Cybersecurity Resume
Cybersecurity Resume
Cybersecurity Resume
PROFESSIONAL SUMMARY:
Professional with 8+ years of extensive experience in the areas of Risk Analysis, SIEM, Endpoint Security,
DLP, Network Security, Email Security, Web Gateway, Vulnerability Assessment, Pen testing, Windows
Server, Domain technology, Antivirus servers, etc.
Hands on experience on Forcepoint and Knowledge of distributed Splunk installation with Forwarders,
Clusters, and Search head cluster.
Expertise in Cyber security & Information Assurance with deep Knowledge of Identity and Access
Management security, Sail point Identity IQ, Access Control issues related to cyber systems and networks,
AWS Cloud, Penetration testing methodology, malware detection techniques, recommended information
assurance policies and standards.
Hands on experience for development, implementation, and administration of
information security policies, standards, and procedures, adhering to industry best practices for clients.
Expert in Vulnerability Assessment using Qualys, Nessus and Nexpose tools to evaluate attack vectors,
identify system vulnerabilities and develop remediation plans and security procedures.
Assisted in integrating regulatory compliance requirements (e.g., PCI, NIST) into the
organizational security roadmap.
Expertise in Gathering and analyzing metrics, key risk indicators and maintain scorecards defined within the
area of information security to ensure our information security program is performing effectively and
efficiently.
Hands on experience on Forcepoint and Knowledge of distributed Splunk installation with Forwarders,
Clusters, and Search head cluster.
Supported the information security audit and third-party assessment initiatives during planning, execution,
and remediation phases, as well as coordinating and tracking remediation activities.
Possess a well-balanced understanding of business relationships, business requirements, and technical
solutions with ability to work collaboratively with business analysts, software testers, developers,
Hands on experience for development, implementation, and administration of
information security policies, standards, and procedures, adhering to industry best practices for clients.
Extensively worked on coding using core java concepts like multithreading, collections, serialization,
Synchronization, exception handling, generics, network APIs and database connections.
Assisted in ensuring that the corporate IT environment is secure and complies with all external audit
requirements and federal standards
Designed and facilitated new cloud security architecture at Bluemix datacenters for the ECMoC product
offering using Vyatta 5400/5600, Juniper vSRX, Fortinet/Fortigate series firewalls.
Efficient and Expert in EIGRP, OSPF, with knowledge on MPLS, BGP (including configuration and
troubleshooting)
Experience in managing Network infrastructure security using HPE ArcSight ESM/ Splunk for monitoring
and classifying and responding to incidents and threats.
Expertise in Gathering and analyzing metrics, key risk indicators and maintain scorecards defined within the
area of information security to ensure our information security program is performing effectively and
efficiently.
Experience in vulnerability scanning g with relevant tools e.g., Nessus, HPE Fortify for SCA (Static Code
Analysis) and Web Inspect, and Rapid 7 Nexpose.
Assist in the deployment and configuration of new tools and capabilities such as Nessus, Splunk, Symantec
and McAfee DLP.
Experience configuring and deploying modules and products like McAfee ePO, McAfee VSE, Cloud, McAfee
HIPS, McAfee Endpoint Encryption, McAfee Network DLP, McAfee DLP Endpoint, McAfee SIEM.
Experience in managing Network infrastructure security using HPE ArcSight ESM/ Splunk for monitoring
and classifying and responding to incidents and threats.
Supported the information security audit and third-party assessment initiatives during planning, execution,
and remediation phases, as well as coordinating and tracking remediation activities.
Familiar with threats and vulnerabilities, latest trends and risks and be able to understand the technical
remediation action steps or plans and communicate them effectively to teams within the organization
Experience with SOC and 24/7 operations.
Acunetix, Microsoft Project, Tripwire/IP360, Tenable, Project Libre, Visio, Pac2000, SharePoint, Peoplesoft&
Nexus, Continuous monitoring, GIS Ware, cloudera, Hadoop, Apache, Microsoft application, endpoint,
Security API’s, shodan API + Nmap and others.
Extensively worked on coding using core java concepts like multithreading, collections, serialization,
Synchronization, exception handling, generics, network APIs and database connections.
Defined and oversaw security hardening standards for client's IT Infrastructure
Coordinated with systems and network engineers to ensure servers and network devices conform
to security standards, and that security devices and controls are working as designed
Experience with industry recognized SIEM (Security Information and Event Management) solutions such as
IBM QRadar, Splunk, and Log Rhythm.
TECHNICAL SKILLS:
Performed static/dynamic code testing, threat modeling, design reviews, and penetration testing of
internal backend services and stage environment applications to identify vulnerabilities and security
defects.
Continuous authorization programme whereby system documents are reviewed annually.
Develop Splunk dashboard to track top Compliance data to the components in your system such; How
many Anti-Virus are installed, Approved software, Approved Hardware, Configuration management,
Vulnerability management.
Performed static/dynamic code testing, threat modeling, design reviews, and penetration testing of
internal backend services and stage environment applications to identify vulnerabilities and security
defects.
Setup and configure AWS WAF on prod and stage environments.
Pull reports from Tenable for vulnerability reports on hosts, break down reports to applicable components
in the boundary and discuss the finding with server POC.
Configured CICD pipelines in Gitlab(12.0) for SAST and DAST automation, whenever there is a new code
pushed into the repository.
Identified common vulnerabilities like Cross-Site Scripting (XSS),Cross-Site Request Forgery (CSRF),Server
Side Request Forgery (SSRF) and SQL Injection (SQLi)
Documenting all the vulnerabilities with proper risk assessment.
Suggesting possible remediation’s to fix the vulnerabilities.
Implemented threat modeling and formulated application security procedures
Exploring different web technologies to understand the security issues arise in web applications
Interaction with users on various issues.
Developed Application Security program (DAST, SAST, IAST) at the enterprise level to identify, report and
remediate security vulnerabilities from applications deployed in DEV, PRE-PROD and PROD environments.
Working knowledge of AWS Cloud Security in implementing Web Application Firewalls (WAF).
Performed the configuration of security solutions like RSA two factor authentication, Ping Federate Single
Signon (SSO), SAML 2.0, Symantec DLP and log aggregation and analysis using HP ArcSight SIEM.
Excellent knowledge of FISMA, HIPAA and NIST, PIA Compliance usage, rules and regulations
Strong understanding of enterprise, network, system/endpoint, and application-level security issues and
risks.
Collaborated, as part of a project team, to automate SOC procedures through implementation of new tools
such as Splunk, Phantom and Resilient while integrating functionality with existing security tools and
infrastructure.
Simplified knowledge sharing by creating and maintaining detailed and comprehensive documentation and
necessary data flow and process diagrams.
Had to deal with SIEM solutions such as Rapid7 Nexpose, Force point, Splunk.
Managing various industries standard SIEM, IPS, PIA, CASB, Firewalls, Gateways, VBlock, Rapid7 Virus and
Endpoint Managers.
Experience in supporting Symantec Endpoint Protection 12.1 workstation clients in an enterprise
environment.
Experience with Red hat Linux Server, macOS Server, Microsoft Windows Server, MS Active Directory,
Azure AD, and Configure and manage AWS/Azure Cloud Infrastructure, Virtualization (VMware NSX,
Hyper-V).
Extensive experience hands-on Azure IaaS / PaaS. Experience designing and building Azure
solutions.
PowerShell experience as it relates to Azure, AD, and Office 365.
Utilize Security Information and Event Management (SIEM), Intrusion Detection & Prevention (IDS / IPS),
McAfee Endpoint Encryption Data Leakage Prevention (DLP), PIA, Force point, forensics, sniffers and
malware analysis tools.
Installation, configuration, and day-to-day management of Symantec Endpoint Protection.
Excellent written and verbal communication skills. Ability to create, update and maintain technical
documentation. Ability to work independently.
Experience with many of the following technologies/roles: Privileged Account Management, Two-Factor
Authentication, Web filtering, Web Application Firewalls, Virtualized computing environments, Encryption-
at-rest and encryption-in-transit, Vulnerability Management.
Experience in Incident Response and Forensic Investigation with Fire eye open source Redline tool to
investigate malicious activity of users /computers.
Deploying and configuring McAfee products for client. Providing SME for McAfee suite of products like
McAfeee PO, McAfee Endpoint Encryption, McAfee DLP Endpoint
Manage IBM QRadar configuration files like inputs, props, transforms, and lookups. Upgrading the IBM
QRadar Enterprise and security patching.
Installation and configuration of networks and network devices such as web application firewalls, network
firewalls, switches, checkpoint firewall, squid firewall, blue coat proxy and routers.
Experience with SIEM platforms (Splunk, Qradar, ArcSight, LogRhythm, Carbon Black)
Administration experience of Cyber Ark vault with Safe creation, integration with LDAP and other
authentication methods & Creation of policies and reports in PVWA.
Designed & developed DevSecOps process for multiple projects integrating security into CI/CD pipelines.
Implemented various security policies for DAST scansto scans web applications/portals to identify exposed
vulnerabilities and driven remediation with various team
Updated System Security Plans (SSP) Using NIST as a guide to develop SSP, Risk Assessments and Incident
Response Plans
Experience with many of the following technologies/roles: Privileged Account Management, Two-Factor
Authentication, Web filtering, Web Application Firewalls, Virtualized computing environments.
Encryption-at-rest and encryption-in-transit, Vulnerability Management.
Experience with using a broad range of AWS technologies (e.g. EC2, RDS, ELB, EBD, S3, VPC, Glacier, IAM,
Cloud Watch, KMS) to develop.
Monitored and configured email spam filters, firewall ACLs, IDS/IPS, and vulnerability scanners
Performed in-depth forensics on compromised workstation hard drives to retrieve critical data
Established and improved the processes for privileged user access request.
Used SIEM tool QRadar on adding the newly build windows and Linux log servers and creating policies for
different alerts.
Troubleshooting the Network Routing protocols (BGP, MPLS EIGRP and RIP) during the Migrations and new
client integrations.
Maintain an Amazon AWS based cloud solution, with an emphasis on best practices in cloud security.
Administered access to information resources and makes provisions for timely detection, reporting, and
analysis of actual and attempted unauthorized access to information resources and systems.
Deployed/Revoked custom packages for the USB exception on Window 7 & Windows 10 and troubleshoot
any issues independently.
Coordinated with level 2, Tanium, SRM, ATOS staff for high level resolutions.
Assisted CSIRT & CSOC with regular monitoring of alerts generated in Threat Response Module and
uninterrupted flow of alerts in Connect Module (Tanium).
Plan, execute and oversee remediation activities for valid vulnerabilities which are identified using
Application Scanning tools.
Experience with application scanning to identify security vulnerabilities in the web application and
architectural weaknesses.
Ability to lead the design of network security infrastructure and the integration of new requirements into
existing architectures. Experience leading compliance assessments of relevant cyber security frameworks.
Troubleshooted and deployed latest FireEye versions on Windows and VDIs.
Responsible for Monitoring and enforcing information security program and policies.
Prepare project activities and work packages in regard to PAM implementation and tracking operating
and/or product changes Documented information security guidance in step by step operational procedures
Optimized network performance and reliability by resolving malware issues, maintaining hardware and
software security
Resolved all LAN/WAN connectivity other issues.
Experience with many of the following technologies/roles: Privileged Account Management, Two-Factor
Authentication, Web filtering, Web Application Firewalls, Virtualized computing environments, Encryption-
at-rest and encryption-in-transit, Vulnerability Management
Identifying the critical, High, Medium, Low vulnerabilities in the applications based on OWASP Top 10 and
prioritizing them based on the criticality.
Involved in DLP data encryption, monitoring/reporting, and remediation of internal and external
threats/vulnerabilities.
Develop installation, troubleshooting, and how-to guides for various systems, tools, and tasks
Conduct proactive monitoring of systems with QRadar SIEM and Cisco ISE
Project lead on network reconfiguration.
Responsible for using resources and preserving availability, integrity, and confidentiality of assets;
responsible for adhering to security policy.
Knowledge of, and experience applying activities associated with endpoint software agent evaluation,
testing, troubleshooting, deployment automation, maintenance, and updates.
Maintain critical systems in support of client cyber security mission
Coordinates with shipping & receiving, network teams, deployment site, cyber security engineers,
and analysts to ensure platform is built, delivered, configured, providing security alerts and logs.
Excellent written and verbal communication skills. Ability to create, update and maintain technical
documentation. Ability to work independently.
Supported peers within IT teams in collaborative activities as well as effectively support training and
mentoring assignments to developers and others as needed
Education Details: