85445c0a-fe03-4199-9ccb-8a6a4643b511
Andrew Smith
Phone:
(000) 000-0000
Address:
287 Custer Street, Hopewell, PA 00000
Professional Summary
Hands-on, successful Info-sec domain with 5 years of experience in delivering appropriate technology solutions for desktop and mobile products. Comprehensive knowledge of platform development, enterprise architecture, agile methodologies, Innovative change agent with a unique mix of high-level technology direction and deep technical expertise.
Education
Sep. 2018
Corr.Masters of Computer Application: Computers
- South Delaware Institute – New Delbertfort, Hawaii
Dec. 2015
Bachelors of Computer Application: Computer Science
- Marvin Academy – Larkinchester, Arkansas
Nov. 2011
High School Diploma: Physics-Chemistry-Maths-Electronics
- South Utah University – Savannahaven, Hawaii
Employment history
Jul. 2019 – Present
Port Brittaney, Arizona
Port Brittaney, Arizona
Information Security Consultant, Hauck, Grimes and Conroy
- Worked on Vulnerability Management tools like Tenable Nessus, Qualys Guard, Rapid 7 Insight VM, Alert-logic, Beyond trust Retina scanner.
- Extracting Reports , customizing , segregating and distributing to our internal stakeholders and driving it further to remediation at the earliest, arranging regular follow-ups and meetings with customer facing PD teams.
- Working on Microsoft Azure with all customer hosted VM’s and securing the VAPT management by “Continuous monitoring of assets in our Resource groups, Subscriptions.
- Managing NSG groups in Microsoft Azure.
- Cloud computing – the risks and benefits of using a vendor’s remote servers to store, manage and process an organization’s data
- Conduct periodic network scans to find any vulnerability and penetration testing by simulating an attack on the system to find exploitable weaknesses through Metasploit pro.
- ISO27001 assessment – specifications for a framework of policies and procedures that include all legal, physical and technical controls involved in an organization’s risk management
- Risk analytics, data visualization , risk reporting models.
- Conducted POC for more than 6 Vulnerability Management, Web Application Scanner, Pen-testing tools ( Metasploit Pro ) as per Corporate / Customer requirements.
- Malware hunting tools : Stinger ( McAfee tool to remove Virus, backdoors, Trojans)
- Currport ( port viewer, listening or not, actions and weird behaviours
- TCP View ( same purpose as above )
- EDR – “Sentinel-one” as primary Endpoint detection ,focusing on threat hunting and major TTP’s/IOC’s,
- Forensics – investigation and analysis of how and why a breach or other compromise occurred
- Burp suite – during/as Vulnerability scanning process
- Secure code practices- for all Devops / testers
- Security assessments of network infrastructure, hosts and applications – another element of risk management
- Asset/Network management – Lansweeper , Solarwinds , BMC Discovery.
- Full fledged management on Onprem , customer facing – customer hosted data, cloud (azure) from Vulnerabilty, penetration testing ,risk analysis.
- Configuration management tools – Service now on workflows and organisational Info-sec structuring
- Baseline configuration for Endpoints and Servers through CIS-CATPRO
- Cisco Umbrella – DNS filtering to corporate , VPN , cloud hosted customers
- Worked on Secure-link- For Integrity and secure connection and trusted remote solutions for all support and monitoring
- Partnered in joint-ventured by conducting Redteam activities through OPTIV and Crowd-strike against our corporate requirements.
- Develop and carry out info security plans, policies ,SOPs
- Knowledge on CISCO IPS, including file integrity monitoring and DLP
- Excellent report writing and communication
- Capable of meeting deadlines and budgets
- The ability to work well independently or with a team
- Available to travel, possibly internationally
- Knowledge on Programming Languages like C, C++, XML, Python, Git-Hub libraries, Exploit DBs
Mar. 2017 – Dec. 2017
Keraborough, Georgia
Keraborough, Georgia
SOC Analyst, Schroeder, King and Schmitt
- 3 years working in IT security as SOC analyst and SIEM administrator
- 2 years working experience with a major vendor SIEM product ( McAfee ESM, Splunk )
- 1+ years experience with Splunk administration, installation, configuration, clustering, monitoring, query design, dashboard design
- Ability to perform complete Splunk environment installs, filter data, and manage indexes
- Manage Splunk knowledge objects (Apps, Dashboards, Saved Searches, Scheduled Searches, Alerts)
- Knowledge on IBM Qradar, McAfee Nitro , HP ArcSight Vendor skills
- Solid foundation in networking (TCP/IP and OSI layers, network routing & switching protocols)
- Support 2nd level colleagues regarding SIEM operation related tasks and Willingness to provide on-call service
- Understanding of ITIL processes
- Knowledge and understanding of the following concepts and technologies:SIEM, Proxies, Firewall, Content Filtering, Vulnerability Scanning, Email, IAM and Web Security
- Oversight of administrative operations performed by 3rd party provider including operating system security hardening, backup management, capacity planning, version/patch management, and lifecycle upgrade management
- Basic implementation and generation of McAfee SIEM / ArcSight content (e.g. rules, trends, lists, reports and dashboards) based on defined use cases
- Maintain key relationships both internal and external stakeholders
- Strong knowledge and demonstrable experience of information security technologies and methods
- Knowledgeable with IP networks and network infrastructure experience
- Ability to perform and interpret vulnerability assessments using Tenable Nessus
- Ability to excel in a face paced, challenging, operations environment with 24/7 shifts
- Ability to administer the operations of a security infrastructure
- Experience in VMWare VSphere Client ESXi Environment,
- Maintaining VM’s in DC, upgrading and backing up Critical
- Darktrace Threat Visualizer ( IDPS ) , Human Immune system similar interface
- Kaspersky Endpoint Security setup – Implementation -Deployment
- Laptop across different OS 7 – 10, security audit logs
Nov. 2015 – Dec. 2015
East Dylanhaven, Wisconsin
East Dylanhaven, Wisconsin
Customer Support Executive, Erdman-Dooley
- Keep records of customer interactions or transactions, recording details of inquiries, complaints, or comments, as well as actions taken.
- Resolve customer complaints or answer customers’ questions regarding policies and procedures.
- Consult with managers or other personnel to resolve problems in areas such as equipment performance, output quality, or work schedules.
- Provide technical support to designers, marketing and sales departments, suppliers, engineers and other team members throughout the product development and implementation process.
- Direct technicians, engineering designers or other technical support personnel as needed.
- Worked with Apple Inc. as our key vendor process, supported them in Macintosh and IOS products
Jan. 2015 – Feb. 2015
South Reneefort, Vermont
South Reneefort, Vermont
Network Engineer, Hirthe, Sauer and Gulgowski
- Maintain and administer computer networks and related computing environments including computer hardware, systems software, applications software, and all configurations.
- Configure, monitor, and maintain email applications or virus protection software.
- Plan, coordinate, and implement network security measures to protect data, software, and hardware.
- Configure and define parameters for installation or testing of local area network (LAN), wide area network (WAN), hubs, routers, switches, controllers, multiplexers, or related networking equipment.
- Document network support activities.
- Evaluate local area network (LAN) or wide area network (WAN) performance data to ensure sufficient availability or speed, to identify network problems, or for disaster recovery purposes.
- Cisco switches, Routers , Firewalls configuration
- DHCP, DNS, RIP, EIGPR, OSPF, BGP routing protocols
Skills
Vulnerability Management , OWASP Top 10 , Web Testing
Skillful
SIEM, DarkTrace, McAfee ESM, Splunk Administration
Skillful
Kaspersky Endpoint Security, Bitlocker, TPM Security Chip
Experienced
Active Directory, GPO, Lansweeper
Experienced
Sentinel One EDR
Skillful
information security consultant
- Malware hunting tools : Stinger ( McAfee tool to remove Virus, backdoors, Trojans)
- Currport ( port viewer, listening or not, actions and weird behaviours
- TCP View ( same purpose as above )
- EDR – “Sentinel-one” as primary Endpoint detection ,focusing on threat hunting and major TTP’s/IOC’s,
- Forensics – investigation and analysis of how and why a breach or other compromise occurred
- Burp suite – during/as Vulnerability scanning process
- Secure code practices- for all Devops / testers
senior information security consultant
- Managed activities in achieving the PCI DSS certification in the bank for 2 years.
- Designed the Information security governance framework including governance bodies, interaction model, and decision rights.
- Drafted/updated Information Security policies, socialized policy drafts with relevant stakeholders to foster alignment and buy-in across the organization, followed up on policy approvals, published / communicated them and provided the appropriate training on them. Managed the group Information security risks through structured, integrated risk-based methodologies that diagnose areas for improvement and provided remediation steps helping the group entities comply with applicable laws and regulations.
- Served as subject matter expert on Information Security Risk to bank’s business leaders and contract owners.
- Responsible for conducting point in time due diligence assessments of third party’s alignment with bank’s security policies and standards. Developed set of vendor security requirements to provide teams a consistent benchmark for evaluating third parties as part of project or monitoring activities resulting in 40% improvement in efficiency of re-review process.
- Actively engaged in business projects, conduct threat modelling and risk assessments, controls design as well as validate the design and implementation of key controls.
- Demonstrated ability to articulate information security risks and privacy technical issues in a clear and actionable manner to non-technical leadership.
information security consultant
- Defining and Updating Security Standards
- Working with Various Departments to Improve Security Threats
- Partnering with IT and Business Departments to Identify Gaps in Procedures.
- Perform GAP analysis and create action plans to bridge with actionable and measurable tasks.
- Coordinating Ongoing Security Improvements with stake holders.
- Information security system policies, plans, and baselines were developed and reviewed.
- Provided security expertise and guidance in support of security assessments.
sr. information security consultant
- Information Security Consultant delegated with the responsibility to provide the following services: -Risk Assessment
- Application Vulnerability Assessments and Penetration Testing
- Network Vulnerability Assessment and Penetration Testing
- ISO 27001 (ISMS) implementations and certification support. -Internal and External Audit preparation
- Secure Network Architecture reviews and design
information security consultant
- Well versed in Scoping, Requirement Capturing, Audit Reviews and Threat Mitigation.
- Gathered field data to research and develop an extensive Threat Model framework to facilitate exhaustive Web Application Security audits.
- Risk analytics, data visualization , risk reporting models.
- Conducted POC for more than 6 Vulnerability Management, Web Application Scanner, Pen-testing tools ( Metasploit Pro ) as per Corporate / Customer requirements.
information security consultant
- Was part of a team which performed ISO 27001:2013 Implementation, Compliance policy reviews & Risk Assessments in a government institution in Oman.
- Conducting Vulnerability Assessment on a regular basis.
- Experienced in Risk analysis and proposing recommendations/countermeasures.
- Practice Development: Preparation & review of baseline documents (Checklist, Methodology, reports)
information security consultant
- Monitor use of data files,server log files and regulate access to safeguard information in computer files.
- Assessed the adequacy of the contracts, processes, infrastructure and systems in place for managing the technology environment of a major Airways company in UAE to ensure that they are robust to support the business requirements, secure and available.
- Performed the vulnerability assessment and penetration testing of network infrastructure and web applications and configuration review services for major government institution in Singapore.
- Assessed the current state and recommending the future state of IT infrastructure, IT Governance and applications for a major EPC client in UAE
information security consultant
- Worked on Vulnerability Management tools like Tenable Nessus, Qualys Guard, Rapid 7 Insight VM, Alert-logic, Beyond trust Retina scanner.
- Extracting Reports , customizing , segregating and distributing to our internal stakeholders and driving it further to remediation at the earliest, arranging regular follow-ups and meetings with customer facing PD teams.
- Working on Microsoft Azure with all customer hosted VM’s and securing the VAPT management by “Continuous monitoring of assets in our Resource groups, Subscriptions.
- Managing NSG groups in Microsoft Azure.
- Cloud computing – the risks and benefits of using a vendor’s remote servers to store, manage and process an organization’s data
- Conduct periodic network scans to find any vulnerability and penetration testing by simulating an attack on the system to find exploitable weaknesses through Metasploit pro.
- ISO27001 assessment – specifications for a framework of policies and procedures that include all legal, physical and technical controls involved in an organization’s risk management
information security consultant
- Working on Different Applications(Web Apps) and found high Level Vulnerabilities
- Used tools such as Netsparker, Acunetix, NMap
- Manual Security Testing
- Preparation of Test cases Reports ,Reports on POCs.
- Traffic Monitoring on remote routers.
- Bypassing Of Firewall protected websites using scripts.
- Maintaining Operational security
information security consultant
- Conducted security assessment of over 100 web applications for clients across the globe.
- Specialised in auditing banking applications.
- Strong experience in conducting penetration testing and vulnerability scanning of large enterprise IT assets
- Network security audit experience of 3 large networks
- Conducted web application security assessments of payment gateway integrated applications
- Rich knowledge of Ethical Hacking and their Countermeasures
- Experienced in Project management and team management
information security consultant
- Providing consulting for Implementing ISO 27001 Implementation and getting Organisation Prepared for ISO 27001:2005 Audit.
- Preparation of Information Security Policies, Procedures and Guidelines for the Clients.
- Conducting Risk Assessments and ISO 27001:2005 Internal Audits for the Organisations.
- Developing audit programs, IT control best practices within key IT infrastructure areas including network and Internet security, application development, IT project management, data center operations and general IT operations for customers.
- Conducting Web Application Penetration Testing (WAPT), Infrastructure Testing (Network Security Testing).
- Preparing high level executive reports for senior management and technical reports for developers based on identified observation.
information security consultant
- Identifying the Network and Security gaps and providing solutions to it.
- Periodic review of Firewall rules and user access.
- Managing the overall Security solutions in the environment.
- Assisting the team in Monitoring and analyzing the logs from SIEM solution.
- Assisting the team to create new rules in SIEM for latest threats based on IOCs
- Managing the Email Gateway. Analyzing the suspicious email and taking necessary action on it.
- Planning and executing the DR activity on a periodic basis.
information security consultant
- Perform onsite and remote security consulting including web application vulnerability assessment.
- Find web application vulnerabilities according to OWASP top 10 2017, 2013 and 2010.
- Provide detailed report on how to patch the detected vulnerabilities.
- Assessed the security posture of a major Airways industry’s internet facing technology environment (applications, public IP’ & network devices) deployed for interacting with external parties and customers to ensure that they are robust, secure and available to support the business requirements.
information security consultant
- Was responsible for conducting audits to check the client’s offshore center readiness based on ISO 27001 standard.
- Was responsible for vulnerability management and technology risk management which includes information security risk, service management risk and other related risk areas across clients in Middle East.
- Proven experience as a Cyber Security practitioner with the knowledge to provide industry best-practice advice to clients.
- Performed current state analyses, process analyses, and GAP assessments on organizations who wish to fulfill requirements of ISO 27001 security standard to consolidate their information security management system(ISMS) and its later certification.
- Worked with nearly 19 clients in Middle East and Egypt on Information Security Assignment including Internal VA, External Penetration Testing, Web Application security assessment, Process Gap Analysis (ISO 27001).
- Conducted audits of ITGCs and infrastructure controls for various clients in Middle East.
- Was member of the team which performs Infrastructure Security testing, Application Security testing, Security Program Management.
information security consultant
- Conducted a security assessment of over 40+ web applications for clients across the globe.
- Conducted change management process audit of over 20+ banking applications.
- Associate Information security consultant for Application Security assessment of Internet Banking applications.
- Conducted web application security assessments of multiple payment gateway integrated applications.
- Knowledge of Ethical Hacking and their Countermeasures
- Experienced in report writing/presentation & client debriefing
- Experienced in Risk analysis and proposing recommendations/countermeasures.
information security consultant
- Defining the test plan, strategy and deriving the road map for Application Security of the organisation.
- Conducting Dynamic Application Security Testing (DAST) and source code review of web and mobile applications using automated and manual approach.
- Upon completion of testing, sending reports to application team outlining vulnerabilities identified during the test, their risk level, and recommendations on how to address the identified issue.
- Provide remediation support & issue clarification on vulnerabilities to the developers.
- Continuous cyber security awareness and training to various stakeholders of the organisation.