Wasi Resume 4
Wasi Resume 4
Professional Summary: -
Education: Bachelor’s Degree in Computer Science from University of Agriculture, Faisalabad in 2015.
Certification:
CompTIA Security+
CompTIA A+
Technical Skills
• Antivirus: McAfee Virus Scan Enterprise, Symantec, Endpoint Protection Suite
• DLP: Websense, Symantec & McAfee
• SIEM: Splunk ES, McAfee, Arcsight, Qradar, LogRhythm
• PEN TESTING TOOL: BurpSuite, CheckMarx SAST, Red Team, HP Fortify, IBM AppScan, Contrast Security, OWASP
Zap, Nmap, Kali Linux, Postman, Rapid7 Nexpose, ReconNG
• End Point Security: McAfee Suits (VSE, HIPS & HDLP), McAfee MOVE AV, Safeboot
• IPS/IDS: McAfee IPS, HP Tipping Point, Cisco IDS, SecureWorks IDS/IPS
• SIEM: RSA Envision, Arcsight, Splunk security manager, IBM Qradar
• Cloud Security: AWS, Azure, OpenStack, Docker, Ansible, Chef, Ansible, CI/CD, Terraform
• Proxies/Sniffers Tools: Burp Suite, Web scarab, Wireshark, DirBuster
• Vulnerability Management Tools: Foundstone, QualysGuard, Nessus, Nmap, Nexpose, Wireshark
• Security Tools: Splunk ES, McAfee Vulnerability management solutions, Burpsuite, OpenVAS, Nessus, Qualys,
SolarWinds, ForeScout, IBM - ICS
Professional Experience
Maxim Healthcare, Columbia, MD May 2021 to present
Sr. Cyber Security Engineer
• Worked on Splunk (ES) in building the real time monitoring to get a clear visual picture of organization's security
posture, easily customize views and drill down to the raw events for Incident Response Team (CIRT) and Cyber
Security Operations Center (CSOC).
• Design, build, upgrade and operate multiple cloud environments. Hands on installation and configuration within
the AWS/Azure clouds.
• Conduct proactive threat hunting a related threat research.
• Actively involved in the implementation of SailPoint Identity IQ.
• Hands-on with database security/vulnerability scanner using Imperva Scuba.
• Responsible for implementing, and managing Identity Directory and Identity Governance, including IAM
architecture and integrations, Azure Cloud, AWS Cloud, and GCP migrations
• Review security events that are populated in a Security Information and Event Management (SIEM) system
• Analyze a variety of network and host-based security appliance logs (Firewalls, NIDS, HIDS, Sys Logs, etc.) to
determine the correct remediation actions and escalation paths for each incident.
• Identify recommendations in Azure Security Center and GCP Security Command Center and Implement as
required.
• Configured ForgeRockDirectories services integration for Azure Cloud platform configurations, Azure AD
Clustering, and Site reliability reporting.
• Performing risk assessments throughout cloud DevSecOps / CICD pipelines including automated & manual
source code reviews and OWASP manual penetration testing of mobile & web applications on AWS/Azure.
• Independently follow procedures to contain analyze and eradicate malicious activity.
• Provide information regarding intrusion events, security incidents, and other threat indications and warning
information to the client.
• Assist with the development of processes and procedures to improve incident response times, analysis of
incident, and overall SOC functions
• Utilized Agile, Waterfall, SCRUM and Zachman as the main PM theories and frameworks for clients
• Extensive Experience with Symantec DLP and RSA DLP architecture and implementation for enterprise level.
• Perform research, analysis, and understanding of log sources utilized for security monitoring focusing on
networking devices.
• Managed client requirements and configured SailPoint IIQconnectors.
• Hands on experience with the Deployment of Imperva Web Application Firewall (WAF) installing, configuring
including the administration of SecureShpere portal.
• Configured multi account architecture, identity and access management, governance, data security, network
design and logging within provisioned AWS landing zones using AWS cloud formation.
• Use JSON polices to create Identity-based polices, resource-based policies and Permission Boundaries within the
AWS environment.
• Designed an Operational Technology (OT) network security solution based on the required template in place of
an existing Company Network (CN) addressing risk and availability of SCADA-ICS in a client’s organization
• Experience with Risk assessment using Industry standards like NIST 800-53 Rev3 and Rev4, HIPPA, PCI/DSS and
develop Security policy as per these standards.
• Conducted comprehensive incident response and investigations, utilizing digital forensic tools to analyze security
breaches and data exfiltration incidents.
• Review risk assessments completed by security team based on the National Institute of Standard and
Technology (NIST) and International Standard Organization (ISO) by using its methodology is based on the PDCA
cycle, which builds the management system that plans, implements cybersecurity, maintains, and improve the
whole system.
• Monitoring using Splunk/ Wily Introscope and setting up WebSphere Global Security for access to the admin
console. Configuring the HTTP Server for various clustered application servers using virtual hosting and enabling
SSL security.
• Developed and integrated an unprotected website to fully functional access management solution using
ForgeRock Open AM.
• Create Sailpoint Connectors, Build Applications with Correlation
• Leverage AWS Cloud Endure to migrate 100s of VMWare on-prem VMs to Cloud.
• Installing, administering and troubleshooting various IAM solutions (Sailpoint IIQ, Thychotic, and ISIM)
• Implementation and migration of Sailpoint IIQ from IBM ISIM
• Hands-on experience using AWS cloud monitoring tools (Cloud watch, Cloud trail)
• Consult clients on automating business processes & risk management activities in the RSA Archer GRC.
• Prepared risk-based test plans and perform the security testing (tool-based testing, manual penetration testing,
source code review, etc.) on the different layers of those information systems in support of the Certification &
Accreditation;
• Performed regular review and recertification of DLP Policies, TLS Domain whitelisting, SOP for enhancement
with ITRM (Information Technology Risk Management) and Risk assessment.
• Perform all cloud engineering and DevSecOps services.
• Utilized Threat Intelligence Platform and other OSINT sources such as news articles and research papers to pull
IOCs and conducted searches in LogRhythm.
• Worked to improve logging in our SIEM and helped create better visibility across our network through
LogRhythm.
• Utilized McAfee Threat Intelligence Platform and other OSINT sources such as news articles and research papers
to pull IOCs and conducted searches in LogRhythm.
• Security Engineer for the deployed SIEM tool (LogRhythm) including troubleshooting, updating/patching,
configuration and availability of the SIEM.
• Implementing and managing the threat detections tools and solutions to support the team’s mission
• Analyzing potential threats against the client’s computing environment
• Performed cyber security threat engineering activities with specific focus on countermeasure Tactics,
Techniques and Procedures (TTPs).
• Manage enterprise security systems, identifying key security risks, reporting risks to management with
recommendations for corrective action utilizing NIST frameworks.
• Work experience with IT policies, procedures and standards are related to doing security review using the NIST
standard specifically with NIST 800-53 and NIST 800-66 for HIPAA security rules. Review the Logs for malicious
user activities
• Worked on FedRAMP / WebEx Infrastructure vulnerability, POA&M remediation / compliance and general
maintenance of Linux environments, VMware, RSA Archer, Qualys, including customer requests and break-fix
situations.
• Performing physical to virtual servers (P2V) migration without Risk Management.
• Internal External Vulnerability Assessments as required for various regulatory compliance. Mitigated any
identified audit items and worked on modules like AML, BSA, OFAC, and participate in fraud investigations.
• Own all aspects of cloud security product definition including vendor integration, platform integration and
monitoring for cloud platforms including but not limited to Microsoft Azure.