Lancy William Menezes is seeking a challenging career in a progressive organization where he can leverage his skills. He has over 5 years of experience in information security roles. His experience includes security monitoring, log review, vulnerability assessment, patch management, and security awareness training. He is proficient in security tools such as ArcSight, Nexpose, Qualys, and has experience administering firewalls, IDS, web application firewalls, and load balancers.
Carl Binder Resume Myrtle Beach address 1-24-17Carl Binder
Ìý
Carl Binder has over 18 years of experience in information security and access management roles. He is currently seeking a new position as an IT Security Manager or Team Lead. His background includes managing identity and access management systems, developing security policies and procedures, auditing for compliance, and leading security-related projects during mergers and acquisitions. He has extensive experience administering user access across various operating systems, applications, and network resources.
The document summarizes IBM's Application Security Assessment service which identifies security vulnerabilities in applications and network infrastructure. The service performs comprehensive testing of applications, identifies specific risks, and provides detailed recommendations to mitigate issues. It uses proven methodologies including technical testing, code review, and delivers a report on an application's security posture with remediation steps. IBM experts leverage specialized skills and tools to provide a cost-effective security evaluation.
This slide deck highlights the continued growth and evolution of Core Security Technologies and helps introduce an entirely new product for enterprise security testing andmeasurement - CORE INSIGHT Enterprise.
The document provides a summary of Rafael Pabon's qualifications for an Information Technology Specialist position. It includes his contact information, objective, summary of qualifications, employment history, education, certifications, skills and salary requirements. The summary highlights his over 7 years of experience in network administration and computer programming, as well as his CompTIA Security+ certification. It also lists his most recent role as a Lead Technician for the Help Desk at Fort Gordon from 2014 to 2016.
Assessing Risk: Developing a Client/Server Security Architecture, MITDaveMillaar
Ìý
The document discusses the formation of a task force at the University of Pennsylvania to address security risks posed by new financial and data warehouse systems utilizing client/server technologies. The task force was charged with identifying threats, validting them, and developing solutions. They surveyed peer institutions, identified trends in security technologies, and outlined a methodology that included identifying assets, threats, validating threats, and developing solutions. The scope of the task force's work initially focused on the new systems but was expanded to consider some mainframe security issues as well.
CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for Employment in Information Technology)
This document provides an overview of the Risk Management Framework (RMF) and the NIST Special Publication 800-37 Revision 2. It discusses the RMF roles and responsibilities, improvements made in Revision 2 including integrating privacy and supply chain risk management, and the RMF tasks. It also provides timelines for the development and public comment process of SP 800-37 Revision 2 and the upcoming Revision 5 of SP 800-53.
This document discusses the development of an IoT-based sensor system for predictive maintenance of computer equipment. The sensor would be installed on computer systems and use machine learning to detect faults in components like the RAM and processor. When a fault is detected, the sensor would send a notification to a mobile app via a database. The organization manager using the app would get alerts and details of issues, and could send notifications to the affected systems. The document covers requirements engineering, system modeling with UML diagrams, architecture overview, and ensures development follows ethical standards.
Tamara Hayajneh is a senior information security analyst with over 5 years of experience in network and security fields. She currently works at IT Security Training & Solutions, where her responsibilities include real-time security monitoring, investigating incidents, and managing a security operations center. She previously worked as a network engineer and technical support engineer. Her education includes a bachelor's degree in communication engineering and various security certifications. She is skilled in SIEM solutions, firewall management, and security analysis.
Building a Product Security Practice in a DevOps WorldArun Prabhakar
Ìý
This document discusses building a product security practice in a DevOps world. It outlines key product security capabilities that enterprises should establish throughout the product lifecycle, including threat modeling, secure coding, software composition analysis, penetration testing, and continuous monitoring. It also discusses the importance of establishing governance around product security through defining roles, processes, and controls for different functions like business, operations, and security. The goal is to integrate software and product lifecycles in a coherent manner so that final products are secure without slowing down development.
Diangelo Fields has over 5 years of experience as a Network Administrator for the U.S. Army at Fort Drum, NY. He has expertise in systems analysis, preventative maintenance, firmware upgrades, IPS signature updates, user account creation, account security maintenance, print servers maintenance, LAN and WAN networks, and wireless access points. Fields has a high school diploma and certificate in Army IT systems from Fort Gordon Advanced Individual Training. He is proficient in customer service, sales, product support, and interpersonal skills.
The document discusses technical vulnerability management and outlines the key steps in the NIST Risk Management Framework that include vulnerability analysis. It also covers establishing an effective Patch and Vulnerability Group to monitor for vulnerabilities, prioritize remediation, and deploy patches. Finally, it provides examples of different types of vulnerability analysis tools including network scanners, host scanners, and web application scanners.
Joseph Mills is an experienced systems administrator seeking a new position. He has over 8 years of experience administering systems across multiple platforms. Currently, he maintains the IT infrastructure, including servers, storage, and security, for a large law firm. Previously, he administered systems for ProQuest and provided IT support for multiple small businesses. He has various technical certifications and a bachelor's degree in information technology.
CCI training helps IT job applicants develop exceptional analytical, organizational, investigational and problem-solving skills organizations need. https://blog.ccitraining.edu/secure-your-career-shift-with-computer-security-training
CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for Employment in Information Technology)
CYB 610 Project 4 involves a collaborative team tasked with addressing cyber threats and exploitation against US financial systems. The team consists of representatives from financial services, law enforcement, intelligence, and homeland security. They will produce a Situational Analysis Report and After Action Report on a cyber attack involving distributed denial of service attacks and data exfiltration by a nation state actor. The collaboration between sectors is meant to leverage different skills and authorities to better defend critical infrastructure through information sharing and coordinated response.
This resume summarizes Erica Viera's experience in human resources, information technology, and as a US Army instructor. She has a Bachelor's degree in Business Administration with a concentration in Human Resources and is currently pursuing an MBA. Her experience includes providing technical support for wireless networks, desktop support, human resources assistance, and instructing soldiers. She has various technical certifications and specialized training.
Kevin Farmer is an experienced Project Manager, Information Assurance, and Network Administrator with 21 years of experience in the United States Navy. He has led teams of up to 35 people and managed risks to protect over $40 million in assets. Farmer has extensive experience in network analysis, information security, and classified material handling. He is pursuing a Doctoral Degree in Leadership & Innovation from Arizona State University.
NASA's Office of Inspector General conducted an audit of cybersecurity management and oversight at NASA's Jet Propulsion Laboratory (JPL). The audit found multiple weaknesses in JPL's network security controls that increase the risk of cyber attacks exploiting NASA systems and stealing data. Specifically, JPL's inventory of IT assets was incomplete and inaccurate, its network was not properly segmented, and it lacked adequate security monitoring and incident response procedures. The audit also found NASA did not have sufficient oversight of JPL's network security practices. The report provided recommendations to strengthen JPL's security controls and NASA's oversight of JPL.
Chiranjit Dutta has over 8 years of experience in application support, IT infrastructure, and customer service. He currently works as a senior systems engineer at Syntel providing application performance monitoring for Allstate Insurance. Previously he has worked at Halliburton Technology and Infosys BPO in various IT support roles. He has skills in application support, problem solving, VMware, UNIX, load testing tools, and application performance monitoring tools.
Carolyn Clarke is a Secret-TS cleared cybersecurity professional with over 7 years of experience in incident management, cybersecurity analysis, systems administration, and help desk support. She has expertise in hardware and software troubleshooting, customer service, clear communication, and team collaboration. Currently she works as a System Administrator for BAI, Inc where her responsibilities include Active Directory management, network monitoring, documentation, and assisting the cybersecurity team. She has a Master's degree in Learning & Teaching with Technology and certifications including CEH, Remedy, and CompTIA.
The document provides information about network management functions including fault management, configuration management, accounting management, performance management, and security management. It discusses the key concepts of SNMP including the manager, agent, MIB, SMI roles and the use of traps and polling for network monitoring.
24may 1200 valday eric anklesaria 'secure sdlc – core banking'Positive Hack Days
Ìý
Secure SDLC aims to integrate security practices into the entire software development lifecycle for core banking applications. It addresses shortcomings like lack of security requirements documentation, threat modeling, secure design practices, developer security training, and security testing. Implementing a Secure SDLC helps ensure core banking applications are developed securely through practices like threat modeling, secure coding guidelines, security testing, and ongoing security reviews of applications and infrastructure. This helps protect critical banking data and systems from threats while maintaining regulatory compliance.
The document provides a summary of Michael Myers' professional experience and qualifications. It summarizes that he has over 25 years of experience in information technology systems management, directing IT initiatives, and designing and implementing network solutions. It lists his areas of expertise, technical proficiencies and certifications. It then describes his most recent roles providing IT support and managing network connectivity for enterprise migration projects.
This document discusses software security engineering. It covers security concepts like assets, vulnerabilities and threats. It discusses why security engineering is important to protect systems from malicious attackers. The document outlines security risk management processes like preliminary risk assessment. It also discusses designing systems for security through architectural choices that provide protection and distributing assets. The document concludes by covering system survivability through building resistance, recognition and recovery capabilities into systems.
For more course tutorials visit
www.newtonhelp.com
CYB 610 Project 1 Information Systems and Identity Management
CYB 610 Project 2 Operating Systems Vulnerabilities (Windows and Linux)
CYB 610 Project 3 Assessing Information System Vulnerabilities and Risk
Intrusion Detection System using Data MiningIRJET Journal
Ìý
This document presents a proposed intrusion detection system using data mining techniques. It begins with an abstract that describes how internal intrusions are difficult to detect as internal users know the organization's information. It then discusses how anomaly detection can be used to create behavior profiles for each user and detect anomalous activities. The introduction provides background on intrusion detection systems and the need for more efficient and effective detection methods. It describes the proposed system which will use data mining techniques like k-means clustering to separate normal and abnormal network activities in order to detect internal attacks. It discusses the hardware and software requirements and specifications. Finally, it concludes that the proposed system can better detect anomalies in the network compared to other machine learning approaches.
This document provides a summary of Noel De Leon Alvior's personal and professional details. It includes his educational background, work experience, skills, and qualifications. He has over 10 years of experience in IT service desk, security, and engineering roles. Currently, he works as an IT Security Engineer at Gemalto Philippines Inc, where he is responsible for physical and logical security policies and ensuring security systems are fully operational.
Shashikant Ramakant Chavan is an Information Security Analyst with over 4 years of experience in network and information security. He currently works as an Information Security Analyst for Happiest Minds Technologies, where he monitors logs, integrates security devices, and tunes the SIEM tool. Previously, he worked as a Security Engineer and SOC Analyst for Netconnect India and HCL Comnet, where he performed security monitoring, incident response, and log analysis. He holds professional certifications in CCNA, CEH, ITIL, and McAfee security products.
Tamara Hayajneh is a senior information security analyst with over 5 years of experience in network and security fields. She currently works at IT Security Training & Solutions, where her responsibilities include real-time security monitoring, investigating incidents, and managing a security operations center. She previously worked as a network engineer and technical support engineer. Her education includes a bachelor's degree in communication engineering and various security certifications. She is skilled in SIEM solutions, firewall management, and security analysis.
Building a Product Security Practice in a DevOps WorldArun Prabhakar
Ìý
This document discusses building a product security practice in a DevOps world. It outlines key product security capabilities that enterprises should establish throughout the product lifecycle, including threat modeling, secure coding, software composition analysis, penetration testing, and continuous monitoring. It also discusses the importance of establishing governance around product security through defining roles, processes, and controls for different functions like business, operations, and security. The goal is to integrate software and product lifecycles in a coherent manner so that final products are secure without slowing down development.
Diangelo Fields has over 5 years of experience as a Network Administrator for the U.S. Army at Fort Drum, NY. He has expertise in systems analysis, preventative maintenance, firmware upgrades, IPS signature updates, user account creation, account security maintenance, print servers maintenance, LAN and WAN networks, and wireless access points. Fields has a high school diploma and certificate in Army IT systems from Fort Gordon Advanced Individual Training. He is proficient in customer service, sales, product support, and interpersonal skills.
The document discusses technical vulnerability management and outlines the key steps in the NIST Risk Management Framework that include vulnerability analysis. It also covers establishing an effective Patch and Vulnerability Group to monitor for vulnerabilities, prioritize remediation, and deploy patches. Finally, it provides examples of different types of vulnerability analysis tools including network scanners, host scanners, and web application scanners.
Joseph Mills is an experienced systems administrator seeking a new position. He has over 8 years of experience administering systems across multiple platforms. Currently, he maintains the IT infrastructure, including servers, storage, and security, for a large law firm. Previously, he administered systems for ProQuest and provided IT support for multiple small businesses. He has various technical certifications and a bachelor's degree in information technology.
CCI training helps IT job applicants develop exceptional analytical, organizational, investigational and problem-solving skills organizations need. https://blog.ccitraining.edu/secure-your-career-shift-with-computer-security-training
CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for Employment in Information Technology)
CYB 610 Project 4 involves a collaborative team tasked with addressing cyber threats and exploitation against US financial systems. The team consists of representatives from financial services, law enforcement, intelligence, and homeland security. They will produce a Situational Analysis Report and After Action Report on a cyber attack involving distributed denial of service attacks and data exfiltration by a nation state actor. The collaboration between sectors is meant to leverage different skills and authorities to better defend critical infrastructure through information sharing and coordinated response.
This resume summarizes Erica Viera's experience in human resources, information technology, and as a US Army instructor. She has a Bachelor's degree in Business Administration with a concentration in Human Resources and is currently pursuing an MBA. Her experience includes providing technical support for wireless networks, desktop support, human resources assistance, and instructing soldiers. She has various technical certifications and specialized training.
Kevin Farmer is an experienced Project Manager, Information Assurance, and Network Administrator with 21 years of experience in the United States Navy. He has led teams of up to 35 people and managed risks to protect over $40 million in assets. Farmer has extensive experience in network analysis, information security, and classified material handling. He is pursuing a Doctoral Degree in Leadership & Innovation from Arizona State University.
NASA's Office of Inspector General conducted an audit of cybersecurity management and oversight at NASA's Jet Propulsion Laboratory (JPL). The audit found multiple weaknesses in JPL's network security controls that increase the risk of cyber attacks exploiting NASA systems and stealing data. Specifically, JPL's inventory of IT assets was incomplete and inaccurate, its network was not properly segmented, and it lacked adequate security monitoring and incident response procedures. The audit also found NASA did not have sufficient oversight of JPL's network security practices. The report provided recommendations to strengthen JPL's security controls and NASA's oversight of JPL.
Chiranjit Dutta has over 8 years of experience in application support, IT infrastructure, and customer service. He currently works as a senior systems engineer at Syntel providing application performance monitoring for Allstate Insurance. Previously he has worked at Halliburton Technology and Infosys BPO in various IT support roles. He has skills in application support, problem solving, VMware, UNIX, load testing tools, and application performance monitoring tools.
Carolyn Clarke is a Secret-TS cleared cybersecurity professional with over 7 years of experience in incident management, cybersecurity analysis, systems administration, and help desk support. She has expertise in hardware and software troubleshooting, customer service, clear communication, and team collaboration. Currently she works as a System Administrator for BAI, Inc where her responsibilities include Active Directory management, network monitoring, documentation, and assisting the cybersecurity team. She has a Master's degree in Learning & Teaching with Technology and certifications including CEH, Remedy, and CompTIA.
The document provides information about network management functions including fault management, configuration management, accounting management, performance management, and security management. It discusses the key concepts of SNMP including the manager, agent, MIB, SMI roles and the use of traps and polling for network monitoring.
24may 1200 valday eric anklesaria 'secure sdlc – core banking'Positive Hack Days
Ìý
Secure SDLC aims to integrate security practices into the entire software development lifecycle for core banking applications. It addresses shortcomings like lack of security requirements documentation, threat modeling, secure design practices, developer security training, and security testing. Implementing a Secure SDLC helps ensure core banking applications are developed securely through practices like threat modeling, secure coding guidelines, security testing, and ongoing security reviews of applications and infrastructure. This helps protect critical banking data and systems from threats while maintaining regulatory compliance.
The document provides a summary of Michael Myers' professional experience and qualifications. It summarizes that he has over 25 years of experience in information technology systems management, directing IT initiatives, and designing and implementing network solutions. It lists his areas of expertise, technical proficiencies and certifications. It then describes his most recent roles providing IT support and managing network connectivity for enterprise migration projects.
This document discusses software security engineering. It covers security concepts like assets, vulnerabilities and threats. It discusses why security engineering is important to protect systems from malicious attackers. The document outlines security risk management processes like preliminary risk assessment. It also discusses designing systems for security through architectural choices that provide protection and distributing assets. The document concludes by covering system survivability through building resistance, recognition and recovery capabilities into systems.
For more course tutorials visit
www.newtonhelp.com
CYB 610 Project 1 Information Systems and Identity Management
CYB 610 Project 2 Operating Systems Vulnerabilities (Windows and Linux)
CYB 610 Project 3 Assessing Information System Vulnerabilities and Risk
Intrusion Detection System using Data MiningIRJET Journal
Ìý
This document presents a proposed intrusion detection system using data mining techniques. It begins with an abstract that describes how internal intrusions are difficult to detect as internal users know the organization's information. It then discusses how anomaly detection can be used to create behavior profiles for each user and detect anomalous activities. The introduction provides background on intrusion detection systems and the need for more efficient and effective detection methods. It describes the proposed system which will use data mining techniques like k-means clustering to separate normal and abnormal network activities in order to detect internal attacks. It discusses the hardware and software requirements and specifications. Finally, it concludes that the proposed system can better detect anomalies in the network compared to other machine learning approaches.
This document provides a summary of Noel De Leon Alvior's personal and professional details. It includes his educational background, work experience, skills, and qualifications. He has over 10 years of experience in IT service desk, security, and engineering roles. Currently, he works as an IT Security Engineer at Gemalto Philippines Inc, where he is responsible for physical and logical security policies and ensuring security systems are fully operational.
Shashikant Ramakant Chavan is an Information Security Analyst with over 4 years of experience in network and information security. He currently works as an Information Security Analyst for Happiest Minds Technologies, where he monitors logs, integrates security devices, and tunes the SIEM tool. Previously, he worked as a Security Engineer and SOC Analyst for Netconnect India and HCL Comnet, where he performed security monitoring, incident response, and log analysis. He holds professional certifications in CCNA, CEH, ITIL, and McAfee security products.
Amit Chaubey is seeking challenging assignments in banking or telecom domains. He has 4.2 years of experience in project management for banking and telecom clients. Currently he works as an associate consultant for Polaris Consulting & Services on an HSBC Bank project in Malaysia. He has skills in requirements gathering, design, development, testing, and issue resolution for clients.
This document contains the resume of Saravanan Durai Manickam. It summarizes his professional experience, skills, education, and objective. He has over 7 years of experience in cyber security and has worked as a Technical Services Specialist at IBM India Pvt Ltd and as a Security Analyst at Prime Access Technologies. He holds certifications like Accredited Configuration Engineer from Palo Alto Networks and ITIL Foundation Certificate in IT Service Management. He aims to be a dynamic professional handling multifaceted responsibilities with learning and growth opportunities.
Information Security Officer Internet Resume Leon Blum CopyLblum1234
Ìý
Leon Blum has over 20 years of experience in information security, technical support, and help desk management. He has worked for international banks and software companies. His experience includes managing user security administration, developing security monitoring systems, and implementing automated help desk systems. He has strong skills in operating systems, applications, networking, and security tools.
AKS IT Services was established in 2006 and provides information security services including consultancy, compliance, network security, application security, cyber forensics, and IT security training. They have qualified consultants and have conducted over 1250 web application security audits. Their services include security consulting, auditing, compliance, forensics, and training. They work with organizations across industries to assess vulnerabilities, perform testing and audits, investigate cyber crimes and security incidents, and provide security awareness training.
AKS IT Services was established in 2006 and provides information security services including consultancy, compliance, network security, application security, cyber forensics, and IT security training. They have qualified consultants and have conducted over 1250 web application security audits. Their services include security consulting, auditing, compliance, forensics, and training. They have experience working with government and private organizations.
This document is a resume for Dhishant Abrol summarizing his professional experience and qualifications. He has over 6 years of experience in information and network security, currently working as a Security Researcher. Previous roles include managing security operations centers and security architectures for clients. He has various technical certifications and skills in areas like vulnerability assessment, malware analysis, compliance, and security tools.
Hayat Azizi has over 17 years of experience in information technology including system administration, security, project management, and technical support. She currently works as a System Administrator for ManTech International Corporation supporting the Department of Defense Standard Procurement System. Her experience includes managing Active Directory, client maintenance, and functional testing. She has a B.S. in Information Systems and several IT certifications.
This document contains the professional summary of Sivasankaran K, who has over 9 years of experience in information security. He is currently an executive at Hyundai Motor India Ltd in Chennai, with expertise in network security, firewall configuration, and implementing security policies. He possesses skills in security solutions, firewall rule development, log management, and security event management tools.
Carlasha Jenkins has over 15 years of experience in information technology and information security within the US Civil and Federal governments. She has held roles such as Information Systems Security Officer and Task Lead, implementing security policies and procedures according to legislative and practical requirements. Her skills include security tools like Nessus and Fortify as well as Microsoft Office, Java, and various operating systems. Currently she is a Senior InfoSec Engineer at SeNet International Corporation where she leads clients through risk assessments and authorization processes according to NIST guidelines. Previously she held senior consultant and engineer roles implementing security guidance and assessments.
The document provides a curriculum vitae or resume for Saipraveen Gottuparthy. It includes a summary of his professional experience working as a senior infrastructure engineer for various clients like Tops Markets, Ahold, and American Express over 7 years. It details his roles and responsibilities which involved managing network infrastructure, security, identity and access management using tools like IBM Tivoli suite of products.
Ilyasuddin Sayed is an Indian national with over 10 years of experience in desktop support and IT service management. He currently works as a Senior Service Desk Analyst for e-Zest Solutions in Vienna, Austria, providing IT support to the International Atomic Energy Agency (IAEA). Prior to his current role, he held several IT support positions for companies in India and Austria, demonstrating strong skills in troubleshooting, software installation, and customer service. He has professional certifications in ITIL and SDI and specialized training in areas such as System Center Configuration Manager and Citrix administration.
This document summarizes the experience and qualifications of an IT professional. They have over 10 years of experience managing IT infrastructure and projects for banks and other organizations. They are skilled in areas such as virtualization, databases, middleware, and networking. They have led teams and been responsible for key projects involving application implementation, infrastructure support, and desktop virtualization. Their education includes an MBA and bachelor's degree and they hold certifications in areas such as ITIL, CCNA, and pursuing PMP.
Albert G. Gonzales is seeking an information security analyst position in California. He has experience ensuring technical security planning, testing, verification and risk analysis in accordance with TCP/IP protocols. Gonzales attended the Seattle Tech-Security Conference in January 2013 and stays up to date on the latest information security technologies. He has skills in monitoring security systems, conducting vulnerability assessments, ensuring compliance, and managing disaster recovery plans.
The document provides a curriculum vitae for Ajay Kumar Mohanty, who has over 8 years of experience in IT and system administration roles. He has expertise in managing servers, networks, firewalls, and security for organizations with over 200 users across multiple sites. His experience includes maintaining Windows servers, Active Directory, Exchange, and virtualization software like VMware. He is seeking a role as an IT executive to manage the entire IT infrastructure and implement new technologies for an organization.
Michael Sawall is an Information Assurance Analyst with over 10 years of experience in the Department of Defense environment, including overseas deployments to Afghanistan. He has extensive experience using vulnerability scanning and remediation tools like ACAS, HBSS, QTip, and SCAP. Sawall holds CompTIA and Microsoft certifications including Security+, Network+, Server+, and MCP. He has a Bachelor's Degree from Michigan State University and ITIL and Dell certification.
Senior cyber security engineer with over 30 years of experience in technical management, hardware engineering, system and network engineering. Experience monitoring, analyzing, migrating, designing, consulting, deploying, troubleshooting and project/technical management of large network systems. Skilled in evaluating system vulnerabilities, compiling analysis, reporting threats, and recommending security improvements.
Tarunidhar Chitirala seeks a position in corporate security that allows professional growth. He has over 2 years of experience in IT security, analyzing threats and responding to incidents. His skills include network security, penetration testing, Linux, programming, firewall technologies, vulnerability assessment, and log analysis. He is currently a Security Engineer at HCL Technologies, where he implements and manages SIEM and vulnerability management tools. His responsibilities include monitoring logs and security events, deploying and configuring security tools, and investigating and reporting on security incidents.
1. Curriculum Vitae
LANCY WILLIAM MENEZES
Mobile : +919739575462
Email:lancy.mnzs@gmail.com
OBJECTIVE:
To obtain a coveted position and a challenging career in a progressive and growth oriented
organization, where my skills & capabilities can be effectively leveraged.
Professional Work Experience Overview
Data serve Middle East (RAK Bank) Apr2016-Till date.
Designation: Information Security Analyst (Information Security)
Responsibilities:
 Review the daily security logs for critical applications such as Prime, ASM, IPS, FWSM, Online
banking, Intranet etc.
 Logs review across all network and security devices through Arc sight, report generation for all
critical devices and validation for any anomalies.
 Review and validation of all backend procedures implemented daily across all the critical
applications.
 Monitoring of any DDOS attacks through Arbor DDOS, traffic analysis of routers and escalating
to respective teams for proper actions.
 Network performance monitoring through Solar winds and determining the root cause of any
network fluctuations and taking necessary action.
 Email traffic validation through Proof point for any data leakage, Offensive language, Malware
and spam analysis.
 Monitoring of any phishing sites, unauthorized apps through Fraud watch. Coordinating with
Fraud watch and ISP to take down the site or block the URL.
2.  Preparing patch management schedule for various applications and operating systems and
liaise with Information Technology departments for effective implementation.
 Vulnerability assessment (Nexpose) for various applications, operating systems and
implementing the critical, severity patches accordingly. Coordinating with the vendors or
internal IT teams to get the patches installed and validation for the same. Review of any
exceptions if any.
 Schedule third-party Penetration test (Qualys) and co-ordinate with IT users about the results
and validations.
 Maintain a schedule for information technology policies and procedures and proactively give
comments to improve the policies and procedures for IT division.
 Perform user access review and clean up for domain users, Application access validation and
review of password management through PMP.
 Physical validation of password chubs as per the security policies of the bank.
 Organizing information security awareness sessions on the intranet and maintaining the
statistics about it for IT division.
 Analysis and validation of any malware alerts and coordinate with vendors (MacAfee, Fortinet,
APT, Bluecoat etc.) for active hash update in the attack signature database.
 Verify information security compliance by scheduling and conducting surprise checks (E.g.
Restoration of backup tapes, user’s desktop, configuration details of computing devices such as
routers and firewall, password length in the OU etc.)
 Assess the information security events and inform the risks that are attached to the incident.
 Verifying Information Security approvals mail box, and make sure that approval requests are
responded.
 Verify the effectiveness of the information Security activities along with InfoSec team members.
 Ensuring IT Security process are implemented and adhered across in RAKBank computing
environment.
 Preparing and maintaining Information Security and IT assurance Dash board and publishing it
regularly.
 Verification of Antivirus DAT compliance across all the network devices in the environment
daily.
 Preparing and constantly updating information security related events that are happening
worldwide for easy reference.
 Getting the separation list from the HR department and verify the access are revoked on a
timely basis.
 Reviewing the internet usage, Bandwidth utilization, Blocked web access, Information leakage,
Malware accessed Links through Bluecoat proxy.
 Reviewing the Application admin roles and privileges assigned to various business applications
and various technology tools that are implemented on the corporate computing environment.
 Helping the ISM in scheduling on Audit responses on behalf of IT division.
 Documenting lessons learned from the information Security initiatives.
3. Occasional Responsibilities and Accountabilities:
 Assisting Information Security Manager in developing and streaming in information security
policies and procedures.
 Assisting Information Security Manager in conducting training programs.
 Identify all the potential and actual process weakness in the applications, process, procedures
throughout the Bank, determining how these process and procedures can be improved or
mitigated, either by systemcontrols/ manual controls or improved procedures, and
implementing these measures.
 Requirement to understand any new technology introduced into the Bank, identify all the
process implications and implement controls to mitigate the risks in a manner which minimize
any effect on manpower requirement or delay in processing customer business.
 Balancing the requirement for tight controls against the business imperative of best customer
service and minimization of costs.
 Review existing and proposed future procedures/ processes software and decide whether they
incorporate adequate process controls.
Ciber Sites India Private Limited Sep2015-Apr2016.
Designation: Consultant (Information Security)
Responsibilities:
 Review of existing firewall rulesets to meet the benchmarks of Audit.
 Experience in Century Link Tier1 (Savistation) and Tier3 Cloud Infrastructure.
 Administration of Firewalls, Updating Policies, Amending it to meet client requirement.
 Administration of Security Devices: IDS, Quays Guard Threat Management Server, Log Logic,
Web Application Firewalls.
 Administration of Load Balancers: ACE, F5. Updating policies to meet Client requirements.
Vulnerability Assessment, Planning and co-ordination with Onshore and Offshore teams to
remediate the same.
 Updating Policies on Firewall, amending it and taking regular backups of the same.
 Analyzing Logs on Firewall
 Log Monitoring and Investigation using Forti Analyzer in real time
 Ensuring Online and Offline log management procedures
 Addressing various alerts logs from Firewall Analyzer and remediating them,
 Creating new address subjects and adding it to the groups
 Creating and implementing Web-filtering, URL filtering and content filtering
 Managing the Application sensors, IPS signature files and DoS.
 Creating Anti-virus profiles for protocols (Web, Email and FTP)
4.  Provide technical support for Intranet and Internet environment, which involved
troubleshooting, analyzing and resolving client problems
 Taking Tape Backup of production and other servers through IBM-TSM (HP or IBM tapes)
 Troubleshooting of Wireless related issues
 Managing & troubleshooting of LAN’s
 Applying group policy in Domain architecture
 Administering DHCP and DNS Server
 Managing, Maintaining and Administering Symantec Antivirus Server
Project:
Part of External Audit done by Bright line using SOC2 principles (IT & HR Controls) for Ciber Inc for 8
Clients.
Working on 8 different projects supporting Information Security and SOC 2 Audit requirements (EU and
NA).
Unisys India, CSE from Jul 2011 to Sept 2015
Designation: Enterprise Specialist System Analyst
Responsibilities:
 Internal Auditing for VPN access (Cisco AnyConnect), helping clients in getting the artifacts
for several SOC2 requirements.
 License auditing for ITSM framework for 150+ clients, coordinating with the SDM’s and
client heads under the principles of SOC2.
 Administration of Security Devices: IDS, Qualys Guard Threat Management Server, Log
Logic, Web Application Firewalls.
 Administration of Production servers, database and coordinate with onshore team, offshore
team and ISP’s using PRTG tool.
 Incident Module, Change management, Service request management, Work order
Management.
 Acquired extensive knowledge on how the industry works in meeting SLA’s and Client
Expectation
 Application Support for the Integrated applications such as Citrix applications, Cisco
systems, BMC(ITSM 7.6 and 8.1), Microsoft, Client Oriented (Pega, Concur, CognosEtc).
 Maintenance and customization of the application ITSM (Remedy), Portal administration
and Hiplink schedules.
 Application of Group Policies on Active directory for Specified tasks.
 Maintenance of foundation data, customizations for different clients in ITSM.
 Good knowledge in Change management, Patch management for ITSM framework.
 Part of CAB for technical implementation team determining the down time, resources etc.
 Good knowledge of loads through ET, Data wizard, SRDs, SLM.
 Working on mobility Support (Mobile Iron application on Apple devices, Android.)
5.  Handling Escalations call, Pro-act call, Level opportunities to Increase resolution rate.
 Oncall Schedule maintenance, troubleshooting for various clients using the tool Hiplink.
ACADEMIC PROFILE:
 B.E (Electronics and Communication Engineering) from VTU-Belgaum in Jul 2011.
 Class XII from St. Mary’s PU College in 2007.
 Class X from Don Bosco School in 2005.
PERSONAL SKILLS:
 Comprehensive problem solving abilities.
 Ability to deal with people diplomatically.
 Willingness to learn.
 Easily affable and adaptable in nature and a team facilitator.
Personal Details:
Father’s Name : RICHARD MENEZES
Date of Birth : 08-11-1989
Gender : Male
Passport Number : L3503937
Visa : Resident Visa (Sponsor – RAK bank)
Languages known : English, Kannada, Hindi, Konkani, Tulu.
Birth Place : Shirva, Udupi
DECLARATION
I hereby declare that the information presented above is true to the best of my knowledge and
belief.
Lancy Menezes Place: Bangalore