| 20,000+ Fresh Resumes Monthly | |
|
|
| | Click here or scroll down to respond to this candidateCandidate's Name
2 Lyon Lane,Franklin Park, NJ Street Address
Phone: PHONE NUMBER AVAILABLEEmail: EMAIL AVAILABLEIT Security GRC / Cybersecurity Solutions Architect SMEPROFESSIONAL SUMMARY:SME: IT Security Policy and Procedure formation and maintenance, IT Security/Risk Analytic and Architectural design skills, IT Audit, Cybersecurity and Data Security Governance including Privacy rules and protection strategy, Vulnerability and Patch management, and Insider Threat and Intelligent Management, Application security testing, and Security Endpoint Protection, implementation of layers of defense security tools, Security Incidents, on premise and in the cloud environments such as Microsoft Azure, and GCP.Develops and maintains incident management and response capability by performing incident response tasks as owner of such procedures.Experience in the implementation of information security Governance strategy with visible metrics showing progress and alignment with the business such as key goal indicators (KGIs) and key performance indicators (KPIs)Experience in Third Party Risk Management (TPRM) and Assessment including Data Privacy and compliancy readiness On-Premises and in the Cloud both at Government agencies and corporate environments.Proficient Cybersecurity examiner / Audit with insight and proactive monitoring skills: To quickly isolate security gaps related to non-compliance with IT Security governance and best practices, control testing, process flow, internal controls, data exfiltration deficiencies prevention schemes, certificate management, data hoarding loophole techniques; protective technology inadequacies that can result in risk manifestation from misconfiguration, lack of security awareness, lateral movement, network reconnaissance and persistence attacks.Manager and Operations expertise in triaging security incidents including in designing web application security controls, detection and responses to security events and overseeing the support and alignment of enterprise IT Security Strategy in meeting the Companys IT Security efforts for dynamic Business Goals through the continuous deployment and evaluation of security controls, threats, and managed event detection response (EDR) program to demonstrate compliance and per standards.Hands-on and expertise working knowledge in evaluation of technology control testing and best Security Practices in various IT projects including design, platform, and software vulnerability management in third-party systems, to protect data using threat modeling techniques and enforcing risk management best practices.Passionate in threat intelligence feeds and monitoring third-party risk management practices for Enterprises risk appetite, threat exposures, Data bleaches, risk scorecards, Identity and Access Control management (IAM) issues to get a grasp of threat landscape to both public facing and internal information assets.Helped to define and quantify appropriate risk levels based on continuous risk assessments, security best practices and standards. Also assisted in providing periodic metrics on KPIs, KRIs enterprise-wide for effective GRC enforcement, SOC1, SOC2, SOC3 assessment reporting internally and third-party vendors external dependencies. Also facilitates the development of security test cases based on standards and in compliance with approved security policies.Experience in developing Security Operation remedial solutions, including deployments and proactive audit by helping to create corrective action plans to remediate highlighted risks and review evidence for closure per post remediation review practices.Doctorate Degree Computer Science, Masters degree Information Security, multiple technical certifications including CDPSE, and security training.Available to start within one or two weeks from offer.TECHNICAL SKILLS:HP UX9.X, Solaris 5.10, RedHat Linux, Sql, NIS, Autosys, BMC Patrol, Microsoft Project 2007, Security Axent ESM 5.1, TCP /IP, Infoman and Service center 2.1, HTML, SNMP, HTTP, BGP, RDBMS Oracle 8.1.5, TCP /IP, Server (LDAP directory server), Perl 5.2, Mainframe-Control M 2.51/TSO; Microsoft Visio 2002, ClearCase, ServiceNow, WebSphere 6.9, Amazon AWS, Google GCP, BMC Remedy IT management 6.0, Ivanti Heat, ClearQuest, Tableau, LDAP, Active Directory, WebSphere, Cognos Report, WebSeal, Ubuntu 14.04.Network / Security Tools: Wireshark, Nmap, Cisco FirePower and SourceFire as IPS, HP Fortify, Tenable SecurityCenter, McAfee ePO, Norton Antivirus, App Scan, Nessus, Rapid7-Nexpose, InsightVM and InsightAppSec, Metasploit, RiskVision (Agiliance), CIS-CATS, Netcool, Ecotool BMC, Whatsup, Symantec DLP MTA, Remedy, ITSM, Extrahop, Varonis, WebDefend, CA Privileged Identity Manager (Control Minder), Qualys(Qualysguard), Nessus, Red Seal Security Engine, IBM Guardium and Nessus, ELSA, Snort, Suricata, STREAM, and Bro; SIEM-based Analytic Engines LogRhythm, McAfee ESM SIEM and RSA Security Analytics, RSA Archer GRC, EtterCap, Cain & Abel, Symantec SEP-ATP, SolarWinds, Vega, Symantec Security Cloud, Symantec MessageLabs, Symantec EDR Platform, Cisco Stealthwatch, Rapid7 MDR platform, Crowdstrike, SecureWorks Platform, Microsoft Defender and Identity Protection, Veracode and SCA tool.Cryptography: PGP, SSH, SSL, AES, 3DES, VPN & TUNNELING: SSH-based Solutions, SHA-3, and RSA ActivIdentity.Framework: FFIEC, NIST 800 Series, FedRamp, FISMA, PCI-DSS, SSAE16, CIS-CAT, GDPR, DFS 500, COBIT 5, ISO/IEC 27001, GDPR, SAS70, and ISO/IEC 27002, TOGAF, FIPs 199/200, HIPPA, SWIFT and HITRUST.PROFESSIONAL EXPERIENCE:August 2021 September 2023Cenlar Federal Saving Bank, Ewing New JerseySenior IT and Cybersecurity Manager Assisted the organization in streamlining the information security program in strategic alignment with its business goals and objectives such as defining the governance priorities., architecting security solutions and success factors. Responsible and oversaw the Vulnerability Assessment and Patch management for systems, network gears including assets with end of support/service (EOS) and end of life (EOL), and application assurance to provide full visibility and coverage in assessment schemes to guide against threats, associated risk and create security baselines. Researched and assisted in the design and delivery of cybersecurity solutions including architecture and integration with existing infrastructure and control objectives. Performed Risk and threat analysis on organization infrastructure and business processes periodically and ensure threat protection controls are implemented adequately and communicate such security gaps to different stakeholders and business leaders. Identified incidents or potential incidents using various threat scenarios and prioritized such incidents based on criticality and business impacts on systems and workgroups. Helped in the creation, review and update Data privacy security pratices and Cybersecurity program standards by implementing good security practices including data privacy protection, and governance processes, workflows with roadmap for continuous improvement. Responsible for the development of the Application Security Roadmap with documented measurable metrics to show progress and linkages to business goals and objectives. Assisted in the implementation of data risk management solutions by ensuring adequate data access and protection controls are deployed and operationalized based on stringent business policies, criticality, sensitivity, and compliance requirements. Collaborated with business owners by using different threat models to isolate both internal and external threats using various threat scenarios thus ensuring security assurance governance processes are fully implemented and integrated with critical business tasks, risk management, change protocols, and data privacy program.Provides system, information security risk assessment and risk mitigation advisory role and leadership enterprise wide to ensure cybersecurity operational resilience. Continuously help to review roles and responsibilities among different quality assurance teams to ensure security and compliance issues are quickly detected and remediated. Noted issues are also communicated to key stakeholders for solution input. Captured periodically meaningful metrics to upper management and Board on state of the security governance and risk management program enterprise wide. Worked with third-party vendor to perform both external Penetration Testing using automated and manual penetration testing techniques on all public facing application systems Provides threat and vulnerability analysis including data flow review during software application code development especially with respect to open-source components. Performed technical security review (TSR) including technical security requirements and control of various projects and well as ensuring secure baselines are used on systems and applications. Assisted in the development of system application controls, targeted phishing campaigns and cybersecurity training for the workgroup and support staff by working with vendors to ensure effective coverage. Serve as an IT security specialist to Sales, Implementation and Product Management to assist with answering RFPs and completing technical questionnaires that focus on security and network standards and our compliance with various audits and regulations.June 2019 Feb 2021US Security Exchange Commission (SEC) /AMYX, New York.Senior Principal IT Security & Cybersecurity Solutions SME /Examiner Assisted in the development and maintenance of IT security and Cybersecurity policies and procedures based on best security practices, standards, organizational business requirements and control gaps within SEC, regulated credit rating and trading organizations. Managed and participated in disaster recovery scenarios and incident responses to ensure best security practices and procedures are followed and incident playbooks are promptly updated to capture lessons learned. Responsible for conducting in-depth IT Audit, third-party and External dependencies audit and risk assessment with the use of targeted questionnaires, context-based threat analysis and triggers catalogued in GRC tools. Contributed to deployment of protective technologies such as Cisco AMP, Secure cloud Analytics solutions, and Next Gen Firepower that provide unified visibility and strong security safeguards. Participated in continuous integration and deployment (CI/CD) efforts by using up to date working knowledge of secure SDLC processes such as OWASP and BSIMM models of application development by ensuring all systems are architected, configured, and tested for data and application-level security controls. Responsible for overseeing various evaluations of the cybersecurity resiliency programs aimed at protecting PII and PHI in applications ofNational Recognized Statistical Rating Organizations (NRSROs) operating globally, and clearing agencies, and ensure risk management processes are built into all business activities. Developed cybersecurity maturity heat maps and matrix used to measure the maturity of risk management approaches for NRSROs based on continuous IT security and cybersecurity examinations and monitoring programs. Assisted in the development of critical cybersecurity policies and procedures to drive SEC incident response plans and monitoring for all Endpoints. Also collaborate with cross-functional teams to ensure infrastructure and physical security controls. Managing cyber security threat intelligence and ensuring that agency develops shares and maintains an effective threat gathering program using various approaches such as ISAC, TAXII and STIX, Talos and other intelligence platforms. Developed Cybersecurity risk Heat Maps and profiles for different Credit Rating Agencies, the Exchanges, selected Clearing agencies, and Mutual Funds to provide hindsight to their IT security and cybersecurity resiliency program and risk treatment. Continuously provide IT security and Cybersecurity threat intelligence feeds to the Capital markets from Security Exchange commission established platforms such as Department of Homeland Security automated Indicator sharing, FBI IntraGard portal, Cisco Talos Intelligence, National information sharing and analysis centers such as MS-ISAC, and US-CISA. Documented security recommendations based on examination and monitoring assessments of the credit and stock brokerage business processing environments and other external vendors. Developed partnerships with relevant cross-functional executive leadership throughout the agency to increase business knowledge and provide appropriate security support.August 2017 June 2019National Benefits and Pension Funds (1199Funds), New YorkSenior Information/Cyber Security Operations LeadResponsible for the threat detection and incident responses (TDR) by reviewing all security events and incidents from IPS/IDS systems, endpoint protection tools and the SIEM.Overseeing the vulnerability management program, risk identification and remediation efforts of critical systems processing PII and PHI and other proprietary sensitive information.Helped to design ongoing efforts to integrate CMDB and Nexpose vulnerability Platform to instantly map vulnerable IT assets IPs to line of business and system owners. Efforts have resulted in a reduction of mean time to remediate vulnerabilities.Oversees investigation of data exfiltration issues based on concern index (CI) and cognitive threat analysis attributes with Cisco Stealthwatch.Coordinated external quarterly penetration test with third party provider - Digital Defense including using social engineering antics to enforce and gauge security awareness training program companywide.Helped to deploy and integrated Symantec Endpoint (SEP 14.0.1. r1) with Symantec Advanced Threat Protection 3.2 (SEP-ATP 3.2) for real time threat detection and mitigation organization-wide. Managed the SIEM infrastructure with Intel McAfee Enterprise Security manager (ESM) and work with Symantec external hosted SIEM support team to provide detect and respond to intrusions round the clock.Assisted in the design of the vulnerability exception life cycle program and documentation for technical teams to account for false positives and vulnerabilities that can be mitigated but can be controlled using compensatory controls especially among legacy applications.Worked with managed security service (MSS) providers to implement Symantec endpoint protection and ATP integration enterprise wide. Also responsible for all coordination of security incidents of end points.Assisted in the formulation and maintenance of Cyber security policies based on NIST Framework, Cloud Security Alliance (CSA) blueprints and emerging threat landscape.Responsible for all coordination and remediation of security incidents of end points enterprise-wideAssisted in the development of third-party risk assessment efforts to determine security requirements for specific use cases for different line of business to ensure alignment with the companys security architecture, control objectives, processes, and policies per Center for Internet Security (CIS), Cloud Security Alliance (CSA) standards and strategic operational goals. Partnered with business clients to conduct third party risk assessment using SAI global platform to ensure business and regulatory compliance with in-built risk triggered alerts.Responsible for application database tier and system risk assessment and review using CIS compliance standard as part of risk assessment initiative that cover assessment of critical MySQL databases, RHEL systems, Windows Servers 2008/2012, JBoss, and Cisco network devices.Assisted in the implementation of SAI Global Compliance 360 risk management platform formerly Modulo to capture all risks in term of tracking, reporting and assessment. This effort has streamline risk catalog management and exception life cycle highlighting areas that need improvement using security best practices and mitigation approaches to prioritize risks enterprise-wide.Responsible for network incident response for all endpoints and devices. Coordinated efforts for remediation with technical services groups and help desk personnel with targeted action plans.Coordinated with various IT teams to design and implement application security controls using continuous agile and integration processes at different stages of the secure software development life cycle including security integration testing.Developed enterprise-wide security metrics used to measure current state of vulnerability mitigation program by analyzing patch results and misconfiguration changes that addresses security risks, gaps, and violations monthly, quarterly and over a certain period.Reviewed security implementation of the Multiprotocol Label Switching (MPLS) network design project on third-party access for data privacy impact assessments and document risk among the different sites to implement adequate security controls to mitigate risk exposure.Liaise with vendors such as managed service provider (MSP) and data processors such as ADP regarding current threats to ensure that they are taking adequate steps to reduce exposure and susceptibility to threat.March 2017 August 2017DuPont /Diverse Lynx, Wilmington DE,Senior Principal IT and Application SecurityLead a Team of 6 3 Onsite and 3 OffshoreConducted in-depth application security assessment of twelve different workstreams as part of the Merge and Spin programs between Dupont and Dow Chemicals to highlight control gaps and develop risk mitigation efforts.Created security assessment reports for each business unit and workstreams including recommendations using security best practices such as OWASP, and ISO 27001 and CSA methodologies for cloud-based applications.Developed exception criteria and tracking system to capture remedial solution exceptions used to enforce due diligence and compliance efforts as championed by industry security standards and Dupont security policy.Assisted in the classification and validation of different authentication and authorization techniques to streamline transition to Oracle Authentication management (OAM) and multifactor authentication (MFA) program.Engaged developers and application support teams in security awareness training efforts with respect to using best application security techniques in development and coding.Provided oversight and governance of application security management processes to adequately certify compliance with ongoing application merge plans using established benchmarks and security standards.Prepared weekly security assessment metrics and documentation to show progress to two-a-box stakeholders as part of the transformation program.Performed external Cyber Security audits on newly deployed web application firewall (WAF)s for effectiveness and compliance requirements.Reviewed last quarters IT audit and assessment reports to ensure documented remedial solutions are fully integrated into operational tasks by assigned teams.Evaluated vulnerability exception tracking processes for different business lines or stakeholders and prepared detailed gap analysis report for improvement and overall risk containment.September 2016 December 2016Moodys Investor Corporation, NYCyber Security Vulnerability and Risk Consultant (SME)Provided leadership in security project management with respect to web application vulnerability testing management, patch management, lead staff in risk detection, and analysis mitigations discussion across the enterprise including offshore.Hands-on in IT risk analysis and vulnerability discovery in systems, application-database tiers, and network devices. Also, responsible for advising security risk impact to senior management and sponsors.Performed internal pen-test using network discovery and network vulnerability scanning methods in addition to web application-tiers vulnerability scanning to highlight security Investor Corporation, NY vulnerabilities thereby maintaining secure baselines after remediation for systems and application-database tiers enterprise-wide.Prepared configuration compliance Audit files based on DISA STIGS and CIS for various technologies within the company-wide to drive vulnerability mitigation implementation in the ongoing cyber security program efforts across different lines of businesses. The document also outlines GRC policy and procedures with roles for various business lines, operation teams and the compliance office.Responsible for developing IT security risk requirements for third-party vendors based on SIG questionnaires and agreed upon procedures (AUP) for different LOB to create risk registers and perform security audit across different business areas to ensure compliance and in accordance with security hardened documents and compliance baseline for operating systems, applications and databases including network gears.Liaise with IT architecture teams to ensure alignment between the security and application architectures, thus coordinating the strategic planning implicit in these architectures.Researched external emerging threats from discovered vulnerabilities and advise relevant stakeholders on the appropriate courses of action. Developed and provided suggestions on effective security audit policies, procedures, and standards to align with cyber security management goals.Gathered requirements for the deployment of SecurityCenter APIs integration work to ensure effective IT asset vulnerability determination, compliance reporting and overall risk remediation.Helped to create security standard operation documentation, manuals and compliance control files uploaded to ServiceNow (SNOW) targeted for different technical services including operations and end user teams highlighting best security practices, procedures, and metrics KPIs, KRIs enterprise-wide for effective risk and vulnerability control.Conducted in-depth cyber security risk and vulnerability assessment through interviews with stakeholders, department heads, and system managers to find gaps and developed system hardening documents based on security best practices and procedures.Coordinated IT security project meetings, analyze project costs including schedules management, and keep relevant stakeholders and steering committee members abreast of action plans by highlighting major project risks and how deliverables are to be delivered as scoped.Helped to prioritize vulnerability results highlighting summary in spreadsheet for mitigation prioritization based on inherent risk criticality and security issues from applications, databases and systems including network gears.Engaged in the configuration and management of vulnerability detection tools such as Nessus and Security CenterPrepared user acceptance test plan (UAT) and test cases for SecurityCenter deployment both in development and production environments to ensure reporting and security vulnerability functional requirements are met.Performed network discovery, the enumeration and documentation of enterprise assets including systems, network devices, software application and databases with a view to distinguished between authorized and unauthorized assets in SecurityCenter.Assisted in analyzing root cause of access control issues and drive solutions across domains to keep access control deliverable projects on schedule.Helped to define and manage access privileges and map roles to assigned tasks to prevent elevation of privileges. Additionally, has an instinct for metrics-driven management. Ensure proper reporting of security violations as appropriate or required.Helped to design cyber security training and awareness program enterprise-wide by interfacing with web developers in developing customized sample phishing templates flagging data leakage links. Efforts in this regard have shown through metrics increasing number of reported phishing cases and improvement in cyber security posture.September 2015 December 2015ManTech Inc / Port Authority NYNJ, Jersey City, NJCyber Security Consultant (Senior Principal)Managed 4 team members.Assisted in analyzing root cause of access control issues and drive solutions across domains to keep access control deliverable projects on schedule.Participated in information security policy development in collaboration with business partners and management, additionally ensuring regulation and compliance elements are covered in policy development.Coordinated cyber security projects including identification of relevant controls and processes from inception including gathering security requirements from users and instrumenting integration even with third party applications and systems.Involved in the developing action plans for militating against vulnerabilities in application and systems using documented patch management best practices and procedures. Furthermore, created workflow and ensure assigned tasks are completed by various technical teams to mitigate observed risks.Helped to develop templates used in behavior profiling that strengthened adaptive authentication and the prevention of fraudulent activities due to authorized access enterprise wide.Provided updates to management on granting and denying access to critical business data in all line departments and business partners per policy after review of current practice.Helped to develop network security monitoring targeting criteria across different business units through rule management to improve security posture of the organization including detailed forensic analysis of security events.Assisted to develop a set of procedures that help to ensure security controls relating to external vendors and dependencies are enforced and correcting baseline.Reviewed existing security documentation regarding asset management and change control process to help to streamline and improve cyber security management procedures.Assisted technical service personnel including database and middleware managers to instrument and develop security best practices for database and application tiers configuration solutions without sacrificing performance and usability.Evaluated and tested end-user machines from different business units for exploitable vulnerabilities likely to pivot to other network systems including endpoint applications using identity and access control mechanism (IAM)Helped to design cyber security training and awareness program enterprise-wide by interfacing with web developers in developing customized sample phishing templates flagging data leakage links. Efforts in this regard have shown through metrics increasing number of reported phishing cases.June 2006 September 2015Financial Information Systems Agency, NY.Senior Change and Production Control (Technical and Compliance)Managed and Mentored 12 team members - Front end and Back end.Assisted as a domain expert to reinforce risk controls management in information and computer security matters using NIST 800-53 r4 framework within the functional and end-user communities couple with change management processes and configuration project coordination.Consistently improve security best practices through in-depth audit of business-related IT security risks by providing guidance, evaluation, and advocacy on audit responses. Efforts in this regard have helped to track information audits enterprise-wide and even with our external clients.Prepared and detailed Cyber Capability Maturity Model (C2M2) assessment based on CERTs methodology. The report to management helped to showcase uncertainty and cyber security gaps within the enterprise that qualifies for immediate remediation.Helps to instrument the development of Data Loss Protection policy and procedures that involves data classification and acceptable use cases for sustainable, consistent data loss prevention program enterprise wide.Responsible for conducting vulnerability, threat and risk assessments and develop prioritization scheme to mitigate them and ensure additionally security controls are architected to reduce risks agency-wide.Documented and defined governance, risk, and compliance posture after evaluation of current program with respect to SOX inherent business processes thereby instrumenting an effective risk control program enterprise wide. Such efforts strengthen risk management, information security and compliance posture in the organization.Assisted in the categorization of IT assets based on sensitivity and potential impact to the critical service such as public, internal use only and proprietary secret.On a daily and timely basis prepares and analyzes violations reports on application and database-tiers enterprise-wide from security in-depth reporting by correlating events and various enterprise-wide transactionsDeveloped security event types to log and alert types in terms of criticality and correlating these in terms of providing network visibility of security-related happenings enterprise wide.Conducted third party risk assessments and detailed vulnerability scanning involving in-depth analysis of network connected components including web application, and database repositories. Prepared both SOC1 and SOC2 reports to highlight internal controls statuses enterprise wide.Involved in the enforcement of audit code review of applications and web application security to prevent data loss. Either from code injection attacks for example SQL and LDAP injections and other backdoors on backend databases and other data repositoriesResponsible for preparing and maintaining computer security documentation |