Quantcast

Incident Response Network Security Resum...
Resumes | Register

Candidate Information
Name Available: Register for Free
Title Incident Response Network Security
Target Location US-MD-Upper Marlboro
Email Available with paid plan
Phone Available with paid plan
20,000+ Fresh Resumes Monthly
    View Phone Numbers
    Receive Resume E-mail Alerts
    Post Jobs Free
    Link your Free Jobs Page
    ... and much more

Register on Jobvertise Free

Search 2 million Resumes
Keywords:
City or Zip:
Related Resumes

Incident Response Computer Network Dumfries, VA

Incident Response Network Security Lanham, MD

Soc Analyst Incident Response Beltsville, MD

Incident Response Soc Analyst Fredericksburg, VA

Project Management Incident Response Upper Marlboro, MD

Incident Response Loss Prevention Owings Mills, MD

Cyber Security Incident Response Rockville, MD

Click here or scroll down to respond to this candidate
Candidate's Name
Bowie, MD. Street Address PHONE NUMBER AVAILABLE EMAIL AVAILABLEBACKGROUND SUMMARYWell-accomplished Cybersecurity Expert with a strong background in threat assessment, incident response, and vulnerability management across diverse industries. Proficient in cryptographic protocols, network security, and cybersecurity policy development, ensuring compliance with GDPR, HIPAA, and industry standards. Skilled at deploying PKI, IDS/IPS, and advanced security tools effectively to mitigate cyber threats. Known for optimizing security operations and contributing to a culture of cybersecurity excellence. Ready to leverage extensive skills and experience to protect organizational assets and maintain robust cybersecurity defenses. AREA OF EXPERTISE Threat Assessments Incident Response Vulnerability Management Cryptography & Encryption NIST ISO Framework FISMA Commercial off-the-shelf Strategic Decision-Making Risk Management Malware Analysis Network Traffic Analysis FedRAMP SOC 2 Database Management Identity & Access Management(IAM) Penetration Testing Ethical Hacking Information Security Operations Management Governance, risk, andcompliance (GRC)CORE SKILLS Public Key Infrastructure (PKI): Expertise in designing, implementing, and managing PKI systems to secure digital communication and authenticate users. Intrusion Detection Systems (Snort, Suricata): Skilled in configuring and managing IDS/IPS tools like Snort and Suricata to detect and respond to unauthorized network access attempts. Data Analysis (Tableau, Power BI): Capability to analyze cybersecurity data using Tableau and Power BI to identify trends, anomalies, and threats for informed decision-making. IoT Automation and Energy Cybersecurity: Understanding and expertise in securing Internet of Things (IoT) devices and automation systems, particularly in energy sectors. Network Security (Cisco ASA, Palo Alto Networks): Proficient in designing, implementing, and managing secure network infrastructures using Cisco ASA and Palo Alto Networks solutions. Security Tools (Nessus, Qualys, Rapid7, Symantec Endpoint Protection, McAfee, Splunk): Skilled in utilizing various security tools for comprehensive cybersecurity defense, monitoring, and threat detection. Cloud Security (AWS, Azure, GCP): Expertise in securing cloud environments and services provided by Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). Regulatory Compliance (GDPR, HIPAA, PCI-DSS): In-depth knowledge and experience in ensuring compliance with cybersecurity regulations and standards such as GDPR, HIPAA, and PCI-DSS. RELEVANT EXPERIENCESTowson University Aug 2023 - PresentGraduate Research  Cybersecurity Specialist Pioneering Vulnerability Analysis Research: Led groundbreaking research into security vulnerability analysis within COTS software supply chains using Nessus and Qualys, advancing industry knowledge. IoT Security Integration Expertise: Addressed IoT automation system security challenges, focusing on integrating PKI solutions to fortify cybersecurity measures. Contributions to Cybersecurity Advancements: Contributed to significant advancements in cybersecurity and data analytics through authoring impactful publications and research papers. Published Research Impact: Disseminated research findings that influenced cybersecurity strategies, emphasizing practical applications for industry implementation. Innovative Cybersecurity Strategies: Pioneered innovative approaches in cybersecurity research, establishing new standards for securing emerging technologies and systems.Central Washington University Aug 2021 - Jul 2022 Cybersecurity & DE-Host Multimedia IT Specialist Robust Cybersecurity Implementation: Implemented stringent cybersecurity measures using Rapid7 risk assessments and NIST frameworks, safeguarding digital education platforms. Advanced Data Analytics for Threat Prevention: Leveraged Tableau and Power BI for proactive data analytics, identifying and mitigating cybersecurity threats to significantly bolster security posture. Enhanced Integration Security: Achieved secure integration of Cisco Webex with Canvas LMS, optimizing data security protocols and operational efficiency. Comprehensive Risk Management: Executed thorough risk assessments, remediating vulnerabilities and strengthening overall security measures. Operational Efficiency and Compliance: Streamlined security operations, enhancing efficiency while ensuring adherence to stringent data protection standards.Gordon-Conwell Theological Seminary Sep 2015 - May 2020 Library and Security Analyst Comprehensive Security Measures: Implemented security measures using Cisco ASA and Symantec Endpoint Protection, enhancing network security. Rapid Incident Response: Orchestrated rapid incident response with McAfee and Splunk, minimizing security breach impacts. Security Policy Development: Developed security policies, strengthening organizational security and improving compliance. Security Awareness Training: Conducted security training for staff, increasing cybersecurity awareness and proactive measures. MTN Telecom Jan 2011 - Jun 2015Information Technology Project Analyst Network Security Enhancement: Engineered secure network strategies for mobile communication systems using Palo Alto Networks and Snort, reducing security breaches significantly. Advanced Security Solutions Deployment: Deployed advanced security solutions in collaboration with cross-functional teams, optimizing network performance and enhancing data protection with Hadoop integration. Technology Innovation Implementation: Implemented innovative technologies across multiple departments, ensuring top security and data integrity standards were maintained, resulting in noticeable increases in system efficiency. Cross-Functional Collaboration: Collaborated with diverse teams to design and execute secure network strategies, improving communication security and achieving a marked reduction in network vulnerabilities. EDUCATION PhD in Information Technology (In Progress) - Towson University MBA in Innovation Management - Apsley Business School, London MS in Information Technology - Central Washington University Postgraduate studies in Public Policy Economics - Sad Business School, University of Oxford Bachelors degree in Public Administration - Ekiti State University CERTIFICATIONS Cisco Certified Network Professional (CCNP- Specialist - Security Core) Certified Information Security Manager (CISM), ISACA Project Management Professional (PMP), PMI Lean Six Sigma Master Black Belt (SSGI)PUBLICATIONShttps://scholar.google.com/citations?hl=en&user=I_CeV7AAAAAJ

Respond to this candidate
Your Message
Please type the code shown in the image:

Note: Responding to this resume will create an account on our partner site postjobfree.com
Register for Free on Jobvertise