Security Clearance, ITAR Security Clearance Professional Summary
Security Clearance, ITAR Security Clearance Professional Summary
Security Clearance, ITAR Security Clearance Professional Summary
Please, refer to the enclosed data sheets for details of my education and experience. I have 12 years of
experience in Network (Windows 2019/2016/2012/2008), Novell multi-servers and Exchange 2013/2010/2007,
Outlook 2007/2010/2013/GroupWise) administration of Engineering / Financial Corporations / Banks / city
government(s) information systems, including Active Directory PAM, FDS, AZUR, AWS, MFA, using PowerShell
4.0, 5.0, HW/SW trouble shooting, maintaining computer network servers, ServiceNow(SNOW/CMDB)
administration, E-mail and backup systems, Internet, remote computing/clients, Firewalls, Cisco
Routers/switches, Metasploit, Rapid7 IDR, Rapid7 Nexpose, SCSI / iSCSI, RAID, TCP/IP, DHCP, DNS, VPN, MYSQL,
SAN, NAS, VMware (ESXi 5.1, vSphere, Vcenter), Linux/Win 7, Win 8, Win 10, MS office 2007/2010/Office 365 /
Office 2016, Telephone, telecommunication systems, T1 / T3 / OC-3 (Fiber), as a Net Admin. or supervisor some
of my contributions to the IT/engineering teams included, engineering/managing projects, CADD management
(incl. Utilities and mapping), network troubleshooting and supervising projects from schematics to finished
product. Managing a $800,000 to $ 2 Million PC/Network budget, vulnerability assessment, progress reports,
cost studies, MTBF studies, inventory reports and HW/SW purchasing.
Furthermore I have worked with Credit unions & banks, I have very strong NIST, NERC, SOX, ITGC, CSF, FFIEC,
SEC & FDIC audits, including ISO 27001, ITGC Audits using Resolver SW, KRI, KPI, NERC metric Reporting skills,
drafting/CADD and document control systems background, have 5 years’ experience working in high volume
mechanical assembly lines, and am well familiar with quality control SPC and JIT/QOS/JIRA processes.
I hold certifications on HPe ArcSight, Splunk, Atalla, Voltage Security SW, Dell Compellent / EqualLogic SAN
technologies, and ISO 9001:19011 Lead Certified Auditor and have been working with these products for the last
8-10 years.
EDUCATION:
University of Texas, Austin, Texas
Bachelor of Science (Physics)
ITS PROFESSIONAL DEVELOPMENT / CERTIFICATIONS:
Microsoft Certified Systems Engineer (MCSE)
Microsoft Certified Systems Administrator (MCSA)
Microsoft Certified Trainer (MCT- 2013)
Microsoft Certified Technology Specialist (MCTS – 2012)
Certified Technical Trainer (CTT+)
CompTIA Net+ and A+ Certification
Completed Planet 3 Certified Wireless LAN/WAN Network CWNA Program
Completed Exchange 2010 Certification training Program
ISO 9001:2008 / ISO 19011 Certified Lead Auditor
Dell EqualLogic and Compellent Storage SW (Certified)
SIEM / SOAR: HPE ArcSight (Certified), Atalla, Voltage (Certified), Splunk, QRadar
PROFESSIONAL EXPERIENCE :
WSP Global – Sr. SOC Security & Audit Analyst – Global Security Operations 02/08/2022 - Present
Sr. SOC Audit Analyst Support Global SOC + Operations teams related to / for SIEM (Including Microsoft
Sentinel & Splunk) Security Operations, SOC vulnerabilities, Pen Testing, Network Security, SOX related
legislation (US or Canadian) and keeping track quarterly of documentation and IT General Computer
Controls (ITGC). Advanced knowledge of SIEM, IT Audits / SOX.ISO.
Splunk Enterprise / Enterprise Security (ES) - Performing complex system development, design,
modeling, analysis, integration, and sustainment of Splunk systems for new or existing computer
systems within an Enterprise. PAM, CyberArk ver. 11 & 12.
Designing and customizing complex search queries and promoting advance searching, forensics, and
analytics. - Developing and documenting configuration standards, policies, and procedures for
operating, managing and ensuring the security of a Splunk infrastructure.
Serving as liaison with clients, participating in meetings to ensure client needs are met.
Maintaining current knowledge of relevant technology as assigned and may have supervisory
responsibilities.
Participate in a SOC team, IR, EDR (Endpoint Det., Response), PAM, UEBA (Behavior Analytics),
Remedy providing twenty-four (24) hours a day and seven (7) days a week services and ensure
client SOC/Threat Hunting, Forensics, for over 250,000 Devices using Splunk 7.2.3 / 7.2.6.
Wrote the DR documentation for many sites, including training local analysts on disaster recovery
procedures
Raising Incidents to be managed by the next level of support for risk remediation. Ongoing triage,
diagnosis and resolution of Incidents
Manage Splunk Root Cause Analysis with identification of the root cause, and an action plan and
estimated time to complete remediation using Splunk use cases I developed
ServiceNow (SNOW/CMDB) administration, Providing Splunk (ver. 7.2.3 & Splunk Cloud 8.0.2),
QRadar, incident management, CyberArk ver. 11
Delivering incident hunting & remediation incl. report with analysis and recommendations
Support risk mitigation or issue resolution following an event or incident
Maintain customer’s SIEM (Splunk 7.2.3) in accordance with customer policy and best practices,
including patching and policy management, SIEM administration, data management, user accounts,
backups, Plan for Disaster recovery & customize searching for ease of use, as well as service
management processes and objectives, created over 120 use case and over 300 Splunk SPL scripts
for web security analysis, Malware hunting & remediations etc. for the customer & other Analyst).
Deliver Threat Hunting, Incident Response, AWS EC2, Cloud application testing for security and
Splunk / SIEM related services in accordance with client’s contractual obligations, upholding
contracted service levels, ensuring constant security monitoring, triage, analysis, alert, and incident
response.
Monitor the customer network, including monitoring and configuring site to site VPN tunnels,
DevOps, monitoring Firewall infrastructure, and monitoring IPS infrastructure, including reporting
of any incidents to Customer’s service desk
Conduct relevant risk mitigation, Extensive vulnerability assessment and testing of WAN devices.
Resolve security-related incidents or breaches detected within enterprise IT environment by liaising
with other Customer Contractors, hardware manufacturers, and other resolver support teams as
required using ServiceNow, CMDB (configurations, Security)
Participate in quarterly security tabletop, red team v. blue team exercises, and live training drills of
incident run books with Customer staff to facilitate brainstorming, improvement, and creativity in
incident response
TAC 202, NIST 800-53, ISO 9001, CSF, NERC, FFIEC
Monitor various security tools (Splunk, Splunk Enterprise Security (Splunk Cloud 8.0.2), Palo Alto
Networks, SourceFire, Cisco ASA, Cisco Firepower, TACACS), McAfee ePO to identify potential
incidents, network intrusions, and malware events, etc. to ensure confidentiality, integrity, and
availability of VA architecture and information systems are protected. IR, EDR (Endpoint Det.,
Response), PAM, UEBA (Behavior Analytics) activities, Forensics in addition to Cyber Ark.
Use Splunk ES SIEM to (IR) respond to incidents detected on the VA network (over 1 million devices)
MY duties included DR preparation documentation & training other analyst on DR preparations and
documenting all procedures
Reviewing and analyzing log files to report any unusual or suspect activities including Threat hunting
& writing use cases to solve issues such as Malware attacks, user behavior issues & IIS, Apache
servers slowness issues & slow user web access related.
Use intrusion testing, threat analysis, incident response, Web application pen testing, use-case
workflows to follow established and repeatable processes for triaging and escalating
Generate trouble tickets and performing initial validation and triage to determine whether
incidents are security events.
Complete investigations in to identified cyber events and hand over as appropriate
Follow established incident response procedures to ensure proper escalation, analysis and
resolution of security incidents
Develop and maintain Incident Response procedures and Security SOPs.
Analyze and correlate (IR) incident event data to develop preliminary root cause and corresponding
remediation strategy
Communicate effectively to all customers and stakeholders
Work with other contract teams to effectively respond to cyber incidents
Provide technical support for new detection capabilities, recommendations to improve upon
existing tools/capabilities to protect the VA network, and vulnerability assessments for High Value
Assets
Wrote over 400 Splunk use cases including complete documentation and solutions to each case.
Developed Splunk Event sequencing procedures to reduce tickets & reduce false positive events,
trained other analysts on how to view & solve incidents “the smart way”
Use McAfee, Symantec Enterprise Antivirus,
CSF, FISMA, NIST 800-53, FFIEC, ISO 9001 - I participated in Auditing done by FDIC & SEC of our
FFIEC audits
Respond to Splunk ver. 7.1.1 / computer security incidents according to the Computer Security
Incident Response Policy (CSIRP)
Deploy security related systems and security in business systems, including VMs, POS and TERMs
Enforce policies and procedures to govern systems access, usage, data access and security of digital
assets using GPO, SCCM, SCEP, ServiceNow, CMDB
Monitor security tools (Splunk ver. 7.1.1, QRadar, NEXPOSE, Rapid7, Tripwire and Malwarebytes,
MacAfee ePO across the enterprise and respond to alerts accordingly
Identify, analyze and communicate information security vulnerabilities using daily reports, JIRA
Managed Splunk Licensing & license servers. Updating Splunk Indexes, forwarders and writing over
400 use cases to solve difficult to solve issues
Responds to Splunk security service requests, user issues, troubleshoots system/user issues and
supports change management procedures, including device updates & backups.
Wrote complete step by step procedures for Splunk Event sequencing to reduce resolution time on
the part of Analysts & automized many event responses to reduce number of tickets.
Administer network security technologies (Cisco Firepower, Firewalls (Fireeye), IDS, IPS, log
management, Endpoint Protection, patch management, etc.).
Performs scans using Rapid7 NEXPOSE to assess vulnerability and take corrective action for data
security risks, Preparing KRI, KPI Cyber Security metrics Reporting using MS SCCM, plus KRI, KPI
Reporting
Manage third-party encryption certificate distribution (SSL, Code-signing, etc.)
Plan and lead the tasks required to ensure regulatory compliance (PCI, HIPPA, etc.)
Threat hunting, threat analysis, vulnerability assessments, Analyze current security practices and
make enhancements to increase their effectiveness to strengthen our security shields.
Collaborated with enterprise team for FFIEC audits done by SEC & FDIC of banking offices
Write and maintain security documentation and reports / JIRA.