From:                              route@monster.com

Sent:                               Saturday, May 07, 2016 5:10 AM

To:                                   hg@apeironinc.com

Subject:                          Please review this candidate for: Cloud

 

This resume has been forwarded to you at the request of Monster User xapeix03

Vasan Kadambhi 

Last updated:  04/30/14

Job Title:  no specified

Company:  no specified

Rating:  Not Rated

Screening score:  no specified

Status:  Resume Received


Morrisville, NC  27560
US

Mobile: (919) 659-5251   
vasancissp@gmail.com
Contact Preference:  Email

Quick View Links:

Resume Section

Summary Section

 

 

RESUME

  

Resume Headline: Vasan SK - Security Engineer/Architect, Cloud/Application Security Engineer

Resume Value: trki8gidufdatabd   

  

 

Vasan K, CISSP, CEH, CISA, CISM

(919)-659-5251                                                                                            vasank@outlook.com


 

Results driven, dynamic, and business-savvy certified security professional with deep “hands-on” IT expertise in system design and integration, IT security architectures, risk mitigation, and system/network administration. A respected senior security engineer, and yet a humble and highly motivated team-player who’s an intelligent self-starter with the ability to produce bottom line results irrespective of impediments or challenges. Highly trustworthy, confident and gracefully poised in interactions with individuals and/or groups at any level.  A swift learner and a dedicated perfectionist. Meticulously completes projects, and is able to multi-task effectively. An invaluable asset to any company or organization, and the definition of “Excellence without excuse”.

 

ü       15 years of extensive experience in designing, engineering and managing systems, technical operations, and project management.

ü       Consistently increasing scope and responsibility in Financial Services, Government, and I/T Services/Consulting, with additional sector-specific experience in the scientific research and energy firms.

ü       Recipient of Lehman Brother's "exceed expectations" employee rating for outstanding performance.

 

KEY STRENGTHS:

 

ü       Security Architecture and Design

ü       Security Engineering

ü       Web Security

ü       Penetration Testing

ü       Regulatory Compliance

ü       System Administration

ü       Troubleshooting and Support

ü       Project Management

ü       Risk Assessments

 

CERTIFICATIONS:

 

§ Certified Information Systems Security Professional (CISSP)

§ Certified Ethical Hacker (CEH)

§ Check Point Certified Security Engineer (CCSE)

§ Check Point Certified Security Administrator (CCSA)

§ National Security Agency (NSA) certification

§ Committee on National Security Systems (CNSS) certification

§ Cisco Certified Network Associate (CCNA)

§ Certified Information Security Manager (CISM)

§ Certified Information Systems Auditor (CISA)

§ QualysGuard Certified Specialist - Vulnerability Management & Policy Compliance

§ ISO 17799 Certified Lead Auditor

§ Sun Solaris Certified System Administrator (SCSA)

§ Sun Solaris Certified Network Administrator (SCNA)

 

TECHNICAL SKILLS & STRONG KNOWLEDGE:

 

§ Operating Systems: Red Hat Linux,Solaris, Cisco IOS, Windows Vista, XP, 2000, Me, NT, 98, 95, WFW 3.11, and MS DOS,

§ Protocols/Services: TCP/IP, UDP, NetBIOS, ARP, FTP, HTTP, HTTPS, NNTP, ICMP, DHCP, Telnet, SNMP, SMTP, X.25, SNMP, RPC, NFS, IMAP, POP, CVP, UFP, IPSec, SSH, SSL, Kerberos, 802.1X, 802.11

§ Programming: UNIX Shell script, SQL

§ Software: MS-Office, Visio Professional, Microsoft Active Directory, VMware, Sharepoint              , Microsoft SQL, Oracle, Wireshark

§ Security Technologies/Tools: eTrust Access Control, Check Point FireWall & VPN, Dragon IDS, Symantec SEP, AlgoSec, Websense Web Filter, BlueCoat, Vontu DLP, Sourcefire and TippingPoint IPS, RSA SecureID, QualysGuard, GFI LANguard, SAINT, SATAN, AppScan, Nessus, SuperScan, eEye Retina, Fortify, Archer, Arcsight, Cisco PIX, Cisco ASA, Tripwire, Snort, ISS Internet Scanner, EnCase, Linux Firewalls (iptables, ipchains), Fortify, Metasploit Framework, Kismet, Tcpdump, Paros Proxy

§ Standards and Regulations: ISO 27002, Sarbanes-Oxley(SOX), PCI, FISMA, NIST 800 Series, OWASP

§ Hardware: IBM compatible PC’s and Laptops, IBM Netfinity Servers, Cisco Routers and Switches, Linksys Routers, SUN Workstations, Enterasys Dragon Sensors and Servers

 

EXPERIENCE:

 

A Prominent Fortune 50 Firm, (2/2009-Present)

Senior Security Engineer

 

Hands-on role in applying security engineering principles related to building, maintaining, and monitoring secure infrastructure using various technologies including firewalls, networking products, VPN, intrusion detection & prevention, access control products, anti-virus, and security operating system or application tools and protocols. Communicate with the Business sponsors, IT systems administrators, and application developers to identify security risks, ensure policies are consistently applied and provide general support on information security related issues.

 

§ Recommended and assisted network services team to upgrade existing CISCO ASA 5510 from version 7.2 to 8.0 to leverage its Web based SSL VPN clientless feature to provide secure access for the vendors on the isolated network, which resulted in substantial savings to the firm by avoiding a potential buy-in.

§ Identified the existence of data leakage through personal storage sites which resulted in thorough research and evaluation of content filtering solutions and recommended Websense Web filter to the senior management as a leading choice. Documented Websense network design options: Pass-by and Pass-through technologies and presented to the IT infrastructure team.

§ Prepared Security Requirements documents and participated in Security Architecture reviews. Worked with Network services and deployment team to ensure compliance with stated security requirements.

§ Documented technical security standards, guidelines, and procedures required to reinforce information security policies. Conducted necessary research to ensure these standards, guidelines and procedures adhere to current best practice guidelines and information security industry standards such as ISO17799.

§ Conducted numerous 3rd party security reviews to determine the security posture of companies that host/store on behalf of Time Warner. The following aspects are reviewed : Security Policy, Organizational Security, Asset Management, Human Resource Security, Physical and Environmental, Communications and Ops Mgmt, Access Control, Info Sys AD&M, Info Security Incident Mgmt, Business Continuity and Compliance.

§ Performed over 100 vulnerability assessments/penetration testing on the systems, networks and applications using tools such as QualysGuard, nmap, IBM AppScan, Nessus. Efforts led to the development of an infrastructure that enhanced information security posture, and advanced the division’s mission towards VISA/MasterCard PCI and SOX compliance.

§ Advised on current and emerging application security threats such as SQL injection and Cross Site Scripting (XSS) to the developers; provided recommendations to mitigate security vulnerabilities on their IT infrastructure; Efforts led to the development  of secure code review practice using Static application security testing (SAST) offerings from Fortify software.

§ Succeeded in preventing a possible infection by Conficker worm which some researchers estimate that millions of computers have been infected with, since January 2009. Accomplished this by drafting a risk mitigation plan including confirming that Symantec End Point protection 11.0 has the latest release definitions for protection and drafted a plan to scan the systems using a newly created QualysGuard scan policy for detecting the presence of worm.   

§ Presented quarterly metrics to the senior management related to Check Point firewall and Dragon IDS security threat events gathered through Symantec portal, and also provided metrics for vulnerabilities based upon severities gathered through Qualys scan results.

§ Documented incident response procedure for the operations team to support after hours and day-to-day activities. 

 

LEHMAN BROTHERS INC, (4/2004-1/2009)

AVP - Senior Security Engineer

Security Engineering, Americas

 

Serve as a subject matter and hands-on expert on information security related services across all business units within Global Investment Banking, North America and Asia. Work closely with developers, IT staff, compliance and audit in ensuring that the infrastructure: system, network and applications are secure, and meet the needs of the business, security policies, standards, and regulations. Key Achievements:

 

§ Part of security engineering team to design, implement and manage access control on 4,000+ Unix and Linux servers across Americas, Europe and Asia;

§ Established an excellent rapport with the developers and the application owners to investigate, analyze and rectify permission issues. Efforts led to the development of an infrastructure that enhanced information security posture, and advanced the division’s mission towards Sarbanes-Oxley (SOX) regulatory compliance;

§ Worked on weekends for critical security changes such as enforcing restriction on services such as SSH, FTP and RSH on the production environment and locked down login access on mission-critical and production environment such as NFS, DNS, and FTP servers based upon initial data log reviews, and analysis;

§ Provided high level of expertise for all aspects of systems security, including standards and hardening of Checkpoint firewalls and reviewed firewall port and change requests from the business owners.

§ Performed security system configuration and policy database changes, provided training to IT security operations team, know-how, and documented a technical run-book thereby eliminating the need for recruiting additional consultants which resulted in annual savings of more than $250,000 to the firm.

§ Deployed and configured Unix Sudo configuration across the global enterprise comprising of 18,000 Unix servers in 3 geographic regions, which improved system turn-around time by more than 50% for developers, database & system administrators;

§ Wrote Shell Scripts for routine works such as policy creation & updates, user account management, log analysis and technical troubleshooting; thereby accomplishing the work previously required of two full-time employees.

§ Reduced maintenance costs on security technology 50% annually by successfully limiting the scope of access control implementation to business critical servers, centralizing all applications and reducing client problems.

§ Integrated UNIX log daemon with ArcSight to monitor critical binaries and executables belonging to 100+ applications spread across 3 geographic regions, which facilitated log management.

 

COGNIZANT TECHNOLOGY SOLUTIONS (1/2003-2/2004)

Senior Security Consultant

 

Performed vulnerability and application-level security testing on applications, infrastructure which included scoping and coordinating assessments, in addition to performing both high-level assessment analyses, translating technical vulnerabilities into business risks, and low-level assessment activities such as, worked with vulnerability assessment tools and conducted ethical hacking.                                 

 

§ Conducted vulnerability testing and application security reviews with minimal impact to business operations for Union Bank of California (UBOC) as an On-site security consultant for their networks and systems using technical examination techniques, including network foot printing, OS fingerprinting, password sniffing, log review, and vulnerability scanning. Tools used include Nessus, AppScan, eEye Retina, nmap and other open source tools. Analyzed test results and provided mitigation recommendations for known security threats to enhance security posture;

§ Personally selected by the director from among 20+ strong security staff to participate in the division’s first infrastructure security assessment onsite assignment;

§ Developed and documented vulnerability testing guidance and procedures as per the ISECOM and NIST methodologies for the client engagements;

 

 

 

 

COMPUTER ASSOCIATES (TCG), (2/2002-12/2002)

Government Agency (On-site) Senior Security Consultant

 

Designed and implemented network security solutions as per the customer’s requirements and made appropriate recommendations to them as needed. Helped customers to effectively govern, manage and secure their infrastructure in the most efficient manner. Developed and delivered high quality presentations, product demonstrations, and proof of concept exercises.

 

§ Challenge: To protect Government Agencies’ IT environment including more than 300 PCs and 15 servers from potential threats originating from the public internet. Prohibiting access to inappropriate materials and preventing employees’ unintentional opening of security holes in the network, bringing viruses and malicious codes into the IT environment;

 

§ Action: Designed, installed and configured eTrust Firewall to meet the Agencies’ requirements in the shortest possible timeframe. Precisely defined which applications should be allowed to pass the firewall and established policies for traffic across the network. Implemented eTrust Intrusion Detection System(IDS) and configured the system to send an email alert to the appropriate people when someone had accessed an inappropriate website and blocked access to inappropriate sites, and monitor and record users’ attempts to access the sites;

 

§ Result: “We are very pleased with the results that CA and Vasan were able to achieve using eTrust Firewall and IDS, and we look forward to working closely with them to address our other information security challenges.” Senior Manager IT, Government Agency.

 

SIFY ASSURE, (11/2000-1/2002)

Information Assurance Engineer

 

§ Performed OS hardening, vulnerability assessment and penetration testing; analyzed the security posture of customer’s IT infrastructure and assisted in remediation of vulnerabilities found within the infrastructure to meet security compliance;

§ Research & analyzed into new information security technologies, such as vulnerability scanning and benchmark configuration tools, with a focus on the introduction of relevant technology to meet client’s requirements.

 

CMS COMPUTERS LIMITED, (5/1998-10/2000)

IGCAR Government Agency (Onsite) UNIX Support Engineer

 

HCL LIMITED, (4/1994-4/1998)

Junior Network Engineer

 

EDUCATION:

 

BIRLA INSTITUTE OF TECHNOLOGY AND SCIENCE, PILANI, INDIA

§ B.S., Information Systems

 

STATE BOARD OF TECHNICAL INSTITUTE, INDIA

§ Diploma In Electronics and Telecommunications Engineering

           (Graduated with Honors)

 

PROFESSIONAL AFFILIATIONS:

 

§ (ISACA) - Information Systems Audit And Control Association

§ (ISC) ²   - The International Information Systems Security Certification Consortium

§ Member, New Jersey Chapter of ISACA

 

TOPICS OF INTEREST:

 

Microsoft Windows, UNIX, Redhat Linux, Solaris, AIX, IIS, SQL Server, SharePoint, Exchange, Oracle, SAP, PeopleSoft, Active Directory, RACF, Mac OX, GOTS, COTS, OS400, Apache, OpenStack Compute, Storage, Swift, Cinder, Amazon AWS/EC2, Azure, REST APIs, Hypervisors, KVM, VMware, vCloud, Xen, HyperV, vSphere, CloudFoundry, Cloudify, OpenShift, Hadoop, Puppet, Chef, Salesforce, SAS,Cloud Security Alliance(CSA), NIST, HIPAA, FISMA, SAS-70, FEDRAMP, PCI-DSS, EU Data Protection Directive, Safe harbor, APEC, FFIEC, SSAE16, ISO27001, SOX, NERC CIP, SCADA, NEI 08-09, CDA, FIPS, FDA, DHS,USGCB, SABSA, Balanced Score Card, COBIT, DIACAP, HITECH, GLBA, DISA, OSTMM, ISO 31000, SAML, XACML, Kerberos, RBAC, OpenID, OAuth, ACLs, LDAP/SSO integration, identity federation, Central Authentication Service (CAS), JAAS, Java crypto API, Public/Hybrid/Private Cloud, SaaS, PaaS, IaaS, C/C++, Java, .NET, Python, Perl, Shell,HP WebInspect, Fortify , IBM AppScan, WireShark, SecurID, RSA Archer, Imperva, CA Control Minder, Nessus, Rapid7, Nexpose, Encase, EnCe, Core Impact, Metasploit, Symantec, Vontu, Websense, FireEye, Aircrack, Nikto, Qualys, BurpSuite, Checkmarx, Nmap, Paros, ZAP,ACLs, Stateful firewalls, VPNs (tunneling, IPsec, PPTP, IPv4, IPv6, Router, Switch, Blue Coat Proxy, Juniper Netscreen, CheckPoint, Algosec, Redseal, Skybox, Checkpoint NG, Cisco PIX, Cisco ASA,WAN, MAN, LAN,CISSP, CISM, CISA, SANS, Security+, CCSK, CEH, SANS, GSEC, GCIH, CCNA, CCNP, VCP, MCSE, CCIE, CIPP, ISC2, ISACA, GAIC, CRISC, CGEIT, CCSA, CCSE, GWAPT, GPEN, PMP, ITIL, CISSP-ISSAP, CISSP-ISSEP, MCSE, RHSE, CSSLP, CRISC, CBCP,FTP, SMTP, DNS, DHCP, NIS, LDAP, TCP/IP, SSL/TLS, ADFS, RADIUS, SSO, SSH,GRC, SIEM, IPS/IDS, PKI, SSL, Digital Certificates, DLP, SDLC, eGRC, CSAT, C&A, SOPs, CIRT, DDoS, WAF, VPN, IAM, DMZ,NetApp, ArcSight, Splunk, Top Secret, TS/SCI, DoD, Poly

 

 



Experience

BACK TO TOP

 

Job Title

Company

Experience

Senior Security Engineer

Fortune 100

- Present

 

Additional Info

BACK TO TOP

 

Current Career Level:

Experienced (Non-Manager)

Date of Availability:

Within 2 weeks

Work Status:

US - I am authorized to work in this country for any employer.

Active Security Clearance:

None

US Military Service:

Citizenship:

None

 

 

Target Job:

Target Job Title:

Information Security Specialist, Security Engineer/Architect, Cloud/Application Security Engineer

Desired Job Type:

Employee
Temporary/Contract/Project

Desired Status:

Full-Time

 

Target Company:

Company Size:

 

Target Locations:

Selected Locations:

US
US-NC-Raleigh/Durham-RTP

Relocate:

Yes

Willingness to travel:

Up to 25% travel