Quantcast

Cyber Security Resume Iowa city, IA
Resumes | Register

Candidate Information
Name Available: Register for Free
Title Cyber Security
Target Location US-IA-Iowa City
Email Available with paid plan
Phone Available with paid plan
20,000+ Fresh Resumes Monthly
    View Phone Numbers
    Receive Resume E-mail Alerts
    Post Jobs Free
    Link your Free Jobs Page
    ... and much more

Register on Jobvertise Free

Search 2 million Resumes
Keywords:
City or Zip:
Related Resumes

Cyber Security Analyst Cedar Rapids, IA

Development Consultant Machine Learning Iowa City, IA

Scrum Master Project Manager Brooklyn, IA

Salesforce Administrator Customer Support Coralville, IA

Supply Chain Strategic Sourcing Cedar Rapids, IA

Software Engineer Project Management Coralville, IA

Customer Service Store Manager Peosta, IA

Click here or scroll down to respond to this candidate
Candidate's Name  804 S. Gilbert CtIowa City, IA Street Address
PHONE NUMBER AVAILABLEEMAIL AVAILABLESUMMARYCyber Security ManagementCandidate's Name 's experience is concentrated in Information Technology Consulting/ Cyber Security / Risk Analysis with 18 years of management experience, including a high-level position. EXPERIENCERKM Technologies, Inc., Denver, CO  ConsultingLed and trained a team of 5 computer engineers serving 40 clients. Achieved revenue growth to $1.2 million through marketing, sales and excellent customer service.Developed and implemented security baselines, risk management and data safety by deploying firewalls and VPNs resulting in growing client list and revenue.Utilized strong planning skills and strategic direction to business owners.EDUCATIONComputer Education - Certification CompTIA Security + 701 (2024), Ethical Hacker Training, Certified Network Defender Training Syracuse University, Syracuse, NY  MPAUniversity of Iowa, Iowa City, IA  BASKILLSCompTIA Security + 701 (2024)Risk ManagementNetwork DefenderEthical HackingPROJECTSCost Controls - Idaho Cobaltmine - $12.5 millionGlobal SaaS for miningoperations in Mexico and PeruPublished in peer reviewedJournal of Applied MathematicsOrganized lobby team to meetwith elected officialsLANGUAGESEnglish/Spanish30-60-90 Plan for Cyber SOARImplementationPrepared by Candidate's Name
Aug 202430-Day Focus: Assessment and Preparation Assess Current Security Landscape:Conduct a review of security tools, processes, and incident response procedures.Identify gaps, inefficiencies, and areas for improvement.Evaluate the organization's readiness for implementation. Define Goals and Objectives:Clearly articulate the desired outcomes of the implementation.Align goals with overall security strategy and business objectives. Identify Key Stakeholders:Map out stakeholders involved in the project.Establish communication channels and roles for each stakeholder. Select Platform:Evaluate organizational needs, budget, and integration capabilities.Create a shortlist of potential vendors for further evaluation. Form the Implementation Team:Assemble representatives from security, IT, operations, and other relevant departments.Define roles and responsibilities for team members. 60-Day Focus: Implementation and Integration Proof of Concept (POC):Conduct a POC to test the platform's capabilities and compatibility with existing tools.Identify potential challenges and develop mitigation strategies. Data Integration:Integrate relevant data sources (e.g., SIEM, EDR, firewalls) with the platform.Establish data mapping and normalization processes. Develop Playbooks:Create standardized playbooks for common incident response procedures.Incorporate automation wherever possible to streamline workflows. User Training:Develop training materials and conduct initial user training sessions.Focus on core functionalities and basic playbook execution. Pilot Implementation:Start with a pilot project to test the platform in a controlled environment.Monitor performance and gather feedback from users. 90-Day Focus: Optimization and Expansion Full Deployment:Roll out the platform across the organization.Provide ongoing user support and training. Performance Monitoring:Continuously monitor platform performance and identify areas for improvement.Optimize playbooks and automation based on performance metrics. Integration Expansion:Integrate additional security tools and data sources as needed.Explore opportunities for platform expansion. Threat Hunting Integration:Incorporate threat hunting capabilities into the platform to proactively identify threats. Continuous Improvement:Establish a feedback loop to gather user input and identify areas for enhancement.Create a process for regular platform updates and upgrades. Key Considerations: Change Management: Effectively communicate to all stakeholders and address concerns. Security and Compliance: Ensure compliance with security and regulatory requirements. Measurement and Evaluation: Define (KPIs) to measure the impact of implementation. Collaboration: Foster collaboration between teams and departments.

Respond to this candidate
Your Message
Please type the code shown in the image:

Note: Responding to this resume will create an account on our partner site postjobfree.com
Register for Free on Jobvertise