Quantcast

Cyber Security Information Resume Gilber...
Resumes | Register

Candidate Information
Name Available: Register for Free
Title Cyber Security Information
Target Location US-AZ-Gilbert
20,000+ Fresh Resumes Monthly
    View Phone Numbers
    Receive Resume E-mail Alerts
    Post Jobs Free
    Link your Free Jobs Page
    ... and much more

Register on Jobvertise Free

Search 2 million Resumes
Keywords:
City or Zip:
Related Resumes

Information Technology Cyber Security Tempe, AZ

Information Technology Security Phoenix, AZ

Information Security Analyst Glendale, AZ

Cyber Security Analyst Laveen, AZ

Quality Assurance Tester and Cyber Security Analyst Chandler, AZ

AI, Machine learning, research writing, Cyber Security Social Me Chandler, AZ

Cybersecurity Analyst Cyber Security Goodyear, AZ

Click here or scroll down to respond to this candidate
Candidate's Name
Gilbert, AZ Street Address
SUMMARYCyber Security and Risk Professional with experience supporting and providing real-time monitoring, analysis and resolution of security events of Department of Defense (DoD), military organizations, and financial institutions information systems. Proven record of evaluating system vulnerability in order to recommend security improvements as well as improve efficiency while aligning the organization processes with network design and infrastructure. CORE COMPETENCIES INCLUDEPROFESSIONAL EXPERIENCEWELLS FARGO (CONSULTANT W/ MOTION RECRUITMENT) JANUARY 2023 -PRESENT DATA AND CYBER RESILIENCY CENTER OF EXCELLENCE (COE): Cyber and Data Resiliency - Lead Information Security Engineer Accountable for managing and driving Cyber Resiliency strategic dependencies and key intersections with stakeholder organizations such Enterprise Resiliency, Technology Resiliency, Data Resiliency, Infrastructure and Platform Support teams. Partnering with application teams to identify gaps and assist in the remediation. Ensure the application teams have adequate practices and plans in place for a timely recovery in the event of a cyber-attack. Lead computer security incident response activities for highly complex events Conduct technical investigation of security related incidents, identify causes and recommended further mitigation strategies. Provide security consulting on large projects for internal clients to ensure conformity with corporate information, security policy, and standards. Design, document, test, maintain, and provide issue resolution recommendations for highly complex security solutions related to networking, cryptography, cloud authentication and directory services, email, internet, applications, and endpoint security. Identify security vulnerabilities and issues, perform risk assessments, and evaluate remediation alternatives. Collaborate and influence all levels of professionals including managers. Firewalls and Routers System Architecture Design Configuration Management Network/Host IDS/IPS Linux Administration Vulnerability and Compliance Evaluation Technical WritingDEMONSTRATED KNOWLEDGE:Network and System Tools (but not limited) : McAfee Network User Behavior Analysis (Securify), McAfee Policy Orchestrator; McAfee Vulnerability Scanner, McAfee Firewall (Sidewinder) Check Point Firewall Syslog- NG/Balabit IBM-Internet Security System, Extreme Switches, Nessus (Tenable), NMAP(ZenMap), Solarwinds Toolset, LANSurveyor, WireShark (Ethereal), Fidelis Cybersecurity Solution, netForensics SIM, Foundstone CounterAct, DbProtect, Splunk, BurpSuiteGENERAL DYNAMIC MISSION SYSTEMS (GDMS) SEPTEMBER 2017 -JANUARY 2023 SYSTEMS SECURITY ENGINEERING COE, CYBER AND ELECTRONIC WARFARE SYSTEMS: Cyber Security Team Sr. Cybersecurity Engineer, Review ACAS scan data and report WVPA calculations Provide patch evaluation identification and collection based upon Top 20 IAVAs, RAR and scan findings Deployment of Splunk servers in the Virtual Environment. Patch and maintain updates Support/Implement software patching to maintain accreditation and authority to operate. Review/test long-lead patching targets (RHEL, Solaris, Nutanix) Provide any updates to procedures from deployment redlines or testing in lab Maintain configuration management of all (e.g., hardware, software and technical) changes to System functional and technical baselines Travel to site to perform patching, post-patch validation, and recording of patching results Utilize Agile methodologies to manage customer features and review requirements, patching priorities, IA concerns, operational considerations, and lessons learned. Assessment & Authorization (A&A) Team, Sr. Information Assurance Engineer, Primary role was to lead A&A activities, provide support to planning, designing and implementing security controls which safeguard and monitor events for information systems, enterprise applications and data Hands on experience with command line UNIX/LINUX security audits and Windows operating systems commands and utilities Maintain government security accreditations and certification IAW, NISPOM, NIST, DIACAP/RMF and other approved government IT security standards, policies and directives Strong experience with documenting test environments, requirements, results and POAM resolution Participate in and/or Lead national level A&A activities Using Splunk, Analyze, troubleshoot, and investigate security-related, information system anomalies based on security platform reporting, network traffic, log files, host-based and automated security alerts Conduct and manage continuous monitoring activities to validate network configuration post accreditation and report/correct findings Evaluate systems using vulnerability scanners and manual techniques to verify system security settings and configurationsWELLS FARGO NOVEMBER 2014 SEPTEMBER 2017CRYPTOGRAPHIC SERVICES  EIS/ETE APPLICATION & DATABASE ENCRYPTION, INFORMATION SECURITY ENGINEER 4 (ISE4) ISE4 Participates in the research, analysis, design, testing and implementation of complex computer network security/protection technologies for Implemented data security solutions for applications (Java, .net, web services), and databases (Oracle, MS-SQL  transparent encryption and integration with external key management systems such as Hardware Security Module Configure and Integrate data-protection software and hardware solutions; Common vendors include: SafeNet/Client, Thales, Vormetric; Transparent solutions include SQL and Oracle Build operational Operations and Maintenance (O&M) checklists to maintain the service (daily, weekly, monthly, yearly O&M checklists); build Tactics, Techniques and Processes (TTPs) and Standard Operating Processes (SOPs) associated with service checklists Respond to information security issues during each stage of a projects lifecycle Provide support for public key infrastructures (PKIs), including use of certification authorities (CAs) and digital signatures. Perform vulnerability testing, risk analyses and security assessments Research security standards, security systems and authentication protocols GLACIER TECHNOLOGIES JUNE 2014 NOVEMBER 2014SMALL BUSINESS ADMINISTRATION (SBA), SECURITY OPERATION CENTER (SOC), SENIOR ANALYST Security Analysts are responsible for maintaining and monitoring the network 24x7. Key responsibilities are to deploy and maintain security devices to monitor and protect the SBA network and data information. Also provide information security incident handling and response.Searching for the customer from the homepage Correlate threat intelligence applied regarding security threats, threat actors, exploits, malware, vulnerabilities and compromise. indicators vulnerability data from multiple sources to provide up-to-date status and reports of the current security posture. Conduct vulnerability assessments, security testing and evaluation (ST&E) as well as participate in remediation efforts. Analyze security events and records to determine if security incidents have occurred; provide consultation on security issues. Identifying intelligence gaps and prepare Intelligence Production Requirements to solve shortfalls Evaluate, communicate and mitigate computing and information security risks. Ensure that appropriate processes are in place and followed so that systems are compliant with applicable requirements. Participate in compliance audits and assessments. INTEGRAL CONSULTING SERVICES, INC. JANUARY 2014 JUNE 2014 DEPARTMENT OF HOMELAND SECURITY (DHS)  IMMIGRATION AND CUSTOM ENFORCEMENT (ICE), SECURITY OPERATION CENTER(SOC) ANALYSTResponsibilities included actively monitoring and analysis to provide network and information security in a 24x7x365 SOC. In the event of a breach, identified, contained and remediated all events and incidents.Outsourcing Call Centers to Rabat, Morocco and Chennai, India Collecting and providing intelligence from many different sources of information. Uses intrusion detection methodologies and techniques for detecting host and network based intrusions via intrusion detection technologies and security event correlation tools Analyzing threats posed to various systems, technologies, operations, defining controls and countermeasures to address them Tracked and verified Information Security Vulnerability Management notifications from US-CERT and CVSS. Reviewed all sources of global information security threat and vulnerability information. GENERAL DYNAMICS C4 SYSTEMS (GDC4S) APRIL 2005  DECEMBER 2013 NETWORK ENGINEER / SYSTEMS ENGINEER / TASK LEAD- NETWORK SYSTEMS / TEST ENGINEER Responsibilities included the evaluation, designing, development, testing and implementation of the overall systems infrastructure and architecture of existing, and proposed space and terrestrial communications network systems. Designed and setup various test and integration lab environments. Planned storage management, for optimization, data protection, and disaster recovery. Performed end-to-end troubleshooting between sites, on all network devices, extreme switches and juniper routers Responsible for planning, reporting, managing, and analyzing the performance of all tasks. EDUCATIONMS, Computer Information Systems, Central Michigan University, 2000 BS, Computer Information Systems, Colorado State University, 1994 TECHNICAL CERTIFICATIONS:CISSP, GIAC/GSEC, C EH, E CIH, Security +,CCNA Security, Clearance: Top Secret/SCIMILITARY WORK EXPERIENCE:Department of Defense, Arizona Air National Guard162nd Fighter Wing Sr System Admin and Section LeaderDefense Intelligence Agency (DIA), USAF ReserveAFMIC, Fort Detrick, Senior AnalystDepartment of Defense, USAFAir Force Pentagon Communication Agency-Pentagon (AFPCA), Pentagon Computer Network Operations Branch, Senior Analyst Computer Network Operations / Helpdesk Support Department of Defense, USAF, Chief, System Administration

Respond to this candidate
Your Message
Please type the code shown in the image:

Note: Responding to this resume will create an account on our partner site postjobfree.com
Register for Free on Jobvertise