Quantcast

Cyber Security System Management Resume ...
Resumes | Register

Candidate Information
Name Available: Register for Free
Title Cyber Security System Management
Target Location US-GA-Powder Springs
Email Available with paid plan
Phone Available with paid plan
20,000+ Fresh Resumes Monthly
    View Phone Numbers
    Receive Resume E-mail Alerts
    Post Jobs Free
    Link your Free Jobs Page
    ... and much more

Register on Jobvertise Free

Search 2 million Resumes
Keywords:
City or Zip:
Related Resumes

Director of Technology & Cyber Security Lilburn, GA

North Carolina Cyber Security Lilburn, GA

Incident Response Cyber Security Atlanta, GA

Cyber Security Information Atlanta, GA

Cyber Security Content Development Jonesboro, GA

Cyber Security Analyst Ellenwood, GA

Cyber Security Information Atlanta, GA

Click here or scroll down to respond to this candidate
Candidate's Name
Powder Springs, GA Street Address  PHONE NUMBER AVAILABLE EMAIL AVAILABLENetwork Engineer / Cyber-Security AnalystHighly skilled cybersecurity professional with extensive experience in various fields. My expertise includes open-source intelligence, system management and deployment, vulnerability detection, and preventative action. I work closely with colleagues worldwide to deliver exceptional quality control evaluations to meet our client's diverse information requests. I have also developed and implemented system management strategies for various legal entities. My focus on intelligence gathering has provided crucial case-supporting evidence. I work with new and ongoing clients, ensuring their specific demands are met through system management and monitoring. I am proficient in VMWare and have successfully deployed usage for thin client networks, virtual machines, and virtualized networks. Additionally, I have designed information security management frameworks in compliance with ISO 27001 and NIST standards.AREAS OF EXPERTISE Project Management Telecommunications Solution Innovation Regulatory Compliance Time Management Red Team Operations Network & Design Analytical Thinking Client RelationsPROFESSIONAL EXPERIENCECyber Security Researcher / Programmer 05/2022  Present Faegin & Associates Analyzed security requirements specifications against implementation, ensuring accurate and timely responses to client requests. Executed penetration testing and reverse engineering using tools such as IDA Pro and Ghidra. Communicated complex technical findings and provided remediation guidance and recommendations to clients. Developed skills by researching new attack vectors, vulnerabilities, and exploits. Managed Linux and other embedded operating systems, ensuring system security. Collaborate with external auditors, NIST representatives, and regulatory bodies to maintain and enhance the company's compliance status. Conduct internal audits and collaborate with NIST to enhance processes, fostering a culture of continuous improvement.ProgrammerPC Tweaks 05/2020  05/2022 Created caching mechanisms to improve application performance and fixed performance defects, resulting in a 10+ times increase in performance in most cases. Design and develop an API for pricing and Method's Marketplace, a new permissions system Creation of web applications using Java and Javascript, as well as UI/UX using Python and Delphi Implement Sass to CSS compilation on the build server Develop a new build system using Team City, Web Deploy, and MSBuild which automated code deployment and improved the quality of the build being deployed to production. Introduced unit testing into the company using the NUnit framework and Moq. Implement and maintain NIST and ISO compliance frameworks for software development processes, ensuring adherence to Cybersecurity and quality management standardsProgramming skills: Assembler, Embedded C, Pascal - Delphi, C, VB.Net, Interbase, Firebird, Coracle, Foxpro/Visual Foxpro, Base III-IV, Paradox, MS-SQL server, MS-SQL, ODBC, XML, Encrypted Hex Data Files, C#, Web API, MVC, ADO.NET, LINQ, Dapper, Python, C++, JAVA, JAVASCRIPTPresidentCyberoptyx 01/2018  05/2020I have worked with international cybersecurity experts to conduct quality control assessments and utilize open-source intelligence to fulfill client information requests. Using various tools, such as VMWare, Defender, Sentinel ONE, and N-Able, to ensure comprehensive system security, including deploying and managing O365 systems, maintaining internal network integrity, managing servers for government systems, and innovating cable management solutions 3D-printed designs. Collaborated with various global cybersecurity professionals, completing quality control evaluations to ensure accurate and timely responses to client requests for information. Use of open-source intelligence and various software to fulfill customers requests. Devised and executed system management for various legal entities to assist in intelligence gathering designed to provide critical case-supporting evidence. Work with new and consistent clients on a wide range of issues, from system management and monitoring ensuring client requests and demands are fulfilled to their requirements.09/2017  11/2019Cyber Operations, VPAllied Security Operations Group, Dallas, TXOur start-up private intelligence company excels in developing and enhancing an information security management framework aligned with ISO 27001 and NIST standards, ensuring seamless integration of evolving legal requirements. We provide strategic enterprise risk management reporting to enterprise risk teams, senior business leaders, and the board of directors, while also offering OSINT data collection, analysis, and evidence for litigation, pattern of life analysis, and competitive business intelligence. Developed and enhanced information security management framework based on International Organization for Standardization (ISO) 27001 and National Institute of Standards and Technology (NIST) standards to integrate and normalize various and ever-changing requirements resulting from laws, bars, and regulations. Developed metrics and reporting framework to provide the status of the information security program to enterprise risk teams, senior business leaders, and the board of directors as part of a strategic enterprise risk management program. Oversaw collection and disbursement of relevant OSINT data pertinent to client needs, highlighting evidence for litigation, pattern of life analysis, and competitive business intelligence. Researched SCADA security in areas ranging from Side Channel access to vulnerability testing within known systems, built Faraday cages, and created new machine languages to obfuscate communications. Cataloged APT teams ranging from Cyber Berkut to APT 32, 33, and 34 that target SCADA systems and discovered their means and attack methods. Intern 09/2013  08/2017Cyber Defense LabsDuring my internship at Cyber Defense Labs, I collaborated closely with CEO Mike Saylor and Computer Scientist Kevin Henson, honing my expertise in the realms of cyber security and electronics design. This experience encompassed mastering the art of identifying threats, mitigating risks, and establishing Standard Operating Procedures, while also instructing on topics like Open-Source Intelligence collection, Pattern of Life analysis, programming in diverse languages, and guiding students in the Cyber Patriot Program within the DFW area to enhance their cyber skills for future roles in intelligence agencies and the US Military, with hands-on training in tools such as PF Sense, Splunk, Maltego, Kali Linux, and other cutting-edge systems. Working with CEO Mike Saylor and Computer Scientist Kevin Henson, I worked to hone the trades of the craft. Learning how to Organize and turn into Standard operating procedures I was taught how to identify threats, fuzz software, mitigate risks and teach others. While at CDL, I had the opportunity to teach classes at colleges in areas from Open-Source Intelligence collection, Pattern of life analysis, known methods be foreign intel services and hacker groups as well as programming in various languages. Taught students in the Cyber Patriot Program in the DFW area, a summer program helping talented high school students become better cyber operators before they went on to their careers in various intelligence agencies and the US Military. Learned and taught students how to use programs like PF Sense, Splunk, Maltego, Kali Linux, and other systems.Wheeled Vehicle Mechanic 11/2003  08/2013U.S. Army, Various Worldwide LocationsMaintained and ensured the 100% operational capability of a $250 million specialized vehicle fleet, overseeing multiple Joint operations, diplomatic activities, and fostering civilian-military partnerships. In combat deployments to Iraq and Afghanistan, they were involved in convoy security, route clearance, explosive ordnance disposal, foreign relations, and ensuring the safety of their fellow soldiers, all while mentoring and training soldiers in preventative maintenance and combat tasks. Responsible for maintaining a fleet of vehicles, ensuring 100% mission capability which were accountable to the Post Commander. Deployed multiple times in Joint operations groups performing mission-critical taskings to ensure operational capabilities. Assisted in local Diplomatic activities to work with Local Nationals to train and maintain military and civilian partnerships. Mentored and trained Soldiers in preventative maintenance and assisted in Training Soldiers tasks in combat environments. Combat Deployments to Iraq and Afghanistan involved in Convoy security, Route Clearance, Explosive Ordnance Disposal, Foreign relations as well as safety of fellow soldiers.EDUCATION Information Technology Security & Administration 07/2022 MyComputerCareer, Arlington, TX AS  Network and Systems Administration 09/2016ITT Technical Institute, Arlington, TXCompTIA A+ Certification Lic. # COMP001021157922

Respond to this candidate
Your Message
Please type the code shown in the image:

Note: Responding to this resume will create an account on our partner site postjobfree.com
Register for Free on Jobvertise