Quantcast

Information Security Cybersecurity Engin...
Resumes | Register

Candidate Information
Name Available: Register for Free
Title Information Security Cybersecurity Engineer
Target Location US-MD-Bowie
Email Available with paid plan
Phone Available with paid plan
20,000+ Fresh Resumes Monthly
    View Phone Numbers
    Receive Resume E-mail Alerts
    Post Jobs Free
    Link your Free Jobs Page
    ... and much more

Register on Jobvertise Free

Search 2 million Resumes
Keywords:
City or Zip:
Related Resumes
Click here or scroll down to respond to this candidate
Candidate's Name
Street Address
Email: EMAIL AVAILABLE Phone: PHONE NUMBER AVAILABLE OBJECTIVESeeking a Information Security/Security Operations Center Analyst position PROFESSIONAL PROFILEExperienced Cybersecurity Engineer with a 5-year track record, proficient in managing vulnerabilities, implementing Identity and Access Management solutions, overseeing Authentication Services, conducting threat hunting, and proficient in firewall management, IDS/IPS configuration, and data loss prevention.Possess a robust comprehension of the OSI layer model and specialized expertise in identifying application-level vulnerabilities.Cybersecurity, Incident Management, and compliance support of Enterprise InfrastructureSecurity policy interpretation and implementation requirements to ensure confidentiality, integrity, information, systems, and network availability.Highly motivated, organized, and results and detail-oriented with excellent interpersonal, communication, and presentation skills.Possessed a unique combination of technical abilities, communication skills, and the ability to multitask, allowing me to collaborate with end-users or businesses.TECHNICAL SKILLSSecurity Technologies: Nessus Security Center, Nmap, Wireshark, IDS/IPS; Log Management, Anti-Virus Tools; (Norton, Symantec), Security Information and Event Management (SIEM)Application: MS Office (Word, Excel, Outlook, PowerPoint, Access); Wireshark, NMAP, Nessus, ArcSight, Google Docs, Active Directory, Identity and Access Management, CrowdStrike Endpoint Detection and Response (EDR)Operating Systems: Windows, Unix-Based Systems (Linux).Software: MS Office (Word, Excel, Outlook, Access, PowerPoint)Framework: Mitre Att&cK, Cyber Kill Chain, ISO 27001/02, Cybersecurity Framework EMPLOYMENT HISTORYCybersecurity Engineer Jan. 2022  PresentProvidence Motors LLC, Bladensburg, MDResponsibilities:Performs vulnerability scanning with Nessus to detect potential risks on single or multiple assets across the enterprise network, assessing missing patches, weak passwords, unauthorized changes, and misconfigured privileges.Develops, coordinates, implements, and maintains standards and procedures to protect information systems, data security, and integrity.Leverage Nessus to identify systems compliance risk levels, identify non-compliance issues and security vulnerabilities, and manage remediation activities.Daily review of logs and alerts from IDS/IPS devices and DLP system.Analyzed Symantec DLP reports, delivering key metrics to the manager for informed decision- making.Manage Symantec DLP to monitor and safeguard network communications, ensuring user data security within and outside the corporate network.Support the Threat Management Team in implementing Proofpoint Email security solutions, contributing to the quarantine of outbound emails violating DLP policies.Conduct thorough checks on the configuration and health of Data at Rest (DAR) and Data in Motion (DIM) Servers.Execute system vulnerability scans on servers and infrastructure devices using Nessus, maintaining a vigilant approach to security monitoring.Manages the remediation of security issues and findings across the enterprise.Creates, evaluates, and interprets internal and external information security policies and standards and participates in decision-making.Supports the development and delivery of Information security education and awareness.Coordinates with vendors and third parties to manage information security risks.Observe and analyze traffic to learn valuable lessons from known malicious actors and determine countermeasures against such threats.Provides daily status updates on existing cybersecurity incidents to follow up with clients/customers to ensure satisfactory resolution.Develops risk assessment reports, identifying threats and vulnerabilities in systems. Conducts security control assessments to assess the adequacy of implemented management and operational, privacy, and technical security controls.Performs system risk management following the NIST risk management framework.Manages enterprise system security plan, Risk assessment, and Privacy policy development.Perform incident response to investigate and resolve computer security incidents.Develop follow-up action plans to resolve reportable issues and communicate with other Analysts to address security threats and incidents.Prioritize and differentiate between potential intrusion attempts and false positive alerts.Assisted with enhancing the incident response processes and procedures to improve incident response times, analysis of the incident, and overall SOC functions.Provides Incident Response (IR) support when analysis confirms an actionable incident.Manages information security risk assessment and research and recommends remediation plans and strategies.Provides strategic consulting on security risk assessment, analysis, and compliance and recommends remediation plans and strategies.Monitor and protect business and sensitive data in motion, in use, and at rest.Send alerts and conditionally block data transfer when detected by Enterprise DLP-defined policy violations (events).Incident detection and response: monitor and investigate data security incidents, such as unauthorized access attempts, breaches, or insider threats. Analyze security logs, alerts, and system reports to identify abnormal behavior and respond promptly to mitigate potential data loss or leakage.Risk assessment: assess the organization's data landscape to identify vulnerabilities and potential. Threats and risks associated with data loss.Evaluate existing security measures and conduct gap analysis to determine areas that need improvement.Apply risk-based decision-making through a review of vulnerability remediation timeframe exceptions.Support expansion of vulnerability detection sources, including adding sources into the remediation workflow and reportingAssist in metric review to identify interesting trends and areas of potential focus to improve overall vulnerability remediation targets.Cybersecurity Specialist Jan. 2019  Dec. 2021Alpha Technology Group, MDResponsibilitiesConduct Network Security Monitoring on services including firewall, Web Application Firewall, Data Loss Prevention, and IDS/IPS.Partnered with business departments to identify policy, procedure, and process gaps.Managed and analyzed business violations of security policy and standards.Prepared risk analysis documentation, reports, and recommendationsCoordinated with stakeholders and system owners to ensure compliance with security processes and controls.Conducted follow-up meetings to assist information system owners in remediating outstanding security findings.Developed risk assessment reports by identifying threats and vulnerabilities to the system.Provided detailed reports on security findings and worked with development teams to remediate.Managed vulnerability remediation and compliance requirements of applications to meet the regulations.Conducted comprehensive system vulnerability scans on servers and devices using Ope Nessus Professional, addressing open ports, sensitive data exposure, weak credentials, and inadequate security controls.Review and validate false positive reports from Nessus through the Common Vulnerability Scoring System (CVSS) before escalating identified vulnerabilities for remediation.Utilized Nmap for comprehensive security auditing, identifying operating system and application versions on network hosts.EDUCATION AND BACKGROUNDCertificate Program: In Seed Transformation ` Nov. 2022 Stanford Graduate School of Business, Stanford, CADoctor of Veterinary: In Medicine ` May 1989University of Ibadan, NigeriaMEMBERSHIP & CERTIFICATIONSCompTIA Security+ May 2024

Respond to this candidate
Your Message
Please type the code shown in the image:

Note: Responding to this resume will create an account on our partner site postjobfree.com
Register for Free on Jobvertise