Profiles search
Arthur Peng, CISSP, CEH
Cybersecurity Platform Ops Consultant at Blue Cross and Blue Shield of Illinois, Montana, New Mexico, Oklahoma & Texas
Chicago, IL, United States
Details
Experience:
Designed Site to Site VPN solution for current and new business partners to HCSC.
Transitioned infrastructure wide security appliances from Check Point firewalls to NGFW Palo Alto Networks
Supervised access to allow internal and external vulnerability testing and scanning.
Engaged in IS audits to review, identify and comply to ensure firewall configuration and changes are in line with security standards.
Participated in firewall access meetings through Tufin Orchestration Platform to ensured and minimize unnecessary duplicate efforts
2018 : Present
Blue Cross and Blue Shield of Illinois, Montana, New Mexico, Oklahoma & Texas
Cybersecurity Platform Operations Consultant
Responsible for the investigation and mitigation of known security vulnerabilities of network securities devices.
Coordinated a team of 10 by assessing all incoming infrastructure deployment and operational support to ensure a balanced team workload that meets our service level agreements.
Provided extensive troubleshooting of production availability that involved in detail analysis of logs and protocol captures to assist in the discovery of a root cause so future occurrence can be avoided.
Worked with application architects, cross-functional infrastructure engineers and project managers to deliver information security compliant projects.
Collaborated and provisioned the roll out of Azure and Amazon Web Services over a Direct Connect VPN solution.
Conducted daily review meetings directly with customers to answer or resolve questions related to infrastructure security standards, various access, and network segmentation.
Regularly identified, analyzed and decommissioned expired, unused security appliances or access to minimize enterprise risks.
2007 :
BCBSIL
Senior Network Security Specialist
Implemented and supported clustered firewall systems for electronic trading environment.
Coordinated in the design of a remote data center that reflected the current CBOT’s information technology synchronization.
Provided support to remote user access through two-factor authentication with RSA SecurID token and VPN.
Participated in the comprehensive design of Disaster Recovery test support via Juniper’s SSL/VPN to our remote data center.
Performed vulnerability assessments with GFI Languard prior to all servers roll out in a trading environment.
Documented all security related implementations and procedures to comply with SOX audits and knowledge transfers.
Resolved frequent users and application access to servers hinder by misunderstanding of technology protocol not pertained to security access.
Redesigned security group’s internal webpage for quick equipment access and inventory accountability.
2001 : 2007
Chicago Board of Trade
Information Security Engineer
Initiated the first CBOT migration of their 6500 Cisco Distribution switches from COS to IOS environment.
Deployed a current layout of Concord eHealth to monitor and analyze infrastructure wide network traffic and systems health to proactively maintained up to date efficiency day to day business.
Provided regular network changes for on-going projects.
Troubleshoot mission-critical network layout that involved financial trading to ensure minimal time loss.
Implemented high priority network design for special client request that required coordination with security team to provide expedient deployment.
Laid out current infrastructure AAA needs in a global setting with Cisco ACS 3.1 to improve the efficiency and consistency administration.
Engineered redundant Internet traffic with BGP in a preliminary environment readied for possible production overhaul.
Maintained network configuration backup with CiscoWorks/NATKIT.
2001 : 2005
Chicago Board of Trade
Network Specialist
Utilized systems such as Netcool, HP Openview, What’s Up Gold, and other products to maintain constant awareness of production systems.
Administered Checkpoint Firewall-1 (4.0 & 4.1) to ensure a secure corporate network. This involved rule creation, NAT manipulation, user authentication, accounting, VPN, and log monitoring.
Responsible for the implementation of HP Openview for the purpose of monitoring data centers. This included the designed layout of server farms relationship, management of systems status via SNMP polls, and the administration of HP Network Node Manger server station.
Troubleshoot network problem once monitoring systems discovered an issue. This involved resolving any in depth analysis of affected data paths within the network infrastructure, security systems, and servers.
Involved in creation of different processes required by the Network Operation Center. Including, but not limited to, escalation procedures, troubleshooting manuals, systems and network startup manuals, and security assessments.
2000 : 2001
Dantis
Operation Analyst
Transitioned infrastructure wide security appliances from Check Point firewalls to NGFW Palo Alto Networks
Supervised access to allow internal and external vulnerability testing and scanning.
Engaged in IS audits to review, identify and comply to ensure firewall configuration and changes are in line with security standards.
Participated in firewall access meetings through Tufin Orchestration Platform to ensured and minimize unnecessary duplicate efforts
2018 : Present
Blue Cross and Blue Shield of Illinois, Montana, New Mexico, Oklahoma & Texas
Cybersecurity Platform Operations Consultant
Responsible for the investigation and mitigation of known security vulnerabilities of network securities devices.
Coordinated a team of 10 by assessing all incoming infrastructure deployment and operational support to ensure a balanced team workload that meets our service level agreements.
Provided extensive troubleshooting of production availability that involved in detail analysis of logs and protocol captures to assist in the discovery of a root cause so future occurrence can be avoided.
Worked with application architects, cross-functional infrastructure engineers and project managers to deliver information security compliant projects.
Collaborated and provisioned the roll out of Azure and Amazon Web Services over a Direct Connect VPN solution.
Conducted daily review meetings directly with customers to answer or resolve questions related to infrastructure security standards, various access, and network segmentation.
Regularly identified, analyzed and decommissioned expired, unused security appliances or access to minimize enterprise risks.
2007 :
BCBSIL
Senior Network Security Specialist
Implemented and supported clustered firewall systems for electronic trading environment.
Coordinated in the design of a remote data center that reflected the current CBOT’s information technology synchronization.
Provided support to remote user access through two-factor authentication with RSA SecurID token and VPN.
Participated in the comprehensive design of Disaster Recovery test support via Juniper’s SSL/VPN to our remote data center.
Performed vulnerability assessments with GFI Languard prior to all servers roll out in a trading environment.
Documented all security related implementations and procedures to comply with SOX audits and knowledge transfers.
Resolved frequent users and application access to servers hinder by misunderstanding of technology protocol not pertained to security access.
Redesigned security group’s internal webpage for quick equipment access and inventory accountability.
2001 : 2007
Chicago Board of Trade
Information Security Engineer
Initiated the first CBOT migration of their 6500 Cisco Distribution switches from COS to IOS environment.
Deployed a current layout of Concord eHealth to monitor and analyze infrastructure wide network traffic and systems health to proactively maintained up to date efficiency day to day business.
Provided regular network changes for on-going projects.
Troubleshoot mission-critical network layout that involved financial trading to ensure minimal time loss.
Implemented high priority network design for special client request that required coordination with security team to provide expedient deployment.
Laid out current infrastructure AAA needs in a global setting with Cisco ACS 3.1 to improve the efficiency and consistency administration.
Engineered redundant Internet traffic with BGP in a preliminary environment readied for possible production overhaul.
Maintained network configuration backup with CiscoWorks/NATKIT.
2001 : 2005
Chicago Board of Trade
Network Specialist
Utilized systems such as Netcool, HP Openview, What’s Up Gold, and other products to maintain constant awareness of production systems.
Administered Checkpoint Firewall-1 (4.0 & 4.1) to ensure a secure corporate network. This involved rule creation, NAT manipulation, user authentication, accounting, VPN, and log monitoring.
Responsible for the implementation of HP Openview for the purpose of monitoring data centers. This included the designed layout of server farms relationship, management of systems status via SNMP polls, and the administration of HP Network Node Manger server station.
Troubleshoot network problem once monitoring systems discovered an issue. This involved resolving any in depth analysis of affected data paths within the network infrastructure, security systems, and servers.
Involved in creation of different processes required by the Network Operation Center. Including, but not limited to, escalation procedures, troubleshooting manuals, systems and network startup manuals, and security assessments.
2000 : 2001
Dantis
Operation Analyst
Company:
Blue Cross and Blue Shield of Illinois, Montana, New Mexico, Oklahoma & Texas
Spoken Language:
Chinese, English