| 20,000+ Fresh Resumes Monthly | |
|
|
| | Click here or scroll down to respond to this candidateCandidate's Name
Cleveland/Columbus, Ohio PHONE NUMBER AVAILABLE EMAIL AVAILABLESUMMARYCybersecurity expert specializing in Security Operations, Cloud Security, and IT Compliance and in using the MITRE ATT&CK Framework for threat detection, scripting, and automation with Python and Bash, and leveraging Kubernetes for incident response. Experienced in utilizing Splunk for security monitoring and Jira & Confluence for documentation. Proficient with Docker for containerization. Adept at performing risk management, security assessments, and project management, with a strong focus on compliance with industry standards such as FedRAMP, NIST, PCI DSS, HIPAA, and ISO 27001.Strong communication skills to document and convey security detection and incident response procedures effectively.KEY SKILLS Technology Risk Management Network Security IT General Controls (ITGC) Regulatory Compliance (e.g., NIST, ISO, FFIEC) Penetration Testing ServiceNow GRC AWS & Cloud Security Vulnerability Management and Remediation Data Analytics and Reporting (SQL, Tableau, C#) Quality Assurance ReviewsCertifications : RH124 Red Hat System Administration NIST And ISO Security+ Prep Course (SYO-601) TOGAF (The Open Group Architecture Framework) ITIL V3 2011 CISSP in progress AWS certified cloud practitionerPROFESSIONAL EXPERIENCEWWC Global, A Pequot Company (Homeland Security), Washington DCCybersecurity SME/ Cloud Security/Technology RiskJan 2023 Mar 2024Led the Security Operations Center (SOC) for a global enterprise, overseeing incident response, threat analysis, and real-time monitoring of security events to mitigate risks across multiple geographic locations.Led global cybersecurity projects, ensuring the security and compliance of cloud and on-premise infrastructure across multiple regions.Conducted security assessments and audits to ensure compliance with the Federal Risk and Authorization Management Program (FedRAMP) and National Institute of Standards and Technology (NIST) standards.Managed governance, risk, and compliance (GRC) processes to ensure organizational policies and regulations were followed.Conducted detailed risk assessments, evaluating potential threats, vulnerabilities, and impacts, and implemented mitigation strategies to address identified risks in cloud and on-prem environments.Conducted comprehensive audits to maintain compliance with regulatory standards such as FedRAMP, PCI DSS, ISO 27001, and HIPAA across IT infrastructure.Developed and implemented governance frameworks to align with business objectives and regulatory requirements.Implemented AWS cloud security best practices across IaaS, securing infrastructure using services such as AWS Shield, GuardDuty, and AWS WAF.Conducted risk assessments to identify and address potential compliance and security issues for NIST CSF and ISO 27001.Oversaw compliance initiatives and tracked adherence to relevant regulations and standards.Led the implementation of IT compliance programs aligned with regulatory standards such as GDPR, FedRAMP, PCI DSS, and ISO 27001, ensuring that all organizational processes met stringent compliance requirements.Offered expert guidance on securing architecture and infrastructure following industry and vendor best practices.Designed and implemented automated security workflows using SOAR (Security Orchestration, Automation, and Response) platforms to streamline security incident handling and reduce response times.Coordinated incident response efforts focused on infrastructure security, implementing corrective actions and enhancing security controls.Designed and maintained secure cloud infrastructure, managing IAM roles, security groups, and cloud-native security services in AWS.Managed security operations for public cloud platforms (AWS, Azure) and on-premise infrastructure, ensuring the deployment of security best practices and monitoring solutions.Developed and maintained FedRAMP documentation, including Security Assessment Reports and System Security Plans, and implemented cloud security controls.Conducted risk assessments and gap analyses, identifying security threats and ensuring compliance with NIST and International Organization for Standardization (ISO) standards.Utilized ServiceNow to track and manage risks, compliance activities, and audit findings, developing automated workflows for streamlined processes.Led efforts to automate security monitoring and compliance in AWS environments, utilizing AWS security tools to optimize infrastructure security.Regularly conducted SOC performance assessments, optimizing detection capabilities, reducing response times, and ensuring the overall effectiveness of security operations.Reviewed and analyzed penetration test reports, presenting findings and actionable recommendations to clients.Provided Homeland Security with comprehensive support to strengthen their security programs.Designed and implemented effective security controls to protect their infrastructure.Developed customized recommendations, policies, controls (NIST and ISO)and standards to align with their security needs and goals.Advised senior leadership and key stakeholders on important security strategies to ensure that security programs aligned with business goals.Ensured the integrity of cloud infrastructure by applying security controls and monitoring configurations across AWS and other public cloud platforms.Used security frameworks(The Security pillar in AWS) to identify gaps and assess maturity by applying best practices and various rating scales.Ally Bank (US Tech Solutions), (Remote) North CarolinaSr. Cybersecurity Engineer/Cloud/ Sr. Auditor/Mar 2020 - Jan 2023Led a global team of SOC analysts, providing mentorship, direction, and advanced technical guidance to enhance security operations and response capabilities.Used the MITRE ATT&CK Framework to create threat detection rules, assess gaps, and perform analysis.Coordinated with external partners and third-party vendors to ensure that global SOC operations were aligned with evolving threat landscapes and security best practices.Led the evaluation and selection of security tools such as Crowdstrike and systems to ensure the right technologies were in place.Developed proactive monitoring systems to detect and respond to threats, ensuring the continuous security of IT infrastructure.Developed and enforced security policies for public cloud environments, ensuring the confidentiality and integrity of data across cloud services.Used SOAR security tools, focusing on automation to improve efficiency.Evaluated clients' current security setup and future plans to identify gaps.Created and presented reports, metrics, and dashboards using splunk to executives to show the effectiveness of security programs.Integrated security into DevOps pipelines by implementing infrastructure-as-code (IaC) tools like Terraform and AWS CloudFormation for secure deployment.Provided strategic and practical solutions to help bridge those gaps and improve their security posture.Designed and implemented a tiered escalation process within the SOC, ensuring efficient incident handling and timely resolution of security events.Developed security architecture plans and long-term roadmaps to guide future security improvements.Conducted regular assessments of SOC maturity using frameworks like MITRE ATT&CK and the NIST Cybersecurity Framework, identifying areas for improvement and implementing measures to enhance detection, response, and recovery capabilities.Automated security testing and vulnerability assessments within CI/CD pipelines to enhance infrastructure security in cloud environments.Applied widely used security standards and frameworks like NIST, PCI DSS, HIPAA, and ISO/IEC to guide security practices and ensure compliance.Set up, configure, and manage security detection rules and tools, including intrusion detection, anomaly detection, and log analysis, to identify and respond to security incidents.Leveraged DevOps practices to secure containerized infrastructure using Docker and Kubernetes, Aws cloud, focusing on automating security tasks.Play a crucial role in daily security operations by monitoring, adjusting settings, analyzing threats, and proactively hunting for potential issues.Managed 24/7 SOC operations, including the implementation of SIEM solutions (Splunk, QRadar) for continuous monitoring and incident detection across cloud and on-premise environments.Lead incident response efforts, investigating security incidents, finding the root cause, and implementing corrective actions.Architected and implemented security strategies for AWS infrastructure, including VPC design, security groups, and network ACLs to ensure secure data traffic.Evaluate the likelihood of different risks and assess their potential impacts on key locations.Identify and document essential functions, necessary resources, and dependencies.Outline recovery procedures and identify critical personnel.Develop scenarios for practice and record lessons learned.Assess the recovery capabilities of key vendors and suppliers.Create and deliver presentations as needed.Support various projects individually or as part of a team to improve work efficiency and effectiveness.Develop and maintain automation scripts and tools in Python and Bash to streamline security detection and response operations.Create, design, run, and troubleshoot playbooks within a SOAR solution to automate incident response processes.Conducted internal and external IT compliance audits, addressing gaps and implementing corrective actions to ensure adherence to regulatory and organizational standards.Enforced encryption at rest and in transit across AWS services using AWS Key Management Service (KMS) and Secure Sockets Layer (SSL) certificates.Maintain thorough documentation of security detection configurations, incident response procedures, and investigations using Jira and Confluence.Kept up-to-date with the latest security threats, vulnerabilities, and industry trends to continuously improve security detection measures.Employed security orchestration, automation, and response (SOAR) tools to streamline and secure DevOps workflows across cloud and on-premise infrastructure.Assessed the effectiveness of security assessments and penetration testing processes, identifying risks and evaluating controls to ensure compliance with organizational standards and regulatory requirements.Continuously monitored network traffic analysis procedures to detect unusual activity and potential threats, leveraging data analytics to identify patterns and anomalies, and ensure timely response to incidents.Evaluated the implementation and impact of security awareness training programs, ensuring they met best practices and effectively reduced organizational risk through data-driven feedback.Analyzed vulnerability assessment and penetration testing results, providing insights on findings and recommending appropriate mitigation strategies.Assessed the integration and automation of security testing tools within Continuous Integration and Continuous Deployment (CI/CD) pipelines, verifying enhancements in application security posture, control effectiveness, and reduction in vulnerability detection time through data-driven evaluations.Collaborated with development teams to integrate security best practices into the continuous delivery process, ensuring infrastructure security from the ground up.Evaluated secure coding practices, control measures, and remediation efforts by development and operations teams, ensuring alignment with security policies and standards.Conducted thorough information security assessments, including vulnerability assessments and penetration testing, to identify and mitigate risks across enterprise IT systems.Developed and maintained automation scripts and tools in Python and Bash to streamline security detection and response operations.Used Splunk for monitoring, analyzing security events, and detecting anomalies.Leveraged Docker for containerization and incident response tasks.Applied OWASP Top 10 security practices to identify and mitigate common web application vulnerabilities such as SQL injection, cross-site scripting (XSS), and cross-site request forgery (CSRF).Provided detailed reports on security assessments to senior management, offering actionable recommendations for enhancing the organization's security posture.Managed AWS Identity and Access Management (IAM) policies, ensuring least privilege access for users and services across AWS accounts.Conducted security assessments of APIs in line with the OWASP API Top 10, addressing risks like broken authentication, excessive data exposure, and security misconfiguration.Developed secure coding practices aligned with OWASP guidelines to ensure robust and secure web and API development processes.Performed vulnerability scanning and penetration testing on APIs and web applications using OWASP methodologies to identify and remediate critical security gaps.Collaborated with development teams to integrate security controls that mitigate OWASP Top 10 threats, ensuring the secure design and implementation of APIs and web applications.Provided training and guidance on OWASP Top 10 risks, fostering awareness among developers and ensuring adherence to best practices during code development and review.Disney (Randstad), Anaheim, CaliforniaSr. Security Specialist (Part-Time)Oct 2020 - Sep 2021Led security awareness training programs for SOC analysts and other security personnel, ensuring that all team members were up to date on the latest threats, tools, and response strategies.Developed interactive dashboards and visualizations using Tableau to analyze and present key performance metrics, trends, and insights.Utilized Jira to create and manage project boards, track issues, and monitor progress on software development tasks.Managed the full lifecycle of infrastructure vulnerabilities, from detection and risk assessment to mitigation and patch management.Conducted code reviews and provided constructive feedback to team members to maintain code quality and consistency.Utilized advanced tools such as Nessus, Qualys, and Nmap to conduct security assessments, ensuring the identification of potential vulnerabilities in network and cloud environments.Implemented AWS Security Hub to centralize security monitoring across multiple AWS accounts, ensuring compliance with best practices and regulatory standards.Provided technical expertise and guidance to engineering teams on integrating privacy controls and protections into the design and development of software applications and systems.Huntington National Bank, Akron, OhioSr. Data and Network SecurityJan 2018 - Mar 2020Conducted security audits and vulnerability assessments of network infrastructure, identifying and remediating security risks and weaknesses.Conducted VPN capacity planning and performance optimization, ensuring optimal performance and scalability to support growing business needs.Implemented VPN encryption and authentication mechanisms to ensure data confidentiality and integrity, adhering to industry standards and compliance requirements.Monitored VPN traffic and performance using network monitoring tools, analyzing logs and metrics to identify and troubleshoot connectivity issues and performance bottlenecks.Developed, published, maintained data security governance documents (e.g., policies and standards-using Cisco products) that define data risk and security requirements in compliance with OCC standards.Assisted in setting up and configuring security detection tools and mechanisms.Conducted daily monitoring and analysis of security events to detect and respond to incidents.Conducted regular security reviews of AWS S3 bucket policies, ensuring proper configuration to prevent data exposure and implementing Object Lock for data immutability.Supported incident response efforts, including root cause analysis and remediation.Created and maintained automation scripts to enhance the efficiency of security operations.Documented security incidents, detection configurations, and response procedures.Designed and implemented scalable system architectures, ensuring optimal performance, reliability, and security across distributed environments.Integrated network applications with system architecture to enable seamless communication between servers, databases, and client devices.Analyzed and optimized network topology, including firewalls, routers, and load balancers, to support high-availability and fault-tolerant system designs.Collaborated with cross-functional teams to define system architecture requirements, ensuring alignment with business objectives and technical constraints.Developed incident response plans for AWS environments, utilizing services like AWS Config and CloudWatch for automated alerts and remediation.Developed architecture diagrams and documentation for both cloud-based and on-premise environments, providing clear guidance on system components, interactions, and data flow.Implemented network protocols and services (TCP/IP, DNS, DHCP, VPN) to support secure and efficient communication between applications and systems.Conducted performance monitoring and troubleshooting of system architecture and network applications, identifying and resolving bottlenecks or connectivity issues.PNC Bank, Cleveland, OhioFirst Line (Retail) Technology Risk Management - Application Engineer Risk SpecialistJan 2015 to Jan 2019Ensured retail banking and customer-facing applications remained in compliance with applicable regulations, such as FFIEC, by conducting regular QA reviews, control assessments, and gap analyses.Conducted security assessments and designed and implemented strong security architectures and solutions.Performed annual risk assessments of applications to determine the appropriateness of control structures and identify gaps.Identified and reviewed policy exceptions, ensuring they were appropriate and thoroughly documented; developed Tableau and Excel reports to monitor exceptions and remediation.Coordinated and executed the retail application quality assurance (QA) program, including integration, performance, and security testing over PNCs debit card applications project, and acted as a liaison between senior management, business line stakeholders, and third-party vendors.Managed PKI infrastructure to secure communications and authenticate users and devices across multiple environments, ensuring the integrity and confidentiality of sensitive data.Implemented and maintained data encryption protocols (AES, RSA) for both data-at-rest and data-in-transit, protecting critical information across cloud and on-premise systems.Configured and managed digital certificates for secure access, encryption, and signature validation, supporting internal and external users and services.Developed and tested API requests using Postman, including GET, POST, PUT, and DELETE methods, to ensure proper functionality and data flow between systems.Modeled and automated API workflows in Postman for validating endpoint functionality and error handling, improving efficiency and reducing manual testing efforts.Created detailed API request and response collections in Postman for use in development, testing, and documentation, ensuring consistent API behavior across teams.Utilized Postman for API performance testing and monitoring, identifying bottlenecks and improving response times.Integrated Postman collections with CI/CD pipelines to automate API testing, ensuring reliability and early detection of issues in API endpoints. Specialized in information systems testing as part of infrastructure-based QA reviews, focusing on applications, data management & governance, cybersecurity, and IT architecture.Cuyahoga County, Cleveland, Ohio Jun 2009 Jun 2014Directed diverse teams, including developers, designers, and QA engineers, to deliver projects on time and within budget.Acted as a technical expert, supporting sales and account teams in identifying and defining new security opportunities.Developed detailed project plans, timelines, and resource allocations to ensure successful project execution.Engaged with stakeholders at all levels, providing regular updates, managing expectations, and incorporating feedback into project plans.Identified potential risks and developed mitigation strategies to minimize project impact and ensure smooth delivery.Managed project budgets up to $X million, ensuring efficient allocation of resources and cost control.Implemented Agile practices, facilitating Scrum ceremonies such as daily stand-ups, sprint planning, and retrospectives to enhance team productivity.Developed and executed change management plans to ensure seamless transitions and adoption of new processes or technologies.Utilized project management tools (e.g., MS Project, JIRA, Trello) to track progress, monitor milestones, and generate reports for executive review.Collaborated with external vendors and contractors, ensuring alignment with project goals and timelines.EDUCATIONMaster of Business Administration, Concentration in Information SystemsCleveland State University Cleveland, OhioBachelor of Art & Science, Major-Political Science, Minor-Computer ScienceCleveland State University Cleveland, Ohio |