Quantcast

Grand Rapids Help Desk Resume Grand rapi...
Resumes | Register

Candidate Information
Name Available: Register for Free
Title Grand Rapids Help Desk
Target Location US-MI-Grand Rapids
Email Available with paid plan
20,000+ Fresh Resumes Monthly
    View Phone Numbers
    Receive Resume E-mail Alerts
    Post Jobs Free
    Link your Free Jobs Page
    ... and much more

Register on Jobvertise Free

Search 2 million Resumes
Keywords:
City or Zip:
Related Resumes

Customer Service Grand Rapids Portland, MI

Manufacturing Engineer Grand Rapids Spring Lake, MI

Grand Rapids Warehouse Worker Grand Rapids, MI

Grand Rapids Lead Operator Grand Rapids, MI

Customer Service Grand Rapids Grand Rapids, MI

Grand Rapids Forklift Operator/ delivery driver. Grand Rapids, MI

Grand Rapids Machine Operator Grand Rapids, MI

Click here or scroll down to respond to this candidate
Candidate's Name
Grand Rapids, MIEMAIL AVAILABLE (616) 516-9949 LinkedIn: https://LINKEDIN LINK AVAILABLE SUMMARYRecent Cybersecurity graduate from Davenport University with internship experience, seeking IT Help Desk role. Solid foundation in cyber defense principles, honed through firsthand experience at Applied Innovation. Proven troubleshooting skills and excellent communication ensure efficient IT issue resolution for users. EDUCATIONDavenport University Grand Rapids, MI 2021-2024Bachelor of Science in Cyber Defense GPA: 3.72 Presidents List (4 semesters) PERSONAL INFORMATION U.S. Citizen Married and Proud father of three children Fluent in Four languages: Zami, Burmese, Malaysian, and English TWORK EXPERIENCEApplied Innovation (Internship) Grand Rapids, MISeptember  December 2023 Demonstrated exceptional critical thinking skills when diagnosing and resolving printer malfunctions. Delivered technical information in a clear, understandable manner to clients. Respond to client inquiries and resolve issues with a professional and courteous attitude. Resolved printer-server connectivity issues by troubleshooting DHCP conflicts, confirming DNS resolutions, and adjusting subnet configuration. Utilized ticketing tools, with experience in ticket resolution and closure. TECHNICAL SKILLSCloud & Container Security: Expertise in securing cloud environments (AWS,Azure) and understanding cloud-specific securitythreats. Familiarity with container technologies (Docker, Kubernetes) and their security implications.Cybersecurity: Knowledge of cybersecurity frameworks (MITREATT&CK, NIST Cybersecurity Framework). Ability to analyze malware samples and identify their behavior. Proficiency in digital forensics techniques forevidence collection and analysis.Security Automation & Analysis: Experience with SIEM tools for log analysis andsecurity incident detection. Understanding of SOAR tools for automating security workflows.Network Security: Network protocols (TCP/IP, BGP, OSPF, IPsec, VPN) Network traffic analysis for threat detection. Penetration testing for vulnerability identification. Incident response (detection, containment,eradication, recovery) Threat intelligence gathering, analysis, and decision making. Firewall configuration and management. IDS/IPS deployment and analysis Wireless network security (WPA2, WPA3)Network Operations: Experience in designing, configuring, andtroubleshooting complex network infrastructure. Network automation skills utilizing tools and scripts for improved efficiency and scalability. Familiarity with SDN principles and tools for dynamic network management.Additional Skills: Strong analytical and problem-solving skills. Excellent written and verbal communication skills. Ability to work effectively in a team environment. Ability to learn new technologies and adapt to changing security threats. IT PROJECT EXPERINCESNetwork Security: Secure Wi-Fi Network Design and Implementation Designed and implemented secure Wi-Fi networks for large estates, utilizing Cat6+ Ethernet cabling for reliable data transfer. Deployed dual-band access points with WPA3 encryption for enhanced wireless security and faster connectivity. Implemented VLAN segmentation to separate network segments and improve overall security posture. Security Operations Center (SOC): Establishing a Comprehensive Security Monitoring System Established a Security Operations Center (SOC) environment utilizing SIEM (Splunk) for comprehensive network traffic analysis and identification of potential threats. Integrated EDR (CrowdStrike) for proactive endpoint monitoring and detection of malicious activity on connected devices. Virtualized Network Security: Managing and Testing Virtualized Network Environments Managed virtualized firewalls within VirtualBox to control network traffic flow and enforce security policies. Implemented OpenVPN for secure remote access to virtual networks, ensuring authorized access. Designed and configured virtual network topologies using VMware and VirtualBox for testing servers and security protocols in a controlled environment.Penetration Testing: Proactive Security Assessment through Penetration Testing Conducted penetration testing of Windows, web applications, and Linux systems leveraging tools like Metasploit, Nmap, Burp Suite, and OWASP ZAP to identify and remediate security vulnerabilities. Utilized various tools to simulate real-world attacks and proactively address potential security weaknesses. Cloud Security: Securing and Optimizing AWS Environment Deployed AWS Security Hub and secured the AWS Free Tier environment, enabling automated vulnerability detection and remediation for enhanced cloud security.Database Management: Optimized Database Design for Scalability and Efficiency Developed an optimized database schema for a web-based shopping list application using MySQL. Employed normalization and indexing techniques for efficient data retrieval and scalability, ensuring smooth application performance.Nursing Home Network Security: Secure Network Design and Implementation for a Healthcare Facility Designed and deployed a secure network for a hypothetical nursing home utilizing Windows Server 2019. Implemented Wazuh monitoring for real-time intrusion detection and proactive identification of security threats. Integrated pfSense for robust firewall protection and granular access control, safeguarding sensitive patient data. ORGANIZATIONAL INVOLVEMENT The National Society of Leadership and Success (NSLS) Upsilon Pi Epsilon (International Honor Society for the Computing and Information disciplines) member Candidate's Name
EMAIL AVAILABLE (616) 516-9949 LinkedIn: https://LINKEDIN LINK AVAILABLE

Respond to this candidate
Your Message
Please type the code shown in the image:

Note: Responding to this resume will create an account on our partner site postjobfree.com
Register for Free on Jobvertise