| 20,000+ Fresh Resumes Monthly | |
|
|
| | Click here or scroll down to respond to this candidateCandidate's Name
PHONE NUMBER AVAILABLE PA TELM I TU LV A @G M A I L. C OM LI NKED I N. C OM / I N/ PA TEL -M I TU L- VAPERSONAL S TATEMENTResults-driven Cybersecurity Analyst with a MasterStreet Address ;s in Cybersecurity Policy and a strong passion for securing digitalenvironments. Offers advanced knowledge of network security, emerging threats, cryptographic protocols, and secure codingpractices. Leverages hands-on experience as an IT Support Specialist in troubleshooting, network administration, and systemmaintenance. Eager to apply technical expertise and cybersecurity enthusiasm to make a meaningful impact in the evolvingdigital security landscape.SKILLSCybersecurity: Network security, intrusion detection, penetration testing, identity/access management, digital forensics,incident response, threat/risk analysis, vulnerability assessment, compliance management (NIST, ISO27001, SOX, GLBA,HIPAA, PCI, FISMA, FERC, NERC), security architecture/design, disaster recovery planning, cloud/virtualization security(AWS, Azure, VMware, Hyper-V), APT/Zero Trust, cryptography.Network Engineering: Network architecture, system design, network monitoring/troubleshooting, IT auditing/compliance,TCP/IP, DNS, DHCP, firewalls.IT: IT upgrades, help desk operations, IT asset management, problem/incident management, technical documentation,customer service, Windows/macOS/Linux/UNIX support, Microsoft Office Suite.Software & Tools: Penetration testing (Metasploit, Nmap, horzion3ai), digital forensics (FTK, EnCase), cloud providers(AWS, Azure), virtualization (VMware, Hyper-V), help desk (ServiceNow), remote desktop (TeamViewer, RDP), antivirus(Symantec, McAfee), network monitoring (Nagios, SolarWinds).Programming: HTML, Java, C++, JavaScript, SQL, Python, PowerShell.Additional Skills: Project management, technical training, cost-benefit analysis, security policy/data retention design,information governance, Active Directory, specialized systems (Tails OS, Qubes OS).WORK H IS TORYPremier Federal, Inc. 07/2024 - PresentCyber Security InternGained hands-on experience with various cybersecurity tools and techniques to identify and mitigate potential threats.Conducted penetration testing to assess vulnerabilities in systems and networks.Performed risk assessments to identify potential security risks and developed recommendations to address them.Troubleshot operating system and network security issues.Worked with the team to implement security best practices and improve overall security posture.Applied knowledge of Kali Linux in conducting security testing and analysis.Contributed to projects involving government cybersecurity, adhering to relevant regulations and standards.Country Inn and Suits, Richmond, VA 12/2020 - PresentIT Support Specialist and Front Desk Assistant ManagerProvide comprehensive IT support to hotel staff and guests, troubleshooting hardware, software, and network issues on bothWindows and Mac platforms.Maintain and optimize hotel computer systems, network infrastructure, and software applications, ensuring performance,security, and compliance.Implement and manage data backup solutions, cybersecurity measures, and IT asset management using ServiceNow.Train staff on hotel management software, email systems, and essential IT tools, explaining complex concepts in simpleterms.Manage front desk operations, create and analyze reports, and coordinate with departments to enhance guest experiences andidentify improvements.Liaise with external IT service providers for technical issues and procurement, maintaining detailed records of procedures andresolutions.Resolve guest complaints promptly and professionally, demonstrating a strong customer service focus.EDUC ATIONMaster of Science in Cyber Security Policy ECPI UNIVERSITY RICHMOND, VA 05/2024Bachelor of Science in Computer and Information Science (Cyber and Information Security) ECPI UNIVERSITY RICHMOND, VA 09/2022Associate of Science in Cyber Security NORTHERN VIRGINIA COMMUNITY COLLEGE STERLING, VA 12/2019UNI VERSI T Y T ECHNI CAL PRO JECT EXPERI EN C EInformation Risk Management: Analyzed the need for an information risk management program, including cost-benefitanalysis and implementation planning.Cyber Forensics: Acquired expertise in forensic evidence integrity, digital media imaging, and manual/automated analysis.Wireless and Mobile Security: Developed executive reports on wireless/mobility security, identifying vulnerabilities andrecommending solutions.IT Audit: Conducted an IT audit, including plan development, execution, and report preparation.Cybersecurity Strategies: Designed industry-specific cybersecurity policies complying with SOX, GLBA, HIPAA, and PCIregulations.Virtualization Security: Developed a comprehensive virtualization security policy, ensuring legal compliance.Information Governance: Created an information governance policy aligning with laws/regulations and recommending bestpractices.Network Security and Intrusion Detection: Analyzed network infrastructures, identified vulnerabilities, and implementedprotective measures.Network Engineering: Designed the architecture of a virtualization solution and implemented security measures to protectnetwork infrastructure.Enterprise Cloud Architecture: Developed a cloud security framework and threat analysis, recommending controls andproviders.Enterprise Cybersecurity Architecture: Developed a comprehensive cybersecurity architecture that aligns withorganizational goals and uses NIST/ISO27001 frameworks.C ERTIFIC ATIONSGoogle Cybersecurity Certificate in CourseraGCP Cloud Logging in letsdefend.ioCloud Armor Network Security in letsdefend.ioRisk Management in letsdefend.ioAWS CloudTrail: Unveiling AWS Account Activity in letsdefend.ioInformation Security Basics in letsdefend.io |