| 20,000+ Fresh Resumes Monthly | |
|
|
| | Click here or scroll down to respond to this candidateCandidate's Name
Avenel, NJ Street Address
PHONE NUMBER AVAILABLE
EMAIL AVAILABLE
EDUCATION Master of Science - Cyber Security Maryville University
Street Address
Bachelor's - Business Administration Abu Dhabi University
2014
PROFESSIONAL Adaptable professional with 2 years of work experience and proven knowledge of leadership,
SUMMARY problem-solving, research and workflow prioritization. Aiming to leverage my abilities to
successfully fill the Cyber Security Analyst role at your company. My versatility and keen
desire to learn and add value will make me an excellent fit for an innovative and challenging
position in Cyber Security.
SKILLS Languages: English Ability to determine appropriate solutions
Key Courses: Penetration Testing, Advanced required to mitigate threats and
Penetration Testing, Controls for effective vulnerabilities discovered
Cyber Defense, Network & Internet Security, Python
Mobile Device Hacking and Forensics, SQL
Security Log Management and Analysis, SIEM tools (Splunk, OSA)
Designing and Implementing Cloud Security, Computer Forensics
Forensic Examination and Analysis, Incident Critical Thinking
Handling and Breaches, Legal aspects of Kali Linux
Privacy and Compliance, Information Malware Analysis
Security, Information Security Policy, Ethics Data Encryption
& Law, Linux Security, Python, Vulnerability Applications / Operating Systems: Kali Linux,
Management, Machine Learning, Cyber Ubuntu, Windows, Microsoft Office 365,
Forensics, Advanced Cyber Forensics, Cloud Computing Platforms (IaaS, PaaS,
Database & Enterprise Application Security SaaS),
Major Related Skills: Experienced in working with virtual
Incident Response Management machines
Vulnerability Analysis
Scanning Tools
Experienced with basic Penetration-Testing
and Ethical Hacking activities
Ability to use logic and reasoning to identify
the strengths and weaknesses of IT systems
Ability to use a forensic approach to
challenges
Privacy Protection Techniques
Ability to use available resources to keep up
with the fast pace of change in the criminal
cyber-underworld
Ability to seek out vulnerabilities in IT
infrastructures
WORK HISTORY Cyber Security Researcher SIEMENS
Princeton, NJ September 2021 to September 2022
Tested and evaluated various Siemens security technologies including:
SIESTA: Used to automate security testing and to be able to reproduce security test
results
OSA: SIEMENS comprehensive OT Security Information and Event Management solution
CLAORTY: Used for continuous threat detection and vulnerability management
Factory I/O: Used for creating industrial automation technologies
Project with Open PLC and Factory I/O software in which an attack was simulated on a
large industrial production line scenario with the purpose to evaluate intrusion
detection systems
Developed Resilient Information Architecture Platform for Smart Grid on three
Raspberry Pi's and enabled and secured communications between the RIAPS nodes.
Helped to recommend improvements in security systems and procedures.
Developed plans to safeguard computer files against modification, destruction, or
disclosure.
Conducted security audits to identify vulnerabilities.
Researched new computer forensic tools
ADDITIONAL AWARDS / LEADERSHIP , Dean's list 2012-2014
INFORMATION
|