Quantcast

Systems Security C Resume Bowie, MD
Resumes | Register

Candidate Information
Name Available: Register for Free
Title Systems Security C#
Target Location US-MD-Bowie
20,000+ Fresh Resumes Monthly
    View Phone Numbers
    Receive Resume E-mail Alerts
    Post Jobs Free
    Link your Free Jobs Page
    ... and much more

Register on Jobvertise Free

Search 2 million Resumes
Keywords:
City or Zip:
Related Resumes

Information Systems Security Officer Upper Marlboro, MD

Information Systems Security Officer Chesapeake Beach, MD

Security Engineer System Hyattsville, MD

Systems Engineer Security, Network Engineer Gaithersburg, MD

Cyber Security Information Systems Sterling, VA

Information Systems Cyber Security Baltimore, MD

Cyber Security Information Systems Woodbridge, VA

Click here or scroll down to respond to this candidate
Candidate's Name
SummaryHighly motivated and goal-oriented IT networking professional, seeking a Solutions Engineering position. I have proficient hands-on knowledge in System Engineering, Systems security analysis, multi- network administration . pki administration and platforms migration which can significantly contribute towards a companys immediate and future goals.Operating Systems & ApplicationsWindows,MacOS, JAVA, Pascal, COBOL, PERL, ASP 3.0,J2EE, .NET Programming (VisualC++,C#, Crystal Reports) using Visual Studio, VB Script, Linux, Unix, SQL, PL/SQL for ORACLE,REAL TIME SYSTEMS, Active Directory, Windows Exchange 2010&2012 Server,,Windows Server2010 & 2012, DNS, WINS, DHCP. SNMP, MIB,SNTP, ICMP,TCP/IP,UDP,P2P,NAT.VPN,IPSec, SSLRouters and Switches Configuration and Composition, PKI,FISMA, HIPAA, Sarbine Oxley, Splunk, Big Fix, Archer Nessus, Wireshark, HP ArcSight SEIM, IBM Guardium- Thales Luna, NCipher, IBM Rational Software, MS SharePoint Designer 2010, Perl, Python & Unix shell . ProtocolsSNMP, MIB, SNTP, ICMP, TCP/IP, UDP Frame Relay, T-1, VLAN, EIGRP, OSPF, SMTP, HSRP, Jupyter Lab, Snowflakes, Cloud Sentry, Cloud RadarHardwareCisco Platforms: 7204, 4006, 3620, 3548, 2950, 2620HP Compaq ProLiant ML370, DL 320, DL 380 G3 & G4, DELL Power Vault 770N, Iomega NAS A305M,Avocent, Dell Equallogic 5000 PS Series, Dell PowerEdge 2600 Series, Palo AltoCertificationsCertified Information Security Management(ISACA -CISM), AWS Certified Solutions ArchitectAssociate, CCNA, MCSA 2003, Security+, A+, Dell Workstation and Server Certificate, HDI Help Desk Analyst Certificate, CISSP  IN PROGRESSTrainingSplunk Power User TrainingBig Fix Inventory and Compliance TrainingArcSight user TrainingProfessional ExperienceApple/CapitalOne/Global Foundries.  Wipro ContractRemote -Austin,TxSr. Solution Engineer, 01/2023  PresentDesigning and developing technical architectures, including hardware and software systems, network infrastructure and security protocol to support Apples Keymanager InfrastructureOrchestrated the migration of legacy applications to Amazon Web Services Cloud EnvironmentDesigned, implemented, and maintained PKI infrastructure in a cloud environment, ensuring high availability and scalability.Conducting research on emerging technologies and trends, and recommending new technology solutions that can improve business processes.Providing technical guidance and support to development teams and other technical staff.Evaluating security requirements and recommending technological solutions that align with Apples security goals and objectives.Installation, integration, configuration and architecting Apple's PKI solutions and systems to facilitate the full lifecycle of X.509 Certificates for Apple computing devices and applications.Create, research, and maintain documents such as the Concept of Operations (CONOPS), Solution Implementation Architecture (SIA), Cybersecurity Risk Management and Private & Data Protection documentsProviding guidance to securing Kubernates(Apple Cloud) infrastructure and ensuring stable, secure operation for multiple other cloud providers through automation capabilities.Providing support to KMS symmetric and asymmetric keys within Amazon Web Services environmentDesigned, implemented, and maintained PKI infrastructure in a cloud environment, ensuring high availability and scalability.Managed and provisioned SSL/TLS certificates for web services and applications deployed in cloud platforms, ensuring secure communication.Collaborated with development teams to integrate PKI services into applications and systems, providing guidance and support on certificate management and implementation best practices.Conducted periodic audits and assessments of PKI infrastructure to ensure compliance with industry standards and best practices.Worked closely with cloud architects and security teams to develop and implement security controls for PKI cloud deployments.Developed and maintained documentation, standard operating procedures, and guidelines related to PKI infrastructure and cloud security.Provide guidance to key stakeholders and contribute to the technical direction of all areas of PKI architecture, including policies, standards, strategies, automation and governance.Serving as the main point of contact for remediation of CapitalOnes self-signed certificate over to a Centrally managed CapitalOne Certificate Authority Solutions.Provide technical guidance and solutions to inquiries and issues customers are faced with incorporating Digital certificates into their S3 bucketsSupported CICD pipeline integration, GitHub, and automating pipelines within Amazon Web Services .Conducted thorough security assessments in alignment with industry best practices and standards.Utilized penetration testing techniques to identify system vulnerabilities and weaknesses.Performed vulnerability scanning on network infrastructure and applications, assessing the potential for exploitation.Conducted threat modeling to identify and address potential risks and attack vectors.Analyzed and interpreted security assessment findings to provide actionable recommendations for remediation.Assisted in the development and implementation of security policies, procedures, and guidelines.Documented assessment methodologies, findings, and recommendations for reporting and record-keeping purposes.Communicated assessment results to technical and non-technical stakeholders in a clear and actionable mannerAcquainted with relevant standards such as ISO 27001, 27002, NIST CSF, NIST 800-82, and ISA 62443 for performing application compliance.Providing Configuration management support in the operation of a number of PKI systems deployed at CapitalOneDesigning and developing technical architectures, including hardware and software systems, network infrastructure,and security protocol to support Apples Keymanager Cryptography InfrastructureProviding support to Stonehenge and Whispher secrets management applications.Evaluating security requirements and recommending technological solutions that align with Apples security goals and objectives.Installation, integration, configuration and architecting Apple's PKI solutions and systems to facilitate the full lifecycle of X.509 Certificates for Apple computing devices and applications.Create, research, and maintain documents such as the Concept of Operations (CONOPS), Solution Implementation Architecture (SIA), Cybersecurity Risk Management and Private & Data Protection documentsProviding guidance to securing Kubernates(Apple Cloud) infrastructure and ensuring stable, secure operation for multiple other cloud providers through automation capabilities.Conducting research on emerging technologies and trends and recommending new technology solutions that can improve business processes.Paypal, Inc. ContractRemote -Austin,TxSystem Security Engineer, 10/2021  12/2022Architecting, installing and maintaining Encryption Key Management systems for all newly implemented environments within the Paypal Cryptography enterpriseManaging Lifecycles of Paypal certs and Keys(Symmetric, Asymmetric, PGP, SSH)Support for PKI-related operational tasks including CRL/OCSP updates, certificate review and approval and issuance of SSL digital certificates.Deploy automated solution in the management and rotation of SSL certificates on organizations platforms.Recommend and consult on the design of cybersecurity controls and risk mitigations to minimize attack surface and support cost-effective field monitoring of security controls.Provide recommendation on GoLive readiness of products and applications security robustness.Provide technical skillset training to members of technical staff on resolving various Digital Certificate, OpenID and SAML related issues.System monitoring and event analysis of Windows and Linux Security events and logs using Splunk SIEM tools.Developing automation task using object-oriented Perl and Unix shell scripting languages Utilizing Github for code storage and sharing.Troubleshooting and issue resolution to SSL VPN Encryption sessions for Paypal Enterprise Application environments and External Vendors connectionsUnderstanding specific FIPS requirements that apply to Hardware assetsTesting and Validation of Encryption Storage devices to FIPS 140-2 complianceProviding support to KMS symmetric and asymmetric keys within Amazon Web Services environmentOmm Tech Inc.  Social Security Admin.ContractWindsor Mills, MDSr. IT Consultant, 07/2020  10/2021Drive and support an authoritative technical consultation process on a variety of cybersecurity products and security engineering tasks across SSA  Digital Identity proofing and Identity products.Providing Configuration management support in the operation of a number of PKI systems deployed at the Social Security AdministrationSupport for PKI-related operational tasks important including CRL/OCSP updates, certificate review and approval and issuance of SSL certs.Deploy automated solution in the management and rotation of SSL certificates on organizations platformsDrive and support processes to ensure products implement appropriate cybersecurity controls, features, and requirements per applicable customer requirements, recognized industry standards, and sound engineering practices.Conduct security audit to identify and mitigate vulnerabilitiesSupport for PKI-related operational tasks important including CRL/OCSP updates, certificate review and approval and issuance of SSL certs.Apex Incorporated  GE Aviation ContractVienna, VACryptography Systems Engineer, 04/2019  05/2020Implementation of Digital security Certificates to over 10,000 users within a Kerberos Single Sign on Services.Architect, Design and deliver Encryption, key management and PKI related solutions to over10,000 users utilizing the Symantec PKI management toolEvaluation, testing and certification of cyber related products including encryption, Key management and access control services for GE-Aviation users.Developing and updating systems documentation (e.g., ConOps, Operating procedures, systems architecture documents) and providing oversight of the PKI libraryProvide expert support, analysis and research into complex problems, and processes relating to the subject matter of Digital Certificate and PKI infrastructuresProvide technical skillset training to members of technical staff on resolving various PKI and Digital Certificate related issues.Achieved data confidentiality and compliance requirements by deploying and managing Hardware Security Module(HSM) to securely generate, manage and store cryptographic keys.Provide guidance for Smart card tools utilization in accordance with Information Technology (IT) security policies as prescribe by the DOD and Federal Regulatory Guidelines and industry best practices for IT Security.Develop an Information Technology Contingency Plan (ITCP) for the organization in accordance with the client ITCP models that align with NIST 800-34.Internal Revenue Services  Compgen/DTINew Carrollton, MDSr. CyberSecurity Analyst/ QA Tester, 2009  04/2019(Active Clearance)Provide Certification and accreditation (C&A) of Enterprise Security tools and applications.Implementing Key Lifecycle Management in accordance with X.509 standardsManaging and Distribution of certificate for Web Applications utilizing Symantec PKI solutionConfiguring, troubleshooting security policies and monitoring Palo Alto Firewall from central management device.Development, review, and issuance of Information Technology (IT) security policies, to ensure compliance with FISMA, OMB, NIST 800-53, Treasury, Federal Regulatory Guidelines and industry best practices for IT Security.Extract and maintain Security Requirements from Policy, Standards and Best Practices as required.Performed Functional, Regression and 508 testing of Arcsight Logger, Connector and Manager Appliances.Utilized IBM Rational software tools for defect logging and creation of reporting and statisticsthroughout the Software Development LifecycleCreating well structured search queries within Splunk to minimize performance impact.Support Network Engineers in monitoring of Mission critical Firewalls, IDS and IPS using Splunk SIEM Correlation tools.Developing Splunk reports and dashboards to meet business and stakeholders requirements  Adjudicating Compliance Scanned Server results against DOD STIG, DOT and NIST guidelines.Testing completion metrics and analysis as well as status read-outs and lessons learn to IRS managementInstalled, designed and served as a system administrator for over a dozen Sharepoint 2010 sites leveraging the Sharepoint Designer toolMitigation of risks of IT system security through analysis of controls and planning to leverage remediation plans throughout the enterprise.Neosystems CorporationVienna, VAApplication Systems Engineer, 2008  2009Supported over 3000 users in Citrix Metaframe Environment.Implemented Dual Factor Authentication Security Policies for access to Companys resources.Certification and Accreditations of Customize Institutions Customized Applications.Review audit logs, analyze, resolve and document system errors in multi-platform environment.Provided both onsite and in house front end user support to Government Contractors using DeltekBackend Database administration in a Microsoft Sql 2003/2005 environment, using Sql programming languages to execute scripts and queries against database.Document Management of IT processes and procedures based on ITIL defined standards. Design and Implemented the Pseudo real time backup of Virtual ESX, Physical Servers and users laptops using Symantec NetBackup Exec 12.0 application.Maintain a disaster recovery plan by documenting current system configuration, identifying, analyzing, and evaluating critical data/hardware issues and documentation and testing plan.L3 COMMUNICATIONS (Montgomery County Contract) Rockville, MDIT Systems Engineer, 2005-2008Provide system security and engineering supports to the development and production teamsTroubleshoot, Configure and Resolved VPN Connections to internal networkInstalling, maintaining, and troubleshooting Microsoft networks and software including Windows 2000 Server and operating systems; Active Directory; Microsoft IIS Web Server; end-user software (especially MS Office); and PC/Server hardwareParticipated in the network infrastructure upgrade and network migration of Linkages to LearningProgram for Montgomery School System. Migrated more than 300 users from Novell 4.1 toActive Directory. Migrated more than 250 workstations from static IP Addressing to DHCP  Configure and Manage of Enterprise Technology using Infovista Products.(e.g. Vista mart)  Install, configure and manage blackberry device and blackberry enterprise server.Overseeing archival of data and managing data backup policies.Write and maintain operations and procedural documentation on tasks performed  Performing phases of virus scanning including virus mitigation and removal.Monitored and reported system changes using Quest Central 5.0, Patrol Central (BMC Software), Vitria BusinessWare Administration Tool, Quest Foglight, LoadRunner Analysis tool, etc. as loads are put on the applicationActionet, Inc.Fairfax, VA Systems Engineer (USDOT CONTRACT), 2004 - 2005Responsible for Agencies enterprise data backup system. Lead for the backup process for the Regional datacenters. Makes sure all data backups are consistent with the agency strategy, following daily, weekly, monthly, and yearly schedules.Assist Lead in maintaining mission critical servers both hardware and software. Provide immediate support for tasks related to security and data disaster recovery.Assisted in the implementation of ATM, Frame Relay and Voice solutions using Cisco Routers(7200) and Nortel Passports (6400) existing branch officesResponsible for the all phases of virus scanning including virus mitigation and removal.Perform emergency rebuild of HQ Exchange 5.5 Server with a colleague after hardware failure.Restore all regional Exchange 5.5 Servers in test lab to validate backups.Assist TA and Lead in identifying, analyzing and implementing major fixes, upgrades, and roll-outs needed for the optimization of agency infrastructure.Write and maintain operations and procedural documentation on tasks performed. Provide technical expertise to the OM and the TA during meetings.EducationCatholic University of AmericaM.S. Information Assurance, 2007Livingstone College, Salisbury, North Carolina B.S. Computer Information Technology, 2003ReferencesAvailable upon Request

Respond to this candidate
Your Message
Please type the code shown in the image:

Note: Responding to this resume will create an account on our partner site postjobfree.com
Register for Free on Jobvertise