiate between false positives and actual threats, and promptly responded to threats flagged by MSSPs for further investigation.
Familiarity with database management systems (DBMS) like MySQL, Oracle, or SQL Server.
Proficiency in using SQL for data aggregation, filtering, and transformation.
Proactively hunted for threats during downtime, utilizing online resources such as Joe Sandbox, AlienVault, and
I specialized as a SIEM Engineer in RSA NetWitness architecture, focusing on monitoring, investigating, and conducting forensic analytics.
Managed and optimized Next-Generation Firewalls to ensure robust security and compliance across the network.
Integrated NGFWs with Palo Alto Cortex XSOAR and Splunk SOAR platforms to automate threat detection and response processes.
Developed custom scripts and automation workflows using APIs to facilitate seamless data exchange and improve incident response efficiency.
Using Splunk's Command Line Interface (CLI) allows you to perform administrative tasks and execute searches directly from the terminal.
Use Splunk ES (SIEM) solution to provide advanced analytics, monitoring, and response capabilities for security operations
Spearheaded the deployment and optimization of SOAR platforms, including Palo Alto Cortex XSOAR and Splunk SOAR, to automate and streamline incident response processes
Automating incident response processes, integrating security tools, and developing or managing SOAR platforms to help as reduced response times or improved efficiency through automation.
Integrate Carbon Black with Palo Alto Cortex using API to automate threat detection and response workflows by leveraging data from Carbon Black (for endpoint security) and Palo Alto Cortex XSOAR (for security orchestration, automation, and response).
Led the implementation and management of Palo Alto Cortex XSOAR for automating incident response processes.
Integrated Cortex XSOAR with existing security tools (e.g., SIEM, EDR) to streamline workflows and enhance security operations. Developed and optimized playbooks.
Flowing NIST 800-53, ISO 27001/2, PCI-DSS Guidance and HITrust Framework.
Tools: Troubleshoot NODE 0: OBC, DR CBC, UAT, PROD, DEV VM Tools
Cloud Destination Aug 2020 – March 2022
Client: NTT/Terumo Medical, Somerset, NJ
Sr. Security Engineer/ Incident Response (Hybrid)
Leveraging NIST 800-53 Rev 5 publication, ISO2001, MITRE, attack to strengthen security and privacy controls to protect sensitive information, data exfiltration, privilege escalation, credential access, persistence, defense evasion, initial access, execution, lateral movement etc.
Proficiency in Office 365 security features and tools (e.g., Microsoft Defender for O365, Security & Compliance Center).
Assess vulnerabilities and attacker tactics, techniques, and procedures (TTP) and provide defensive action to locate and prevent threats.
Worked with other investigation tools such as Fortinet Analyzer firewall, McAfee EPO/ENS to ensure compliance, LogRhythm, Proofpoint to investigate email-related threats (ETP), Microsoft Azure Cloud Security to manage AD user PAM access, SCCM, Citrix.
Proficiency with SailPoint IdentityIQ 8.0, including configuration, administration, and troubleshooting.
Integrating Azure with Okta to enable a seamless, secure identity and access management solution for cloud-based resources, improving user experience, security, and administrative efficiency Administered Microsoft Azure IAM, setup risky user watch, manage access, and possible to automating infrastructure deployment and configuration at scale, Key Vault to encrypt and store keys and secrets in FIPS validated HSMs in the cloud.
Monitor the status of access requests and approvals, addressing any holdups with (Sailpoint) SAP. Process user access requests, ensuring they follow the appropriate approval workflows
Developed and maintained custom playbooks in Splunk SOAR, leading to an increase in efficiency and faster threat remediation
Use Splunk's Common Information Model (CIM) to standardize data for correlation and reporting. Configure Splunk ES to align with your organization's security policies and requirements.
Using Splunk's Command Line Interface (CLI) allows you to perform administrative tasks and execute searches directly from the terminal.
Use Splunk SOAR for security orchestration, automation, and response (SOAR) solution
Handled complex issues with Guardium components and followed through until it is resolved.
Controlled access to specific data within the EPM database, enabling me to grant users access to particular rows, columns, or fields in an EPM database table.
Managed the offshore SIEM team.
Responsible for identifying, analyzing, and troubleshooting IT application issues.
Worked with users or corporate accounts in professional applications.
Created Phishing Campaign with Knowbe4
Ensured bad IPs are blocked in Fortinet and LogRhythm logs are properly processed for less false positive.
Worked with Microsoft Defender ATP detect, investigate, and respond to advanced attacks.
Worked on Mobile Iron and Intune Mobile Device Management (MDM)
Reviewed Digital Shadow dashboard and creating reports, also reviewed and make changes to windows policies
Took SOC escalation notifications and defined actions.
Demonstrated the ability to use LR/SOC output to assess posture impact and recommend changes.
Served as a subject matter expert (SME) across the enterprise for Data Loss Prevention (DLP) and Classification, while also managing associated DLP policies and administering Identity Access Management (IAM) roles in AzureEnsure devices and software are in compliance.
Pyramid Consulting July 2019 – March 2020
Client: DXC Technology/UTC/DoD, (Remote)
Global Account Security Officer
Lead the SIEM Team, SailPoint (SAP) v9.1 (IAM), RSA Netwitness architecture (monitoring, Investigating, and forensic analytics), RSA Archer, Rapid7 to accelerate Security, Qualys Vuln Management, Compliance network intel and user risk on endpoints, and Tanium for real-time client management. Budget balancing for projects.
Assisted in SCCM and Tanium migration project to create possible related issues during migration/Deployment, auditing, and control.
Roles and Responsibilities:
Implemented infrastructure changes with version-controlled configuration files with Terraform.
Used Rapid7 suite to provide cybersecurity solutions to help the organizations to identify, prioritize, and mitigate security risk.
Used Qualys to automate vulnerability assessment, view the organization’s security posture and to continuously monitor and prioritize vulnerabilities.
Worked as a SME on BeyondTrust Privileged Access Management (PAM) elevates privileges to the necessary applications, control application usage, logs, and reports on privilege activities using security tools already in place.
Managed privileged account lifecycles using BeyondTrust Password Safe, including automated credential rotation, secure check-in/check-out processes, and enforcing role-based access controls (RBAC).
Monitored and audited privileged account activities with BeyondTrust Password Safe, generating compliance reports and integrating with SIEM tools for proactive threat detection and incident response.
Encryption bypass: Checkpoint, BitLocker, McAfee, Symantec Endpoint.
Custodian collections: Remote Users, Microsoft Compliance Center
Smart Source Feb 2019 – April 2019
Client: The Clearinghouse, New York, NY
Sr. Security Engineer
Identified intrusion activity from alerts and reports correlated across sensors and systems, prioritizing responses accordingly, while specializing in insider threat prevention and user behavior analysis
Proposed additional controls aimed at detecting and preventing malicious activity.
Worked with third-party MSSP, and other company-wide engineers, analysts, managers, and others on monitoring and incidents, detection, and prevention.
Expertly manage SOC tools, endpoint security, firewalls, and related technology while overseeing threat monitoring, threat intelligence, and business analytics. This includes fusing data from all monitoring feeds for correlation and analysis and researching emerging security threats.
Tools: NetIQ Microfocus IDM, AWS Identity and Access Management (IAM), Websense Forcepoint DLP user behavior analytics, Carbon Black EDR, LogRhythm, ArcSight, Proofpoint, Wireshark, encase 7, AWS Key Management Services (KMS) and McAfee ENS to protect endpoints against malicious activities.
Pyramid Consulting Aug 2018 – Nov 2018
Client: Becton Dickinson (BD), Franklin Lakes, NJ
SecOps Lead/Incident Response L2 CSIRT
Leveraging NIST 800-53 Rev 5 publication, ISO2001, MITRE, attack to strengthen security and privacy controls to protect sensitive information, data exfiltration, privilege escalation, credential access, persistence, defense evasion, initial access, execution, lateral movement etc.
Managed about 16 team members worldwide
Managed incident response activities, intrusion detection processes, security for the infrastructure and third-party vendor.
SSE integrates threat intelligence and advanced security features like UEBA to detect and respond to sophisticated cyber threats.
Utilized SentinelOne XDR to detect and respond to real-time threats using AI-driven analytics and behavioral threat detection and hunting.
Worked with Cloud Access Security Broker Forcepoint CASB/Integrated Identity Access management IAM, Active Directory, conditional Access Policies, Linux/Unix file permission.
Used Forcepoint to monitor data sharing for IOCs, DLP via computers and mobile devices, gain visibility over user activities and adjust rules.
Took lead on incident severity level 3, 2, and 1 incident to remediation.
Work on the implementation of Crowdstrike MDR/XDR in collaboration with Splunk SIEM tool
Created custom scripts to pull data via the API, transforming it into a format suitable for ingestion into the SIEM.
Used System Center Operation Manager (SCOM) to monitor IT data center OS and hypervisors.
Assisted in LogRhythm/SIEM deployment, to manage cybersecurity logs, events, network, security analytics, endpoint monitoring, and forensics
Familiar with Securework MDR– Red Cloak Endpoint Threat Detection.
Experienced with Symantec Endpoint Protection, for threat, anti-malware, vulnerabilities prevention, and firewall features to secure servers and computers.
Used FireEye NX/HX threat intelligence analysis to Provide tactical and operational intelligence support, Discover, research, and defines individual threat group, Blue Coat SG management and support, Checkpoint management and support, Palo Alto.
Palo Alto Networks (Prisma Access) provides SSE services as part of its broader SASE offering.
SSE supports zero trust principles by enforcing strict access controls and continuous verification, minimizing the risk of unauthorized access.
Worked with Info Security Runbook process documentation.
Lehigh Technology Feb 2018 – Aug 2018
Client: Natixis Bank, NYC, NY
Security Analyst
Leveraging NIST 800-53 Rev 5 publication, ISO2001, MITRE, attack to strengthen security and privacy controls to protect sensitive information, data exfiltration, privilege escalation, credential access, persistence, defense evasion, initial access, execution, lateral movement etc. Also, PCI DSS protect cardholder data and prevent credit card fraud.
Engineered operating system deployment task sequence using SCCM OSD, MDT, Imagex, Altiris,
Implemented Microsoft Azure AD Multi-Factor Authentication (MFA).
MicroFocus Access Manager enables single sign-on and secures access to web-based applications, SaaS services, and federated business-to-business interactions.
SentinelOne XDR detects and responds to real-time threats using AI-driven analytics and behavioral threat detection. Integrate Sentinel with third-party SIEMs, ticketing systems, or security tools. Use APIs for advanced data sharing and integration.
Submitted Application Packaging Requests and certification for production.
Migrated from MS Exchange to Office 365.
Responsible for assisting on projects for other groups, such as Facilities & Infrastructure and Engineered and support groups globally.
Monitored network performance and provided network performance statistical reports for both real-time and historical measurements, and recording using SIEM Splunk.
Used FireEye NX to scan e-mails attachment for malicious scripts, detect multi-flow, multi-stage, zero-day, ransomware and other advanced attacks, detects known and unknown threats in real-time while also enabling back-in-time detection of threats, automates validation and blocking of attacks across multiple vectors, provides evasion proofing and to Immediately stops attacks.
Abigail Consulting Dec 2016 – Oct 2017 Client: Nordea Bank, NYC, NY
Information Security Analyst
Leveraging NIST 800-53 Rev 5 publication, ISO2001, MITRE, attack to strengthen security and privacy controls to protect sensitive information, data exfiltration, privilege escalation, credential access, persistence, defense evasion, initial access, execution, lateral movement etc. Also, PCI DSS protect cardholder data and prevent credit card fraud.
Created and maintained documents and log reports for various modules including Release History on SharePoint.
Familiar with Cisco Cloudlock for cloud security CASB/Integrated Identity Access management IAM, Active Directory, Active Directory Connect, AD FS, ID Protection, MFA, Linux/Unix file permission.
Experienced on Sailpoint IQ v7.3 Identify administration governance and access governance.
Responsible for Splunk SIEM log data monitoring, McAfee EPO to detect risk and maintain compliance.
Performs web application attack & penetration (A&P) testing to find security issues such as risks, defects, and logical errors.
Administered AMLR Risk-based Market Customer Due Diligence Application (CDD Tools).
Administered Risk-based Market Counterparty Due-Diligence Application (Counterparty Tools)..
Ensured team leaders attested to the information entered in RSA Archer.
Managed Avigilon Central Center 5 client card-key access control and updating the user card-key access system to keep the log updated.
Managed IAM RSA SecurityID Console, Assign/reset, and clear RSA Tokens.
Direct Travel HQ, Paramus, NJ May 2014 – Oct 2016
Data Security Analyst
Worked with internal business units to drive secure configurations in images used for desktops, servers, network devices, and wireless network devices.
Designed, implemented and managed robust endpoint security solutions.
Integrating CrowdStrike with other security tools and platforms such as SIEMs, SOARs, and other endpoint management systems.
Used IBM Guardium for vulnerability assessment, monitoring and analytics, data protection and classification, threat prevention, assessment management, patching, audit, and compliance and perform scalability.
Understand Vulnerability Scanning output and work with the team to develop a patching plan.
Knowledge of RSA Aveksa Identity governance and lifecycle.
OWASP Tools Expertise: Hands-on experience with OWASP ZAP for dynamic application security testing (DAST) and Dependency-Check for vulnerability management.
Administered CyberArk PAM, configured CA Password Vault, CPM, PVWA, psmp, and PSM, and utilized Carbon Black for threat response and hunting, along with Burp Suite and AppScan for Ethical Hacking.
Experienced with HP ProLiant and Dell PowerEdge and Blade servers. Configuring and Mirror and RAID.
Sailpoint used for governance identity access management IAM, IDM and ping Identity to free the digital enterprise by providing secure access from the right person to the right device.
Used PowerShell to automate and manage CyberArk environments to streamline tasks such as password management and session monitoring.
PingAccess agents provide a one-to-one replacement option for migration from current WAM architecture.
CISCO CloudLock – Cloud Access Security Broker (CASB), and cloud security platform to gain visibility in protecting users, data, and apps in the cloud by mitigating risk and data breaches through automation.
Enrolled mobile devices (Android, IOS, Mac OS) and Windows 10 devices to AirWatch MDM system.
Crédit Industriel et Commercial Bank (CIC), NYC, NY Feb 2015 – May 2015
Security Analyst/Mobile Asset Enterprise Manager
Leveraging NIST 800-53 Rev 5 publication, ISO2001, MITRE, attack to strengthen security and privacy controls to protect sensitive information, data exfiltration, privilege escalation, credential access, persistence, defense evasion, initial access, execution, lateral movement etc. Also, PCI DSS protect cardholder data and prevent credit card fraud.
Managed asset management via WASP Mobile Technology, Setup barcode printer and database.
Designed asset management template via spreadsheet and MS Access Database, inventory tables, and Risk Assessment and Management (IAM).
Working with SIRT to manage and maintain antivirus, anti-malware, and endpoint detection and response (EDR) tools.
Microfocus Identity Manager to manage end-to-end identity administration and user provisioning solution, SailPoint governance Identity Access management.
Worked with SIEM to manage Log data packets from network devices, host assets, operating systems, applications, vulnerabilities, and user activities and behaviors.
Analyze the scan report and provide the recommendations and risk assessments to technical teams based on severity.
Palo Alto Wildfire anomaly detects, repairing the weekly and monthly dashboards for remediation status.
Managed Rules/Policy, MDM, MDT, Active Directory (AD) GPO mgmt, IOC, TCP/IP, IDS/IPS, IAM, PIM/PAM.
Deployment, Migration, monitoring,Troubleshoot, Response, Analysis, Vulnerability, Compliance, Assessment, Patches, Configuration, Managing logs, KVM and Syslog Monitoring, Reporting, filters, Inventory, Develop, Testing, training,
Mindray North America, Mahwah, NJ Feb 2014 – May 2014
Security Engineer
Monitored logs, events, Run Ghost backup, image or win, and XenMobile device monitoring and management.
Developed and implemented security policies and procedures for endpoint protection.
Monitored and responded to security incidents, performing root cause analysis and implementing corrective actions.
Developed and implemented security policies and procedures for endpoint protection.
I tested and developed Citrix Xen Server and managed print server and print queue.
TSQL queries, Managed Server 2008 R2 and MySQL, and deployed Citrix XenApp and XenDesktop.
Used Symantec Ghost to make boot imaging software, Bit locker encryption, Share, map Network drives, and printers.
Used PingIdentity and PingAgent for application access management, and to be built on open agent protocol.
Provided Maximo asset production support and managed all Technical Project for Citrix, VMware.
Installed, configured and used WASP for inventory control and Dell KACE (KBOX) system management appliance of IT
Performed network maintenance, troubleshooting, and repaired computer connections.
Installed PC Cillin antivirus, configure, scan/remove viruses, and update.
Environment: SCCM, MDM, MDT, Active Directory (AD) GPO mgmt, IOC, Qradar, TCP/IP, LAN/WAN, IDS/IPS, VOIP
MetLife, Somerset, NJ Nov 2013 – Feb 2014
Security Analyst
Performed migration from Lotus Notes to Outlook, build Lotus Notes and Outlook’s new user profile account, and join them to their designated domain.
Troubleshot hardware and software issues for HP, Dell, and Lenovo desk-side systems, managed encryption/decryption, system wipes, backups, and system reimaging.
Managed NetSuite ERP & SAP and supported Desktop/Laptop PC/MAC and Mobile devices.
Managed and deployed Maas 360 MDM applications to Blackberry devices and used Symantec Ghost for imaging.
Environment: F5 Load Balancing, MS SQL server backup/restore, USMT4 migration, VMware, BMC Remedy, Marimba Software Manager, Lotus Notes, Ms Outlook, OWA, POP3/IMA4/SMTP, Mobile active Sync, VPN, TCP/IP, SCCM, MDM, MDT, Active Directory (AD) GPO mgmt, IOC, Qradar, TCP/IP, IDS/IPS, ITSM.
Pfizer Pharmaceutical Peapack NJ July 2010 – Nov 2013
Security Vulnerability Officer
Performed system maintenance such as software version control, Active Directory users’ access, and Policy, log checking, exception reporting, data integrity.
Monitored Symantec Endpoints protection for outdated, offline,