| 20,000+ Fresh Resumes Monthly | |
|
|
| | Click here or scroll down to respond to this candidateCandidate's Name
Phone: PHONE NUMBER AVAILABLEEmail: EMAIL AVAILABLE / EMAIL AVAILABLELinkedIn: LINKEDIN LINK AVAILABLEAddress: Street Address Forbes Avenue, Pittsburgh, PAPROFESSIONAL SUMMARYDedicated cybersecurity professional pursuing a Master's degree in Information Technology Management, with a solid foundation in network engineering and computer science. Experienced in implementing security measures, conducting vulnerability assessments, and managing IT infrastructure. Ability to deliver high-impact projects and apply theoretical knowledge to real-world scenarios.EDUCATIONMaster of Science in Information Technology Management (in progress)Seton Hill University, Greensburg, PAExpected Graduation: December 2024GPA: 4.0Relevant Coursework: Enterprise Security & Cyber Policy, Cyber Risk Mitigation, Data Mining & Big Data, Agile Project Management, Business Intelligence & Data VisualizationBachelor of Science in Computer ScienceNjala University, Sierra Leone, West AfricaGraduated: April 2021GPA: 4.29/5.0Relevant Coursework: Data Structures, Algorithms, Computer Networks, Information SecuritySKILLSTechnical Skills:Network & System Security: Network Security, Computer Systems Security, Firewall Configuration, SIEM Tools, OSINT, Active Directory, Cyber Kill Chain Strategy, IDSSecurity Assessments: Vulnerability Assessment, Penetration TestingProgramming & Scripting: Python, JavaScript, HTML, CSS, SQLData Management & Analysis: Data Analysis, Database ManagementOperating Systems: Linux, Windows, macOSProject Management: Agile Project Management, General Project ManagementSoft Skills:Problem-solving, Team Collaboration, Critical Thinking, CommunicationCertifications:Preparing for CompTIA Security+ SY0-701Google IT Support (in progress)PROFESSIONAL EXPERIENCECybersecurity Analyst (Graduate Assistant)Seton Hill University, Greensburg, PA October, 2023- PresentConducted regular vulnerability assessments and penetration testing on university networks.Implemented and maintained security tools to monitor and protect against cyber threats.Developed and delivered cybersecurity awareness training for faculty and staff.Assisted in developing university-wide IT security policies and procedures.Provided technical support for students and faculty, resolving hardware and software issues.Maintained and repaired university computer systems and peripherals.Assisted in the implementation of new technologies across campus.Developed documentation for common technical issues and solutions.Network EngineerKingho Mining Company, Sierra Leone June 2020 - July 2022Designed and implemented network infrastructure for small to medium-sized businesses.Configured and maintained firewalls, routers, and switches for optimal network performance.Conducted network troubleshooting and resolved complex connectivity issues.Implemented VPNs and other secure remote access solutions for clients.PROJECTSSecure SSH Configuration with User Privilege Management (University Production System)Implemented key-based authentication and user-specific access controls.Enhanced system security by disabling password authentication and restricting sudo privileges.Configured SSH server for key-only authentication, improving overall security posture.Applied the principle of least privilege by managing user permissions effectively.Secure SFTP Server with User Jails and SNMP (University Production System)Designed and implemented a secure file transfer system with isolated user environments (chroot jails).Integrated SNMP for improved network monitoring and management.Configured SFTP jails for multiple user groups, enhancing data segregation and security.Implemented logging and monitoring for SFTP activities to detect potential security breaches.Intrusion Detection System (IDS) ImplementationDesigned and implemented a custom IDS using Snort and the ELK stack.Improved network security posture by detecting and alerting on potential threats.Configured rules to identify and respond to several types of network intrusions.Secure Web Application DevelopmentDeveloped a secure e-commerce platform using OWASP best practices.Implemented multi-factor authentication and secure payment processing.Conducted thorough security testing to identify and mitigate vulnerabilities.AWARDS & ACHIEVEMENTSInvited Member, National Society of Leadership and SuccessRecipient, General Board of Higher Education and Ministry Scholarship, United Methodist Church, 2024Active Member, Church Worship Team, and Technology Support GroupPUBLICATIONSSecuring Critical Infrastructure: Challenges and Solutions (In Progress)Conducting research on the vulnerabilities and security measures for critical infrastructure systems, focusing on identifying challenges and proposing solutions to enhance resilience against cyber-attacks.Zero Trust Architecture in Modern Cybersecurity Frameworks (In Progress)Exploring the principles and implementation strategies of Zero Trust Architecture, evaluating its effectiveness in improving organizational security postures and mitigating cyber threats.References available on Request |