| 20,000+ Fresh Resumes Monthly | |
|
|
| | Click here or scroll down to respond to this candidateCandidate's Name
Bowie, MD. Street Address PHONE NUMBER AVAILABLE EMAIL AVAILABLEBACKGROUND SUMMARYWell-accomplished Cybersecurity Expert with a strong background in threat assessment, incident response, and vulnerability management across diverse industries. Proficient in cryptographic protocols, network security, and cybersecurity policy development, ensuring compliance with GDPR, HIPAA, and industry standards. Skilled at deploying PKI, IDS/IPS, and advanced security tools effectively to mitigate cyber threats. Known for optimizing security operations and contributing to a culture of cybersecurity excellence. Ready to leverage extensive skills and experience to protect organizational assets and maintain robust cybersecurity defenses. AREA OF EXPERTISE Threat Assessments Incident Response Vulnerability Management Cryptography & Encryption NIST ISO Framework FISMA Commercial off-the-shelf Strategic Decision-Making Risk Management Malware Analysis Network Traffic Analysis FedRAMP SOC 2 Database Management Identity & Access Management(IAM) Penetration Testing Ethical Hacking Information Security Operations Management Governance, risk, andcompliance (GRC)CORE SKILLS Public Key Infrastructure (PKI): Expertise in designing, implementing, and managing PKI systems to secure digital communication and authenticate users. Intrusion Detection Systems (Snort, Suricata): Skilled in configuring and managing IDS/IPS tools like Snort and Suricata to detect and respond to unauthorized network access attempts. Data Analysis (Tableau, Power BI): Capability to analyze cybersecurity data using Tableau and Power BI to identify trends, anomalies, and threats for informed decision-making. IoT Automation and Energy Cybersecurity: Understanding and expertise in securing Internet of Things (IoT) devices and automation systems, particularly in energy sectors. Network Security (Cisco ASA, Palo Alto Networks): Proficient in designing, implementing, and managing secure network infrastructures using Cisco ASA and Palo Alto Networks solutions. Security Tools (Nessus, Qualys, Rapid7, Symantec Endpoint Protection, McAfee, Splunk): Skilled in utilizing various security tools for comprehensive cybersecurity defense, monitoring, and threat detection. Cloud Security (AWS, Azure, GCP): Expertise in securing cloud environments and services provided by Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). Regulatory Compliance (GDPR, HIPAA, PCI-DSS): In-depth knowledge and experience in ensuring compliance with cybersecurity regulations and standards such as GDPR, HIPAA, and PCI-DSS. RELEVANT EXPERIENCESTowson University Aug 2023 - PresentGraduate Research Cybersecurity Specialist Pioneering Vulnerability Analysis Research: Led groundbreaking research into security vulnerability analysis within COTS software supply chains using Nessus and Qualys, advancing industry knowledge. IoT Security Integration Expertise: Addressed IoT automation system security challenges, focusing on integrating PKI solutions to fortify cybersecurity measures. Contributions to Cybersecurity Advancements: Contributed to significant advancements in cybersecurity and data analytics through authoring impactful publications and research papers. Published Research Impact: Disseminated research findings that influenced cybersecurity strategies, emphasizing practical applications for industry implementation. Innovative Cybersecurity Strategies: Pioneered innovative approaches in cybersecurity research, establishing new standards for securing emerging technologies and systems.Central Washington University Aug 2021 - Jul 2022 Cybersecurity & DE-Host Multimedia IT Specialist Robust Cybersecurity Implementation: Implemented stringent cybersecurity measures using Rapid7 risk assessments and NIST frameworks, safeguarding digital education platforms. Advanced Data Analytics for Threat Prevention: Leveraged Tableau and Power BI for proactive data analytics, identifying and mitigating cybersecurity threats to significantly bolster security posture. Enhanced Integration Security: Achieved secure integration of Cisco Webex with Canvas LMS, optimizing data security protocols and operational efficiency. Comprehensive Risk Management: Executed thorough risk assessments, remediating vulnerabilities and strengthening overall security measures. Operational Efficiency and Compliance: Streamlined security operations, enhancing efficiency while ensuring adherence to stringent data protection standards.Gordon-Conwell Theological Seminary Sep 2015 - May 2020 Library and Security Analyst Comprehensive Security Measures: Implemented security measures using Cisco ASA and Symantec Endpoint Protection, enhancing network security. Rapid Incident Response: Orchestrated rapid incident response with McAfee and Splunk, minimizing security breach impacts. Security Policy Development: Developed security policies, strengthening organizational security and improving compliance. Security Awareness Training: Conducted security training for staff, increasing cybersecurity awareness and proactive measures. MTN Telecom Jan 2011 - Jun 2015Information Technology Project Analyst Network Security Enhancement: Engineered secure network strategies for mobile communication systems using Palo Alto Networks and Snort, reducing security breaches significantly. Advanced Security Solutions Deployment: Deployed advanced security solutions in collaboration with cross-functional teams, optimizing network performance and enhancing data protection with Hadoop integration. Technology Innovation Implementation: Implemented innovative technologies across multiple departments, ensuring top security and data integrity standards were maintained, resulting in noticeable increases in system efficiency. Cross-Functional Collaboration: Collaborated with diverse teams to design and execute secure network strategies, improving communication security and achieving a marked reduction in network vulnerabilities. EDUCATION PhD in Information Technology (In Progress) - Towson University MBA in Innovation Management - Apsley Business School, London MS in Information Technology - Central Washington University Postgraduate studies in Public Policy Economics - Sad Business School, University of Oxford Bachelors degree in Public Administration - Ekiti State University CERTIFICATIONS Cisco Certified Network Professional (CCNP- Specialist - Security Core) Certified Information Security Manager (CISM), ISACA Project Management Professional (PMP), PMI Lean Six Sigma Master Black Belt (SSGI)PUBLICATIONShttps://scholar.google.com/citations?hl=en&user=I_CeV7AAAAAJ |