- Featured in:
Find out what is the best resume for you in our Ultimate Resume Format Guide.
Additional Data Systems Administration Resume Samples
Cyber Security Engineer Resume Samples
No results found
0-5 years of experience
Currently serving as a security engineer on a federal contract that conducts security assessments to multiple Departments/Agencies to ensure confidentiality, integrity and availability of the systems, networks, and data.
- Conduct Trusted Internet Connection (TIC) assessment in accordance with DHS standards, and TIC CCV workbook security controls.
- Developed an application utilizing VBA to automate the assessment process to increase efficiency and standardization.
- Implemented an updated process/tool that incorporates the Incident Response Life Cycle to reflect the client’s new requirements with a team of 5 security engineers.
- Managed the mapping of 72 complex technical requirements, functionalities, and capabilities to NIST 800-53 Rev 4 security controls, FISMA, OMB, and US-Cert to ensure compliancy with federal standards, policies, and procedures.
- Developed a change management systems using Redmine with requirements from stakeholders to resolve deficiencies in the current process.
- Enlisted to administer training on the usage of the change management system and service delivery process to 13 Northrup Grumman employees.
0-5 years of experience
- Rapidly designed. deployed, and implemented cyber capabilities cloud solution featuring multi-tenancy using the HP CloudSystem Matrix Suite
- Developed cyber capabilities cloud catalog using industry-standard tools including: HP ArcSight, AlienVault, HP Fortify, Metasploit Pro, Kali, BackTrack, Nessus, Nagios, Snort, Santoku, Zero Wine and many more
- Developed vulnerable test environment for training and testing of various cyber capabilities
- Designed and integrated custom wireless intrusion detection system using Open Source components
- Developed and implemented custom disaster recovery drill, including simulation test
- Supported development team migration to Scrum from Waterfall methodology. Decreased deployment time of new capabilities by 30%.
0-5 years of experience
Provided independent contracted IA engineering support services to the U.S. Army CECOM, Software Engineering Center (SEC), Information Operations Directorate, IA Division, located at Fort Monmouth, NJ.
- Researched, managed, and implemented security protection technologies (i.e., firewalls, intrusion detection systems (IDS), data encryption, Biometrics, etc.,) to mitigate systems security vulnerabilities discovered as apart of the DoD Information Technology Security Certification & Accreditation Process (DITSCAP), DOD Directive 8510.1, and Common Criteria/Orange Book criteria evaluations.
- Drafted and tested Systems Security Authorization Agreements (SSAA), Certification Test & Evaluation Plans and Procedures (CT&E), and Security Test & Evaluation Plans and Procedures (ST&E) for strategic and tactical Army computer systems and networks.
- Conducted various security vulnerability assessments (e.g., Patch Analysis, Port Analysis, Malicious Code Analysis, and CERT Vulnerability Analysis,) and documented the results in Certification Reports, Residual Risk Assessment Reports, User Security Policy Manuals, and Standing Operating Procedures.
- Made recommendations to Army Commanders on how to mitigate the remaining residual risks by implementing various information security technologies, such as Biometrics, IDSs, Firewalls, Tier’ed Network Infrastructures, and advanced auditing technologies, as well as exploitation of emerging IPv6 advanced authentication and data security capabilities.
0-5 years of experience
Senior Cyber Security Engineer, ISC2 project FDIC
- Participated in service, design, implementation, and risk assessments during device strategy, design, and operations
- Responsible for and managed daily routines, updates, patches and fixes to firewall and router appliances
- Analyzed IT systems to identify, assess, and design security features
- Identified and reported security issues, and resolving issues in accordance with established policies
- Created network diagrams; created, documented, and implemented Standard Operating Procedures
- Supervised and provided mentorship to junior team members, including boarding and training of new employees to the role. Developed job descriptions
- Supported and interacted with customers, provided tier 2 level support as required
0-5 years of experience
Assess all-source cyber threat intelligence for impact to the Ballistic Missile Defense System (BMDS) design and program implementation, propose countermeasures/mitigations, and coordinate cyber threat awareness with missile defense partners.
- Leverage cyber threat knowledge and national security policy to influence the BMDS architecture and design and to develop cyber security policy for the BMDS programs.
- Produce a Cyber Threat Mitigation Report on a monthly basis that is read by all IAMs that support BMDS
- Analyze intelligence products to evaluate, confirm, and mitigate cyber security threats relevant to the missile defense mission.
- Provide technical analyses and course of action in response to emerging and persistent cyber threats.
- Provide Information System Security Engineering (ISSE) services to large-scale systems integration of missile defense systems.
0-5 years of experience
Assess all-source cyber threat intelligence for impact to the Ballistic Missile Defense System (BMDS) design and program implementation, propose countermeasures/mitigations, and coordinate cyber threat awareness with missile defense partners.
- Leverage cyber threat knowledge and national security policy to influence the BMDS architecture and design and to develop cyber security policy for the BMDS programs.
- Produce a Cyber Threat Mitigation Report on a monthly basis that is read by all IAMs that support BMDS
- Analyze intelligence products to evaluate, confirm, and mitigate cyber security threats relevant to the missile defense mission.
- Provide technical analyses and course of action in response to emerging and persistent cyber threats.
- Provide Information System Security Engineering (ISSE) services to large-scale systems integration of missile defense systems.
0-5 years of experience
- Configured, setup and installed agents on Trend Micro, Deep Security, ArcSight, Nessus and monitored events on Deep security and AWS consoles.
- Utilized Windows, Linux RedHat and Centos to troubleshoot the various networks from VM’s and RDC.
- Utilized Splunk to monitor and analyze Metadata throughout various networks
- Interacted with Amazon Web Services through integration of TrendMicro and Deep Security software
- Received two AWS accreditations through CGI
0-5 years of experience
- Performed as a core-authorized member of the Nuclear Safe Guards Information, Critical Group and DST for the 10 CFR 73.54 CS Project.
- Support the Nuclear sites in network software engineer testing with HPLoadRunner and issue resolution related to cyber security programs.
- Performed with Corporate Nuclear Security in procedures writings, in support of plant operations and Cyber Security technical decisions.
- Coordinates with IT and Nuclear site teams to implement and administer the NRC/ FERC/ NERC mandated cyber security programs.
- Perform Cyber assessments as required by the NRC/ FERC/ NERC mandated cyber security programs (with NEI/ NIST/ FIPS).
0-5 years of experience
- Product manager for all security testing and detection platforms for Target Cyber Security/CFC.
- Responsible for re-architecting vulnerability management platforms, moving to a hybrid of Agent and Network based scanning.
- Instrumented scanning of micro-services server architecture as well as Target’s cloud based services.
- Re-architected Security Testing Services dynamic and static code analysis platforms.
- Responsible for managing 12 engineers across 8 security platforms.
- Responsible for overall direction of CSTD’s and STS’s tool/platform direction and architecture.
0-5 years of experience
- Responsible for providing technical expertise for Centers for Medicaid Medical Services security control assessments.
- Responsible for interpreting MS SQL Server (2008/2012), Oracle 11G, and other database instances script output to ensure NIST and/or DISA STIG compliance.
- Responsible for reviewing virtualized and Cloud technologies to ensure NIST and/or DISA compliance
0-5 years of experience
- Conduct incident/event investigation and analysis.
- Detect, assess and report network vulnerabilities.
- Perform regular O&M functions such as problem management, patching, backups, configuration management, system documentation and reporting.
- Provide technical support to tier 1 &2 team.
- Maintain awareness of cyber trends, threats, and vulnerabilities.
- Monitor and maintain the operational capability of several enterprise level cybersecurity tools and countermeasures.
- Troubleshoot operational systems and collaborate with other organizational entities responsible for enterprise systems support.
- Participate in validation testing of system configuration/hardening and assessment of classified information systems (IS)
- Recommend technological upgrades/modifications to client’s Information Systems Security architecture.
- Ensure system reliability and accessibility by preventing and defending against unauthorized access to system.
0-5 years of experience
Cyber Security
- Installed security patches
- Ran security scripts to check for vulnerabilities and unauthorized ports
- Set up and collected Cisco switch logs
- Set up Cisco switches and firewalls
0-5 years of experience
Served as Lead McAfee Vulnerability Management scanning coordinator/manager/assigner. McAfee vulnerability scans were performed on a monthly basis, when a new server was added to the network or when analyzing systems for vulnerabilities during an investigation. Results of the scan were to then follow the Vulnerability Remediation Procedures.
- The Cisco MARS SIEM appliance was used to monitor and manage devices and authorized user accounts on the appliance. Cisco MARS was the central log repository for Server, Oracle Application, IDS, ASA, ACS, Router and switch logs. Logs were monitored in near real time and could be used for investigating incidents or assist in monitoring device failures and backup failures/success. Logs were designed to be emailed to appropriate personnel automatically as defined when they occured in near real time.
- POAM tracking for the Network and Major Applications is maintained on a continuous basis in a tracking spreadsheet.
- Responsible for managing and maintain a small instance of Splunk Enterprise in the disaster recovery environment.
- SSP modifications and management are to comply with NIST 800-53 Rev 4 requirements, FISMA requirements and provisions as well as FIPS and OMB memorandums and requisites.
- Security Impact Assessments were required when a change to the network or a request for new software is added to the network. After the SIA was completed it would go through the Change Control Board and the Change Approval Board for review.
- Served as Lead Certification and Accreditation (A&A) tester. Responsibilities as lead tester included testing all 262 controls for a Moderate system in accordance with the latest release of NIST (800-53 Rev 4). Testing can include technical tests to verify compliance against access control, compare policy and procedure documentation, annual security training and disaster recovery tests to name a few. I participated in 8 certification and accreditations.
- Assists in developing the SAR (Security Assessment Review) with the ISSO for final signatures by the designated AO’s.
- I helped develop Security Policies and Standard Operating Procedures when applicable. These Procedures are then published as final versions on Share Point so the team can access the latest copies.
- Create and conduct Annual Security Training for team project staff or when the Security Incident Handling procedures change.
- Served as Lead Security Incident Handler. Responsibilities include to be a first responder to security related incidents and to notify team members and the customer during a security related incident. Assist with log correlation and investigation alongside the system administrator and network engineers. Work with vendors, customer and team members to isolate and eradicate incidents as they may occur.
0-5 years of experience
- Use of Alert Logic, Tripwire, [company name], McAfee ePolicy Orchestrator, Enterprise Systems Database security technologies to handle operational security incidents to contain and mitigate attack campaigns against the company, developing new security tools and processes, and interfacing with business units to mitigate exposure to the business while permitting the business to function efficiently.
- Responsible for maintaining existing security infrastructure, such as two-factor authentication, network surveillance technology, intrusion detection solutions, endpoint protection, data leakage protection, and encryption solutions and systems.
- Document processes and procedures for existing and new technologies with ITSM and SharePoint. Provide documentation relating to data privacy laws and compliance as requested by the enterprise. (relating to endpoint security technologies)
- Perform vulnerability testing, risk analyses and security assessments.
- Conduct internal and external security audits
- Provide tier 3 support for end user relating to endpoint security technologies to ensure the integrity of systems.