Quantcast

Cybersecurity Resume Newark, NJ
Resumes | Register

Candidate Information
Name Available: Register for Free
Title Cybersecurity
Target Location US-NJ-Newark
Email Available with paid plan
Phone Available with paid plan
20,000+ Fresh Resumes Monthly
    View Phone Numbers
    Receive Resume E-mail Alerts
    Post Jobs Free
    Link your Free Jobs Page
    ... and much more

Register on Jobvertise Free

Search 2 million Resumes
Keywords:
City or Zip:
Related Resumes

Cybersecurity Analyst Patient Care Secaucus, NJ

IT, Cybersecurity, Risk, Governance, compliance, SOC Weehawken, NJ

Aspiring cybersecurity professional Huntington, NY

Governance Risk Compliance CyberSecurity-DevOps-DevSecOps-IT Aud Manhattan, NY

Information Technology Cybersecurity Consultant Sayreville, NJ

Customer Service Cybersecurity Analyst Brooklyn, NY

Senior Cybersecurity Analyst Franklin Park, NJ

Click here or scroll down to respond to this candidate
Candidate's Name
Richmond, VA Street Address  PHONE NUMBER AVAILABLE EMAIL AVAILABLELINKEDIN LINK AVAILABLEPROFESSIONAL SUMMARYDedicated and results-oriented Cybersecurity Analyst student with a Master's in Cybersecurity Policy, demonstrating a strong passion for securing digital environments. I possess advanced knowledge in network security and a deep understanding of emerging threats, cryptographic protocols, and secure coding practices developed throughout my academic journey. Additionally, I have hands-on experience as an IT Support Specialist, where I honed my skills in troubleshooting, network administration, and system maintenance. Eager to apply my skills and enthusiasm for cybersecurity to contribute meaningfully to the constantly evolving digital security landscape. As a U.S. citizen eligible for security clearance, I am willing to relocate and open to networking, collaboration, and continuous learning to stay abreast of developments in this dynamic field.SKILLSTechnical Skills: Network Security, Intrusion Detection (IDPS), Penetration Testing, Identity & Access Management, Security Tests & Evaluations, Digital Forensics, Cybersecurity Data Analysis, Incident Management, Digital Forensic Tools (FTK, EnCase), Governance & Risk Analysis, Threat Analysis, Risk & Vulnerability Assessment, Compliance Management, Security Architecture & Design, System Design, Security Policy, Disaster Recovery Planning, Cloud & Virtualization Security (AWS, Azure, VMware, Hyper-V), Network Architecture and Cloud Security, IT Auditing & Compliance (SOX, GLBA, HIPAA, PCI), Knowledge of FISMA, FERC, NERC, PCI, HIPAA, GLBA, SOX, SARBOX, Active Directory Infrastructure, Information Governance, Knowledgeable in Advanced Persistent Threat(APT) environment and challenges. Familiar with Zero Trust (ZT) security principles.Software & Tools: Penetration Testing Tools (Metasploit, Nmap), - Digital Forensic Tools (FTK, EnCase), Network Monitoring Tools, Cloud Providers (AWS, Azure), Virtualization Platforms (VMware, Hyper-V), Hospitality Software (Opera, Choice Advantage).Project Management: Project Planning, System Design, Technology Implementation, Technical Training, IT UpgradesAnalytical Skills: Cost-benefit analysis, Threat Analysis, Risk & Vulnerability Assessment, Security Policy & Data Retention Design, Disaster Recovery PlanningAdditional Technical Skills: Cryptography, Linux Systems, Microcomputer Operating Systems, Software Design, Computer Hardware, and Troubleshooting, Familiar with HTML, Java, C++, JavaScript, and SQL. EDUCATIONMaster of Science in Cyber Security Policy May 2024 ECPI University  Richmond, VA (GPA: 3.93)Relevant Coursework: Network Security, Human and Ethical Aspects of Cybersecurity, Cybersecurity, Security Architecture and Design, Cloud SecurityBachelor of Science in Computer and Information Science (Cyber and Information Security) September 2022 ECPI University  Richmond, VA (GPA: 3.5)Associate of Science in Cyber Security December 2019 Northern Virginia Community College  Sterling, VA PROFESSIONAL DEVELOPMENT (CERTIFICATIONS)Completed Google Cybersecurity Certificate in Coursera.Completed GCP Cloud Logging in letsdefend.ioCompleted Cloud Armor Network Security in letsdefend.ioCompleted Risk Management in letsdefend.ioCompleted AWS CloudTrail: Unveiling AWS Account Activity in letsdefend.ioCompleted Information Security Basics in letsdefend.ioEnrolled in Akamai Network Engineering Specialization in Coursera.Enrolled in The Complete Salesforce Certified Administrator Course + AI in UdemyEnrolled in Microsoft Cybersecurity Analyst in Coursera. UNIVERSITY TECHNICAL PROJECT EXPERIENCEAdvisory Report on Implementing an Information Risk Management Program-Prepared a comprehensive Advisory Report/White Paper as the Chief Risk Officer, analyzing the need for and benefits of implementing an information risk management program. Conducted a cost-benefit analysis, outlined implementation steps, addressed challenges, and identified necessary resources. Submitted a closing statement along with a revised paper incorporating faculty feedback.Cyber Forensics- Completed an intensive Cyber Forensics course, acquiring advanced knowledge and practical experience in maintaining the integrity of forensic evidence. Developed proficiency in imaging digital media, examining forensic information using both manual and automated methods, and analyzing findings. Successfully collected, examined, analyzed, and prepared detailed reports demonstrating expertise in digital evidence collection and analysis.Executive Advisory Reports on Wireless and Mobile Security- As the Chief Information Security Officer (CISO) for a large company, developed a series of Executive Advisory Reports (EARs) on wireless and mobile security for upper management. Prepared PowerPoint presentations highlighting security implications of wireless implementation, identified Wi-Fi vulnerabilities, and examined potential impacts on company operations and liabilities. Developed recommendations and security solutions for securing the corporate Wi-Fi network and mobile devices, ensuring differentiation of solutions for various company departments.Information Technology Audit at Vista Retail Solutions- Conducted an Information Technology (IT) audit at Vista Retail Solutions as part of the MSCS647 Compliance and Audit course project. Identified Vista Retail Solutions for the IT audit project, developed an IT audit plan, and executed the audit according to the developed plan. Documented findings, prepared draft and final IT audit reports, and incorporated feedback and comments from the instructor.Cybersecurity Strategies Project-Participated in a group project, MSCS645 Cybersecurity Strategies, aimed at designing and implementing cybersecurity policies for various industries. Designed policies for compliance with regulations such as Sarbanes-Oxley (SOX), Gramm Leach-Bliley Act (GLBA), Health Insurance Portability and Accountability Act (HIPAA), and Payment Card Industry (PCI). Ensured compliance with regulations, designed effective policies, and presented findings logically and cohesively.Virtualization Security Project- Participated in a team project, MSCS680 Virtualization Security, focusing on developing a comprehensive virtualization security policy for a hypothetical organization. Conducted an inventory of IT infrastructure, evaluated existing virtualization technology, and designed the architecture of the virtualization solution. Developed security policies, procedures, and data retention policies, ensuring compliance with legal requirements.Information Governance Policy Development-Participated in a team project, MSCS643, focused on developing an Information Governance (IG) policy for a real company. Administered surveys, evaluated best practices, and developed a comprehensive IG policy based on survey results and best practices. Ensured alignment with laws and regulations, recommended best practices, and developed policies for implementation and enforcement.Network Security and Intrusion Detection Project-Advanced course, MSCS624, focusing on network security and intrusion detection. Analyzed network infrastructures, identified weaknesses and vulnerabilities, and implemented security measures to protect network infrastructure. Utilized penetration testing methodologies and tools to identify and analyze malicious traffic, safeguarding the network.Framework and Threat Analysis for Enterprise Cloud Architecture- Advanced comprehensive project, MSCS615, focusing on developing a framework and threat analysis for the enterprise cloud architecture of a Fortune 500 Company. Conducted an in-depth analysis of existing IT infrastructure and security policies, evaluated the benefits and potential impacts of migrating to the cloud, and recommended appropriate security controls and cloud service providers.Comprehensive Enterprise Cybersecurity Architecture Development- Participated in a project focusing on developing a comprehensive enterprise cybersecurity architecture for a Fortune 500 Company. Described the existing security architecture, identified areas for improvement, and addressed functional areas of enterprise cybersecurity architecture. Utilized cybersecurity frameworks such as NIST and ISO27001, ensuring alignment with organizational goals and strategic vision.RELEVANT WORK EXPERIENCEIT Support Specialist and Front Desk Assistant Manager Country Inn and Suites - Richmond, VA Dec 2020  PresentProvide comprehensive IT support to hotel staff and guests, including troubleshooting hardware, software, and network issues.Perform regular updates and maintenance on computer systems to ensure optimal performance and securityTo ensure reliable connectivity, Manage and support the hotel's network infrastructure, including Wi-Fi, routers, and switches.Install, configure, and update software applications, ensuring compliance with licensing agreements and security protocols.Implement and oversee data backup solutions to prevent data loss and facilitate quick recovery in case of system failures.Conduct training sessions for staff on hotel management software, email systems, and other essential IT tools.Liaise with external IT service providers to resolve technical issues and manage hardware and software procurement.Implement and monitor cybersecurity measures to protect the hotel's IT infrastructure and data.Maintain detailed records of IT procedures, configurations, and troubleshooting steps.Oversee front desk operations to ensure excellent customer service and guest satisfaction.Train, mentor, and manage front desk staff, coordinating shifts for smooth operations.Resolve guest complaints and issues promptly and professionally.Create and analyze front desk reports to track performance and identify improvement areas.Coordinate with other departments to ensure smooth operations and exceptional guest experiences PERSONNELUS citizen eligible for security clearanceEffective communication skillsProven problem-solving abilities.Ability to work under pressure.Collaborator with leadership experienceAdaptable to challenging environments.Committed to continuous professional development.

Respond to this candidate
Your Message
Please type the code shown in the image:

Note: Responding to this resume will create an account on our partner site postjobfree.com
Register for Free on Jobvertise