| 20,000+ Fresh Resumes Monthly | |
|
|
| | Click here or scroll down to respond to this candidatePROFESSIONAL SUMMARYCERTIFICATIONSPORTFOLIO AND PROFILEEDUCATIONEXPERIENCECandidate's Name
8622506390 EMAIL AVAILABLE Totowa, NJ 07512 Results-focused cybersecurity professional with extensive experience conducting practical and maturity assessments on organizations using the NIST Cybersecurity Framework and conducted risk assessments on several applications using the CIA triad. I have experience in cybersecurity risk management, and I implemented the Mitre att&ck framework to create incident response and detections, and manage cloud security. I have prioritized, detected, and addressed vulnerabilities and tracked program effectiveness to reduce security risks. I deeply understand risk management frameworks (NIST, CIS, etc.) and have a proven track record of mitigating cyber threats. Detail-oriented, specializing in security, compliance, and implementing the three lines of defense model. Skilled in asset management, identity and access management, and vulnerability remediation procedures. I am dedicated to safeguarding organizations that align with industry standards and strengthen an organization's overall security posture.CompTIA Security+ ce CertificationCybersecurity SOC Analyst (LeveldCareers)Cyber Security Governance, Risk, and Compliance (GRC Mastery) https://github.com/Candidate's Name
https://LINKEDIN LINK AVAILABLEMaster of Business Administration (M.B.A.): Operations Rutgers Business School, New Jersey, Jun 2018Bachelor of Arts (B.A.) - Business AdministrationUniversity of Science & Arts, Chickasha, OK, May 2015 Cybersecurity AnalystDow Jones, 2023 - CurrentConduct cybersecurity practical and maturity assessments using the NIST CSF and risk assessments on several applications using the CIA triad.Assist in identifying, classifying, prioritizing, remediating, and creating rules for managing vulnerabilities for the business to follow.Created and managed a continued process and procedure to operate PCI controls daily through multiple validation tools and SAAS tools to revalidate assets.Analyzed vulnerability scan results, prioritizing, detecting, and addressing vulnerabilities and tracking program effectiveness to reduce security risks, assisting the company in being PCI DSS compliant.Developed automated remediation process to preemptively deal with vulnerabilities stemming from Windows updates and third-party software.Cybersecurity ConsultantSKILLSCook Consulting Group, 2022 - 2023Implement secure cloud configurations using Azure Private Link, Network Security Groups, Microsoft Defender for Cloud, and Azure Regulatory Compliance for NIST 800-53, PCI DSS, and HIPAA/HITRUST, resulting in a 96% reduction in security incidents over the same time interval.Troubleshoot and support Microsoft Azure services, including Microsoft Sentinel (SIEM), Virtual Machines(Linux & Windows), Azure Monitor, and Azure Active Directory, on average, resolving over 80 issues per week.Developed KQL queries to support the Log Analytics workspace and Microsoft Sentinel, which resulted in several new SIEM dashboards and workbooks.Performed unauthenticated and credentialed vulnerability scans, analyzed results, and highlighted differences.Senior Account ExecutiveIQPC, 2018 - 2023Collaborated with cross-functional teams to develop learning and selling environments for Healthcare, Automation, & GBS communities, resulting in $1M+ annual revenue.Market Research AnalystPCS Wireless, 2018 - 2018Drove a detail-oriented sales cycle within an assigned territory, leveraging interpersonal skills to generate leads, develop relationships with stakeholders, and meet financial projections.Wealth Management ConsultantMerrill Lynch, 2017 - 2018Managed online transfers, credit card payments, and limit increases with a focus on security compliance, consistently keeping my customer satisfaction rate above 90%. Cybersecurity SOC NIST Incident Response Risk Management Vulnerability Management KQL CIS Controls HIPAA PCI DSS Cloud Support Azure Active Directory SIEM Asset Management Third-party Management Identity and AccessManagement Security Education andAwareness |