From:                              route@monster.com

Sent:                               Friday, November 4, 2016 8:48 AM

To:                                   hg@apeironinc.com

Subject:                          Please review this candidate for: PaloAlto

 

This resume has been forwarded to you at the request of Monster User xapeix03

Eduardo Bonilla 

Last updated:  09/02/14

Job Title:  no specified

Company:  Apeiron, Inc.

Rating:  Not Rated

Screening score:  no specified

Status:  Resume Received


Miami, FL  33014
US

Mobile: 9178649670   
edbonilla@msn.com
Contact Preference:  Email

Quick View Links:

Resume Section

Summary Section

 

 

RESUME

  

Resume Headline: Eduardo Bonilla - System Security

Resume Value: da5eigjg88f8tebm   

  

 

EDUARDO BONILLA JR.
149-29 114th Place
South Ozone Park, NY 11420
917.864.9670 (Mobile)
edbonilla@icloud.com
Summary
• Strong IT background including excellent Networking and Security background.
• Excellent customer service skills with the ability to interface with all levels of users.
• B.S. in Computer Science - Computer Security with a minor in Computer Forensics (3.8 GPA, graduating Magna Cum
Laude with Honors).
• Honorably discharged veteran with over five years in the US Army and three years with the US Army Reserves, two
deployments in support of Operation Iraqi Freedom and awarded with the Army Commendation Medal and two Army
Achievement Medals.
TECHNICAL SKILLS
Network configuration/engineering, programming and administrating of routers and firewalls (including Nokia, Cisco
ASA’s, Checkpoint and Palo Alto), Cisco Security Manager, CheckPoint Smart Console, Juniper VPN’s(remote access),
Ironport Email Security, Console Switches for out of band management, DNS management using Men & Mice, IPS/IDS
configuration and maintenance utilizing McAfee Network Security Platform and Snort, Advanced Persistent Threat
analysis using FireEye, Endpoint computer protection utilizing software such as McAfee ePolicy Orchestrator suite,
Network Analysis and vulnerability scanning using McAfee Vulnerability Manager, Nessus, Nmap, BackTrack. Ticket
management using Remedy. Network monitoring, analysis and forensics using NetWitness, IBM QRadar SIEM, Riverbed
appliances including Cascade, Steelheads and Shark/Pilot, NetScout, Wireshark and Network Miner. Computer forensics
and analysis, data recovery using EnCase, FTK and ProDiscover. C++ programming, Bash, Java, Asterisk VoIP, VMware
and similar virtualization software, all Microsoft operating systems and software.
PROFESSIONAL EXPERIENCE
DoITT/City of New York
IT Security/Security Operations/Firewall Engineer
2/13 – Present
• Working in a large scale environment with a goal of providing security, expertise and protection to the assets,
employees and end users of the City of New York; daily activities include threat detection, mitigation and deterrence
while providing a high level of functionality of all city network resources.
• Administrating complex city firewalls includes reviewing all firewall requests to certify that all mandated security
policies and procedures are being adhered to and pose minimal risk to city assets; submitting all approved changes
through change management teams and after final approval, implementing changes on appropriate firewalls. Rules
may include but not limited to creating objects, modifying groups, routing for interfaces, creating VPN group/users,
Network Address Translation for hidden IP’s.
• Management and monitoring of URL filtering appliances using Facetime (Actiance) and Palo Alto firewalls.
• Assisting in troubleshooting firewall and/or connectivity issues which can include firewall or routing issues using
trouble ticket tracking system. Typical troubleshooting includes consulting with client or users, packet captures,
reviewing traffic flows and log reviews with a goal of resolving issues within department SLA.
• Management of DNS zones including management of domains, creating A, PTR, MX, TXT(SPF) and CNAME
records and reverse delegation.
• Management of Juniper remote access including the creation and management of user realms, roles, resource profiles
and policies and troubleshooting end user connectivity issues.
• Management of Cisco Ironport email filtering appliances and troubleshooting email issues with end users/agencies.
• Upgrading city infrastructure including appliances that are end of life and updating appliance software operating
systems.
Security Consultant for DoITT/McAfee
6/12 – 2/13
• Monitoring network assets using Nagios and acting on alerts to remediate events.
DYNTEK, INC.
• Lead security consultant for the deployment, management and monitoring of the McAfee Network Security Platform
for the City of New York including placement and configuration of McAfee IPS sensor appliances throughout network
• Day to day use of the real time and historical threat analyzer for actionable events and evaluate said events within the
timeframe allocated in the SLA and report my findings to both technical and non technical parties including
recommendations and/or remediation.
perimeter, configuration of the Network Security Manager including policy and firewall rules, updates and
troubleshooting/repair.
• Manage, maintain and operate the McAfee Vulnerability Manager including user credentials and profiles, scan
configurations, daily system maintenance and operations. Training new clients/users on how to conduct scans of their
environment/assets according to their needs, obtaining and reading vulnerability reports and assisting clients build
customizable reports.
• Working with trusted third parties {both governmental and private), investigate and locate compromised hosts that
pose a threat to network security.
• Identifying remote access credentials that have been compromised by reviewing logs and information obtained from
trusted security agencies to insure the confidentiality, integrity and availability of the network while still providing
remote access to authorized personnel.
• Using Remedy, IBM Security Operations Console, Mazu and QRadar, investigating network security incidents or
anomalous events that involve both external and internal threats and creating and/or resolving Help Desk Tickets and
Change Request. Remediation of tickets often requires working with outside departments/agencies to help identify
faults, failures and/or security violations.
ZINBARG, EMANUEL & ASSOCIATES
Security Engineer/ IT Administrator
12/09 – 5/12
• Redesigned company network by replacing servers, hosts, switches and firewall, migrated data and applications from
Windows 2000 Server to Windows 2008 Server while assessing the needs of the client and finding the most cost
effective method of updating infrastructure without loss of services, speed or data.
• Set server and client policies to assure secure access while maintaining high degree of data integrity and security.
• Strategized cost effective way to replace old terminal stations with newer, faster terminal stations and streamlined
copying, printing and facsimile methods by integrating server based printing.
• Centralized workstations to a server based environment utilizing remote desktop and VMware.
• As network administrator, was responsible for implementing security measures which included Host Intrusion
Detection Services utilizing Snort, McAfee Total Protection for Secure Business, created a back up procedure and
schedule, implemented orderly shutdown procedures, and disaster recovery methods.
• Installed, configured and managed Ethernet and Wireless Cisco routers giving the client the ability streamline network
traffic, increased security with another layer of packet inspection, VPN access and the ability to safely use wireless
endpoint devices.
• Working in conjunction with the proprietor and his staff, we were able to implement a strategy to digitize all attorney
files, and establish means for attorneys to obtain critical attorney files offsite via VPN or cloud file storage.
INFRAGARD – NY METRO ALLIANCE
Project Manager / Internship
09/11 – 12/11
• Infragard, a non-for profit organization required a server based PBX system to help in its expansion into the network
and computer security community.
• While coordinating the planning project along with my team members, we created a milestone timeline to keep the
project on track and meet the deadline set by the organization.
• As the lead project manager I was tasked with creating a secure VoIP telephone sever to be utilized as a model for the
Infragard community and satellite offices throughout the nation.
• This project necessitated a great knowledge of Unix, Telephony protocol, scripting, configuring, TCP/IP protocols and
network security.
• At the conclusion of the project, we created a stable environment to run the Asterisk VoIP PBX server all the while
keeping a keen eye on network security without jeopardizing access, availability and data integrity.
• Supervised a white hat vulnerability testing to assure any and all exploits were recognized and quickly patched.
US ARMY - Department of Defense
Sergeant/Squad Leader
Security Clearance: Secret (expires in 2018)
05/2005 – 1/2010 (Active)
04/2010 – 6/2013 (Reserves)
• Responsible for running operations in harsh environments with the goal of providing unfettered access to both
logistical and informatics for a battery sized element.
Eduardo Bonilla Jr. / Page 2
• Supervised and trained 5 soldiers in fields that included maintenance, electronic management, information
management, resource development and troubleshooting.
• Successfully trained with several next generation military equipment and then crossed trained others with an excellent
success rate.
• Some other duties include the responsibility for sensitive items accountability, acquisition of new materials for planned
projects and successfully turning over all equipment upon departure with a less than a .05% rate of loss.
• Due to my actions, team leadership skills and dedication to the mission I was awarded with the Army Commendation
Medal and two Army Achievement Medals.
EDUCATION
ST. JOHN'S UNIVERSITY
May, 2012 – B.S. Computer Science - Computer Security with minor in Computer Forensics
(Magna Cum Laude with 3.8 GPA, Honors and Deans List for 2012)
May, 2011 – A.S. Computer Science - Computer Security (Deans List with 3.9 GPA)
ACHIEVEMENTS
• President/Member of the St. John’s Computer Science Society (2011-2012)
• Inductee of the St. John’s College of Professional Studies Honor Society (2011-2012)
• Dean’s List for academic year (2010-2011) & (2011-2012)
• Inductee of the St. John’s leadership organization (2011-2012)
• Recipient of the Army Commendation Medal (2008)
• Recipient of the Army Achievement Medal (2008, 2009)
• Member of the Northeast Chapter of the H.T.C.I.A. (2011-2012)
• Member of the St. John’s Computer Science Society (2010-2012)
• Member of the St. John’s College of Professional Studies Honor Society (2011-2012)
• Member of the St. John’s leadership organization (2011-2012)
• Member of the St. John’s Criminal Justice Association (2010-2012)
MEMBERSHIP & ORGANIZATIONS
Eduardo Bonilla Jr. / Page 3



Experience

BACK TO TOP

 

Job Title

Company

Experience

System Security Consultant

Dyntek, McAfee, NYC DoITT

- Present

 

Additional Info

BACK TO TOP

 

Desired Salary/Wage:

85,000.00 - 110,000.00 USD yr

Current Career Level:

Experienced (Non-Manager)

Date of Availability:

Within 2 weeks

Work Status:

US - I am authorized to work in this country for any employer.

Active Security Clearance:

Active Secret

US Military Service:

Yes

Citizenship:

US citizen

 

 

Target Job:

Target Job Title:

Network Security Analyst

Desired Job Type:

Employee

Desired Status:

Full-Time

 

Target Company:

Company Size:

Occupation:

IT/Software Development

·         Computer/Network Security

·         Systems Analysis - IT

 

Target Locations:

Selected Locations:

US-NY-New York City

Relocate:

No

Willingness to travel:

Up to 50% travel

 

Languages:

Languages

Proficiency Level

Spanish

Advanced