Security Architect; Security Engineer; Security Analyst - Information
Security Architect; Security Engineer; Security Analyst - Information
My Spider Scam Awareness Contacting Us F. A. Q.
 
Job Seekers
Search Jobs
Browse Jobs
Post a Resume
Job Alerts
 
Employers
Search Resumes
Browse Resumes
Post a Job

Security Architect; Security Engineer; Security Analyst Resume


Desired Industry: Information Technology SpiderID: 84337
Desired Job Location: Syracuse, Utah Date Posted: 9/19/2023
Type of Position: Full-Time Permanent Availability Date: Immediately
Desired Wage: 108000
U.S. Work Authorization: Yes
Job Level: Management (Manager, Director) Willing to Travel: Yes, Less Than 25%
Highest Degree Attained: Bachelors Willing to Relocate: Yes


Objective:
Technically inclined, solutions-focused, and highly analytical IT professional, equipped with extensive experience in designing and implementing security solutions and strategies to protect an organization's information systems, data, and assets systems from unauthorized access, potential security breaches, and cyber threats.

Effective at promoting security awareness and education within the organization, training staff on security best practices, and ensuring its ongoing success by mitigating security risks. Known for adeptness in deploying and configuring networking hardware and software, such as routers, switches, firewalls, and other networking equipment to ensure smooth data transmission and communication across networks. Recognized for solid work ethic, along with the ability to guarantee the confidentiality, integrity, and availability of sensitive information and technology resources. Armed with articulate communication and interpersonal skills in building positive work relationships with clients, managing group dynamics, and leading high-caliber teams of professionals.


Experience:
LEGATO SECURITY | Salt Lake City, UT
Information Technology Security Architect Jan 2020– Aug 2023
 Facilitated training to Security Operations Center (SOC) analysts, enabling them to identify and effectively address cybersecurity threats; as well as to security engineers, equipping them with the skills to extract and integrate logs from various systems into a security information and event management (SIEM) system and to draft alerts for SOC analysts.
 Held responsibility in deploying a range of SIEM, security orchestration, automation, and response (SOAR), and endpoint detection and response (EDR) platforms, such as LogRhythm, Securonix, Sumo Logic, and Tenable.
 Utilized regular expression (regex) patterns in writing log parsing profiles to extract essential information from logs and ensure effective integration into SIEM or SOAR platforms.
 Drafted Bash or Python scripts to collect logs from different systems and incorporate them into multiple SIEM or SOAR platforms.
 Conducted installation of log collectors either on-premises or within the Google cloud platform to collect logs.
 Examined and applied industry best practices for firewalls, intrusion prevention systems (IPS), and intrusion detection systems (IDS) to enhance security for customers.
 Demonstrated high-level skills in performing installations and modifications on customer firewalls, as well as IPS/IDS systems, to ensure optimal security and performance for customers.
 Performed program assessments to identify whether a flagged file is malicious or a false positive by utilizing various malware analysis tools, such as Cuckoo, Flare, and other automated online analysis systems.
 Oversaw the development and deployment of various systems that remained in active use to this day, including the SIEM system log collectors within Google cloud platform and internal network, EDR platforms, and malware analysis systems, enabling Legato Security to operate effectively as a managed security service provider (MSSP).

GRA QUANTUM | Salt Lake City, UT
Information Security Analyst II Aug 2018–Dec 2019
 Determined potential, successful, and unsuccessful intrusion attempts and compromises to data and system access through keen analysis of relevant event details and summary information.
 Delivered efficient security incident response services, such as meticulous logs tracking and review, prompt threat analysis and mitigation, and operation restoration.
 Closely monitored network infrastructure, operating system, and application intrusions and compromises in collaboration with relevant parties.

STATE OF UTAH | Salt Lake City, UT
Security Analyst II Nov 2012–Aug 2018
 Worked closely with state agencies to handle security incident response activities, which include tracking and reviewing logs, mitigating threat, and restoring operations.
 Utilized keen eye for detail in examining and evaluating relevant event details and summary information to swiftly identify potential, successful, and unsuccessful intrusion attempts and compromises.
 Maintained active communication with relevant parties on network infrastructure, operating system, and application intrusions and compromises.
 Provided expert leadership to the Enterprise Security Awareness Program, which involves review of security policies and delivery of customer support on security-related issues.
 Keenly evaluated traffic and threat logs from IDS and IPS systems to determine legitimate threats and false positives for blocking legitimate threats and alteration of the system, while minimizing false positives.

Earlier Positions Held:

Telecommunications Specialist II, STATE OF UTAH | Salt Lake City, UT Jun 2012–Nov 2012

Network Engineer, CONVERGYS / JUNIPER NETWORKS | Ogden, UT Feb 2011– May 2012

Database Administrator, UNISYS / 7-ELEVEN | Salt Lake City, UT May 2009–Mar 2010

Report/Forms Designer and Hardware Support, BLUESTEP SYSTEMS / TELEPERFORMANCE | Layton, UT Feb 2007–Nov 2008


Education:
Bachelor of Science in Computer Forensics and Digital Investigations, May 2018
Champlain College | Burlington, VT
GPA: 3.86 | Graduated summa cum laude | Alpha Sigma Lambda (Xi Beta Chapter) – National Honor Society
Dean’s List (Jan 2017 and May 2017) | President’s Lister (Jan 2018)

MSSQL Program • SetFocus | Parsippany, NJ ▪ 2001
Coursework in Electronics Repair • Ogden-Weber Applied Technology College | Ogden, UT ▪2008
Coursework in Automotive Repair • Davis Applied Technology College | Kaysville, UT ▪ 1997



Skills:
Traffic Analysis
Intrusion Prevention
System Backup and Disaster Recovery
Network Security Protocol Implementation
Technical Problem Resolution and Support
Network and System Administration
Vulnerability Assessment
Security Architecture and Design
Network Routing and Installation
System Development and Configuration


Additional Information:
Licenses and certifications
Certified Internet Web Professional (CIW) JavaScript Specialist
Certified Internet Web Professional (CIW) Database Design Specialist
Certified Internet Web Professional (CIW) Web Design Specialist
CompTIA Project+
CompTIA Security+
CompTIA Network+
CompTIA A+
Microsoft Certified Technology Specialist (MCTS): Windows 7
Microsoft Certified Solutions Expert (MCSE) for Windows NT
Juniper Networks Certified Internet Associate: Firewall VPN (JNCIA-FWV) (expired)
Juniper Networks Certified Internet Specialist: Firewall VPN (JNCIS-FWV) (expired)
Juniper Networks Certified Internet Associate - Junos (JNCIA-Junos) (expired)
Cisco Certified Entry Networking Technician (CCENT) (expired)
Cisco Certified Network Associate (CCNA) (expired)

Awards and achievements
Letter of Appreciation, Unisys/7-Eleven
Notable Achievement, Hill Air Force Base
Superior Performance Team, Hill Air Force Base
Letter of Appreciation, Hill Air Force Base



Candidate Contact Information:
JobSpider.com has chosen not to make contact information available on this page.
Click "Contact Candidate" to send this candidate a response.


    





© 2025 Job Spider
Privacy Policy | CC Marketing Sites | Site Map | Links