- Featured in:
Find out what is the best resume for you in our Ultimate Resume Format Guide.
Additional Information Technology Resume Samples
IT Security Analyst Resume Samples
No results found
0-5 years of experience
Planned, analyzed, developed and deployed an enterprise-wide information security awareness training program to 9500 users worldwide
- Participated in creation of Security Operations Center for the company, which included the formation of an Incident Response Team comprised of selected IT individuals worldwide
- Provide information security support to regional IT teams worldwide
- Provide Incident Response management and remediation assistance to regional IT teams worldwide
- Plan, develop and implement special projects and initiatives that help support continued growth that is manageable and secure while complying with regulatory needs
- Developed and implemented a secure IM communications initiative which helped in the reduction of international toll charges
0-5 years of experience
Achieved “Certified Information Security System Professional” (CISSP) designation.
- Managed IT Security projects such as implementing laptop encryption and use of personal firewall.
- Created policies, standards, guidelines and security awareness campaigns for associates to follow related to IT Security and protecting corporate assets.
- Conducted and participated in annual disaster recovery exercises. Included significant planning and coordinating among multiple resources
- Performed Risk Assessments on servers, network and confidentiality of data and potential breaches.
0-5 years of experience
Provided user provisioning for SAP, Network and Exchange accounts. Managed users on over fifteen applications including; SAP, Active Directory among other in-house third party applications.
- Managed Active Directory users and groups across corporate office and over 150 external locations, including offices and plants outside the U.S.
- Managed users and groups across multiple applications, including in-house and third party applications. Interacted with business and Help Desk on a daily basis to provide internal customer support and ensure satisfaction.
- Documented processes’ to manager’s satisfaction and cross-trained all team members.
- Created and Maintained user IDs in the BPC 7.0 system Appsets. Assigned Teams, Member Access Profiles, and Task Profiles. Ran the User and Profile reports.
- Created and completed tickets within the GRC 5.3 CUP(Compliant User Provisioning) module. Also used the Forward action to reassign tickets to different BPOs.
- Created and maintained IDs within the Portal UME(User Management Engine). Assigned roles, unlocked IDs and reset passwords.
6-10 years of experience
IT Security Professional with [company name], a NASA contractor at Johnson Space Center in Houston, Texas. Applied expertise in information technology and knowledge of National Institute of Standards and Technology (NIST) requirements to ensure that NASA organizations are responsive to all government IT reporting and IT security implementation requirements.
- Coordinated and directed NASA organizations through required government IT assessment and authorization audits as required by NIST
- Facilitated two Federal Information Security Management Act (FISMA) audits and one Office of Inspector General (OIG) audit as well as over 15 internal audits under NIST guidelines
- Analyzed policies and procedures against Federal laws and regulations; provided recommendations for mitigating the gaps in security
- Handled all aspects of information assurance processes including risk analysis, system certifications, auditing, security documentation, and security testing
- Responsible for the oversight of the information security program to ensure that proper security controls exist and are enforced
- Conducted risk assessments of information systems to identify security issues and develop mitigation plans
0-5 years of experience
As a member of customer support center responsible to perform IT security analysis and vulnerability assessment solutions for GE international clients and business partners in a 24/7 environment.
- Configured translation and access control Microsoft ISA proxy servers at the perimeter level to ensure security and compliance with organizational policies and procedures.
- Review packet information generated by network sniffers like ethereal and plug-ins which define the actual scripts crafted to run the checks in Nessus.
- Responsible to complete projects and assigned tasks and ensure on time deliverables to meet the service level agreement and communicate directly with GE international clients and customers across the globe.
- Awarded “Voice of the customer” for excellent communication and customer service skills.
0-5 years of experience
Sound understanding and experience with NIST Risk Management Framework (RMF) process.
- Perform Information Systems Security Audits and Certification and Accreditation (C&A) Test Team efforts.
- Reviewed and updated some of the system categorization using FIPS 199, Initial Risk Assessment, E-authentication, SSP, POA&M, contingency plans (CP), and contingency plan tests (CPT), privacy impact assessments (PIA) and risk assessment (RA) documents per NIST 800 guidelines.
- Monitor controls post authorization to ensure continuous compliance with the security requirements in accordance to FISMA guidelines.
- Communicate effectively through written and verbal means to co-workers, subordinates and senior leadership.
- Review and update System Security Plans (SSP) against NIST 800-18 and NIST 800-53 requirements.
- Conduct FISMA-based security risk assessments for various assigned application systems – including interviews, tests and inspections; produced assessment reports and recommendations; conducted out-briefings.
0-5 years of experience
Documented and update security policies and procedures created by the Information Security Officer
- Adhered adequate security controls commensurate with risk to the system in accordance with the Federal Information Security Management Act (2002) and National Institute of Standards and Technology
- Planned, developed, implemented, and maintained programs, polices, and procedures to protect the integrity and confidentiality of systems, networks, and data
- Reviewed and updated the department’s system-related security plans and updated accordingly
- Automated hard copies of my department’s server checklists using NetIQ Security Manager auditing software
0-5 years of experience
Subject matter expert in areas of IT processes, risk analysis and threat mitigation, and security architecture. Areas of expertise include: Forensic imaging and analysis, enterprise log management, event correlation/incident detection, infrastructure vulnerability scanning/remediation, end point protection.
- Increased efficiency to reduce the expense and reduce the time required to incident closure
- Initiated and achieved the capabilities to detect, correlate, and alert suspicious activity
- Greatly improved the process of evidence collection and investigations of offenders/incidents
- Developed and drafted information security policies, standards, and procedures
0-5 years of experience
Conducted infrastructure and information assurance assessments to develop INFOSEC requirements for government and commercial customers.
- Conducted engineering studies and developed and implemented security design for information security requirement (e.g., encryption, access control, identification, and authentication, digital signatures, and etc ).
- Planned security risk analyses, security evaluations, and audit information system.
- Performed security penetration test on network systems using ISS software.
- Presentation on security product for customers.
- Wrote documentation on Information Security solution (technical writing).
- Performed software and hardware testing for system developments.
0-5 years of experience
Project and logistical analyst integrating PeopleSoft, Identity Management (IdM) and Sun Role Manager 4.1 (Vaau) RBACx systems to implement segregation of duties in an enterprise environment.
- Performed Risk Management and Assessment Methodology to secure IT systems and critical information.
- Developed strategic processes and procedures for the migration of legacy information owners and data storage across multiple role based environments and lines of business.
- Integrated, managed and regulated all user access to Sun IdM /Sun project sensitive documentation and key information utilizing Microsoft SharePoint Server 2007.
- Establish access levels in accordance to organizational policy and the governance body for audit regulations.
- Provided metric reporting to validate application access/usage and licensing agreements to justify expenditures for budgeting.
0-5 years of experience
Provided direct IT Security support for [company name] for CSC.
- Developed and maintained SharePoint Tracking site for Change request
- Tracked, and approved changes to network assists for security issues.
- Oversaw AD on 5 separate domains. Allowing, and removing access for users
- Reviewed, and provided feedback on security audits for 5 domains.
- Used Citrix, AD, SharePoint, Linux, and Unix to maintain network security
6-10 years of experience
Electronically secured critical cyber assets essential to power generation through computer and network hardening, intrusion detection, and log surveillance
- Created and maintained documentation for compliance with NERC security regulations
- Utilized vulnerability scanning and network exploration tools such as Nessus, NMAP, Wireshark, and MBSA
- Conducted firewall request and policy exception reviews
- Configured, updated, and managed antivirus and WSUS servers
- Assessed security patches for several Windows operating systems and other vendor software
- Developed, maintained and trained users on Disaster Recovery, Business Continuity and Cyber Incident Response Plans.
- Created and managed IT budget guidance for 50+ power plants
0-5 years of experience
Conducted FISMA-based security risk assessments for various government contracting organizations and application systems – including interviews, tests and inspections; produced assessment reports and recommendations; conducted out-briefings.
- Documented and reviewed System Security Plan (SSP), Security Assessment Report (SAR), Security Plan of Action and Miles tones (POA&M), Authorization letter/memorandum (ATO).
- Assisted with review of policy, security alerts, guidance, regulations and technical advances in IT Security Management
- Utilized processes within the Security Assessment and Authorization environment such as system security categorization, development of security and contingency plans, security testing and evaluation, system accreditation and continuous monitoring.
- Contributed to initiating FISMA metrics such as Annual Testing, POA&M Management, and Program Management.
- Communicated effectively through written and verbal means to co-workers, subordinates and senior leadership.
0-5 years of experience
- Lead Analyst with responsibility for formal IT Security analyses and assessments in accordance with Industry Standard security guidelines and operating procedures
- Developed security target lists and protection profiles based on intelligence analysis
- Engineered technical IT security documentation based on knowledge and detailed research
- Improved customer relationships through customer-focused initiatives and significantly improved communication by designing and implementing improved concepts & processes
- Successfully designed and built suite of test equipment for execution of security tests across multiple functional support and customer areas
6-10 years of experience
Demonstrated the ability to manage multiple project time lines effectively, including the security representative for the TRICARE West (US-Government Health Care) program.
- Enjoyed being the PacifiCare and UMR/Fiserv project representative for merger/ acquisitions in Cypress, CA.
- Led training program to integrate the users and software systems for newly acquired companies into the corporate systems: AtYourService, SATS, and United Support Center Knowledge Management.
- Quickly learned new systems without supervision. Became a SME in customized software and trained operations staff on how to provision security on ADUC, Windows, Unix, AS/400, and Mainframe platforms.
- Implemented multiple process improvements based on collaboration with business segments. Result: cost savings in the RSA SecureID project where 60,000 tokens were replaced and new provisioning process implemented in under 90 days.
- Created and revised technical documentation on over two hundred document sets.
0-5 years of experience
Provision access for new users across over 60 applications including but not limited to: Active Directory, Exchange Console, Epic Hyperspace, Epic Reflections, Picis, Radiology Information Systems, Res-Q, Lawson User Interface, and UNIX
- Troubleshoot issues and modify user access via requests in Vantive and HP Service Manager ticketing systems
- Work with other IT teams to ensure issues are resolved in timely manner as well as to streamline processes and procedures
- Managed and owned new employee on-boarding process
- Provided on-call support on evenings and weekends on a rotation basis for all Park Nicollet users with Security issues
- Supported go-live of Epic EMR system in July of 2011 by supporting user set-up, access/security issues, and providing customer support to users with issues
0-5 years of experience
Performed assessments of current security technology and authentication systems.
- Evaluated assessment results against HIPAA, Federal and State information protection and privacy regulations, corporate security policies and other relevant regulations and best practice controls pertaining to the protection of Enterprise information assets with respect to information security.
- Consulted, advised and collaborated with personnel in IT departments to coordinate data and security related activities and architecture.
- Developed and advanced IT security policies, standards and procedures.
- Performed risk assessments and reviews to identify key corporate security vulnerabilities, and ensure adequate levels of control are in place.
- Consulted and advised IT in the design of suitable vulnerability and threat management systems in order to safeguard assets.
0-5 years of experience
Audit control and compliancy for Gaming Regulation, MIC’s, SOX, PCI and PAR requests.
- Supported and troubleshoots interactions of the Identity and Access Management systems.
- Quality Assurance for on-shore and off-shore analysts.
- Provisioning and de-provisioning accounts for all MGM properties.
- Maintained accurate records of system security baseline policies.
- Troubleshoot and resolved tier 1 and 2 Remedy tickets.
- Documented all access requests and validation as records for internal and external security audits.
0-5 years of experience
Worked with the Systems Management Security Sub-domain, Corporate Information Protection Group, Corporate Audit, and multiple client and server teams to define computing security requirements and helped develop new policies and procedures in accordance with regulatory, industry and corporate information protection standards.
- Researched (RFI/RFP/Pilot activities) and created formal recommended cross-platform server related security tools considered to address current unmet or emerging requirements.
- Provided day-to-day support for vulnerability scanning, anti-virus, and personal firewall tools.
- Participated in resolving security breaches such as fraud, viruses, and system compromises.
- Supported core infrastructure of security tools.
0-5 years of experience
Process (Improvement) Reengineering.
- Saved a failed pilot by developing and documenting new installation procedures for SafeBoot laptop encryption software.
- Installed, configured and supported SAML federation services for several Software as a Service (SaaS) providers.
- Single sign-on for external business partners.
- Wrote global IT Security policies and standards based on ISO 27002.
- Summarized 3M’s compliance requirements with 21 CFR Parts 11, 210, 211, 820, Scope & Application Guidance, FDA Principles of Validation, C-TPAT, and PCI DSS.
0-5 years of experience
Worked with the Chief Information Securities Officer in leading the company to a perfect “no exceptions” SAS 70 audit report during tenure of employment. Analyzed system generated audit trails, reports, and other forms of raw, server-side data.
- Performed audits of the information technology environments, operating systems, and applications to ensure compliance with policies and procedures.
- Provided support and worked closely with the Security Architect in dealing with security incidents. Identified policy violations and escalated them for investigation by appropriate technology teams.
- Managed 300+ servers in three locations on the east coast via the Tripwire Web Console installed on a Level-1 UNIX based
0-5 years of experience
- Supported clients, using RSA/Ace Server/ Remote Access administration including MCI/Fiberlink functions, Active Directory, Oracle Security, and RACF security packages. Experienced in Using Vanguard, ETFA, TSO, ISPF, SDSF, IOF, JCL, SAS, CICS, IMS and DB2.
- Managed multiple projects and reporting results to ensure the effectiveness and reliability of security on OS390/ZOS lpars.
- Assisted system programmers with integrating operating system upgrades.
- Designed and implemented reporting processes to collect and provide access and password violations for management and client review.
0-5 years of experience
Monitored IDS/IPS (Snort/ISS), and provided incident response support for various incidents (Policy violation [P2P], Malware, attack on DMZ [SQL injection, XSS], and more.
- Performed malware diagnostic using HBGary.
- Created help desk tickets for security remediation (e.g. removing objects that threatened security postures like malware/rootkit, p2p program, etc.)
- Developed IT security policies, guidelines, baselines, and procedure for the Redskins organization to reflect IT governance adherence (SOX).
- Assisted in the writing and review of organizational security policies to support internal control (access management, contingency planning & testing, Security Awareness, intrusion detection, Patch Management, Anti-Virus, etc.)
- Developing IT security internal control for SOX environment (section 302 & 404). Auditing for Internal control for IT governance project (FISMA/SOX). Auditing domains such as Change Management, Access Management, and Operations for SOX [section 404]
0-5 years of experience
Assured strict compliance to corporate IT security policies for several business units within U.S. and offshore. Performed regular audits and vulnerability assessments. Wrote and maintained security policies and procedures for a variety business units within the organization. Worked with business units to prepare for 3rd party SAS-70 and PCI DSS audits.
- Wrote security standards documentation for several business units.
- Brought several business units from 20% to 100% security compliance.
- Organized a region-wide security awareness training program for various levels of employees (managers,development staff, networking).
- Worked with the office of the Chief Information Security Officer on roll-outs of new security initiatives.
0-5 years of experience
Responsible for assuring the integrity of end-user access profiles
- Analyzed information within a variety of end-user access profile databases (using IBM LOTUS Notes) to locate discrepancies
- Modified/changed/added needed information for the preservation of consistent end-user data resulting in integral activity at the production front
- Utilized SQL scripting (using MS Access) for data filtering and the creation of reports from database source data dumps
- Generated final reports (using MS Excel) of end-user access profile data for the company’s defense during auditing sessions
- Communicated with management across all divisions in a timely manner to ensure the proper provisioning of application access for reporting employees
- Developed and researched new methods to ensure that residual user accounts in the production front were thoroughly removed with compliance to auditing purposes
0-5 years of experience
- Performed as a liaison to project teams within the IT Infrastructure of Express-Scripts.
- Built Cross-Company Processes aligned with corporate strategy and goals.
- Assisted in development, review and finalization of presentations and training modules through SharePoint.
- Constructed system access playbooks to help guide business users through the company integration.
- Executed root cause analysis of complex business issues and collaborated with team members to develop possible solutions.
- Calculated Daily Metrics for the Security Administration department – Open & Past Due Tasks, Requests and Incident Tickets utilizing Excel Pivot tables.
0-5 years of experience
Developed executive summaries for end-to-end e-mail encryption and enterprise digital rights management. Developed monthly status reports for service interruptions, SPAM statistics, and other IT related issues.
- Created policies and procedures for hospital’s HIPAA and SOX compliance.
- Project leader for PostX end-to-end e-mail encryption implementation. Successfully developed and trained pilot group for implementation.
- Advised organizational executives on complex IT issues such as anti-spam, anti-virus, and disaster recovery plans.
- Configured and secured Cisco and Microsoft firewalls. Created ACLs for private, public and DMZ networks.
- Configured LAN-to-LAN and client VPNs for medical professionals and CNMC business partners.
- Monitored wide area network, access controls, event log activities, and end-users for IT security policy enforcement. Assisted Security Operations Center with monitoring and alert creation for security monitoring devices.
- Installed and configured e-mail anti-spam, anti- malware and web based vulnerability security servers. Created mail rules to reduce SPAM and route messages to Exchange and encryption servers. Monitored for Denial of Service attacks.
- Prepared RFPs for information technology procurement.
0-5 years of experience
- Selected to serve as one of initial team members of newly launched Security Access Team, with full accountability for Western Region systems security access.
- Partnered with System Administrator and Application Developers to successfully assume responsibility for 5 systems within a 3-year time frame.
- Innovatively developed, produced and documented user ID setup/access and removal process and delivered comprehensive Security Analyst team training program.
0-5 years of experience
Managed program and compliance of Security Access and User Certifications across multiple locations. Reported to Manager of Information Security.
- Provided user access data reports on regular and as needed basis to Database team, IT Security & Compliance, Service Desk, System Administrators, Finance, and Human Resources departments.
- Prepared for and participated in compliance audits, and maintained quality controls.
- Contributed reporting information, data analysis and summaries, and supplied data conversions in response to information requests. Monitored data performance and provided validations.
- Pro-actively analyzed processes and procedures, identified gaps and inefficiencies, initiated improvements.
- Initiated and implemented new MS Access HR database that integrated MVP and Preferred Care post-merger which tracked non-employee data (contractors, consultants, vendors) to a centralized location. Overcame initial barriers, reached out to HR across locations and attained participation. Gathered user and business requirements. Built front-end tools and application for users. Achieved successful adoption of system, utilized by Legal department (training compliance) and Finance (payroll) department.
- Involved in RFP review and decision to purchase SailPoint IdentityIQ, a$500K software Enterprise Identity Management Software solution. As application owner and administrator, coordinated with consultants to set up and install software to pull in reporting data from all other systems in company. Helped configure new system and associated servers, began system implementation, and worked across departments (Operations, Database, and Service Desk) to facilitate install. Partnered with Project Manager to set milestones, and facilitated meetings. Gathered customer requirements and published a Solutions Requirements Document (SRD). Worked as Business Analyst to ensure the application met business requirements for end users.
6-10 years of experience
Deployment, support and management of Enterprise Anti-Virus, Anti-Spyware, Anti-Spam, Email Security, Monthly Vulnerability Assessment, Secure File Transfer (SFTP) Full Disk Encryption, and Password Reset Self-Service solutions.
- Integral part of the team which performed the evaluation, selection and deployment of numerous enterprise security solutions; including, but not limited to full disk encryption, vulnerability scanners, HIP/NIP solutions, and E-Mail encryption.
- Demonstrated to leadership and business unit representatives the need for numerous security solutions, and presented the proposed solutions to same.
- Represent Information Security Services during Corporate New Employee Orientation presentations.
- Administer and support Windows 2003, 2008, SQL 2008, and Linux based security systems and appliances, including patch management, utilizing WSUS for windows based systems.
- Interface with vendors and vendor support staff. Conduct meetings and set expectations for solution proof of concept engagements.
0-5 years of experience
- Worked as a member of the security operations team providing level two support for technologies and processes that have officially been transitioned through a plan, build, run model.
- Worked with engineering to deploy new security solutions and provide process improvements for solutions already deployed.
- Displayed leadership skills by assisting with the on-boarding of two new employees
- Spearheaded several process improvements within the team that resulted in efficiency and reduced incident count.
0-5 years of experience
Performed reconciliations on various documents
- Organized monthly reconciliation extracts with vendors
- Designed various Excel formulas to perform multiple functions
- Produced monthly user activity reports
- Monitored user activity abnormalities
0-5 years of experience
Selected monthly samples of Security tasks performed by Security Administrators for review and performed analysis of the tasks selected.
- Investigated findings and notified SA of discrepancies found deviating from documentation for resolution.
- Escalated to management as required.
- Directed to proper team for documentation clarification and enhancements as necessary.
- Moved Dept. from a behind status to a current status with processes documented and findings recorded.
0-5 years of experience
- Demonstrated working knowledge of information technology and security, including scanning tools and computer systems analysis
- Performed independent research and evaluation of emerging security-related technologies
- Created presentations on the benefits of DADS Security Management and presented them to both upper and lower level staff
- Assisted in establishing direction for the agency-wide security function at DADS
0-5 years of experience
Provided 2nd Level Tripwire support, including installation, upgrade and administration
- Monitored, analyzed and remediated firm wide correlations
- Built and deployed a Bastion Host on hardened Red Hat Linux server for out of band device management
- Specifically handled UDP packet forwarding for SNMP and SYSLOG
- Configured Netscreen Firewall to process Port Address Translation (PAT) and NAT
0-5 years of experience
Perform Security Categorization using FIPS 199 and NIST 800-60 as implementation guild, Privacy Threshold Analysis (PTA), E-Authentication with business owners and selected stakeholders.
- Develop, maintain, and communicate a consolidated risk management activities and deliverables calendar.
- Work with business owners to ensure timely identification and remediation of jointly owned risk related issues and action plans.
- Perform comprehensive Security Control Assessment (SCA) / ST&E according to NIST SP 800-53A and prepare report on management, operational and technical security controls for audited applications and information systems.
- Review audit logs and provide documentation guidelines to business process owners and management.
- Work with IT system sponsors to document security weaknesses in Plans of Action and Milestones (POAMs), as well as to initiate and support and provide quarterly report on corrective action.
0-5 years of experience
Information Security (INFOSEC)
- Performed systems analysis, security analysis, controls reviews or certification and accreditation afpnet.org.
- Researched INFOSEC solutions and INFOSEC policies and procedures.
- Provided technical support for secure software development.
- Development of the SSAA and the POA&M.
- For the Pentagon Federal Credit Union, performed scanning reviews of internal hosts utilizing Nessus, IIS review, SQL script/review, and ANTLERS, a [company name] proprietary tool.
- Provided analysis and reporting of scanning results, developed work papers and assessments for the client.
0-5 years of experience
Established a set of change management procedures that complemented the day-to-day activities of IT operations unit-performing daily monitoring and auditing.
- Supported the development of a new Siebel data warehouse for Blue Cross-Blue Shields
- Examined and discussed options of existing business models and data flows with clients, and helped in designing appropriate solutions from both technical and business suitability perspective. Protection of assets worth more than $ 4.8 Million USD
- Identified compliance issues for financial services clients, documenting and monitoring technical issues concerning infrastructure and emergency preparedness.
- Led and guided governance projects, designing, building and integrating operational IS security processes using ITIL. Supported the implementation of business continuity plans and disaster recovery, analyze emergency procedures and business disruption scenarios.
0-5 years of experience
Review [company name]’s information technology infrastructure for compliance with PCI, COBIT, HIPAA, NIST, and ISO
- Prepare and present information technology internal control improvement opportunities to executive management
- Developed 35 information technology policies/standards based on regulations, control frameworks, and industry best practices
- Assisted with the remediation of 169 information technology control gaps
0-5 years of experience
Handled successful SOX audit within designated time frames
- Called upon to develop new IT Security policies for the entire organization
- Performed a formal audit of Active Directory and completed report on recommendations
- Attended training on Bit9 and trained the team on proper administration
- Conducted investigations on security breaches and compiled a detailed report that was presented to executives
- Assisted in the remediation of a major virus outbreak
- Audited Exchange EOP and made suggestions to reduce viruses, phishing attempts, and spam
- Created monthly security awareness publications
- Monitored Bit9 and Palo Alto’s for potential security issues
- Evaluated new products for possible addition to our security tools
- Worked with vendors to fine tune current security configurations.
0-5 years of experience
- Architected and managed a 3-year, $0.5M enterprise “data security†initiative
- Developed and engineered enterprise data loss prevention (DLP) tools and processes
- Technical program manager for a 2-year, $0.3M PC encryption effort with Credant
- Matured enterprise encryption and key management policies, processes, and tools
- Designed DBMS security strategy with hardening, logging, monitoring, and encryption
- Informed end-users with creatively targeted messages, graphics, surveys, and feedback
- Created 15 information security policies for emerging technologies
0-5 years of experience
Determined and provided appropriate security access for users in Windows AD, PDMLink, and SAP environments
- Assisted in creation of job templates in SAP enviroments
- Assisted users in access related problems, i.e. password and technical issues
- Assisted in updating of security processes
- Participated in team oriented goals within SAP environment
0-5 years of experience
- Conducted gap analysis between SOP-90-47 and NIST SP 800-53.
- Conducted gap analysis between SBA SSP Template and NIST SP 800-53
- Created a fast C&A approach using data call questionnaire for undiscovered systems to bring in FISMA compliance
- Created several high level handbooks for SBA, Small Business Administration
- Developed vulnerability assessment matrix template per DHS system
- Serve as an Advisor, Interconnected Security Agreements, member for DHS ICE Systems
0-5 years of experience
- Conducted security assessments of management, operational and technical security controls for information systems at the NASA Glenn Research Center.
- Supported the system owners and supporting personnel at NASA Glenn with evaluating and documenting general and information system controls and business processes.
- Documented and monitored weaknesses discovered during security assessment, risk assessment and annual continuous monitoring activities.
0-5 years of experience
Monitored and enforced compliance with documented and distributed agency system security policies and standards in a team environment. Analyzed TCP/IP network traffic as well as network port traffic for abnormal activity. Protected agency assets by anticipating and leading the response to potential computer-related threats and vulnerabilities.
- Resolved client issue with the confines of the Acceptable Usage Policy & S.S.A. Security Policy
- Monitoring Intrusion Detections and Prevention Systems via Enterasys Dragon, SourceFire & Arcsight Security Information Event Management for active alerts and determine priority of responses.
- Identified possible intrusion attempts or other anomalies.
- Filtered non-threatening network traffic via Bluecoat Proxy SG for enhanced reporting accuracy.
- Incident handling of new threats. Occasionally required to initiate and assist in drafting remediation strategies.
0-5 years of experience
Receive and resolve helpdesk tickets and calls in a fast paced environment
- Troubleshoot all issues ranging from network infrastructure, servers, software, and end user equipment for 120
- Assist in implementing SharePoint 2013 into the business environment
- Maintain access controls and security groups
- Implement network security measures to maintain a hardened environment
- Maintain patch management for all software in the business
0-5 years of experience
Supporting the IT Security needs of PPG’s global workforce of 39,000 employees and contractors. Support
includes Active Directory administration: user account and security group creation, deletion and administration.
- Exchange 2007/2010 mailbox creation, mailbox/quota management, rights management.
- Unix, Linux and Oracle administration
- Assisted in the design, QA testing and implementation of a globally deployed application for managing
- Lead on quarterly audit of Off-Shore remote access users
0-5 years of experience
Employed for global implementation of a new company-wide smart-card based encryption schema for use in all of the storage devices utilized through the organization (SAN, Clusters, NAS, Backup devices, etc). This included all administrative and technical duties (such as network design, user and security key management, appliance image creations, etc), required clearance, and adherence to all corporate policies and procedures with respect to internal security.
- Team leader for one of the deployment teams.
- Worked varying shifts on a 24/5 basis, to accommodate offices located in different countries.
- Worked with multiple groups across the globe to roll out, troubleshoot and implement the solution.
- Completed the deployment of over 600 DECRU security appliances globally ahead of a hard deadline by over 60 days.
- Administration and Level 1&2 support of DECRU appliances, encryption data forts.
- Entrust, VeriSign, Secure FTP and Citi SFT account administration and support.
0-5 years of experience
- Daily completion of auto generated tickets.
- Daily maintenance of employee login database for various software systems.
- Troubleshooted dial-in capabilities for employees nationwide.
- Part of the rotation for on-call assistance, available 24/7.
- Resolved issues via inbound calls regarding ticketing system and completion of these issues.
- Emailed correspondence with users on a daily basis regarding issues with dial-in capabilities. Worked on special projects.