Post Job Free
Sign in

Information Security Engineer

Location:
West Chester, PA
Salary:
135000
Posted:
May 09, 2025

Contact this candidate

Resume:

Sean Grady

*** ****** ****, **** ******* PA ***80

E-mail: *************@*****.***

Phone: 610-***-****

LinkedIn: www.linkedin.com/in/seangrady1707

Indeed: https://profile.indeed.com/p/seang-srjbnqq

Authorized to work in the US for any employer

Objective

Information security engineer seeking to provide professional grade strategic proactive security solutions, advisement, support, risk analysis, incident response, malware handling, and threat landscape research

Professional Experience

Senior Information Security Engineer

Comcast

West Chester, PA - April 2020 to December 2024

Lead Security Engineer serving a Custom Threat Reporting Portal for Comcast Business based on UTM Device events (Layer 3-7)

Designed, Developed and implemented a custom Threat Report page that allowed clients to easily drill down into security threats presented that were classified as High Risk between all of the UTM Modules

Administration and engineering of Snowflake Database as a Service

Tableau workbook development for service metrics and client facing workbooks

Remediation of vulnerabilities identified on the Threat Reporting portal and technologies driving service

Documentation of service in internal wiki including items such as topology, dataflow, service flow and past incident details

Senior level support to clients who are having issues seeing their data or wish to know how to use the portal better

Development and repair of Threat Reporting pages for the Threat Reporting portal

Administration and repair of Databricks workflows, compute and run issues

Design and implemented Monthly Business reviews on how the Threat Reporting Portal has been running for the past month, our accomplishments and future state goal setting

Lead SOC 2 Audits against the Threat Reporting portal and the technologies supporting it

Performed User Access Reviews for our Snowflake and Tableau environments

Performed status review of clients and appliances reporting in as well as threats clients are experiencing and pages customers visited most often

Performed threat event reviews based on client need and service needs to discover threats and load as well as events that may be overloading customers implementations

Implemented custom concourse configuration and jobs based off of GitHub repos in order to manage code changes

Worked with AWS s3 buckets, security policies for AWS objects and ran SNS topics to notify run team of any latency issues within the Threat Reporting portal

Partnered with run team in order to validate UTM assets are in place for each customer order

Designed, developed and implemented reports on threats that have impacted our customers’ UTM devices globally based on threat module, top talkers, and points of interest based off of common and unique threat characteristics

Senior Information Security Engineer

Comcast

West Chester, PA - September 2017 to April 2020

Worked as a Contract Employee through Brooksource in Sept 2017 to Sept 2018 then hired on as an FTE

• ArcSight SIEM Solution Management

• Part of a team that prospected, architected, implemented and continuously improved a new SIEM technology into the business: Splunk ES SIEM Solution

• Use Case development and implementation in ArcSight ESM, ArcSight Logger, and Splunk for malicious and/or unauthorized behaviors

• Designed and implemented Cyber defense strategy modeling utilizing attack and threat vector implications

• SIRT/CIRT Strategy and program development

• Design and implementation of Log and Event Management of enterprise systems

• Threat Hunting and Discovery

• PCI Compliance Initiatives

• Event review for malicious, and unauthorized behaviors with tools such as...

Host-based malware and forensic solutions

Layer 3-7 network security devices

Windows, Linux, and Unix Platform logs

Lead Information Security Engineer (Contract Employee)

AT&T / Dupont

Wilmington, DE - March 2017 to April 2017

• Configuration Improvement of Juniper, and Cisco configurations

• Network Security Policy Management through utilization of Firemon to reduce risk, improve compliance, and assess pathway changes

• Chemical-terrorism Vulnerability Information (CVI) Authorized User Certification

Information Security Engineer

Five Below

Philadelphia, PA - November 2015 to November 2016

• Performed as sole information security resource for national retailer

• Information Security Strategy development driven by Risk and Threat Mitigation

techniques utilizing industry guidelines such as CIS, NIST, SANS, and ISO 27001/2 combined with driver

indicators from data breach investigation reports as well as Third Party Risk Assessment feedback

• Information Security Solution prospecting, design and continuous improvement in the

following areas: host-based anti-malware detection/prevention, network-based anti-malware prevention/

detection, vulnerability management, threat intelligence integration, Layer 7 Firewalls, Malicious/Unauthorized Behavior Analytics, Automated Malicious/Unauthorized Incident Detection, malware sandboxing, Forensic response kits as well as several other areas

• Audit Management and Compliance Advisement for PCI DSS 3.1 and SOX

Information Security Engineer

CVS Health

Woonsocket, RI - September 2011 to November 2015

• Accomplished prospecting, design, implementation, continuous improvement and senior level support of security solutions such as ArcSight SIEM, Firemon NSPM, McAfee Email Gateway, Log Distribution services, Qualys Web Application Vulnerability Scanning, Veracode Static Code Analysis, Cisco ASA Firewalls, and more

• Accomplished prospecting, design, implementation and continuous improvement of a new Security Operations Center

• Accomplished design, implementation and continuous improvement of Cisco ASA technical controls for the CVSHealth RxConnect application

• Firewall Configuration and Control Risk Review, Firewall Complexity and Control Redundancy Reduction Services, Firewall Control Migration and Control Analysis

• Proactive and security incident driven system examination with platform utilities, SIEM systems, intrusion detection/prevention systems (IDS/IPS), packet analyzers, traffic analyzers, Advanced Threat Detection Engines, logging platforms, File Integrity Monitoring, Data Loss Prevention Systems, vulnerability scanners and network security policy management engines to discover and remediate malfunctions, malicious activity, unauthorized activity, vulnerabilities or risks

• Custom middleware development through bash scripting and reverse engineering python for indicator of compromise utilization and management as well as event normalization.

Systems Engineer

Phoenixville Hospital / Community Health Systems

Phoenixville, PA - October 2009 to September 2011

• Design, implementation and senior level support of Clinical/Non-Clinical information systems utilizing various versions of Windows, Linux, Unix, and specialty Linux/Unix operating systems

• Design, implementation and senior support of Clinical and Non-Clinical data networks

• Lead On-Call System support for on-going Surgical Procedures

• Implemented Surgical Centers, Doctor’s offices, Endoscopy suites, Hospital Pharmacies, Cancer Centers, Specialty clinics, nurse stations and administrative offices

• Migrated, standardized and organized Hospital Main Data Frame as well as configured MDF to utilize up to date internetworking technologies and cabling

• Data reconnaissance, restoration, and migration of server and end user systems utilizing Windows, and Linux Tools

Pre-Graduation Information Technology Experience

Information Technology Specialist

Pottsgrove School District

Pottstown, PA - August 2002 to August 2005, Summer(s) (2006, 2007)

• Lead Support, Administrative and design specialist for networks and systems for a team of 3

• Design, Implementation, and continuous improvement of data networks and information systems

• Accomplished design, installation, continuous improvement and uptime of Cisco IP Telephony/VOIP services

• Custom Server and desktop hardware design and implementation running Windows 2003 series and custom Linux/Unix distributions

• Accomplished building and implementing over 50+ custom client computers for the school district based on Intel Architecture

Education

Pennsylvania College of Technology

Williamsport, PA

2005 - 2009

Bachelor’s of Science Majoring in Information Technology Security Specialist Concentration with Honors

Minor in Business Administration

GPA - 3.7

Certification

Currently working toward my CompTIA Security+

Volunteer Work

I volunteered at the East Goshen Fire Department as an Exterior Firefighter for about 4 years from June 2020 to May 2024. I am looking to get back into the Fire Service soon but it has been a great way to learn, engage and give back.

Competencies

• Information Security Strategy Development, Portfolio Management, and Implementation

• Prospecting, Design, Implementation, and continuous improvement of Technical as well as Procedural

Security Controls

• Design, implementation, administration, and service of information systems and data networks for companies in several sectors: Clinical, Healthcare, Insurance, Retail, Construction, Legal, Venture Capital and Education

• Prospecting, design, implementation, continuous improvement as well as senior level support for Security Solutions such as Firemon Network Security Policy Management Suite, McAfee Email Gateway Email Protection Suite, ArcSight SIEM, Access Data's Forensic Toolkit for Digital Investigations, Cisco ASA Firewalls, F5 Load Balancers for Log Distribution services, Veracode Static Code Analysis, and QualysGuard Web Application Scanning Services and more

• Networking concepts such as physical and logical design, service debugging, Layer 1 - 7 troubleshooting, packet analysis, netflow, switching, routing, subnetting, access control lists, and network address translation

• Data reconnaissance, migration, forensics, and restoration on server and client systems

• Proactive and incident driven system examination with platform utilities, SIEM systems, intrusion detection/prevention systems, packet analyzers, traffic analyzers, Advanced Threat Detection Engines, logging platforms, vulnerability scanners and compliance reporting systems to discover and remediate malfunctions, malicious activity, unauthorized activity, vulnerabilities or risks on different types of devices using different platforms

Skill Set

Computer Systems: Windows / Client-Server Families, Windows SBS 2003/2008, Windows 7/10/11, Window Server 2012, MAC OS X, Fedora, Ubuntu, Red Hat Enterprise, Linux Client-Server Families such as CentOS and RHEL as well as other Unix\Linux platforms

Roles: Mail, File, Proxy, Application, Web, DNS, DHCP, RAS, Print, Domain Controller, Backup and Recovery, Authentication, LDAP, Terminal Services, Digital Fax, Deployment services, Database, Key management, Update Services, Secure File Transfer

Networking: Routers, Firewalls, Load Balancers, Switches, Repeaters, Hubs, Wireless Access Points, Wireless Controllers, Wireless Security Protocols, UTM Devices, Hybrid Devices, VPN, NAS, SAN, TCP/IP, IPv4, ACLs, IPv6, TCP, UDP, DNS, VOIP, VLAN, DHCP, Static Routing, IPSec, SSL/TLS, 802.3, 802.11, 802.1x, ICMP and more

Vendor(s): Cisco, Sonicwall, 3COM, Netgear, HP, Custom Linux Distros

Malware Analytics Technologies and Skill Set: Crowdstrike, Carbon Black, Lastline, Anubis, Hybrid Analysis, Wepawet, Kali Linux, Parrot Linux, OpenVAS, GrayLog, Squid, OpenVPN, Onion Proxy Tor, Maltego, Cobalt Strike, REMnux, Helix, Wireshark, Metasploit, bash scripting, Command and Control Traffic analysis, packet analysis, Machine analysis, Log analysis, File analysis, Forensic Investigation Processes and Techniques, Reverse Engineering File Behaviors and Binaries, Verizon Data Breach Report and other data breach reports as well as other breach reports

Malware Experience and Research: Zeus, CryptoLocker, Locky, CTB-Locker, Flame, Duqu, Stuxnet, SpyEye, Dridex, ModPOS, VBS Downloaders as well as other blended malware families or attacks

Security / Forensics: Access Data Forensic Toolkit, Prodiscover Toolkit, Encase, FireEye, Firemon,

SNORT, SourceFire, IBM Proventia, ArcSight SIEM Platform, vulnerability scanners, vulnerability management, Qualys Web Application Vulnerability Scanning, Veracode Static Code Analysis, Nessus, Splunk, RSA DLP, Fidelis DLP, RSA Archer eGRC, Riverbed Cascade Profiler, Qualys, HIPPA, SOX, PCI DSS, iptables, threat intelligence integration, host-based anti-malware detection/prevention suites, network-based anti-malware prevention/detection solutions, Symantec Suite, ESET Suite, GFI Suite, McAfee Suite, Web Application Firewalls, ModSecurity, Imperva WAF, OCTAVE Risk Assessment Framework, CIS, SANs, NIST CSF, NIST RMF, ISO 27001/2, MITRE ATT&CK, Cyber Kill Chain, File Integrity Monitoring, Steganography, Group Policy, Cryptography, Encryption, Biometrics, Access Control, Patch management, Anti-malware solutions, McAfee Email Gateway, Proofpoint, HIDS/HIPS solutions, Malware Sandboxes, Cb Defense, LogRhythm, Palo Alto and OWASP

Database: MySQL, Oracle, MS SQL, Snowflake

Virtualization: VMWare, Parallels, Hyper-V, Citrix, VirtualBox

Web 2.0: Sharepoint, Drupal, Wordpress, Joomla, OpenAtrium, LogMeIn, Teamviewer, NoMachine NX, LAMP Stack Applications, WIMP Stack Applications

Disaster Recovery: Acronis, Symantec Ghost, Image Vault, Paragon, Symantec Backup Exec

Other: OpenOffice, MS Office, Drawio, Visio, MS Project, Adobe Acrobat, Adobe InDesign, Adobe Photoshop



Contact this candidate