Quantcast

Machine Learning Network Security Resume...
Resumes | Register

Candidate Information
Name Available: Register for Free
Title Machine Learning Network Security
Target Location US-IL-Chicago
Email Available with paid plan
Phone Available with paid plan
20,000+ Fresh Resumes Monthly
    View Phone Numbers
    Receive Resume E-mail Alerts
    Post Jobs Free
    Link your Free Jobs Page
    ... and much more

Register on Jobvertise Free

Search 2 million Resumes
Keywords:
City or Zip:
Related Resumes

Machine Learning Data Scientist Chicago, IL

Power Bi Machine Learning Chicago, IL

Machine Learning Computer Science Bensenville, IL

Machine Learning Engineer Chicago, IL

Data Science Machine Learning Chicago, IL

Machine Learning Data Science Chicago, IL

Information Technology Machine Learning Aurora, IL

Click here or scroll down to respond to this candidate
Candidate's Name
Chicago, IL EMAIL AVAILABLE PHONE NUMBER AVAILABLE LinkedInCyber Forensics AnalystConduct threat-hunting procedures, identify elusive threats, and handle cyberattacks as they occur; threat-hunting techniques include machine learning, situational awareness, user behavior analytics, and intelligence to prepare for and manage attacks in real time. Conduct an in-depth study of digital forensics and learn to investigate network and host attacks and reverse-engineer malware to understand its purpose and execution on vulnerable systems.EDUCATIONThe Chicago University, Chicago, IL 7/Street Address /2024Cybersecurity Professional CertificateDFIR and Treat Hunting, Cyber Infrastructure, Cloud Security, Offensive Security: Ethical, Hacking, Game Theory Strategy in Cybersecurity, Linux Security, Microsoft Security, Computer Networking, Network Security, Introduction to Python for SecurityITT Technical Institute 3/1987-2/2000Coursework completed towards Bachelor of ScienceElectrical Computer EngineeringTheory, analysis, and design of electric circuits. Voltage, Current, Power Distribution Energy, Resistance, Capacitance, Inductance, Node Analysis, Mesh analysis, Thevenin's theorem, Norton's theorem, AC, DC, Phasors, Operational Amplifiers. Ohm's Law and Kirchoff's laws; Circuits with Resistors, Photocells, Diodes, LEDs; Rectifier Circuits; First Order RC Circuits; DC and RMS Value; Operational Amplifier Circuits, Analog Signal Processing Systems including Amplification, AM Modulation Sampling and Reconstruction, Laboratory utilizing Multimeter, Function Generator, Oscilloscope, Spectrum Analyzer, Experiments on Various Circuits and Systems. Computer Systems Programming using C Language. Translation of C into Assembly language. Introduction to Fundamental Data Structures: Array, Hash. Allen Bradley and Microchip machine Micro Controller Programming.PROFESSIONAL PROJECTSForensics sound collection, transmission, and storage of digital evidence.Computer Forensics: Using Autopsy to Investigate a Local Hard DriveAnalysis of digital evidence to identify indicators of compromise and adversary activityIncident recovery, restoration of data from backups, reimaging workstations and servers, rebuilding network infrastructure, activities as necessaryIdentify artifact and evidence locations to answer critical questions, including execution, file access, data theft, anti-forensics, and detailed system usage by an adversary.Vulnerability assessment tools and penetration testing techniquesScripted DFIR toolsets Linux, Debian, kaliExamine traffic using common network protocols to identify patterns of activity or specific actions that warrant further investigation.Managing a variety of tools, including Burp and SQL Map, John the Riper, Wireshark, firewalls, proxies, Honey pots, SIEM, EDR, OSI Model and malware analysisPerform forensic analysis of digital information using standard computer forensics and evidence handling techniques and computer forensics tools.Information security; security engineering; application architecture; authentication and security protocols; applications session management; applied cryptography; common communication protocols.Developed advanced memory analysis tools to assess adversary activities on host machines and detect pivot points used across the network, leading to a 40% decrease in average resolution time for security incidents in the financial industry.Executing security and privacy investigations for clients, in preparation of, and in response to, data security matters, include ongoing breach detection, threat analysis, incident response and malware analysis.Forensically acquire data and images from identified hosts, and then locate evidence of compromise to determine its impact from disk, file, memory, and log analysis.Ability to learn and apply critical thinking in a variety of situationsConducting Technical analysis on web application ethical hacking assessments.CERTIFICATIONS & SKILLS PROFILELanguages: English, SpanishCertifications: I hold EPA National & Elgin IL Electrical License I am also pursuing the Security+ and Network+ certifications.Operating systems: Windows Environment, Users and Groups, Windows Server 2016 & 2019 operating & hardening systems, Windows and Linux, Debian, Kali, UbuntuNetworking: Design and maintain secure infrastructures, including Network Types and Devices, Network Media, and Local Area. Wide Area Networks and Cables, Network Topologies and Architecture, Network Protocols Commands, and Wireless Technology. Operate network communication equipment and systems, including Cisco Certified CyberOps, OSI Model, Networking Recap, Redundancy Methods, Network Security Systems. Design,Programming languages: Linux, Python programming.Tools: NMAP, Wireshark, Arp Poising, Masscan, Pfsense, Metasploitable, Zenmap, Wincap, Scapy,Arpspoof, DNS Poisoning, Port Stealing, SSL Stripping, Burp Suite, Offline Password CrackingOnline Password Attacks, Projects packet flow, TCP/UDP traffic, firewall, security event andincident management, Intrusion Detection Systems, Internet Web Proxy, Endpoint Detection ResponseManagement: Bilingual professional with 30+ years of customer relations, management & supervisory experience, and field technician installing and troubleshooting computerized electromechanical commercial cooking equipment.PROFESSIONAL EXPERIENCEAppliance & Mechanical Svc, Chicago IL 1/2009 - CurrentService ManagerCustomer relations and management, also assisting a crew of 6 field technicians installing and troubleshooting computerized electromechanical commercial cooking equipment, Refrigeration including HVACExperienced with the NFPA 70, National Electrical Code commercial, residential design of machinery building wiring and electrical installations.Experience in designing electrical wiring systems diagrams and implementing installation of server motors and cooling systems compressors, including temperature and proximity sensors, and installation of cat5 and cat6 cabling.

Respond to this candidate
Your Message
Please type the code shown in the image:

Note: Responding to this resume will create an account on our partner site postjobfree.com
Register for Free on Jobvertise