leo vang_resume.07.22.2016

8
Leo Vang 4950 Westham Way Elk Grove, CA. 95758 Phone: 484-336-3393 Email: [email protected] Objective To obtain a position that will promote professional growth while utilizing my skills as a Senior Security Engineer or a Senior Security Architectural Engineer Education ITT Tech 2010 to 2011 Online -Bachelors of Science, Information Systems Security Build a foundation with government policies, controls, laws, known standards and how to apply them within Information Technology. Received honors Member of National Technical Honor Society (NTHS) ITT Tech 2004 to 2007 King of Prussia, PA -Associate, Information Technology Degree in Computer Networking Systems Architected a centralized 3-site infrastructure from ground up with 5 servers; DC/Active Directory, mail, web, ftp, & VoIP server Received honors Experience CENTENE-HealthNet 03/21/2016 to Present Rancho Cordova, CA Security Architect Duties & Administration Project Management o Security Assessment o Engaging and working with IS Risk Management (ISRM) to determine risks Mitigation of Risk Rejection of Risk Acceptance & Sign-off of Risk o Engaging other departments utilizing Security Access Controls, Policies and Regulations to assure compliance Support, Administration, Troubleshoot, Testing, Evaluation, & technical documentation of the CENTENE-HealthNet environment Project Development Life Cycle (PDLC) o Initiate & Review Solution o Gather requirements o Present to the board o Project Initiation, Analysis, Design, Build & Test Security Controls o Implement Security Controls o Review Security Controls

Upload: leo-vang

Post on 11-Feb-2017

28 views

Category:

Documents


4 download

TRANSCRIPT

Page 1: Leo Vang_Resume.07.22.2016

Leo Vang 4950 Westham Way

Elk Grove, CA. 95758Phone: 484-336-3393

Email: [email protected]

Objective To obtain a position that will promote professional growth while utilizing my skills as a Senior Security Engineer or a Senior Security Architectural Engineer

Education

ITT Tech 2010 to 2011 Online -Bachelors of Science, Information Systems Security Build a foundation with government policies, controls, laws, known standards and how to apply them within Information Technology.

Received honors Member of National Technical Honor Society (NTHS)

ITT Tech 2004 to 2007 King of Prussia, PA -Associate, Information Technology Degree in Computer Networking Systems Architected a centralized 3-site infrastructure from ground up with 5 servers; DC/Active Directory, mail, web, ftp, & VoIP server

Received honors

Experience

CENTENE-HealthNet 03/21/2016 to PresentRancho Cordova, CASecurity ArchitectDuties & Administration

Project Managemento Security Assessmento Engaging and working with IS Risk Management (ISRM) to determine risks

Mitigation of Risk Rejection of Risk Acceptance & Sign-off of Risk

o Engaging other departments utilizing Security Access Controls, Policies and Regulations to assure compliance Support, Administration, Troubleshoot, Testing, Evaluation, & technical documentation of the CENTENE-HealthNet environment Project Development Life Cycle (PDLC)

o Initiate & Review Solutiono Gather requirementso Present to the boardo Project Initiation, Analysis, Design, Build & Test

Security Controlso Implement Security Controlso Review Security Controlso Set Security Standards

Develop Security Standards, Policies, and Requirements Develop and Implement Security Procedures to Respond to and Report Security Incidents

o Security Incident Identificationo Determine Security Incident Response processo Establish a way to report on a security incident responseo Develop documented responsibilities and response procedures

Develop and Deploy the System Activity Review Processo Procedures that regularly review records

Audit logs Access Management Security Incidents

Develop Appropriate Standard Operating Procedures

Page 2: Leo Vang_Resume.07.22.2016

o Audit Trail Trackingo Setting a proper review process and logging

Implement the Information Review and Audit Process Compliance, Rules, Regulations & Law Reviews

o HIPAAo FISMAo NISTo Corporate Complianceo Protected Health Information (PHI)/Personally Identifiable Information (PII)

Protected Data Assuranceo Follow compliance, Rules, Regulations & Laws to implement controlso Encryption of datao Security Transmissiono Secure Accessibilityo Role-based Accessibility of datao Principle of Least Privilege (POLP) implementation

SIEM Designing and Architectureo Evaluation of current McAfee Nitro and LogRhythm productso Designing the integration for LogRhythm for CENTENE-HealthNet

Request for Proposal (RFP) writing and reviewo Review and re-write the Request for Proposal (RFP) to buildout the SOC and transition to internal personnelo Engage with Contract specialists and internal departments

Security Operations Center Buildout with Vendoro Plan, build and design of the Security Operations Centero Security Tool evaluationo Build custom Security Toolso Integration of Security Toolso Develop controls, policies and processeso Operations trainingo Documentation

Automationo Creating scripts to automate and replace PHI/PII data

Developmento Create Webapp to help expedite the Security Requirements deliveryo This Webapp has a series of questions relating to certain required functionso The questions then return Company, HIPAA, NIST and Federal regulations, laws, policies and etc. for delivery

Chevron 11/30/2015 to 02/26/2016Remote / San Ramon, CASenior Security Architect – Security ConsultantDuties & Administration

Head up the design, deployment/implementation of Security Analytics Packets & Bluecoat SSL-Vo Deployment to over 30 sites across the world

Support, Administration, Troubleshoot, Testing, Evaluation, & technical documentation of Security Analytics Packet Capturing Appliances

Packet Analysis, Malware Analysis & Portable Executable Analysis Full Network Traffic Capture, evaluation, traffic shaping, network monitoring, system & service trending and analysis Penetration Testing & Packet Analysis

o Network Sniffing, nmap port scanning, service checks, wireshark utilization CVE Mitigation and Control Policy Control, Assessment, and Documentation Hardware troubleshooting

o DAC, JBOD,& VNX Troubleshooting Security Analytics / NetWitness Packets Bluecoat SSL-V Design, Deployment/Implementation, Configuration, Testing, troubleshooting and evaluation Help customers identify traffic, anomalies & threats by creating custom rules, parsers, feeds and help analyze environment

Architectural Design, Implementation & Support Calculated needed appliances for customer environment across the globe

Page 3: Leo Vang_Resume.07.22.2016

Storage retention evaluation, design, deployment/implementation and documentation Design, Deploy and Implement

o Design & Implement over 100 Security Analytics & NetWitness Appliances & DAE’s (storage) & Bluecoat SSL-Vo Deploy & Integrate

SA AD Authentication OU & User privileges

o Custom Installation & deployment documentationo Remote Virtual Media installationo Virtualization Appliance installation documentationo Configurations & Tuningo Troubleshooting & Support

Customer Environment NW appliances, DAC’s, JBOD’s &VNX Service/processes

o Feeds, parsers, app rules, network rules & BPF deploymento Custom Meta/Language Key buildo Reporting & Alert creation

EMC 06/11/2012 to 01/29/2016 Reston, VA / RemoteSenior Security Engineer – Global Security Organization – Cyber SecurityDuties & Administration

Support, Administration, Troubleshoot, Testing, Evaluation, & technical documentation of NetWitness Products Packet Analysis, Malware Analysis & Portable Executable Analysis Full Network Traffic Capture, evaluation, traffic shaping, network monitoring, system & service trending and analysis Penetration Testing & Packet Analysis

o Network Sniffing, nmap port scanning, service checks, wireshark utilization CVE Tracking, Searching & Submission

o Utilizing mitre & NVD databaseo Working with SECOps to submit vulnerabilities and or problems

CVE Mitigation & Control Policy Control, Assessment, and Documentation Hardware troubleshooting

o DAC, JBOD,& VNX Troubleshooting (storage)o EMC Unisphere Integration

Security Analytics Logging & Packets NetWitness Packets SourceFire Support & Administration RShield Support & Administration Ironport Support & Administration Archer Support & Administration Greenplum cluster support & Administration Mapr Hadoop cluster support & Administration VSS, Gigamon, Network Critical - TAP Configuration, Troubleshooting, testing and evaluation Netronome SSL Configuration, Testing, troubleshooting and evaluation Help customers identify traffic, anomalies & threats by creating custom rules, parsers, feeds and help analyze environment VMWare Virtualization - ESX ESXi 4.0, 4.1 & 5

o Deployment, Administration and Troubleshooting Linux Administration

o Securingo Vulnerability Assessment & Mitigation of the Linux Operating Systemo Securing of Redhat/CentOS Operating systemo RPM distribution & Controlo YUM Administration and Control

Utilized internal patching server

Architectural Design, Implementation & Support Dedicated Engineering Accounts

Page 4: Leo Vang_Resume.07.22.2016

o USBank, VISA, Johnson and Johnson, Boeing, DHS, CSC, ADPo Calculated needed appliances for customer environment across the globeo Design & Implement over 100 Security Analytics & NetWitness Appliances & DAE’s (storage)o Deploy & Integrate

SA AD Authenticationo Custom Installation & deployment documentationo Remote Virtual Media installationo Virtualization Appliance installation documentationo Configurations & Tuningo Troubleshooting & Support

Customer Environment NW appliances, DAC’s, JBOD’s &VNX (storage) Service/processes

o Feeds, parsers, app rules, network rules & BPF deploymento Custom Meta/Language Key buildo Reporting & Alert creationo Security Information & Event Management (SIEM)

SA AD Authentication, WinRM Event Collection, SDEE, & log file collectionSoftware QA

Product Software Quality Assurance, testing and code debuggingo NetWitness

Investigatoro NetWitness

Administratoro NetWitness

LiveManagero NetWitness

Spectrum/Malware

o NetWitness Informer/Reporter

o NetWitnesso Security Analyticso Security Analytics

Reports

o Security Analytics Malware

o Security Analytics Investigation

o Security Analytics Alerts

Code debugging & revisions Flex-parser and Custom Feed development

Development Bash Scripting

o NwTech Script Modification, maintenance, & addition of code Gives the ability to obtain logs, stats, system & service information

o Search & Destroy Script Finds files with specified date in folders and deletes Mainly used to on older systems when there is corruption on database files

o Retention Script Shows decoder packetdb retention

o Active & verify port connection Calls a curl & wget command to check if the port is opened Specific to rest for NW appliances

USATODAY 11/15/2010 to 06/01/2012 Mclean, VA – Corporate HeadquartersSenior Business/Systems Analyst - LeadDuties & Administration

Maintaining Windows 2003, 2008 Servers and RedHat Enterprise Linux Servers o Windows 2000, 2k3, 2k8, and RedHat Enterprise 4 & 5 o Building & Managing OU’s, Group Policy Object Editing (GPO), & Permissions Settings

Server Configuration, Administration, Management, and troubleshooting Single & Multiple internal/intranet based LAMP Stack setups, configurations and administration

o Departmental designs, configurations, implementations and administration IBM Blade Center HT 8740

o 4 Blade - VMware Private Cloud Infrastructure ESX ESXi 4.0 & 4.1

Page 5: Leo Vang_Resume.07.22.2016

o 4 Blade - Citrix XenAPP Support Newsgate Citrix Application Support Monitoring, Management, Administration & Support

o 3 Blade - Redhat Cluster support, High Availability configuration with Heartbeat and or Round robin dns iptables & SELinux labeling support

o Newsgate Infrastructure – Hybrid of Services for over 88 news media/print/production/circulation clusters and sub clusters sites around the world

Monitoring and Administrating over 6000 Servers/Services, WAN & Print Sites & branch offices McAfee ePO version 4.5

o Management and Administration Editorial, Content, Online, Production, Print, Circulation and branch office support WAN uptime verification & troubleshooting Penetration Testing & Packet Analysis

o nmap port scanning, service checks, wireshark utilization

Project Management Project Management

o OpenNMS and SolarWinds Monitoring Services for WAN/LAN devices Implementation Test & Review Documentation & Support Service Control Review & Implementation Escalation Procedural summarization

INetU Inc. 12/15/2008 to 11/12/2010 -Managed Hosting Company Allentown, PA Lead Systems EngineerProject Management

Citrix XenServer Virtualization o Setup, Configuration, Test and Troubleshooting Case Scenarios

Nagios introduction and deployment o Setup, Configuration, deployment and testing integration

Backup Project Design & Implementation o Backup Assist/open source Bacula

Documentation of setup, configuration, implementation and troubleshooting Duties

Maintaining Windows 2003, 2008 Servers and Linux Servers o Windows 2000, 2k3, 2k8, FreeBSD, and RedHat/CentOS/Fedora

Server Administration and management Monitoring and Administrating over 3000 servers and about 15,000 services VMWare Cloud Infrastructure

o EMC CX300, EMC CX4-120 and EMC CX4-240 support New server configurations, setup, install, administration & support

o IISo Apache o Tomcat o cPanel/WHM o Plesk o SSL Cert Installs

o Symantec Backup Exec 11d

o Backup Assist v.4 o VERITAS o Exchange 2k3/2k7 o SQL 2k5/2k8

o Bacula o Qmail o Postfix o Spamassassin o Nagios

Linux Apache MySQL & PHP/Perl (LAMP) Stack support - Single & Multiple setups o LAMP Stack configuration with Linux (Centos/Redhat), Apache, MySQL, and PHP. HA MySQL & Apache services

Setup, troubleshooting, management of Citrix XenServer and VMware Servers. o Install/Setup & Configuration o Management & Troubleshooting

Technical Support o Escalation Point

Backups and Providing Custom Backup Solutions o Backups via Disk & Tape

Page 6: Leo Vang_Resume.07.22.2016

PowerAdmin/PowerDNSo DNS Management – A records, mx records, cnames, text and etc. Help customer point their domains to their IP’s

Cisco ASA 55XX o Adding/Removing Access List Controls o Object Groups – Separation of services & networks. Helps to group certain services or networks to create rules against

Analysis & Statistics o Cacti – mrtg & rrdtools o BWstats – Bandwidth trending and overview

Enersys Inc. 3/7/2005 to 12/15/08 Reading, PA - Corporate Headquarters Electrical Engineering Technician//Network Administrator

Maintaining Windows 2003 Server Domain Controllers Manage and Maintain the Active Directory infrastructure Setup and manage Group Policies File server and ftp server maintenance Software testing, troubleshooting, repair and maintenance VERITAS Backup Management and Administration Print Server Management and Administration RedHat LAMP server administration and maintenance Setting separate equipment Servers and standalone servers for data acquisition Supporting the Lab network, troubleshooting and repairing upon request (desktop support) Testing Batteries, build batteries, designing cost effective batteries

Documentation & Control Documenting and Reviewing Domain Security Control Network, Server & Application trending and analysis reportingPolicy Management and Overview Technical Writing

o Ticketing & Monitoring Policy Creation and Overview o Acknowledgement Policies & Change Management Policies o SLA Creation, Overview and Auditing o Escalation Procedures, Change-Management Documentation and Implementation

Security Control & Domain Security Assessment & Evaluation Business Continuity Planning (BCP) & Disaster Recovery Planning (DRP)

o Documentation, training, and overview o Executive Summary, Critical Process/Services Prioritization, Risk Mitigations & Cost Summarization

Log Analysis Building new servers, configurations, setup, and installs:

o IIS 6 & IIS 7, Active Directory o Apache o SSL Cert Installs o VERITAS Backups o SQL 2k5/2k8 installation (Mirror Failover setup & support) o Postfix o OpenNMS Monitoring Services

Setup, troubleshooting, management of Citrix Applications and VMware Servers. o Install & Configuration o Management & Troubleshooting

Skills Server Monitoring: Monitoring 4000 servers, processes, services, ports, sites, transaction logs, site mirrors, and etc. WAN Site Monitoring: Monitoring and troubleshooting over 88 sites across the globe Server Administration: Windows, Linux (RedHat, CentOS, Fedora, and FreeBSD Servers) Incident Management: Follow through, ownership, documentation, tracking, trending, and analysis Customer Relationship Management: Tracking, updating, opening, establishing, and maintaining. Mail Server Services: Troubleshooting, testing, maintaining and configuring qmail & postfix Tomcat: Setup, configuration, testing, maintaining and troubleshooting for Tomcat servers Resin: troubleshooting, monitoring and maintenance of resin/java services

Page 7: Leo Vang_Resume.07.22.2016

LAN’s and WAN's: Implement and build centralized networks with Cisco from ground up Systems Administration: LAMP Stack Design, Configuration, Implementation, Troubleshooting & Administration. DNS, BIND, IIS,

APACHE, Active Directory services, FTP servers, NFS, File Servers, and doing monthly backups APACHE: Setting up web services and publishing content on the world wide web Cisco’s OSI model: Knowledge of the networking standards and it’s structures Microsoft Office Suite: MS Excel, MS Word, MS Power Point, MS Access, MS Project, MS FrontPage, and MS Visio Programming/Scripting Languages: Bash, MySQL, CSS, and html Snort & Elsa: Installation, setup, configuration & utilization Networking: switches, routers, and firewall configurations. 2950 switch, 2600/2800 router & PIX/ASA configuration and setup