M. H. Email and Phone Number
An accomplished Cyber and Cloud Security Engineer with extensive experience in overseeing IT planning, development, deployment, and project management for high-visibility financial clients. Demonstrated expertise in advancing cybersecurity measures, compliance, and implementing robust cybersecurity controls, standards, procedures, and automation in alignment with regulatory requirements. Skilled in leading the development and implementation of governance, risk, and compliance processes, with a focus on automating and monitoring information security controls. Proficient in regularly checking CISA advisories and NVD against Known Exploitable Vulnerabilities to ensure rapid identification and mitigation of security threats.With a proven record of accomplishment in supporting, automating, and optimizing mission-critical deployments in AWS, I offer deep knowledge in solutions design for cloud technology and quality engineering. My experience encompasses transitioning multiple projects to ensure seamless end-to-end delivery of cloud and security services, leveraging in-depth knowledge of AWS cloud services and platforms. I specialize in conducting comprehensive security assessments and vulnerability management using tools like AWS Inspector and Nessus Tenable. Additionally, I am adept at developing technical support strategies, including escalation management for security-related issues, and fostering team development through targeted recruitment and training.
Booz Allen Hamilton
View- Website:
- boozallen.com
- Employees:
- 32419
-
Cloud Security EngineerBooz Allen Hamilton Apr 2023 - PresentAtlanta Metropolitan AreaOversee IT strategy, execution, and project leadership for a prominent financial organization, ensuring top-tier planning, development, and deployment.Propel the client's goals forward by implementing a cybersecurity controls risk assessment framework that aligns with regulatory requirements.Elevate the client's cybersecurity posture through the development of standards, procedures, and controls, alongside process automation and continual enhancements.Enact governance, risk, and compliance measures to automate and persistently oversee information security controls, highlighting exceptions, risks, and evaluation processes. Craft and maintain reporting metrics, dashboards, and evidence artifacts.Regularly update security controls and provide comprehensive support to all stakeholders regarding security measures, focusing on internal evaluations.Conduct thorough assessments of both internal and external information security risks, addressing incidents, scans, and patch management.Offer relentless technical support and manage escalations regarding security issues via Everbridge. -
Cloud Security EngineerJeriel Llc Jul 2020 - Mar 2023Atlanta, Georgia, United StatesDefined, developed, and operationalized 7 security metrics while employing classified systems to help protect data on running devices• Implemented security best practices in AWS including multi-factor authentication, access key rotation, role-based permissions, encryption using KMS, enforced strong policy, configured security groups and NACLs, S3 bucket policies and ACLs, mitigating DDoS attacks etc.• Generated Certificate Signing Request (CSR), create private key files and requested SSL certificate from Entrust. Imported SSL encryptions keys into AWS Certificate Manager (ACM), and configured application load balancer for it.• Implemented secure key and certificate management: Store encryption keys and certificates securely and rotate them at appropriate time intervals while applying strict access control; for example, by using a certificate management service, such as AWS Certificate Manager (ACM). Defined, developed, and operationalized 7 security metrics while employing classified systems to help protect data on running devices.• Monitored open source and commercial threat intelligence for Indication of Compromise (IOC), new vulnerabilities, software weaknesses and other attacker Techniques and tactics procedures (TTP). • Monitored alerts from the SIEM tools and responded with analysis of the triggered alerts.• Investigated emails and attachments to identify the presence of any phishing or malware attack and to prevent the loss of sensitive data.• Examined alerts from various security monitoring tools, identified potential risks, such as virus and malware attacks, and hacking.• Monitored, investigated, and reported incidents of suspicious activity from the monitoring center.• Analyzed security breaches to determine the root cause of problems.• Monitored identity and access management as well as monitoring for abuse of permissions
-
Cloud / Cyber Security AnalystClarke Publishing Communications & Bpo, Inc. Aug 2019 - Jul 2020Winston-Salem, North Carolina, United StatesMonitoring alerts from the SIEM tools and responding with analysis of the triggered alerts.• Performed S3 bucket creation, access policies, and archive outdated data to Glacier through the Lifecycle policy configuration.• Knowledge of PCI-DSS Compliance requirements related to credit cards. Working knowledge of security tools such as firewalls, IDS/IPS, anti-spam, content management, server and network device hardening.• Performed evaluation testing on enterprise intrusion detection systems and prevention systems (IDS/IPS) such as McAfeeMonitoring alerts from the SIEM tools and responding with analysis of the triggered alerts.• Knowledge of PCI-DSS Compliance requirements related to credit cards. Working knowledge of security tools such as firewalls, IDS/IPS, anti-spam, content management, server, and network device hardening.• Performed evaluation testing on enterprise intrusion detection systems and prevention systems (IDS/IPS) such as McAfee.• Developed and supported the patch and vulnerability management process for Systems and Service Desk.• Observed and helped reduced IT and information security risk across people, processes, and technologies.• Performed risk assessment before systems go live and conduct periodic security check on live systems.• Stay up-to-date with security vulnerabilities and remediation steps.
Frequently Asked Questions about M. H.
What company does M. H. work for?
M. H. works for Booz Allen Hamilton
What is M. H.'s role at the current company?
M. H.'s current role is Cloud Security Engineer/ Security GRC.
Who are M. H.'s colleagues?
M. H.'s colleagues are Brandon Gibson, Jennifer Felter, Abigail Rubin, Pmp, Erin Ward, Kendall Chance, Teresa Yerdon, Larry Oliver.
Not the M. H. you were looking for?
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial