| 20,000+ Fresh Resumes Monthly | |
|
|
| | Click here or scroll down to respond to this candidateCandidate's Name
LinkedIn EMAIL AVAILABLE PHONE NUMBER AVAILABLEEducationCertificate CompTIA CySA+ expected Summer (Street Address )Certificate, CompTIA Security+ January Street Address
Certificate, Google Cloud Fundamentals: Core Infrastructure September Street Address University of Maryland Global CampusB.A. Cybersecurity Policies and Management May 2022 Certificate in Basic Fundamentals and Concepts of AWS June 2021 Ner Israel Rabbinical CollegeBachelors in Talmudic Law June 2018Familiar with & Technical SkillsVulnerability management, FedRAMP ATO process, Next-Gen Firewalls, Wireshark, Virtualization, IT Ethics, NIST Cyber Security Framework, NIST 800-53, NIST Risk Management Framework (RMF), GCP, Prisma, IAM, OSI Model, Network Topologies, Network Security, System Security Plan (SSP), POA&M management, incident responseProfessional ExperienceTata Consultancy Services (TCS) / KeyBank, Information Security Specialist July 2022- Present Scan and detect security risks and vulnerabilities Prioritize and advise appropriate personnel on how to mitigate or reduce the risks Reduce and managed access controls to the principle of least privilege Help transition KeyBank on-site services to Google Cloud Platform (GCP) Automate the process through Infrastructure as Code (IaC) via Terraform Computer Cure, InternSetup computers and network devices to clients desires and preferencesInstalled secure anti-virus and anti-malware softwareInstituted secure and protective firewall rules to protect the end user Finkelstein, Shurin Landman CPA, Tax PreparerAnalyzed and ensured that all customer financial information was accurateCommunicated with clients and employer for data collection Law Office of Samuel Sperling, Law Office of Frank B. Cahn - Legal AssistantResearched pertinent laws and regulations related to my assigned casesDocumented the background, timelines, and proposed resolution for incidents under reviewCompiled and collected all required evidence, documents, and bills Academic Accomplishments Network Security Proposal developed a security proposal for a network including policies, access controls, vulnerability assessments, backups, continuity planning, physical defenses, network devices, and encryption. Studied the incorporation of the CIA triad within an organizations security program through the use of physical and logical security controls. Assessed threats and vulnerabilities to determine levels of risk. Produced a Risk Assessment on an organization in depth to evaluate the quantitative and qualitative values of each risk. Developed recommendations to mitigate and lessen the risks to the organization. Researched and wrote a cybersecurity strategy and implementation plan to help ensure a company is properly protected and secure from threats. The plan included controls, policies technologies, people, process, and the cost of the plan. Authored a paper on how companies should implement emerging technology of Artificial Intelligence (AI) & Machine Learning (ML) to help detect and prevent attacks and threats. |