Quantcast

Cyber Security Threat Intelligence Resum...
Resumes | Register

Candidate Information
Name Available: Register for Free
Title Cyber Security Threat Intelligence
Target Location US-GA-Lawrenceville
Email Available with paid plan
Phone Available with paid plan
20,000+ Fresh Resumes Monthly
    View Phone Numbers
    Receive Resume E-mail Alerts
    Post Jobs Free
    Link your Free Jobs Page
    ... and much more

Register on Jobvertise Free

Search 2 million Resumes
Keywords:
City or Zip:
Related Resumes
Click here or scroll down to respond to this candidate
Candidate's Name
Contact: PHONE NUMBER AVAILABLEE-mail: EMAIL AVAILABLELinkedIn: https://LINKEDIN LINK AVAILABLESummary:Having 10+ Years of experience in System Administration, Cyber/Information security, Threat Intelligence and expert in cyber-attacks management.Mechanisms of an attack: analyzing, assessing to identify that an attack is happening Ways different types of attacks that might affect the business action-oriented advice about how to defend against attacks.Many forms of cyber-attacks are common today, including zero-day exploits, malware, phishing, man-in-the-middle attacks, and denial of service attacks.Different ways of attacking computer systems and networks constantly evolve as cybercriminals find new vulnerabilities to exploit.Cyber Threat Intelligence (CTI) I organizations stay informed about with the SOC team, new threats report for plan of action so that they can protect themselves.Cyber security experts organize, analyze, and refine the information they gather about attacks to learn from and use it to protect businesses better.Threat intelligence (or security intelligence) also helps stop or mitigate an attack that is in progress.The more an IT team understands about an attack, the better they will be able to make an informed decision about how to combat it.Cloud Security professional with about 3 years of experience as a Microsoft 365 Systems Administrator responsible for analyzing, maintaining, supporting a portfolio of systems and A services critical to the operations of our organizations security posture.Experience with Managing M365 cloud services, like; Teams, OneDrive, SharePoint, Azure AD, etc.)Extensive understanding of core Microsoft cloud technologies and services, including Azure IaaS, PaaS, Office 365, and core Microsoft technologies, including Defender for Endpoints, Defender for Cloud Apps, Defender for Identity and Active DirectoryDetail-oriented cybersecurity professional dedicated to protecting organizations and the people they serve.Knowledgeable about NIST frameworks and able to implement security controls to ensure compliance with international regulations related to data protection.Experience with identifying threats, risks, and vulnerabilities; security hardening; threat modeling; and incident escalation and response.Proficient in the use of Linux command line, SQL, and Python. Strong communication and problem-solving skills.Recently completed the Google Cyber security Certificate, a rigorous, skills-based program that covers key cybersecurity knowledge and skillsExperience analyzing and reporting on KPIs for numerous digital marketing channels.Also, further knowledge and proficiency in working with vendors and supporting vendor relationships, Google Analytics, Microsoft Excel etc.)Working as a VoIP technician. In-depth knowledge of VoIP systems and IP Protocols, Knowledge of hardware endpoints.Work Experience:Averitt Expresss, Atlanta, GA 01/2022  PresentSystems Security Analyst (Hybrid)Team responsibilities: Ensure compliance with cyber security policies and procedures regarding documentation, labeling, asset tracking, and quality assuranceConduct Network Security Monitoring on services including SIEM, IDS/IPS, Firewall, Web Application Firewalls, and Data Loss Prevention (DLP), PII, SPIIDocument security breaches and assess the damage they caused,Work with the security team to perform tests and uncover network vulnerabilitiesFix detected vulnerabilities to maintain a high-security standard.Stay current on Information Technology (IT) security trends and newsDevelop company-wide best practices for IT securityPerform penetration testing, help colleagues install security software and understand information security management.Provided LAN/WAN design, implementation and configuration using voice and data VLANs, Layer 3 redundancy using HSRP/VRRP and Layer 2 redundancy using Spanning Tree.30+ crew members per shift, ensuring consistent and high-quality service Responsible for ensuring both inbound and outbound customers Tech support Increased customer satisfaction by 15% in 6 months through effective team leadership and problem resolution.Managed daily sales averaging $20,000; achieved a 10% sales growth in Q1 2023 compared to Q4 2022.Reduced order errors by 25% by implementing a new training protocol for new crew members the training and purposes of (MSA).Lenards Technology LLC, Farmington, NY May 2017  Oct 2021Network Security EngineerBalancers, Brocade ADX Load Balancers, Brocade router and switches.Maintained and managed over $15M of IT Infra. equipment inventoryInstall, upgrade, support and troubleshoot for printers, computer hardware.Created a new product line for Dell - Cloud Business Unit, generating high revenue per yearMaintained an uptime environment for customersMonitor critical network elements and applications using various network monitoring tools in a 24/7/365 Security Operations Center (SOC)24/7 Level 3 support skill set with configuration and implementation experience of F5 Load ProvidedConfigure, deploy, maintain, troubleshoot and support computer workstations, laptops, printers, mobile devices, phones and other computers telecommunications equipment.Barracuda Cloud Gen Firewall protect digital asset against intrusion, Malware, Dos attacks and advanced threats remediation.Cisco Identity Services Engine a network administration product that enables the creation and e Perform real-time monitoring and analysis of security events from multiple sources, including SIEM tools enforcement of security and access policies for endpoint devices connected.Citrix Gateway provide single sign-on across all applications whether in a data canter, in a cloud,Also, worked with Cisco Meraki cloud Network platform, configuration wireless network deployment, cut routine network task time from hours to minutes by using our open source APIs Hybrid work force, Safe zing, detecting, preventing attackers or Malware, phishing, spam, ransomware against any malicious attackers.At Sams Club Project, Further, incidence response project we embark on, used DLP tools Azure cloud native configure under SQL sensitive data deployment in the various regions, using DLP such as active and passive fail over, preventing data lost.Knowledge of OMB, FISMA, RMF (NIST 800-37-53-61-71), and FIPS, HIPAA and other federal regulations / requirements associated with Information Security, with experience, python (ability to read, deconstruct, and create basic queries).Excellent verbal and written communication, planning, analysis, and organizing skills Develop KQL queries to support Log Analytics workspace and Microsoft Sentinel, resulting in X number of new SIEM dashboards and workbooks.Ensure compliance with cyber security policies and procedures regarding documentation, labeling, asset tracking, and quality assurance.Conduct Network Security Monitoring on services including SIEM Tools, IDS/IPS, Web Application Firewalls, Data Loss Prevention (DLP), PCI DSS, PII, and SPII, DDoS (Distributed Denial of Service)Also, CISSP 8 domains: such as concentrating on the first four: security risk management, asset security, security architecture and engineering, communication and, networking security.Identity and access management security, Document security breaches and assess the damage they caused.Provided technical support and documentation of Wireless LAN/WAN networks.Work with the security team to perform tests and uncover network vulnerabilities, fix detected vulnerabilities to maintain a high-security standard.Stay current on Information Technology (IT) security trends and news develop company-wide best practices for IT security, perform penetration testing, help colleagues install security patches, software to control risk management level in the organization.At Revogenex Pharma Data Center, Perform core data center operations and deployment tasks on one or more functions (e.g., maintenance, machines, projects, networking, and media security) with day-to-day guidance. (Mainframe)Microsoft Office Suite, Help Desk, Ticketing System, Azure, Network Security Groups, Firewalls, ACLs (Access Control Lists), Virtual Machines, Virtual Networks, Cloud Computing, Active Directory, File Permissions, Windows 10,11, SIEM, tool such as packet sniffing, or Network IP sniffing, spelunk,Monitoring, analyzing as well as hackers online and reduced in-store theft by 20% through vigilant surveillance and proactive interventions at Sams Club.DLP projects: MySQL: data migration using Microsoft365platform Hyper-V, Azure Active Directory Federation: server based on prime all sensitive data migration from on prime to the cloud: with the baseline: Active, passive mode; failover webserver based.Kohl's Department Stores Inc., Savannah, GA Dec 2015  Apr 2017IT Support Specialist/System AdministratorResponsible for basic troubleshooting and resolution of all incoming helpdesk calls regarding problems with CRM platform, Point-of-Sale software, hardware, and all business application system issues for all users throughout the Kohls corporation.PC repair and upgrading, web design and development, LAN/WAN design and implementation, Windows/Linux, administration, network security solutions.Worked with numerous IT department support groups and teams to report issues with and perform basic troubleshooting of user issues and systems such as user account login and password problems.Worked and resolved telecommunication issues, both wide area and local area network problems, and any type of system server related issues for all stores, distributing centers and the corporate office.Easy-to-use ERP: mobile + desktop. Get 24/7 real-time insights on costs, inventory & more.WorldNet Site Technology / AT&T, Vienna, VA Jan 2013  Nov 2015Systems Support AnalystProviding initial reports and updates regarding any unresolved issuesResponsible for ensuring customers can connect to the Internet service at reasonable connection speeds using dial-up modemsAssisted customers in accessing web pages and ensuring their email accounts were accessible and functioningAdditional duties, for setting up new Internet service accounts, log in and password allocation and configuration, include: assisting, educating, and mentoring tier 1 technical agents in advanced connectivity and application support for maintaining customer Computers functionalityResponsible for assisting customers with tier 2 second-level support issues; including Microsoft operating system functionality, handheld email asset classification configuration, local, modem, network, and wireless connectivity for desktop and laptop software applications as well as Zen desk application.Education:Associate Degree in Application Programming from Institute of Management Information System, Accra, Ghana, 1998Bachelor of Science in Information Tech /Cyber security, Colombia Southern University, Orange Beach, Alabama, Expected- November 2024Certification:Google Cybersecurity professional certification from Coursera Google Inc, in 2023COMPTIA CYSA+ in 2021COMPTIA CYSP, in 2021CompTIA Security +, in 2020AWS Solution Architect, from UDMYCOMPTIA A+, in 2020CCNA from Cisco, in 2022Microsoft 365 Certified Security Admin. From Microsoft, in 2022AWS Cloud Essential Practitioner from AWS online course, in 2022

Respond to this candidate
Your Message
Please type the code shown in the image:

Note: Responding to this resume will create an account on our partner site postjobfree.com
Register for Free on Jobvertise