Summary
Overview
Work History
Education
Skills
Languages
Timeline
Generic

Abednego. A. Achamba

Hyattsville,MD

Summary

Information Security Specialist with passion for aligning security architecture plans and processes with security standards and business goals. Extensive experience developing and testing security framework for cloud-based software. Versed in robust network defense strategies.

I am a CCNA, COMPTIA Security+ certified and a Graduate with a Master’s degree in Cyber Security management and Policy. I am really excited about this role because I will align to your mission and vision to achieve the goals for the organization. I have more than 8 years of IT management and Business experience where I lead a team of 20 employees. I have managed a project with a combined budget of over 5 million dollars. I am Seeking this Position where I know attention to details and Customer Satisfaction is crucial.

Overview

15
15
years of professional experience

Work History

Cybersecurity Management, University of Maryland Global Campus
10.2021 - 06.2023
  • Graduated-GPA 3.8)
  • Risk management Framework as well as NIST special publications such as NIST 800-171 and 800-53
  • Practical approaches to risk analysis; techniques to prevent intrusions and attacks that threaten organizational data
  • (Vulnerability assessment and management-Pent testing, scanning-nexus and Qualys as tools)
  • Coordinate and critically examine policy and procedures to align business needs, create and develop systems to maintain privacy
  • Sound knowledge in exploring the legal and regulatory environments related to local, state, national and international cybersecurity concerns
  • Extensive knowledge on the Formulation of Cybersecurity policy for the prevention of intrusions, attacks, and threats to organizational data
  • Apply critical thinking and analysis to determine potential risks to the enterprise, investigate the application of systems, tools, and concepts to minimize risk in an organization's cyberspace initiatives
  • Extensive Knowledge on threats identification, vulnerability assessments, and perform risk assessment using various tools as SEIM, Carbon black, Microsoft defender) system development and application assurance from a holistic viewpoint that spans cyberspace landscapes
  • Sound understanding of the value of providing regulatory, policy compliance guidelines in addition to pure technology options
  • Ability to Create a cybersecurity program using the enterprise as a framework and examine the role of architectural methodology as part of the complete cybersecurity program
  • Develop incident response and business continuity planning reports and presentations and provide guidelines in both government and industry.

Cyber Security Analyst

Vector Talent Resources
12.2018 - 09.2022
  • Review and analyze data and network traffic from numerous security tools such as full packet captures and security device logs in order to detect traffic anomalies, identify infected systems and determine lateral movement of infections across the network
  • Monitor network traffic for security incidents and events
  • Investigate incidents and respond to events in real time
  • Write detailed incident response reports
  • Install and operate firewalls, encryption programs, and other security software
  • Fix vulnerabilities, mitigation and remediations
  • Develop and promote best practices for information security
  • Conduct threat research
  • Perform periodic risk assessments and penetration tests
  • Responsible for daily Incident Management and reports, conducting investigation in any computer breach
  • Monitor events, respond to incidents and reported findings and also escalate critical tickets
  • Utilize Intrusion Detection & Prevention (IDS/IPS) to monitor malicious activities on the network
  • Analyze firewall logs, IPS and IDS logs to uncover malicious activity going on within the network
  • Contribute to incident response, maintaining relevant communication in emails, ticket summaries, analysis and reporting
  • Conduct basic static and dynamic malware analysis.
  • Performed risk analyses to identify appropriate security countermeasures.
  • Conducted security audits to identify vulnerabilities.
  • Recommend improvements in security systems and procedures.
  • Authored security incident reports, highlighting breaches, vulnerabilities and remedial measures.
  • Created cybersecurity best practice communications to educate staff against known threats and potential vectors of attack.
  • Developed and maintained incident response protocols to mitigate damage and liability during security breaches.
  • Participated in creation of device hardening techniques and protocols.
  • Designed company-wide policies to bring operations in line with Center for Internet Security (CIS) standards.
  • Directed in-house cyber security auditing program to detect flaws and weaknesses in [Software].
  • Managed relationships with third-party intrusion detection system providers.
  • Spearheaded bring your own device program, defining necessary security parameters and designing complementary security deployments.
  • Analyzed network traffic and system logs to detect malicious activities.
  • Implemented security measures to reduce threats and damage related to cyber attacks.
  • Worked with other teams to enforce security of applications and systems.
  • Administered and monitored firewalls, intrusion detection systems and anti-virus software to detect risks.

IT Support Technician

Fisher Automotive Group
06.2015 - 10.2018
  • IT support relating to technical issues involving Microsoft's core business applications, as well as virtual environments built on Microsoft, and VMware/Hyper-V, etc
  • Work completely through service tickets and project tickets, following internal procedures
  • Design, implementation, and support services for Microsoft related technologies: Windows Server, Office 365, SQL, SharePoint, etc
  • Engineer and implement system solutions for customers using technologies that meet their needs
  • Implement and support disaster recovery solutions
  • Technical services and support at the network level: WAN and LAN connectivity, routers, firewalls, and security
  • Remote access solution implementation and support: VPN, Terminal Services, etc
  • System documentation and consulting services to include system reviews and recommendations
  • Communication with customers: keeping them informed of incident progress, notifying them of impending changes, and agreed outages
  • Install and integrate new network equipment, computer hardware, and software applications
  • Adherence to SLAs for password resolution, call answer rates, drop call rates, first call resolutions, total ticket resolution
  • Monitors faults, performance, and capacity issues; prepares remediation reports and documentation
  • Maintain network connectivity, security and monitor network to ensure optimal performance
  • Create Technical support documentation for systems and applications
  • Upgrade system and processes as required for enhanced functionality and security issues resolution.
  • Troubleshot and diagnosed problems to accurately resolve wide range of technical issues.
  • Trained users on how to operate components and systems.
  • Explained technical information in clear terms to non-technical individuals to promote better understanding.
  • Responded to support requests from end-users and patiently walked individuals through basic troubleshooting tasks.
  • Walked individuals through basic troubleshooting tasks.
  • Monitored systems in operation and quickly troubleshot errors.
  • Configured hardware, devices, and software to set up work stations for employees.
  • Explained technical information in clear terms to promote better understanding for non-technical users.
  • Updated documentation and produced reports.
  • Responded to telephone, email and in-person inquiries regarding [Item] operation, use and repair.
  • Completed inventory counts and organized supplies.
  • Rolled out software updates and applied server patches to thwart threats from penetrating networks.
  • Analyzed issues to identify troubleshooting methods needed for quick remediation.
  • Provided Tier 1 IT support to non-technical internal users through desk side support services.
  • Provided basic end-user troubleshooting and desktop support.
  • Installed, modified, and repaired software and hardware to resolve technical issues.
  • Researched product and issue resolution tactics to address customer concerns.
  • Configured hardware and granted system permissions to new employees.

Security Assessor

Advanced Auto parts Inc
04.2011 - 05.2015
  • Responsible for performing security control compliance reviews, tracking, and continuous monitoring of assessment packages
  • Advise and assist with the Lifecycle Assessment and Authorization (A&A) process and developing a Security Assessment Report (SAR)
  • Perform security control assessments in support of new and existing systems
  • Participate in A-123 assessments
  • Utilize CSAM, the GRC tool for this program
  • Assess the implementation of NIST SP 800-53 security controls for major applications and general support systems using manual and automated test methods
  • Assess the severity of weaknesses or deficiencies discovered in the information system and its operating environment and recommend corrective actions to address identified vulnerabilities
  • Support security assessment and authorization (SA&A) during the system development life cycle to maintain the authorization to Operate
  • (ATO)
  • Perform security reviews, identify gaps in security architecture, and develop a security risk management plan
  • Perform security reviews and identify security gaps in security architecture resulting in recommendations for inclusion in the risk mitigation strategy
  • Perform risk analysis (e.g., threat, vulnerability, and probability of occurrence) whenever an application or system undergoes a major change
  • Plan and conduct security authorization reviews and assurance case development for initial installation of systems and networks
  • Provide input to the Risk Management Framework process activities and related documentation (e.g., system life-cycle support plans, concept of operations, operational procedures, and maintenance training materials)
  • Review authorization and assurance documents to confirm that the level of risk is within acceptable limits for each software application, system, and network.
  • Worked with other teams to enforce security of applications and systems.
  • Investigated and resolved incidents of unauthorized access to sensitive information.
  • Educated and trained users on information security policies and procedures.
  • Implemented security measures to reduce threats and damage related to cyber attacks.

Store Manager

Pep boys Auto parts
01.2008 - 03.2011
  • Train and Develop Employees
  • Payroll application & ADP Service Management
  • Partner with senior Leadership to ensure that mission, vision, and business goals are achieved
  • Lead and manage a team of about 20 Employees
  • Conduct job interviews, direct workflow, and develop work schedules for junior and senior staff
  • Responsible for coordinating the day to day running and operations of the store according to the established operating procedure schedule, through maintenance and management of staffing of Associates and Management staff
  • Implements company policies and procedures and ensures that subordinates are in compliance
  • Coordinate sales promotion activities within the store and service center as well as conduct store audits to compliance with control procedures
  • Reviews daily, weekly, and monthly management information reports that include sales updates, productivity, expense control, profit and loss and procedural compliance with subordinates
  • Ensure ongoing awareness and understanding of business needs and provide specific recommendations for improvement.
  • Managed inventory control, cash control, and store opening and closing procedures.
  • Managed store employees successfully in fast-paced environment through proactive communication and positive feedback.
  • Completed point of sale opening and closing procedures.
  • Rotated merchandise and displays to feature new products and promotions.
  • Maintained proper product levels and inventory controls for merchandise and organized backroom to facilitate effective ordering and stock rotation.
  • Assisted with hiring, training and mentoring new staff members.
  • Approved regular payroll submissions for employees.
  • Maximized sales and minimized shrinkage through excellent customer service and adherence to standard practices.
  • Set effective store schedules based on forecasted customer levels, individual employee knowledge, and service requirements.
  • Coached sales associates in product specifications, sales incentives, and selling techniques, significantly increasing customer satisfaction ratings.
  • Reconciled daily sales transactions to balance and log day-to-day revenue.
  • Promoted team collaboration, performance, and efficiency by fostering healthy environments focused on mutual success.

Education

Bachelor of Science - Business Management

University of Buea
Cameroon
10.1997

Master of Science - Cyber Security Management and Policy

University of Maryalnd Global Campus
Adelphi,MD
05.2023

Skills

  • RMF and NIST Security Controls (SP 800-37, 800-53) and other applicable Controls, FIPS and NIST Special Publication
  • SCCM/SCOM-Enterprise Management Platform, SEIM, JIRA Ticketing and Wireshark
  • Carbon black, AZURE defender, SOAR, SENTINEL 1, Microsoft defender, Fire eye and cisco amp as running tools for end point security
  • Active Directory ,Firewall Configuration and Microsoft window server
  • Experience in HRIS-Human Resource Information System
  • Security Control Assessment experienceISA-95, ISO27001 and other security tools
  • Ticket Management and Applications-Service Now
  • Security assessment, Risk management and compliance
  • Remediation recommendations
  • Microsoft 365 office Suite, SaaS model and share point
  • Cyber Security detection and response
  • LAN and WAN Technologies and Paolo Alto Firewall
  • Microsoft Office Suite, Visio, power point, MS Project, oracle, and SAP Globe
  • Active Directory Support, DNS Server, and Boarder Gateway Protocol and commands
  • Qualys Cloud Platform
  • Tenable Nessus
  • Flaw Detection
  • Risk Management Evaluations
  • Vulnerability and Penetration Testing
  • Best Practice Implementation
  • Compliance with Security Requirements
  • Incident Response Management
  • Remediation Activities
  • Information Auditing

Languages

Danish
Professional Working
English
Full Professional
Norwegian
Professional Working
Dutch
Limited Working
Swedish
Limited Working

Timeline

Cybersecurity Management, University of Maryland Global Campus
10.2021 - 06.2023

Cyber Security Analyst

Vector Talent Resources
12.2018 - 09.2022

IT Support Technician

Fisher Automotive Group
06.2015 - 10.2018

Security Assessor

Advanced Auto parts Inc
04.2011 - 05.2015

Store Manager

Pep boys Auto parts
01.2008 - 03.2011

Bachelor of Science - Business Management

University of Buea

Master of Science - Cyber Security Management and Policy

University of Maryalnd Global Campus
Abednego. A. Achamba