- Featured in:
Find out what is the best resume for you in our Ultimate Resume Format Guide.
Additional Safety Security Resume Samples
Security Engineer Resume Samples
No results found
6-10 years of experience
Administered, maintained, and operated existing security solutions such as Arbor Networks for DDOS attacks, HP ArcSight for event correlation, RSA NetWitness for real-time network forensics and automated threat analysis, RedSeal Networks for proactive security analysis and Sourcefire IPS
- Integrated multiple data feeds from local network devices and forwarded into HP ArcSight ESM via HP ArcSight Logger and HP ArcSight Connector Appliances for analysis by CSIRT/SOC
- Oversaw external vendors and consultants on delivery and implementation teams which impact existing and new security solutions
- Provided day-to-day administration and support of an OSPF/BGP Netscreen firewall WAN with dual-stack IPV4/IPV6 environment
- Assisted CSIRT/SOC with the investigation of and response to network security breaches.
- Established and maintain IPSec-based connectivity with external vendors
- Supported remote access solutions (Cisco ASA, Juniper SSL VPN)
0-5 years of experience
Led the Information Vulnerability Management (IVM) process at ADNET to ensure compliance and increase the network’s security posture. Responsibilities included: Network Scanning and mitigation of servers and workstations. Patch application in accordance with IAVM DISA FSO standards.
- Led a team of four to prepare for a DISA FSO inspection that resulted in the FSO rating the network as fully compliant.
- Tested and implemented over 100 security controls on Windows 2003 servers.
- Responsible for researching and the network installation of security solutions such as: SSL accelerators, Windows 2003 security servers (Symantec and patch application server), firewalls, and signature based IDS systems.
- Responsible for conducting vulnerability scanning and identify system and network vulnerabilities. Automated vulnerability scanning tools used include: Retina scanning tool, FSO Gold Disk and PatchLink mitigation tool.
- Developed and performed mitigation plan and performed remediation activities based on the findings to resolve network and system vulnerabilities to meet DOD compliance requirements.
- Assisted with site certification and accreditation process including policy development, C&A package review, and ST&E testing.
- Researched and established contacts with various hardware and software distributors of IA products. Conducted operational and security testing to evaluate products and provide recommendations to the client.
0-5 years of experience
Independently managed and customized Tripwire security tool deployments for Connectria’s business needs by developing implementation that will also meet Connectria’s Hosting Customer’s compliance standards for PCI and HIPAA certifications including: File Integrity Manager, Policy Manager, Log Center and SEIM solutions. SME for Tripwire.
- Customized compliance requirements for scans with PCI/HIPAA policy manager for server and firewall devices to meet customer specific compliance controls and supported the needs of 150+ customers.
- Implemented file integrity monitoring to meet customer audit requirements with automated reporting.
- Integrated Tripwire Enterprise and Tripwire Log Center to display correlation rules in a custom dashboard for customers and internal PCI infrastructure.
- Secured the operations of [company name]customer environments by responding to security alerts, problem management, and security incident management support.
0-5 years of experience
Managed security incident responses for NIPR and SIPR networks through a methodical process of identification, investigation, and resolution. Performed computer Incident Management for Navy systems and programs with 5,000 users. Worked directly with Navy personnel at multiple levels and with FBI and NCIS on high level incidents. Collaborated with law enforcement agencies and NCIS to obtain evidence and maintain chain of custody. Held Secret clearance.
- Developed Standard Operating Procedures (SOPs) for incident response handling.
- Reviewed and analyzed security response policies and programs for potential risks.
- Ensured continuity in user account creation for military personnel.
- Disseminated Information Assurance Vulnerability Alerts via Online Compliance Reporting System.
0-5 years of experience
Lead security engineer for managed PKI and the SSL certificates for the [company name] services, inclusive of certificate expirations, renewals, and certificate installations.
- As a prime team member on the Global Security team, cooperated in the design and installation of the [company name] internal Certificate Authority on a Windows platform.
- Installed the Red Hat Certificate Authority on a Red Hat server for evaluation.
- Managed and supported the [company name] 2-Factor authentication service on the RSA Authentication Manager.
- Installed and configured the Red Hat Identity Management application (IPA) for evaluation to implement as [company name]’s centralized authentication for the Linux production network to meet PCI compliance.
- Provided vulnerability assessment of the Linux production network systems utilizing QualysGuard.
0-5 years of experience
Project lead and point of contact for the Firewall Team on the PCI compliance audit for the 5th largest healthcare system in the country.
- Intake Manager, prioritizing and coordinating work for the Firewall team.
- Prepared, configured and managed firewalls (ASA, Fortigate), ACLS as well as Network management tools (Cisco CSM, FortiManager).
- Provided support and troubleshooting on network security.
- Prepared status reports on security matter to develop security risk analysis scenarios.
- Created network and security documentation.
- Configuring routers, creating new VPN’s, IPSec tunnels with GRE and BGP.
0-5 years of experience
Performed verifications on incoming certificate requests to ensure they were in compliance with baseline requirements for SSL certificates.
- Main point of contact for primary customer during their process of replacing over five thousand certificates threatened by the Heartbleed bug and coordinated the processing of all urgent or sophisticated orders.
- Supervised and assisted with training the support team for primary customer and reviewed the team’s work for the replacement certificates.
- Coordinated team members in multiple regions to process requests for international customers in different time zones and languages.
- Tracked and reported on number and value of certificates issued as well as performed internal audits to ensure all SSL On Demand customers remained in compliance with industry baseline requirements.
- Consistently exceeded performance goals and expectations, recognized for contributions to several major projects.
0-5 years of experience
Wrote Python and Shell scripts to poll customer firewall and ids configurations for AT&T MSS Data and extract the information into files for the customer to review.
- Wrote documentation based on the customer’s network environment by analyzing network diagrams, policy information, and technical documents for the CSSM Migration.
- Assisted the AT&T Network team with troubleshooting Cisco Firewalls (ASA, FWSM), and syslog logging issues.
- Assisted the AT&T System Administrator team with troubleshooting issues in the Linux Redhat environment.
- Built a Yum repository server for the Linux Redhat RHEL 5 and 6 Servers.
- Executed Nessus vulnerability scans and generated custom reports for security analysis.
- Configured the Enterasys Dragon EMS Manager and Dragon sensors for the CSSM test pilot.
0-5 years of experience
Reported directly for Deputy of the Defense Major General James Klugh (Retired).
- Obtained a high level of expertise in tracking new and emerging Command, Control, Communications, Computers and Intelligence (C4I) technology research, development and implementation worldwide.
- Managed a specialized project that prepared technical reports on C4I developments. These reports were incorporated into Intelligence Summaries that were read at the highest levels of government on a daily basis.
- Planned and conducted operations throughout Europe, the Middle East and North Africa in support of National Cryptologic requirements.
- Director – Information Assurance for Executive Security and Executive Technologies, Inc.
- SME member of National Security Telecommunications Advisory Committee (NSTAC) Assigned to the Department of Defense (U.S. ARMY) Army Material Command to ensure proper automated information system security engineering activities.
- Served NSTAC committee as a representative for Retired Undersecretary of the Defense Major General James Klugh and Retried General Wilson as Information Assurance Officer.
6-10 years of experience
Maintained a rapidly changing environment while still providing solutions that preserve compliance, access and security.
- Evaluated risks & threats while adopting adaptive security policies, processes, & technologies.
- Conducted security monitoring via IDS, File Integrity monitor, logs, forensic analysis, incident response, & cyber-crime investigations
- Researched IT security issues & solutions & presenting ideas in a business-friendly &/or user-friendly language
- Created information security documentation & implemented best practices
0-5 years of experience
Managed and improved the Infrastructure Vulnerability Assessment Program, including configuring, scheduling, monitoring, and reporting results of vulnerability, patch, and compliance scans.
- Administered, maintained, and improved configuration of the McAfee Vulnerability Manager (MVM) and the Scuba Database
- Trained and led staff on operation and maintenance of program and tools.
- Created and distributed custom vulnerability, patch, compliance and KRI reports to platform teams and IT and Security
- Participated in and contributed to the Patch and Vulnerability and Infrastructure Risk Remediation groups.
- Led the Americas Vulnerability Rating Forum (VRF), producing business and environment-specific ratings of patches and vulnerabilities. Provided input and challenges to the Global VRF.
- Improved and updated Standard Operating Procedures and Configuration and User Guides for the Vulnerability Assessment
0-5 years of experience
Assigned to Enterprise Management Operations Center (EMOC) to monitor and resolve all security issues in support of TSA ITIP contract.
- Led investigations of security violations.
- Provided technical consultation on highly complex tasks.
- Assessed assigned system to determine system security status.
- Performed daily network maintenance.
- Performed change control modifications on Cisco ASA, McAfee Sidewinders, and McAfee web washers.
- Re-mediated malicious logic codes using Symantec Endpoint Protection and Microsoft Antigen for Exchange.
0-5 years of experience
Implemented and supported a highly secure web infrastructure.
- Implemented a secure corporate Internet and web infrastructure utilizing Cisco PIX, Cisco routers, Watchguard, Tripwire, Cisco Local Director, and hardened Solaris and NT operating systems.
- Addressed the need to keep security current by creating a maintenance schedule to apply relevant security updates in a timely fashion.
- Developed and maintained the internet security policy and procedures.
- Designed and deployed VPN for secure remote management of the web infrastructure.
- Provided remote customer support for 125 internal end-users and was a primary support contact for over 200 client companies.
- Planned and completed VPN client roll out to virtual employees.
10+ years of experience
Established PepsiCo’s application security program.
- Led the effort to prepare secure coding policies
- Train PepsiCo developers on secure coding policies.
- Assessed applications and provided guidance to development teams on remediation of identified vulnerabilities.
- Designed and managed the build-out of an all-new infrastructure and custom application code in the wake of a major security breach.
- Managed a team of five to implement network security controls.
- Performed regular security audits.
0-5 years of experience
Designed and implemented SIEM and FIM tools to adhere to PCI/HIPAA/SOX requirements
- Developed, wrote and drove security standards, policy and methodologies to adhere to regulatory compliance as well as security best practices
- Rogue device scans on PCI environment
- Led efforts during certification for HIPAA/HITECH
- Reviewed all change management tickets to insure adherence to company security policies/procedures as well as regulatory compliance
- Primary contributor in ISO/IEC certification process
- Analyze new clients security posture for regulatory compliance and adherence to company security standards
0-5 years of experience
Provided 4th level support for antivirus and malware protection software from Symantec and McAfee
- Reduced Out of Date, Offline, and Disabled clients from 34% (5100+ clients) to 10 % in 9 months
- Technical Lead for SEP 11 EOSL migration project for 3000+ customer servers affecting over 400 customers
- Built SEP 12 packages for reliable, consistent deployment via SEPM Console and HPSA Policy
- Indirectly managed 80+ SEPM Console admins from various departments world-wide
- Created Batch Script automatically backup the ePO SQL database and config files
- Created PowerShell scripts to migrate users from one domain to another, including group memberships
0-5 years of experience
System engineer for the implementation of Oakley Networks/Raytheon Innerview 6.7.4 to support insider Threat
- Maintained Multiple RedHat Enterprise systems with antivirus updates, web cert updates, and standard system security updates
- Managed and configured system to deploy Innerview agents across entire domain
- Created and maintained documentation on processes and procedures related to monitoring the system, deploying Innerview agents, backing up data, and performing disaster recovery.
- Setup, configured and maintained McAfee EPolicy server with Virus Scan Enterprise, Data Loss Prevention, Host Intrusion Prevention, McAfee Agents, Policy Auditor, and Rogue System Detection (HBSS) on multiple networks
0-5 years of experience
- Partnered with university clients on configuration management of network security devices.
- Participated in the change and release management processes to plan and manage installation of new
- Coordinated internal and external audit requirements for FERPA and ISO 27000.
- Provided technical support and analysis of critical infrastructure for security programs and policies.
- Conducted security architecture analysis to evaluate and mitigate issues.
0-5 years of experience
Served as functional lead for General Dynamics AIT C&A team, specializing in compliance, policy, and continuous monitoring.
- Responsible with assisting in staffing depleted C&A team
- Ensured vulnerability mitigation to an acceptable level for 100+ systems before systems could receive accreditation
- Campaigned for OS baselines for 7 system types, resulting in increased testing efficiency by 100%
- Prepared security business cases for upper management within AIT services
- Responsible for C&A transition efforts from DCID 6/3 to ICD 503 standards
0-5 years of experience
- Performed security testing, risk analysis, requirements analysis, policy and procedure review, and generated all necessary reports
- Performed vulnerability assessments via automated tools or manual checklists published by DISA, FIPS, NIST or FISMA to assess target network compliance posture
- Conducted functional review of the assessment tools and Contractor Site/Government Program Office’s readiness during the Test Readiness Review
- Served as subject matter expert on networks, devices, scanning, testing tools, and Security Technical Implementation Guides (STIGs)
- Provided technical updates to Team Lead for Daily Trip Reports (i.e., status reports)
0-5 years of experience
- Developed, implemented, maintained, and oversaw enforcement policies, procedures, and associated plans for system security administration and user system access
- Conducted research on emerging products, services, protocols and standards in support of security enhancement and development efforts
- Deployed, managed and maintained all security systems including antivirus software, security event monitoring, and intrusion prevention
- Performed various domain administration, system administration and network engineering tasks
- Deployed and managed Symantec Endpoint Protection antivirus severs and clients across the organization
- Deployed and managed Tenable Nessus vulnerability scanner and developed the company’s vulnerability management process