Results-driven Cloud Security Engineer with a successful track record in secure cloud architecture design, IAM implementation, and encryption strategies. Proven expertise in configuring and monitoring cloud security tools, conducting audits, and ensuring compliance with industry standards. Experienced in incident response planning, collaboration with DevOps teams, and continuous improvement of security measures. Holds an Associate's in Computer and Information Sciences from San Jacinto College, complemented by CompTIA A+, Security+, CySA+, and SSCP certifications.
-
Sr Data EngineerCapital OneHouston, Tx, Us -
Cloud Security EngineerWells Fargo Aug 2022 - PresentSan Francisco, California, Us- Cloud Architecture Design:Develop and implement secure cloud architectures, considering best practices for data protection and access controls.- Identity and Access Management (IAM):Design and manage IAM policies to ensure proper authentication and authorization within cloud environments.- Encryption and Data Protection:Implement encryption mechanisms to safeguard data both in transit and at rest, ensuring confidentiality and integrity.- Configuration and Compliance Management:Configure and monitor cloud security tools to identify and address vulnerabilities.Ensure compliance with industry standards and regulations relevant to cloud security.- Incident Response and Monitoring:Develop and maintain incident response plans for cloud-based systems.Monitor cloud environments for security incidents and anomalies and respond promptly.- Collaboration with DevOps:Collaborate with DevOps teams to integrate security into the development lifecycle, promoting a culture of secure coding practices.- Security Audits and Assessments:Conduct regular security audits and assessments of cloud infrastructure to identify and mitigate potential risks.- Network Security in the Cloud:Implement and manage cloud network security measures, such as firewalls, VPNs, and intrusion detection/prevention systems.- Security Automation:Implement automation tools for security processes, ensuring efficient and consistent security measures across cloud environments.- Documentation and Reporting:Maintain comprehensive documentation of security configurations, incidents, and responses.Generate regular reports on the security status of cloud environments for stakeholders.- Continuous Monitoring and Improvement:Stay updated on the latest cloud security threats, vulnerabilities, and best practices.Continuously assess and improve security measures to adapt to evolving risks. -
Cyber Security AnalystPercepta Aug 2020 - Aug 2022Allen Park, Michigan, Us- Network Security:Implement and manage network security measures to protect the organization from unauthorized access, attacks, and vulnerabilities.Configure and monitor firewalls, intrusion detection/prevention systems, and other security devices.- Endpoint Security:Deploy and manage antivirus software, endpoint protection solutions, and other tools to secure individual devices within the network.- Identity and Access Management (IAM):Administer user access controls and authentication mechanisms.Ensure proper identity verification processes and manage user privileges.- Security Audits and Assessments:Conduct regular security audits and vulnerability assessments to identify and address potential weaknesses in the infrastructure.- Incident Response:Develop and maintain an incident response plan to address security incidents promptly.Investigate and mitigate security breaches, incidents, and anomalies.- Security Policies and Compliance:Develop, enforce, and update security policies and procedures.Ensure compliance with industry regulations and standards.- Security Awareness Training:Conduct security awareness training programs for employees to educate them about potential security risks and best practices.- Data Encryption:Implement and manage encryption technologies to protect sensitive data both in transit and at rest.- Patch Management:Regularly update and patch software and systems to address vulnerabilities and ensure a secure computing environment.- Security Architecture:Design and implement a secure architecture for the organization's IT infrastructure.Stay informed about emerging threats and security technologies.- Monitoring and Analysis:Monitor security logs and events for signs of suspicious activity.Perform analysis of security incidents and develop strategies to enhance security measures.- Collaboration:Collaborate with other IT teams and departments to integrate security measures into overall IT strategies. -
It Security InternMax Integrations Llc Jun 2019 - Jun 2020- Administered daily security of company databases and performed other duties as assigned by internship manager- Conducted 15+ incident response investigations monthly for Classified Incidents, and ensured all classified systems complied with cybersecurity regulations - Analyzed Security Technical Implementation Guides (STIGs), Security Content Automation Protocol (SCAP), and assured Compliance Assessment Solution of scanning results - Defined, developed, and operationalized 7 security metrics while employing classified systems to help protect data on running devices
Ashley Walker Education Details
-
San Jacinto CollegeComputer And Information Sciences
Frequently Asked Questions about Ashley Walker
What company does Ashley Walker work for?
Ashley Walker works for Capital One
What is Ashley Walker's role at the current company?
Ashley Walker's current role is Sr Data Engineer.
What schools did Ashley Walker attend?
Ashley Walker attended San Jacinto College.
Who are Ashley Walker's colleagues?
Ashley Walker's colleagues are Pruthviraj Gudishetty, Shamika White, Mo Radji, Naren Konda, Ralph Reeves, Gio Elano, Shelton Shawn.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial