Quantcast

Information Technology Cybersecurity Con...
Resumes | Register

Candidate Information
Name Available: Register for Free
Title Information Technology Cybersecurity Consultant
Target Location US-NJ-Sayreville
20,000+ Fresh Resumes Monthly
    View Phone Numbers
    Receive Resume E-mail Alerts
    Post Jobs Free
    Link your Free Jobs Page
    ... and much more

Register on Jobvertise Free

Search 2 million Resumes
Keywords:
City or Zip:
Related Resumes

Network Engineer Information Technology Jersey City, NJ

Information Technology Applied Science Brooklyn, NY

Information Technology Issue Resolution Brooklyn, NY

Information Technology Computer Science Jersey City, NJ

Cyber Security Information Technology Philadelphia, PA

Information Technology Security Manhattan, NY

Technical Support Information Technology Englewood, NJ

Click here or scroll down to respond to this candidate
Candidate's Name
 Cybersecurity Consultant
Candidate's Name  is looking to utilize his skills and knowledge acquired through school and work in a challenging Information Technology environment. His experience as a developer and tester serves as a strong background for his Cybersecurity experience which he is developing further in Cognizant. He plans to continue developing his skills so that he may be the strongest asset for his future employer. His experience and skills make him a great candidate for your Cybersecurity Consultant position.SKILLS/TECHNOLOGIES JAVA, Spring Boot, RESTful, HTML5, SQL, Angular 7, GITHUB, Spring MVC, CSS3, JavaScript, MongoDB, BootStrap, Angular, SoapUI, PostMan, Swagger, Splunk, Qradar, CyberArk, Symantic, CrowdStrike, QualysEXPERIENCE AND PROJECTSCYBERSECURITY IVM/ITM, COGNIZANTNOVEMBER 2021 TO PRESENTLearned NIST Cybersecurity FrameworkRespectable knowledge in Network FundamentalsHands on experience in identifying phishing emailsUsed individually assigned Ubuntu Virtual Machines to:Practice Linux skillsDemonstrate network fundamentalsCapture and study events from log filesHost Apache2 Web ServerHost Splunk Universal Forwarder with live connection to Splunk ServerSplunk Core Fundamentals through hands on practice and Splunk training Topics:oSplunk ArchitectureoSearchesoReportingoVisualizationsoDashboardsoSplunk REST APIoStrong understanding of the differences between SIEM and UEBAoStrong understanding of File Integrity Monitoring via SplunkDeveloped Splunk Correlation to identify and address emerging security threats with continuous monitoring, alerting, and analyticAnalyzed security based events, risks and reporting instances.Monitored Database connection healthWorked on installing Universal Forwarder and heavy forwarders to bring any kind of data fields.Qualys Vulnerability Management Certified Specialist Training Topics Covered:oVulnerability Management Detection & ResponseoVulnerability ManagementoScanning Strategies & Best PracticesoReporting Strategies & Best PracticesoQualys API FundamentalsoPerform Vulnerability scanning and identifying the root cause of vulnerabilitiesoProvided remediation on accounts deemed to be a vulnerability riskStrong understanding of Crowdstrike Endpoint Detection FundamentalsWeb & Programming including:oHTML5, CSS, AJAX, JavaScript, Java Basics, JSONSailpoint Test AnalystStrong understanding of internal technicalities SailpointExperienced in End-to-End integration of IAM using SailpointReady to work on IAM products, To learn and Deliver the bestCyberArk Privileged Access ManagementGreat Understanding of CyberArk infrastructureExperience in IAM Tools for deploymentHands on experience in using the Password vault Web Access, Enterprise Password Vault, Central Policy ManagerExperience in PAM operational tasks  Defining access control, user entitlement, credentials, user Policy managementObserve Security Solutions: SIEMs, Firewall appliances, IDS, DLP systems, analysis tools.Technical analysis of Network activityMonitor and evaluate network FlowPROJECTUse the student Ubuntu VM Web Server to create a dynamically generated web page from the Splunk REST API, which automates display of cybersecurity related data.Cyber Threat DefenseoProactively monitoring, investigating, and mitigation of security incidentsoAnalyze security event data from network via IBM QradaroConduct log analysis using IBM QradaroUse tools such as Anomoli to do further investigation on the source IP addressoEnsure the integrity and protection of networks, systems, and applications by technical enforcement of organizational policiesSOC Analyst(Cognizant), Freddie MacOctober 2023 TO May 2024Worked in a 24x7 Security Operations CenterContinuous monitoring and interpretation of threats using IDS and SIEMConducted Proactive Monitoring, investigation, and mitigation of security incidentsCollaborated with Security engineers and SOC managers to provide Situational Awareness via detection, containment, and remediation of threats to networks, web apps, and systemsIdentify suspicious/malicious activities or codesPerformed static malware analysis on isolated virtual servers.Searched Firewall, email, web or DNS logs to identify and mitigate intrusion attemptsConducted Log analysis on Splunk.Hands on experience with Symantec for DLP related scenariosConduct investigation on domains and Ips using open-source tools such as URL Scan and Virus TotalUsed AWS, Crowdstrike, Symantec, and Proofpoint to verify/manage security assessments and pinpoint FlawsRecognize Potential, successful, and unsuccessful intrusion attempts and compromises thorough reviews and analysis of relevant event detail and summary information. Examples of attacks I have recognized:oPhishingoPort ScanningoWeb app attacksoDDOSConducted QA analysis on other SOC engineers analysis to ensure they were meeting the Freddie Mac standardoScored based system on how well written the analysis was and if enough evidence was included to support their analysisoIf they failed the analyst had to go back and correct their mistakeSOC Analyst(Cognizant), Discover Financial ServicesNOVEMBER 2022 TO APRIL 2023Worked in a 24x7 Security Operations CenterContinuous monitoring and interpretation of threats using IDS and SIEMIdentify suspicious/malicious activities or codesInvestigate Phishing email using Demisto ToolConduct investigation on domains and Ips using open-source tools such as URL Scan and Virus TotaloAs Well as used LastLine for Full URL Link and document analysisoConduct analysis on potential Phishing emails by creating a ticket in ResiliantConduct Log analysis using SIEM tools such as SplunkConducted PCAP analysis using WireSharkSearch firewall, email, web or DNS logs to identify and mitigate intrusion attempts.Analyze network flow data for anomalies and detect malicious network activitiesEnsure searches for Indicators of Compromise are completed when reported, through EDR toolsHands on experience with Symantec for DLP related scenariosRecognize Potential, successful, and unsuccessful intrusion attempts and compromises thorough reviews and analysis of relevant event detail and summary information. Examples of attacks I have recognized:oPhishingoPort ScanningoWeb app attacksoDDOSFULL STACK DEVELOPER, COLLABERAAUGUST 2019 TO DECEMBER 2020Built Several Java projects ranging from simple programs to Spring Boot applicationsAssisted in others to create a Database in MySQLCollaborated with others to create a website using HTML5 and other technologies to make improvementsQUALITY ASSURANCE/TESTER, WELLS FARGO (THROUGH COLLABERA_JANUARTY 2020 TO AUGUST 2020Created several Test Scripts to test the software upgradesUtilized Software such as ALM and Jira to test the software and find defectsExecuted Test scripts against software to ensure it met the requirementsEDUCATIONBACHELOR OF SCIENCE  Computer Network and Security  Wilmington University, 2019

Respond to this candidate
Your Message
Please type the code shown in the image:

Note: Responding to this resume will create an account on our partner site postjobfree.com
Register for Free on Jobvertise