- Featured in:
Find out what is the best resume for you in our Ultimate Resume Format Guide.
Additional Information Technology Resume Samples
IT Security Engineer Resume Samples
No results found
0-5 years of experience
Assessed the system security categorization as per FIPS 199, identified applicable security controls to NIST 800-53.
- Prepared Certification and Accreditation (C&A) packages to NIST 800 standards for various USCIS systems and sites using automated RMS C&A software tool.
- Conducted Self-Assessment as per NIST 800-26 for customer’s applications and General Supported Systems (GSS).
- Created, maintained and updated Plan of Actions and Milestones (POA&M) for various systems/LANs. Coordinated with ISSOs for mitigating vulnerabilities included in the POA&M.
- Conducted Security Evaluation and Testing (ST&E) for systems for Certification and Accreditation and conducted Risk Assessment to NIST 800-30.
- Reviewed technical documentation and white papers.
- First to use Risk Management System (RMS) software for preparing C&A packages.
- Awarded Certificate of Appreciation for outstanding contribution to Office of Chief Information Officer (OCIO) from the customer’s Chief Information Officer
0-5 years of experience
Directed operations and supervised Security Engineers and Technicians at the 24/7, 365-day center. Served as a member of the Incident Response Team charged with maintaining incident response documentation.
- Analyzed and administered security controls for information systems
- Introduced company security policies and ensure compliance
- Delivered incident response, analysis, and reporting according to policies and procedures
- Developed detailed reports and security plans for IS systems
- Improved security posture of information systems by reviewing, assessing, and documenting vulnerabilities
- Maintained all documentation on Security Policy and Procedures
0-5 years of experience
- Conducted annual Payment Card Industry assessment.
- Performed risk analysis and penetration testing on for over 500 Linux, Windows, network and virtual assets.
- Analyzed security and data loss prevention logs.
- Ensured website compliance for over 2000 U.S. & Canadian hotel properties.
- Provided training to hotel members and reservation agents on security best practices and modern trends.
- Reviewed internal procedural documents and processes and provided feedback for continuous improvement.
0-5 years of experience
- Proposed, designed, and implemented various Information Security related projects, such as vulnerability assessments, remediation, intrusion detection, border security, and patch management
- Researched and evaluated the latest security technologies, provided implementation plans, and deployed security controls
- Administered firewalls and provided support for VPN concentrators
- Performed quarterly firewall audits to identify open ports and services, compared those findings with approved change requests, and initiated the remediation of those findings
- Designed the Systems Management Server infrastructure that led to the successful deployment of large software and security applications over various WAN links
0-5 years of experience
Designed enterprise architecture for web security using Tivoli Access Manager for e-Business integrated with RACF-based security and Lotus Domino security
- Ensured all new security solutions were designed to comply with US Patriot Act
- Developed custom user ID synchronization process utilizing Perl scripting and MoveIT DMZ secure FTP application
- Utilized Sun ONE Directory and Sun ONE Metadirectory in development of enterprise directory
- Deployed enterprise-wide certificate authority with certificate management policies to alleviate problems caused by self-signed certificates
- Designed and facilitated trainings on LDAP, SSL, certificates, and Access Manager to various employee groups
0-5 years of experience
Monitored and mitigated Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks on a 24X7/365 basis for attacks on Fortune 500 companies web servers, which if not conducted by me, would cause billions in lost sales for customers as well as reputation loss for CenturyLink for reliability
- Managed firewall rules for US Government agencies and fortune 500 companies
- Monitored firewalls, servers, routers, switches, gateways owned by our group preventing millions of dollars in losses from critical outages via Nagios monitoring
- Updated and modified internal two-factor authentication accessed wiki related to all core areas of work within my role
0-5 years of experience
- Managed system access authorization and monitored security status of 400 servers and 6000 computers
- Directed holistic IT security analysis of entire China region using technics of data mining
- Developed IT security risk management strategy based on the risk profile of various business functions
- Composed HSBC control standards in China and adapted global compliance policies to the local market
0-5 years of experience
Supported Virginia Contractor ICD 503 Pre-Security Assessment
- Member of a collaborative team environment to meet standard system accreditation goals, while maintaining final decision-making authority.
- Reviewed and validated Technical Security Controls. Provided implementation responses.
- Conducted RMF gap analysis to identify any weaknesses that could lead to missing or improperly implemented security controls.
- Reviewed documentation to determine if the technical aspects of policies and procedures were current and comprehensive.
- Developed security documents (Configuration Management, Maintenance, and Continuous Monitoring Plans) which addressed the NIST 800-53 Technical Security Controls.
- Reviewed and Validated Certification Test Plan.
- Reviewed audit logs to determine if security controls were logging the proper information and if the group was adhering to its log management policies.
0-5 years of experience
Project manager and lead security engineer on multiple high-profile projects including a unified end-point, network access control, and data loss/leakage prevention.
- Coordinated with and led InfoSec efforts across various departments, both technical and non-technical, ensuring appropriate buy-in and resource allocation; focus was always on implementation quality and client satisfaction.
- Worked with internal auditors on findings analysis and associated remediation efforts.
- Performed IDS/IPS mitigation/response and vulnerability scanning in support of internal and PCI requirements.
0-5 years of experience
Responsible for protecting the organization from internal and external threats while ensuring regulatory compliance and the highest standard of security for customers’, employees’, stakeholders’ and organizational information assets.
- Developed and established policies and procedures for key systems and enhanced existing policies and procedures to make them more efficient and effective; developed team vision while improving overall department perception through effective communication, documentation, and team work
- Sarbanes-Oxley (SOX) control owner; reviewed and modified SOX narratives and controls to ensure accuracy and validity
- Established communications plan for system modifications and outages which increased system stability and availability leading to improved customer satisfaction
- SharePoint Subject Matter Expert (SME) – Migrated company from SharePoint Portal 2003 to Microsoft Office SharePoint Server (MOSS) 2007 and implemented Microsoft Project Server 2007 allowing the company to leverage world class enterprise project management, content management & collaboration systems
- Promoted effective departmental project management by establishing and executing project plans for company-wide security projects
- Identified, reported, and prevented security vulnerabilities and incidents leading to the protection of sensitive data and the avoidance of damaging publicity
- Established the Security Portal to centralize departmental documentation and track security related incidents, tasks, projects and staff attendance.
- Responsible for administering, managing, and supporting a wide variety of security, network, and web related systems and technologies. Specifics can be provided as requested
0-5 years of experience
Administered, patched and upgraded Anti-Virus on servers and workstations and Security for MS Exchange with ePolicy Orchestrator.
- Led Endpoint Encryption rollout project in a 40000+ user environment.
- Trained local technicians, Enterprise Service Desk and user trainers.
- Performed security alerts monitoring.
- Interacted with the local Desktop Support and System Administrators in regards to local security issues.
- Wrote technical and policy documents.
- Represented Security Department in various meetings.
- Tier 3 support.
0-5 years of experience
Day-to-day operational support of Symantec DLP suite of software
- Functional lead of data loss prevention services to IT security
- Participated in data protection strategy program to resolve regulatory issues within a short timeframe
- Managed data-at-rest scanning services to support resolution of regulatory issues
- Evaluated and improved operation procedures of other groups within the Threat & Vulnerability area
0-5 years of experience
Analyzed and evaluated network, system, and security events to determine whether an incident occurred and initiated appropriate investigative and response actions
- Performed malware behavioral and code analysis to produce indicators of compromise
- Conducted digital forensic investigations developing an understanding of the intent, objectives, and activities employed by cyber threat actors
- Created technically detailed incident reports including trends, remediation steps taken, and recommendations to prevent future incidents
0-5 years of experience
Formed IT committee to develop policies and guidelines for use of organization’s LAN and WAN
- Performed Active Directory duties to include creating and managing user accounts, group policies, and managing user’s passwords.
- Implemented a secure network infrastructure for the academy by setting up Norton Firewalls antivirus on all the computers connected to the network
- Centralized Microsoft client update to workstation by pushing the updates through the servers.
- Provided ongoing technical support maintenance of the network both on site and remotely
- Worked with Cisco, 2000/3000/7000 routers, Switches, Hubs, CSU/DSU, Cisco Works, Protocol Analyzer, IPX/SPX
- Setup, configured, and installed Cisco routers from the console and remotely
- Performed password recovery and created access lists for incoming and outgoing traffics.
- Resolved routing loops for network related issues.
0-5 years of experience
Conducted malware analysis and protection, content filtering, logical access controls, identity and access management, and data loss prevention, content filtering technologies, application firewalls, vulnerability scanners, The Lightweight Directory Access Protocol (LDAP), forensics software, security incident response, Identity Management (IDM).
- Maintained networks and computing devices/systems that enforce security policies and audit controls in Windows environment.
- Assisted in responses to external audits, penetration testing and vulnerability assessments
- Maintained application patches, disaster recovery procedures in the event of a security breach.
- Created information security documentation related to work area(s) and completing security requests in accordance with company requirements.
- Interfaced with end user community to understand security needs and implementing procedures to accommodate them.
0-5 years of experience
Multiple years of technical experience facing customers to gather client requirements and then design, implement, and support secure networks and IT solutions
- Supported over 65 Cisco Pix and Check Point firewalls in extremely large, sensitive and complex environments across multiple industries including healthcare, manufacturing, insurance, retail, restaurant, auto rental, and more
- Promoted to 3rd Level Firewall/VPN Engineer because of communication skills, work ethic, leadership, ability to learn quickly, ability to teach, and self-motivation for success
- Graduated from the Engineer Development Program – the course was tailored toward business management, leadership, communication and technical development including Oracle, UNIX, Programming in C and VB, networking, and the complete software development life cycle
- Selected as the Project Manager during the Engineer Development Program to manage the development of a complex software program
- Interviewed by Ross Perot Sr. and offered a position to join the Engineer Development Program for the future leaders of [company name]
0-5 years of experience
Designed, built, tested, and released realtime log parsing application GUI for trouble-shooting SecurVantage appliances.
- Wrote a log parser and Java servlet; used Java, C, Perl, Shell, and Python programming.
- Came up to speed on and used IntelliJ to code and integrate into web UI.
- Learned and used Carnegie Mellon University timeline software, to incorporate into the GUI.
- Performed unit, integration, and system testing of the GUI.
- Made slight modifications based on field-test results.
- Self-taught Wireshark, and wrote a snort signature to recognize the exploit.
0-5 years of experience
- Responsible for coordinating global IT Security initiatives as well as developing and implementing enterprise IT security strategy.
- Developed and implemented IT security policy and process for a multinational medical device manufacturer, including facets of ISO17799, COBIT and ITIL frameworks
- Project lead on global Identity Management framework implementation
- Supported Sarbanes-Oxley audit and remediation for multiple business units
0-5 years of experience
In charge of IT Security brands, including market leaders such as Check Point, Iboss, ForeScout and Safenet. Specialized in Checkpoint firewall and Iboss Secure Web Gateway solutions. Met with resellers and customers as technical expert to consult and demonstrations of products represented by Proweb. Development of Proofs of Concept (PoC) for resellers and customers helping to increase the Company sells. Project management and support for Proweb’s resellers and customers. Presales engineer.
- Served as Project Manager and implemented Network Access Control (Forescout CounterAct NAC for 1000 network assets) for Social Prevision Institute Chile (IPS Chile), which was a client.
- Presales Engineer for Two-factor Authentication Projects using Safenet products for clients Transbank and Banco Bice Chile.
- Redesigned and significantly improved Proweb’s LAN, combining Cisco, Check Point and VMware virtualization products. Created VMware internal Cloud of Proweb’s Lab Environment to demonstrate and test security solutions using VSphere Hypervisor ESXi 5.5.0 with Operation Management 5.5 and VCenter administrative software as platform.
0-5 years of experience
Primary Tier III support for McAfee EPO including Host Intrusion Protection (HIPS), Data Loss Prevention (DLP), VirusScan (VSE), Endpoint Encryption (MEE), and others.
- Project Lead for Implementation of McAfee Security for SharePoint
- Project Lead for Implementation of McAfee Host Data Loss Prevention
- Implemented Symantec Enterprise Protection Manager for USB & CD media scanning stations
- Served as Tier III support for Corporate IT Department
- Worked & assisted numerous other technologies including BRO Network Security IDS, McAfee Nitro SIEM, ProofProint, & Damballa.
6-10 years of experience
Use UML and related methodologies to communicate technical and business process oriented designs, issues and benefits envisioned within “as-is” and “to-be” environments. Conduct periodic security reviews and evaluations of technical designs and enterprise business processes. Performed analysis/evaluations on reported security risks and provided engineering recommendations, to respective business owners and senior IT leadership team members, to mitigate and/or correct identified issues.
- As lead business/systems analyst, facilitated RFI and RFP exercises for evaluation and purchase of an Identity Management solution; this role included leading technical and business requirements gathering/design development, review and approval for the Identity Management enterprise solution.
- Designed, developed and implemented framework to facilitate reviews, evaluations, approvals and implementation of changes to enterprise based firewalls rules-set. This effort provided needed audit and reporting capabilities to all levels of IT management.
- Managed PCI testing activities.
- Wrote Risk Management specifications document to support subsequent creation of an enterprise IT Security Risk Management and Compliancy group. Information from formal entities (e.g., DeepSight application) was used in input to build use-cases for envisioned risk-management framework
- Designed and developed framework to facilitate reviews, evaluations and approval/exceptions to reported risks.
0-5 years of experience
Provided information assurance (IA) support for the Joint Interoperability Test Command (JITC) systems, which conducts test, evaluation, and certification services to support global net-centric warfighting capabilities
- Coordinated the requirements, planning, training execution, and assessment phases of JITC IA exercise assessments for purposes of evaluating the COCOMs, Services, and Agencies ability to protect and defend the Department of Defense networks and respond to potential attacks against the Global Information Grid (GIG).
- Examined DoD Information Assurance Certification and Accreditation Process (DIACAP) scorecards for completion to gauge what additional information is required from the site, including the number of IA controls required, number of compliant/non-compliant areas, and assessed risk status of each non-compliant area to identify deficient IA controls and to ensure a successful exercise assessment.
- Designed and implement software intended to ensure that DoD automated systems are secure from unauthorized use, viral infections and other problems that would compromise sensitive information in terms of confidentiality, integrity, and availability.
- Conducted research and testing on proposed network products, services, protocols, and standard operation procedures (SOP) for authorization to operate (ATO) on DoD networks, to ensure that risk management is applied.
- Conducted security audits in accordance with specific government policy guidelines.
- Applies patches and modify systems configuration settings to mitigate Gold Disk and Retina vulnerability findings.
0-5 years of experience
Provided information assurance (IA) support for the Joint Interoperability Test Command (JITC) systems, which conducts test, evaluation, and certification services to support global net-centric warfighting capabilities
- Coordinated the requirements, planning, training execution, and assessment phases of JITC IA exercise assessments for purposes of evaluating the COCOMs, Services, and Agencies ability to protect and defend the Department of Defense networks and respond to potential attacks against the Global Information Grid (GIG).
- Examined DoD Information Assurance Certification and Accreditation Process (DIACAP) scorecards for completion to gauge what additional information is required from the site, including the number of IA controls required, number of compliant/non-compliant areas, and assessed risk status of each non-compliant area to identify deficient IA controls and to ensure a successful exercise assessment.
- Designed and implement software intended to ensure that DoD automated systems are secure from unauthorized use, viral infections and other problems that would compromise sensitive information in terms of confidentiality, integrity, and availability.
- Conducted research and testing on proposed network products, services, protocols, and standard operation procedures (SOP) for authorization to operate (ATO) on DoD networks, to ensure that risk management is applied.
- Conducted security audits in accordance with specific government policy guidelines.
- Applies patches and modify systems configuration settings to mitigate Gold Disk and Retina vulnerability findings.
0-5 years of experience
Coordinated the development, integration, delivery, and maintenance of new enterprise managed data network security offers including firewalls, virtual private networking, intrusion detection, application level security, network vulnerability assessment, mass data storage, reporting, and new security technologies
- Forecasted budgetary requirements for infrastructure and staffing to accommodate business growth
- Determined & provided staffing, system, training, and support requirements for new business applications
- Developed user acceptance and operational readiness tests to ensure proper functionality, training support, and first offer integration during initial stages of new enterprise managed security services
- Designed, documented, and taught classes regarding new security services along with their associated interface agreements, ticketing, troubleshooting, and maintenance methods and procedures
- Required to work solo in a telecommuting position as well as in a ‘war room’ collective effort to get tasks completed efficiently and meet critical timelines
- Responsible for planning, scheduled testing, implementation, maintenance, and documentation of intrusion detection, vulnerability assessment, auditing and analysis tools
- Experienced with Microsoft Project, Cisco Intrusion Detection, Cisco IOS Firewall, Cisco PIX Firewall, Cisco Routers, CiscoWorks, CheckPoint Firewall, Nortel Connectivity Switch, Nortel Optivity Manager, HP OpenView, Remedy, SQL, SNMP, UNIX, and Windows.
- Functioned as a subject matter expert for the security mitigation and maintenance of data center operations, system development, change management, and disaster recovery
- Responsible for network infrastructure, application, and physical security controls in support of existing environment and forecast future needs worldwide
0-5 years of experience
Provided a highly secure environment by administering Internet content filtering rule established for 33 District agencies, and managing access control, RSA Secure ID token inventory for +100 users.
- Served as task leader for the virus protection implementation project for the District of Columbia government with 15,000+ users; managed daily operations of virus protection management platform, policy Orchestrator, for 15 District agencies.
- Authored virus protection management policies and procedures as well as a virus protection guide for system administrators; supported development of computer security-related materials.
- Responded and reported incidents by serving as a CERT team member.
0-5 years of experience
Implement and manage security controls for [company name] North America. Ensure network and endpoint security. Engineer and maintain Information Security solutions.
- Maintain firewall and threat prevention policies with the use of Next Generation Firewalls in a global enterprise infrastructure.
- Control network access using site-to-site and remote-access VPN, corporate
- Maintain endpoint security with anti-virus, URL filtering, application control, vulnerability management, and patch management.
- Respond to service requests for resolution of security related issues.
- Evaluate new solutions and maintain equipment and services for existing solutions.
0-5 years of experience
Perform compliance evaluations in accordance with Common Criteria (ISO/IEC 15408) and the Common Evaluation Methodology. Software applications tested include eBusiness Applications, Disk Encryption, Open-View Operation, Single-Sign On, Antivirus, Routers, and Firewalls.
- Write and evaluate test plans, test scripts, configuration management systems. Assess accuracy of test coverage analysis, vulnerability analysis, and strength of function analysis.
- Perform manual and automated tests of security functions and external product interfaces.
- Verify the consistency of marketing and design documentation which included: product/application functionality, the user/administrator guidance, internal/external interfaces (GUI and CLI, and error messages), and software design processes.
- Assess the strength of identification/authentication, audit, and access control functions.
- Report and present findings to National Information Assurance Partnership (NIAP) Validation Oversight Review (VOR) Board.
0-5 years of experience
Senior IT Engineer and Team lead for the department of 4 people including contractors.
- Daily monitoring of security logs of all firewalls and security devices.
- Maintaining PCI environment to remain PCI DSS Compliant
- Maintain Checkpoint and Palo Alto firewalls for external and PCI environments
- Maintain McAfee Web Gateway for URL web content filtering.
- Monitoring and maintaining of 25 Palo Alto IPS/IDS throughout the environment.
- Web application security assessment testing of Frontier Airlines websites
- Researched, recommended and implemented new technologies that was best for the environment.
- Internal Pen testing for PCI audits and security assessments
0-5 years of experience
Manage, monitor, and maintain McAfee ePO and all the software and their policies to adhere to the security standards of the company.
- Responsible for the planning, configuring, and implementation of McAfee Endpoint Encryption.
- Responsible for analyzing suspicious emails for malicious content/intent with several tools.
- Scan the environment with Nexpose Vulnerability Scanner to identify vulnerabilities on workstations, servers, and printers and create remediation plans to fix the vulnerabilities.
- Monitor the environment with Arcsight for suspicious traffic both internally and externally to help prevent attacks.
- Help Level I Technicians with advanced troubleshooting.
- Part of an on-call rotation that monitors the IT Security Team’s tickets and assigns them to correct team member.
- Resolve issues in a timely manner to prevent down time for the company.
0-5 years of experience
Responsible for engineering, implementing, supporting and maintaining complex security infrastructure deployments.
- Provides analysis and support for the following technologies: Juniper and Palo Alto Firewalls, IDS/IPS, SSL VPN, and Blue Coat proxies.
- Assists in the overall management of Enterprise client security infrastructure including the planning, design, deployment, and 24×7 administration
- Assists in the development and implementation of security policies, procedures and measures in a networking environment
- Prepare, configure, administer, and manage firewalls, ACLs, VPN appliances, IPS/IDS and applicable network management tools in a multi-vendor environment.
- Provides best practices, engineering, implementation, maintenance, and hardware/software
- Assists in performing security architecture reviews, develop engineering design, and deployment plans in order to identify and prevent security breaches.
- Participates in security risk assessments and remediation efforts to ensure PCI compliance and overall security for the company.
0-5 years of experience
- Sub-contracted consultant to Raytheon as their IT security representative. Provided security compliance verification and implementation at for the Neutral Buoyancy Laboratory and the Space Vehicle Mock-up Facility of the International Space Station (ISS) industrial control systems (ICS) that utilizes Rockwell Automation software following ICS SCADA controls in NIST 800-82 and 800-53 at Space Center Houston (NASA).
- Developed, implemented and maintained information security standards and procedures. Scheduled and performed quarterly continuous monitoring using McAfee Foundstone vulnerability scans. Ensured compliance activities to include laptop and CPU data at rest whole disk encryption, IT inventory, license management documentation, configuration documentation, application health monitoring, patching and change management procedures.
- Participated in IT risk assessments during the Certification & Accreditation (C&A) process to include running network scans, ensuring correction and/or the mitigating of IT security issues discovered.
- Maintained documentation required for compliance – System Security Plans (SSP), Risk Assessment Reports, Contingency Plans, POA&Ms in compliance with NIST regulatory requirements.
0-5 years of experience
Primary on-site systems administrator/security engineer responsible for router & switch, firewall, domain controller/active directory, network security, and desktop management.
- Network & systems auditing using tools NMAP, Wireshark, Nessus Network Vulnerability Scanner, & What’s Up Gold Network Monitor to effectively secure the network infrastructure for FISMA Certification & Accreditation.
- Assisted ISSO in documentation of the design & implementation of network infrastructure, as well as the Security Policies & Procedures for FISMA Certification & Accreditation in accordance with NIST Special Publications 800-53.
- Implementation & management of Fortinet Fortigate Firewalls, HP switches, & Linksys Wireless AP’s & switches.
- Implementation of Public Key Infrastructure for secure email and website access for client sites.
- Migration of Active Directory & Messaging infrastructure to Microsoft Windows 2003/Exchange 2003.
- Administration, configuration, patch management & security updates for Windows Server 2000/2003, CentOS, Red Hat Enterprise Linux, & VMware GSX Servers, SSL VPN, NEC PBX phone system, LeftHand Networks SANS, Symantec Antivirus Server, and VERITAS Backup Exec.
- Analyze & recommend new hardware, software, & communications products.
- Performed advanced security, diagnostics, & maintenance on computer/networking devices.
- Implemented Inventory Management process for all IT assets.
0-5 years of experience
Responsible for perimeter security through IronPort email systems and Websense web filtering.
- Monitored AD infrastructure with ManageEngine tools.
- Ran Ediscovery through EMC Discovery Manager.
- Security Event monitoring with AlienVault/OSSIM.
- Vulnerability and Patch Managment monitoring.
0-5 years of experience
Administer SAP security for R/3 system in modules FICO, HR, PM, PP, QM, SD, and MM for both North America and International sites. Oversee all audits including Sarbanes-Oxley, general computing controls and access controls. Work with audit team ensuring risk mitigation controls in place and operating effectively.
- Environment: SAP R/3 Version 4.6C and ECC 6.0
- Developed Authorization Roles using PFCG.
- Research SAP transaction/process issues using SUIM, SU53, and Authorization Traces.
- Experience providing security setup with NetWeaver and some Business Intelligence packages.
- Experienced in all phases of the project life cycle including scoping, planning, and implementing SAP Security for Global Rollouts and Production Support projects.
- Processed security role modifications via TMS transports (Development, Quality, and Production environments).
- Provided support for Service Help Desk system and monitoring/assigning ticket requests.
- Worked in 24/7 environments extensively to monitor and provide required support.
- Experienced in ITGC, Risk Analysis, Remediation, and Mitigating risks for roles and user assignments based on SOD and SOX Compliance requirements for both Internal and External Auditing Firms.
- Ensuring the SAP Security Administration team achieves target SLA’s, Audit Compliance, and all related policies, procedures, control sets, and best practices.
0-5 years of experience
Lead engineer for the Whole Disk Encryption (WDE) project at Qualcomm. Deployed WDE to over 27000 systems worldwide in less than one year (97% of laptop systems). Created a custom theme for the WDE software using company logos to give systems a consistent look and feel for Qualcomm’s users. Wrote troubleshooting guides for the WDE software to provide training to support staff globally.
- During the WDE deployment I discovered that systems were simultaneously connected to the wireless and wired networks. To address this security issue I engineered two solutions to support two laptop types. These solutions activated the wireless device when a LAN connection was not detected and vice versa. These solutions ensure that the networks were not being bridged.
- Upgraded the Symantec PGP infrastructure. Streamlined the encryption policy for the PGP services for consistency and to speed the processing of email.
- Wrote a monitoring script to test the capture rate of the Netwitness concentrators and decoders using the Representational state transfer (REST) API. Wrote a script to detect hard drive failures in Netwitness servers and email the administrators if detected. Standardized the time in the Netwitness infrastructure.
- Worked with my team to upgrade the Netwitness infrastructure to the latest version.
- Worked with my team to upgrade the network DLP infrastructure to the latest version.
0-5 years of experience
Worked on defining encryption and key management architecture of a client medical product that will be under FDA Oversight.
- Developed a blue print for corporate Ad-Hoc and Mobile wireless network implementation.
- Served as a member of Security team on Unatek high-profile client projects. This high-profile project involves daily, face-to-face communication with senior client directors, key stakeholders, security staff, and CIO’s.
- Monitored Security Information and Event Management (SIEM) for security incidents and perform incident response at Unatek. Support clients at highest level in development and implementation of doctrine and policies.
- Developed project plans for all assigned security projects to ensure high-quality and timely delivery and to meet future requirements.
- Advise IT Security Specialists on different Cyber security projects operations and manage centralized patch and vulnerability management using Microsoft System Management Server (SMS).
- Experience in managing centralized patch and vulnerability management. Established and satisfied system-wide information security requirements based upon analysis of user, policy, regulatory and resource demands; and developed project plans for security environment to meet future requirements.
- Implemented common controls into C&A package during contract procurement phase to ensure quick turnaround possible for Solution Provider’s C&A task. Also, established system wide information security requirements based on policy and regulatory requirements based on NIST 800-53 for client; created reports of findings of C&A effort and presented documentation to client.
- Develop and maintain System Security Plan formal document to ensure it provides an overview of security requirement for information system and describes security control in place to meet requirement of associated documentation NIST 800-37 (Guide for the Security Certification and Accreditation of Federal Information Systems), NIST 800-53A (Guide for Assessing the Security Controls in Federal Information Systems), NIST 800-60, NIST 800-30 and Federal Information Processing Standards (FIPS)199 and 200.
- Conduct periodic reviews (self-assessments). Assist with information system Security audits and reviews; report findings.
- Write Security Assessment Report (SAR) and provide (POA&M) Plan of Action and Milestones with list of risk. Attend weekly project security meetings.
0-5 years of experience
Coordinate with internal and external auditors to determine compliance with policies, directives and standards.
- Provide information on security policies, directives, standards and procedures to trading partners of the agency and interact for operational or commercial reasons.
- Reviewed OS baseline configuration and policies. Audit the Plan of Action and Milestones (POAM) for security weaknesses. Interpret data and create reports and dashboards for senior management.
- Assist the IT Department in developing a policy and procedures to provide cost effective, quality, system and network security assessment and certification based on unified federal guidelines and procedures.
- Assist SEC Operational Data Center in identifying and meeting information assurance requirements. Analyzed the development and implementation of information security policies and procedures for patch and vulnerability.
- Used Qualys and Bigfix tools to create regular reports for vulnerabilities and path management in the network systems.
0-5 years of experience
I worked as a Level 2 Security Engineer on C4 System’s Information Risk Management team. This was a team responsible for risk monitoring and mitigation of security incidents as well as incident handling.
- Security incident management and response
- Symantec Endpoint Protection (SEP) use and administration for security event management
- Sourcefire administration for packet inspection and threat analysis
- FireEye administration for incident handling and malware detection alerts
- Splunk programming for security data analysis
- Security Metrics Reports
- Experience with anti-virus solutions, virus outbreak management, and virus removal
- Analysis of network and workstation assets for hardware, network, and malware issues
0-5 years of experience
Perform daily analysis of IT Audit Reports on vulnerabilities issues
- Perform monthly security checklist for 129 Windows/Citrix servers
- Work to resolve POA&M items reported in SCA Audit reports
- Review event logs for audit failed objects
- Participate in DTNM patch management to ensure DNIA compliance
- Address computer security incidents as they occur
- Perform computer security related work as required
- Performing system requirements capturing
0-5 years of experience
Assisted managing firewalls and anti-virus deployment
- Primary contact for any security-related issue experienced by the company.
- Worked on securing environment for PCI compliance including installing LogRhythm SIEM, CISCO FirePower IPS.
- Performed network and application level penetration testing and vulnerability scanning using MetaSploit and Nessus.
- Primary contact in Systems for auditors from SOX and PCI.
0-5 years of experience
Serves as a subject matter expert on security policy and governance for the operations of a US Court’s national HR payroll system.
- Develops divisional security policy and standard operating procedures for account management, incident response, contingency planning, and configuration management.
- Coordinates IT security meetings with various stakeholders, branch executives and division chief to discuss, establish and document security requirements for the system and supporting policy.
- Performs security authorization activities to obtain an authority to operate (ATO) for cloud-based information systems.
- Develops, validates and collects security control supporting evidence for information systems.
- Authors multiple policies and standard operating procedures.
- Develops security training awareness policies and curriculum.
- Utilizes Cyber Security Assessment and Management (CSAM) application to ensure confidentiality, integrity, and availability for information systems and its information.
- Develops Fedramp security requirements for information systems in a cloud environment.
0-5 years of experience
Install and configure HP Fortify RTA and SCA (SSC)
- Issue and Administrator SafeNet MobilePass Tokens
- Issue and Administrator RSA SecureID tokens
- Experience with Juniper SSL VPN Appliance
- Experience with Juniper Security Threat Response Manager log review
- Experience as Attalla Key Custodian
- Process ServiceNow Security requests
- Implement Change Requests for Production, Pre-Production, Development & QA
0-5 years of experience
Administer and manage Symantec Endpoint Protection for 1400+ users
- Administer and manage Computrace laptop tracking for 1400+ devices
- Administer and manage Proventia Intrusion Provention System
- Assist in the management of McAfee Web filter
- Assist in the management of QRadar network monitoring
- Work with other Engineers on verifying network infrastructure and how it relates to security technologies
- Worked on computer asset compliance as it related to security policies
- Work with end users on issues related to security technologies like Symantec, McAfee, Proventia, and QRadar
- Complete weekly reporting and analysis for reporting to management
- Write procedures and articles as they relate to IT Security needs within the organization
0-5 years of experience
- IT security assessment, testing, and compliance activities for the Department of Treasury – IRS FISMA Cyber Security Program.
- Performing security assessment of classified & highly complex information technology financial tax systems.
- Daily coordination of client / business needs to ensure compliance of security risks and evaluations.
- Lead coordination of client engagements at all levels of the assessment project.
- Project management capabilities to ensure program timelines & milestones are met.
- Contributing in team collaboration & building exercises to ensure project continuity and consistency.
0-5 years of experience
- Performed all duties associated with extensive IT Security audits of NASA launch systems, including planning and scheduling, interviews with system personnel, vulnerabilty detection and analysis, penetration testing, recommending mitigation and corrective actions, creating and delivering presentations and reporting efforts.
- Performed quarterly vulnerability assessments for the Enterprise and worked closely with the NASA customer to analyze results and resolve findings.
- Supported incident response and forensic investigation teams.
6-10 years of experience
- User Master and Authorization Maintance for over 30,000 users
- Role Development and production support for over 900 roles.
- Security Lead for R/3 Treasury, APO Planning, BW Finance Implementations.
- Multiple R/3 Upgrades, most recently ECC 6.0
- Multiple BW Upgrades, most recently Netweaver 2004
- Updated and maintained Security Requirements Document.
- Updated and maintained Security Environment Document.
- Implemented GRC, Compliance Caliber, Firefighter, Access Enforcer.
- Worked part-time as a Business Analyst on the Product Cost and Tracking Team for 2 years.
0-5 years of experience
- Security Testing and Evaluation (ST&E) of NIST 800-53 technical controls as part of the C&A process and update appropriate C&A documentation accordingly
- Reviewing and developing technical security plans, policies and procedures.
- Analyzing the results of the centralized and onsite risk analysis testing.
- Perform validation testing of mitigated weaknesses and ensure that C&A documentation is updated accordingly.
- Documents may include, but are not limited to, System Security Plans, Contingency Plans, Configuration Checklists, Risk Assessments, and local policies and procedures.
- Perform security assessment testing and analyze the result of the testing.
- Reviewing technical security policies and procedures performing and analyzing the results of the centralized and onsite technical testing VMS, Vista, Routers, Switches, Firewalls Windows 2003 Servers, Windows XP, and other applications and devices.
- Participated in C&A Annual Testing and perform Contingency Plan Testing with the VA Information systems.
- Lead a team of 6 engineers at various site locations.
- 75% travel to various site locations throughout the continental United States.
0-5 years of experience
- Maintain operational audit processing, ensuring 100% uptime on all system and security audit logs.
- Manually review logs and report security anomalies reported by individual systems.
- Perform system administration tasks including modifying and granting security accesses and authorizations.
- Ensure installation of Anti-Virus software on all servers and maintain current updates.
- Conduct monthly vulnerability scans on all servers across the network.
- Compile daily security audit findings into a monthly summary for all remote administrators on all servers across the network.
- Identified and remedied multiple security vulnerabilities affecting network security.
- Develop UNIX/LINUX scripts to improve auditing ease and reduce commonly repeated tasks.
- Provide an hands on accountability of all media capable equipment across the globally spanned network.
0-5 years of experience
CSIRT Team Member (Computer Security Incident Response Team).
- Computer and network forensic analysis/investigation.
- eDiscovery for Legal, HR, and Corporate Security Departments.
- Network security reviews.
- Security reviews for new software implementations and software upgrades.
- Network monitoring.
- Server security setup.
- Network/system/server security investigations.
- PKI (Public Key Infrastructure)(cryptography)(encryption)(security certificates) setup, configuration and monitoring.
Security Engineer Duties and Responsibilities
Security engineers work with highly complex systems and sensitive information on a daily basis. In this position, you will be regularly required to work on the following:
Write Security Plans Security engineers may need to write brand-new security software in order to protect networks from potential breaches and keep systems safe.
Create and Implement Firewalls Security engineers design new firewalls, putting them into place in networks and making sure they are functioning properly to stop threats before they get to the system.
Analyze and Investigate Breaches In the event of security breaches, security engineers analyze data logs and perform risk assessments to find out which parts of the system have been compromised and where the danger lies. This may require a forensic investigation to isolate problems and put a stop to them.
Attempt to Penetrate Systems In order to ensure the integrity of network systems, security engineers actively try to breach data and hack secure systems to probe for weaknesses. If they are successful, they will know where the potential vulnerabilities are.
Test New Software and Hardware Testing and retesting systems is ongoing; technology changes quickly and new viruses and penetration methods are constantly being developed, requiring systems to be routinely tested to make sure they’re up-to-date and secure against possible dangers.
Security Engineer Skills and Qualifications
Security engineers are often the first and last line of defense for complicated IT systems. Security firms look for security engineers who have experience in the following:
- Familiarity with multiple operating systems – security engineers must know how to work with all the major operating systems, including Linux, in order to create software for multiple types of IT networks
- Knowledge of database platforms – security engineers need to know MySQL/MSSQL database platforms
- Problem-solving – to find potential security hazards and protect the system
- Data analysis – to look through extensive data logs and computer code to isolate security issues
- Creativity – though security engineers work with mathematical formulas and highly technical systems, creative skills are needed to write new software programs to protect systems
Security Engineer Education and Training
Security engineers need a bachelor’s degree in cybersecurity, computer science, or a similar discipline. In addition to the degree, most security firms require certification in several types of programming language and computer skills, including CISA, CISM, CISSP, RHCE, CCNP security, GSEC, and CEH. Because technology is always changing and reinventing itself, ongoing education is essential. As new programs and protocols are invented, security engineers will need to become certified in these emerging technologies as well.
Security Engineer Salary and Outlook
Security engineers make an average salary of $70,000 to $93,000 annually. The median wage for this career path is $87,828. The Bureau of Labor Statistics that job growth for security analysts and related fields is 28 percent through 2026, much faster than the national average. Security engineers also receive full health, dental, and vision insurance benefits. Some companies may also offer profit-sharing and stock option incentives to employees. Because ongoing certification and education are often required, many employers also provide education reimbursement to their security engineers.
Security Engineer Helpful Resources
Stay in the know and up to speed on security technologies with the following useful tools:
Information Systems Security Association International – This non-profit, international organization provides forums for knowledge sharing, as well as news and information about the latest developments in technology and cybersecurity systems of all types.
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers – This useful guidebook tells how to create security software using Python, a widely-used programming language that can be applied to a vast number of IT networks.
Center for Internet Security – Use this website for the latest news on data protection and to get tips on cyber safety online, including information about recent developments in IT security.
Cisco Networks: Engineers’ Handbook of Routing, Switching, and Security with IOS, NX-OS, and ASA – This book covers everything you need to know about Cisco-based networks, including every aspect of ASA, IOS, and NX-OS software.