| 20,000+ Fresh Resumes Monthly | |
|
|
| | Click here or scroll down to respond to this candidateCandidate's Name
Silver Spring, MD Street Address PHONE NUMBER AVAILABLE EMAIL AVAILABLEPROFESSIONAL SUMMARYInformation Security Specialist with passion for aligning security architecture plans and processes with security standards and business goals. Extensive experience developing and testing security framework for cloud-based software. Versed in robust network defense strategies. Proactive Cyber Securit Analyst ready to stand between businesses and threat actors. Lifelong student of developments in threat detection and mitigation. Adept at assisting with every stage of cybersecurity management, from preventive measures to disaster mitigation and recovery. Trusted Cyber Security Engineer with 3 years protecting companies against both internal and external threats. Talented at preemptively detecting unidentified threat vectors and applying preventive measures to mitigate security flaws. Employs technological solutions and personnel training to harden both people and machines against malicious actors. Organized and dependable candidate successful at managing multiple priorities with a positive attitude. Willingness to take on added responsibilities to meet team goals. Cybersecurity Specialist with proficiency in online security research, planning, execution and maintenance. Skilled at training internal users on security procedures and preventive measures. To seek and maintain full-time position that offers professional challenges utilizing interpersonal skills, excellent time management and problem-solving skills. Detail-oriented team player with strong organizational skills. Ability to handle multiple projects simultaneously with a high degree of accuracy.ACCOMPLISHMENTSPerformed comprehensive investigations of security breaches and implemented appropriate solutions.Educated management on how to minimize risk of cybersecurity attacks.Trained end users on proper security protocol to minimize cybersecurity attacks.Created daily database reports to identify and mediate potential vulnerabilities.Resolved product issue through consumer testing.Used Microsoft Excel to develop inventory tracking spreadsheets.SKILLSData securityRemediation SystemsErecting firewallsSymantec Endpoint ProtectionIntrusion Test OversightIDS IntegrationCybersecurity Policy DevelopmentNetwork Security MeasuresRisk MitigationFore ScoutTenable NessusRisk Management FrameworkEncryptionDocumentationNetwork Performance MonitoringProtecting NetworksBest Practice ImplementationMulti-Factor AuthenticationEvent Security MonitoringSecurity RecommendationsData EncryptionContinuity MonitoringIncident Response ManagementCritical Thinking SkillsManaging Security BreachesDeveloping Security PlansIdentifying RisksBug FixesPCI ComplianceCompliance with Security RequirementsFlaw DetectionThreat DetectionPlan of Actions & Milestones (POA&M)Preventative MaintenanceWORK HISTORYSECURITY OPERATIONS CENTER ( SOC) 06/2022 to CURRENTGridIron IT Solutions Fort Meade, MDAnalyzed security threats and risks and developed mitigation strategies to reduce potential losses.Monitored department's contribution to total store shortage reduction and prevention programs.Implemented comprehensive security plans to provide highest levels of protection for facilities.Conducted regular security audits and assessments to identify potential security risks and vulnerabilities.Optimized security programs, administrative functions, business management and inventory control by enhancing planning and allocation of resources.Cultivated relationships with external security vendors to make additional security resources available if necessary.Managed security policies and procedures to promote safety and security of personnel and assets.Completed vulnerability scans to identify at-risk systems and remediate issues.Investigated and resolved security breaches to protect organization and corporate assets.Kept team compliant with security protocols and appearance standards.Investigated incidents and wrote reports.Worked in fast-paced and high-risk environments while maintaining exceptional standards of excellence for security programs, strategies, and plans.CYBERSECURITY ANALYST 03/2018 to 06/2022Golden SVCS LLCCreated cybersecurity best practice communications to educate staff against known threats and potential vectors of attack.Developed and maintained incident response protocols to mitigate damage and liability during security breaches.Participated in creation of device hardening techniques and protocols.Managed relationships with third-party intrusion detection system providers.Spearheaded Bring Your Own Device program, defining necessary security parameters and designing complementary security deployments.Collaborated with third-party payment card industry (PCI) compliance partners.Designed company-wide policies to bring operations in line with Center for Internet Security (CIS) standards.Monitored computer virus reports to determine when to update virus protection systems.Reviewed violations of computer security procedures and developed mitigation plans.Conducted security audits to identify vulnerabilities.Recommend improvements in security systems and procedures.Performed risk analyses to identify appropriate security countermeasures.Monitored use of data files and regulated access to protect secure information.Encrypted data and erected firewalls to protect confidential information.Developed plans to safeguard computer files against modification, destruction or disclosure.Engineered, maintained and repaired security systems and programmable logic controls.Researched and developed new computer forensic tools.Authored security incident reports, highlighting breaches, vulnerabilities and remedial measures.Administered and monitored firewalls, intrusion detection systems and anti-virus software to detect risks.Investigated and resolved incidents of unauthorized access to sensitive information.Implemented security measures to reduce threats and damage related to cyber attacks.INFORMATION ASSURANCE/SECURITY ANALYST 05/2017 to 03/2018Paragon SystemConducted security audits to identify vulnerabilities.Recommend improvements in security systems and procedures.Reviewed violations of computer security procedures and developed mitigation plans.Performed risk analyses to identify appropriate security countermeasures.Monitored computer virus reports to determine when to update virus protection systems.Monitored use of data files and regulated access to protect secure information.Encrypted data and erected firewalls to protect confidential information.Developed plans to safeguard computer files against modification, destruction or disclosure.Engineered, maintained and repaired security systems and programmable logic controls.Researched and developed new computer forensic tools.Quickly learned new skills and applied them to daily tasks, improving efficiency and productivity.Carried out day-day-day duties accurately and efficiently.Demonstrated respect, friendliness and willingness to help wherever needed.Worked flexible hours; night, weekend, and holiday shifts.Performed duties in accordance with applicable standards, policies and regulatory guidelines to promote safe working environment.Maintained energy and enthusiasm in fast-paced environment.Proved successful working within tight deadlines and fast-paced atmosphere.Used critical thinking to break down problems, evaluate solutions and make decisions.Offered friendly and efficient service to customers, handled challenging situations with ease.Developed and maintained courteous and effective working relationships.Created and implemented security network framework across 20 devicesProvided safety reports and data analysis to building managers to inform security processesEstablished company-wide security best practices and protocols to mitigate risk of data breachResearched and developed new computer forensic toolsPerformed risk analyses to identify appropriate security countermeasuresAnalyzed network traffic and system logs to detect malicious activities.Worked with other teams to enforce security of applications and systems.Implemented security measures to reduce threats and damage related to cyber attacks.Administered and monitored firewalls, intrusion detection systems and anti-virus software to detect risks.EDUCATIONHigh School Diploma 08/2008Continental Academy, Miramar, FLCERTIFICATIONSCYSA - Cyber Security AnalystSecurity +Clearance: Top SecretMicrosoft Defender for Endpoint. |