Quantcast

Ict Security And Bcp Specialist Remotely...
Resumes | Register

Candidate Information
Name Available: Register for Free
Title ICT SECURITY AND BCP SPECIALIST (Remotely)
Target Location US-MN-Shakopee
Email Available with paid plan
Phone Available with paid plan
20,000+ Fresh Resumes Monthly
    View Phone Numbers
    Receive Resume E-mail Alerts
    Post Jobs Free
    Link your Free Jobs Page
    ... and much more

Register on Jobvertise Free

Search 2 million Resumes
Keywords:
City or Zip:
Related Resumes

Security Officer Minneapolis, MN

Technical Support Cyber Security Andover, MN

Cyber Security Compliance Analyst Woodbury, MN

Security officer Minneapolis, MN

Customer Service Security Guard Minneapolis, MN

Dining Room Desk Security Princeton, MN

Information Security Engineer Saint Paul, MN

Click here or scroll down to respond to this candidate
Candidate's Name
Street Address
                                                                                         PHONE NUMBER AVAILABLE
                                                                               EMAIL AVAILABLE
                                                                               https://Candidate's Name .com

------------------------------------------------------------------------------------------------------------------


Professional summary:
My expert leverages the latest technologies and industry best practices to create a secure and
resilient IT environment. Performing thorough risk assessments, identify vulnerabilities, and
implement comprehensive security measures to protect your critical data and systems.
Simultaneously, develop and maintain detailed business continuity plans that guarantee
operations can continue with minimal disruption, safeguarding your bottom line and reputation.


Employment history:
ICT Security & BCP (Remotely) | Tanzania Commercial Bank
Aug 2022 - Present
    Utilized Security Information and Event Management (SIEM) systems, such as Splunk and 360Log
    Analyzer, Symantec Endpoint to detect and respond to security incidents and anomalies.
    Implemented and maintained security monitoring tools to ensure continuous surveillance of
    network activities.
    Investigated and analyzed security incidents to determine root causes, assisted in vulnerability
    assessments, and managed comprehensive remediation eGorts.
    Conducted forensic analysis to identify attack vectors and methods, ensuring thorough
    understanding and resolution of security breaches.
    Created and implemented automation scripts and work ows using Python and PowerShell to
    enhance SOC eGiciency.
    Performed in-depth analysis of logs using tools like ELK Stack and Splunk to identify indicators of
    compromise (IOCs) and potential security breaches.
    Integrated incident response plans with Business Continuity Plans (BCP) to ensure seamless
    recovery and continuity.
    Conducted regular testing, drills, and simulations of business continuity plans to validate their
    eGectiveness.
    Coordinated with analysts and other stakeholders to promptly escalate and respond to security
    incidents, ensuring a uni ed approach.
    Ensured alignment of business continuity plans with cybersecurity measures for a comprehensive
    approach to organizational resilience.
    Worked closely with stakeholders to promote awareness and understanding of business
    continuity planning principles.
    Conducted training sessions to enhance the skills and knowledge of the SOC team.
    Ensured compliance with CIS Benchmark in con guration for enhanced security.
Web & API s Penetration Tester (Remotely) | Lockwood Tech Company
Feb 2024 - Present
    Review API documentation to understand the endpoints, parameters, and expected responses.
    Test API parameters for input validation issues, such as injection attacks.
    Test the strength of authentication mechanisms.
    Test for improper error handling that could disclose sensitive information.
    Document all  ndings, including detailed descriptions, proof of concept, and potential impact.
    Collaborated with API s developer to close vulnerabilities for remediation process.
    Ensure proper con guration of security headers like Content Security Policy (CSP) and HTTP Strict
    Transport Security (HSTS).
    Analyze API responses for sensitive data exposure, such as PII or internal system information.




Penetration Tester (Contractor) | Azania Bank
Jan 2021 - Jul 2022
    Planned, executed, and reported on penetration tests for Azania Bank's applications, networks,
    and systems.
    Identi ed and exploited vulnerabilities in a controlled environment to assess and improve overall
    security.
    Reduced external threat for 26% in 2021 compared to previous year 2020.
    Document all phases of penetration testing, detailing methodologies,  ndings, and
    recommended corrective actions.
    Prepare comprehensive reports for technical and non-technical stakeholders, including
    actionable insights and risk assessments.
    Work closely with internal cybersecurity teams, IT personnel, and application developers to
    address identi ed vulnerabilities.
    Provide guidance and support to enhance the overall security posture of Azania Bank.
    Stay abreast of the latest cybersecurity trends, emerging threats, and industry best practices.
    Continuously improve penetration testing methodologies through research and development
    initiatives.
    Providing regular feedback on the security posture of the organization to help improve overall
    security measures.
    Acted as an information security subject matter expert for the Incident Response team, assisting
    in escalations and providing insights to enhance security strategies.
Cyber Security Analyst | Digitalbrain Company
May 2019 - Dec 2020
    Monitored and analyzed log data to detect and mitigate security threats proactively.
    Conducted forensic analysis to identify attack vectors and methods, ensuring thorough
    understanding and resolution of security breaches.
    Performed over 10 Vulnerabilities Assessment Penetration Test to our clients.
    Upgraded and optimized security infrastructure, such as  rewalls, IDS/IPS, and endpoint
    protection systems, improving overall security posture.
    Implemented ICT Infrastructures hardening strategies and benchmarks.
    Collaborated eGectively with cross-functional teams to integrate security measures into the
    software development life cycle (SDLC).
    Conducted training sessions for IT and non-IT staG, fostering a security-aware culture across the
    organization.
    Developed and executed successful security awareness and training programs for employees,
    leading to a noticeable improvement in security hygiene across the organization.
    Develop and implement security policies and procedures to ensure the protection of company
    data and systems.
    Developed and executed incident response plans to eGectively mitigate and respond to cyber
    security incidents, minimizing the impact on the organization.




Software Developer OKicer | Tanzania National Roads Agency
Jul 2017 - Apr 2019
    Designed, developed, tested, and maintained software applications and systems in alignment
    with TANROADS' business objectives.
    Provided ongoing support and maintenance for deployed software applications.
    Enabled the implementation of Project Management System and Physical Mail Delivery System.
    Debugged external/outsource systems and customized codes.
    Create and maintain comprehensive documentation for software design, coding, and testing
    processes.
Education:
Bachelor s degree in information technology | Institute of Finance Management
2015 - 2017


Diploma in Information Technology | University of Dar es Salaam
2012 - 2014



Skills:
Cloud Security | Vulnerability Assessment | Network Security Monitoring | XDR | SOAR |
Threat Hunting | Endpoint Detection and Response (EDR) | Intrusion Detection and
Prevention Systems (IDPS) | Firewall and Perimeter Security | Scripting & Automation |
Incident Response | Patch Management | Security Audits & Compliance | Access
Control Management | Cryptography | Disaster Recovery and Business Continuity
Planning | Security Awareness Training |



Tools:
Splunk | Symantec Endpoint | Veeam Solution | Snort | Pacu | Cortex XDR | Qualys |
Carbon Black | CrowdStrike Falcon | Tenable Nessus | Acunetx | Secret Server (PAM) |
CIS Benchmarks | Mobile Security Framework (MobSF) | Kali Linux | OpenVAS | OWAP
Zap | Postman | Python (Script) | Nmap | Jupyter (Data Analytical) | Rapid7 InsightVM |
Wireshark |


Courses:
Certi cate of Ethical Hacking v10 | EC-COUNCIL
2019

ISO 27001: Lead Implementer | PCEB
2022

Certi cate of Ethical Hacking v12 | EC-COUNCIL
2024 - ongoing

Respond to this candidate
Your Email «
Your Message
Please type the code shown in the image:
Register for Free on Jobvertise