Information Security Specialist with passion for aligning security architecture plans and processes with security standards and business goals. Extensive experience developing and testing security framework for cloud-based software. Versed in robust network defense strategies.
I am a CCNA, COMPTIA Security+ certified and a Graduate with a Master’s degree in Cyber Security management and Policy. I am really excited about this role because I will align to your mission and vision to achieve the goals for the organization. I have more than 8 years of IT management and Business experience where I lead a team of 20 employees. I have managed a project with a combined budget of over 5 million dollars. I am Seeking this Position where I know attention to details and Customer Satisfaction is crucial.
Overview
15
15
years of professional experience
Work History
Cybersecurity Management, University of Maryland Global Campus
10.2021 - 06.2023
Graduated-GPA 3.8)
Risk management Framework as well as NIST special publications such as NIST 800-171 and 800-53
Practical approaches to risk analysis; techniques to prevent intrusions and attacks that threaten organizational data
(Vulnerability assessment and management-Pent testing, scanning-nexus and Qualys as tools)
Coordinate and critically examine policy and procedures to align business needs, create and develop systems to maintain privacy
Sound knowledge in exploring the legal and regulatory environments related to local, state, national and international cybersecurity concerns
Extensive knowledge on the Formulation of Cybersecurity policy for the prevention of intrusions, attacks, and threats to organizational data
Apply critical thinking and analysis to determine potential risks to the enterprise, investigate the application of systems, tools, and concepts to minimize risk in an organization's cyberspace initiatives
Extensive Knowledge on threats identification, vulnerability assessments, and perform risk assessment using various tools as SEIM, Carbon black, Microsoft defender) system development and application assurance from a holistic viewpoint that spans cyberspace landscapes
Sound understanding of the value of providing regulatory, policy compliance guidelines in addition to pure technology options
Ability to Create a cybersecurity program using the enterprise as a framework and examine the role of architectural methodology as part of the complete cybersecurity program
Develop incident response and business continuity planning reports and presentations and provide guidelines in both government and industry.
Cyber Security Analyst
Vector Talent Resources
12.2018 - 09.2022
Review and analyze data and network traffic from numerous security tools such as full packet captures and security device logs in order to detect traffic anomalies, identify infected systems and determine lateral movement of infections across the network
Monitor network traffic for security incidents and events
Investigate incidents and respond to events in real time
Write detailed incident response reports
Install and operate firewalls, encryption programs, and other security software
Fix vulnerabilities, mitigation and remediations
Develop and promote best practices for information security
Conduct threat research
Perform periodic risk assessments and penetration tests
Responsible for daily Incident Management and reports, conducting investigation in any computer breach
Monitor events, respond to incidents and reported findings and also escalate critical tickets
Utilize Intrusion Detection & Prevention (IDS/IPS) to monitor malicious activities on the network
Analyze firewall logs, IPS and IDS logs to uncover malicious activity going on within the network
Contribute to incident response, maintaining relevant communication in emails, ticket summaries, analysis and reporting
Conduct basic static and dynamic malware analysis.
Performed risk analyses to identify appropriate security countermeasures.
Conducted security audits to identify vulnerabilities.
Recommend improvements in security systems and procedures.
Authored security incident reports, highlighting breaches, vulnerabilities and remedial measures.
Created cybersecurity best practice communications to educate staff against known threats and potential vectors of attack.
Developed and maintained incident response protocols to mitigate damage and liability during security breaches.
Participated in creation of device hardening techniques and protocols.
Designed company-wide policies to bring operations in line with Center for Internet Security (CIS) standards.
Directed in-house cyber security auditing program to detect flaws and weaknesses in [Software].
Managed relationships with third-party intrusion detection system providers.
Spearheaded bring your own device program, defining necessary security parameters and designing complementary security deployments.
Analyzed network traffic and system logs to detect malicious activities.
Implemented security measures to reduce threats and damage related to cyber attacks.
Worked with other teams to enforce security of applications and systems.
Administered and monitored firewalls, intrusion detection systems and anti-virus software to detect risks.
IT Support Technician
Fisher Automotive Group
06.2015 - 10.2018
IT support relating to technical issues involving Microsoft's core business applications, as well as virtual environments built on Microsoft, and VMware/Hyper-V, etc
Work completely through service tickets and project tickets, following internal procedures
Design, implementation, and support services for Microsoft related technologies: Windows Server, Office 365, SQL, SharePoint, etc
Engineer and implement system solutions for customers using technologies that meet their needs
Implement and support disaster recovery solutions
Technical services and support at the network level: WAN and LAN connectivity, routers, firewalls, and security
Remote access solution implementation and support: VPN, Terminal Services, etc
System documentation and consulting services to include system reviews and recommendations
Communication with customers: keeping them informed of incident progress, notifying them of impending changes, and agreed outages
Install and integrate new network equipment, computer hardware, and software applications
Adherence to SLAs for password resolution, call answer rates, drop call rates, first call resolutions, total ticket resolution
Monitors faults, performance, and capacity issues; prepares remediation reports and documentation
Maintain network connectivity, security and monitor network to ensure optimal performance
Create Technical support documentation for systems and applications
Upgrade system and processes as required for enhanced functionality and security issues resolution.
Troubleshot and diagnosed problems to accurately resolve wide range of technical issues.
Trained users on how to operate components and systems.
Explained technical information in clear terms to non-technical individuals to promote better understanding.
Responded to support requests from end-users and patiently walked individuals through basic troubleshooting tasks.
Walked individuals through basic troubleshooting tasks.
Monitored systems in operation and quickly troubleshot errors.
Configured hardware, devices, and software to set up work stations for employees.
Explained technical information in clear terms to promote better understanding for non-technical users.
Updated documentation and produced reports.
Responded to telephone, email and in-person inquiries regarding [Item] operation, use and repair.
Completed inventory counts and organized supplies.
Rolled out software updates and applied server patches to thwart threats from penetrating networks.
Analyzed issues to identify troubleshooting methods needed for quick remediation.
Provided Tier 1 IT support to non-technical internal users through desk side support services.
Provided basic end-user troubleshooting and desktop support.
Installed, modified, and repaired software and hardware to resolve technical issues.
Researched product and issue resolution tactics to address customer concerns.
Configured hardware and granted system permissions to new employees.
Security Assessor
Advanced Auto parts Inc
04.2011 - 05.2015
Responsible for performing security control compliance reviews, tracking, and continuous monitoring of assessment packages
Advise and assist with the Lifecycle Assessment and Authorization (A&A) process and developing a Security Assessment Report (SAR)
Perform security control assessments in support of new and existing systems
Participate in A-123 assessments
Utilize CSAM, the GRC tool for this program
Assess the implementation of NIST SP 800-53 security controls for major applications and general support systems using manual and automated test methods
Assess the severity of weaknesses or deficiencies discovered in the information system and its operating environment and recommend corrective actions to address identified vulnerabilities
Support security assessment and authorization (SA&A) during the system development life cycle to maintain the authorization to Operate
(ATO)
Perform security reviews, identify gaps in security architecture, and develop a security risk management plan
Perform security reviews and identify security gaps in security architecture resulting in recommendations for inclusion in the risk mitigation strategy
Perform risk analysis (e.g., threat, vulnerability, and probability of occurrence) whenever an application or system undergoes a major change
Plan and conduct security authorization reviews and assurance case development for initial installation of systems and networks
Provide input to the Risk Management Framework process activities and related documentation (e.g., system life-cycle support plans, concept of operations, operational procedures, and maintenance training materials)
Review authorization and assurance documents to confirm that the level of risk is within acceptable limits for each software application, system, and network.
Worked with other teams to enforce security of applications and systems.
Investigated and resolved incidents of unauthorized access to sensitive information.
Educated and trained users on information security policies and procedures.
Implemented security measures to reduce threats and damage related to cyber attacks.
Store Manager
Pep boys Auto parts
01.2008 - 03.2011
Train and Develop Employees
Payroll application & ADP Service Management
Partner with senior Leadership to ensure that mission, vision, and business goals are achieved
Lead and manage a team of about 20 Employees
Conduct job interviews, direct workflow, and develop work schedules for junior and senior staff
Responsible for coordinating the day to day running and operations of the store according to the established operating procedure schedule, through maintenance and management of staffing of Associates and Management staff
Implements company policies and procedures and ensures that subordinates are in compliance
Coordinate sales promotion activities within the store and service center as well as conduct store audits to compliance with control procedures
Reviews daily, weekly, and monthly management information reports that include sales updates, productivity, expense control, profit and loss and procedural compliance with subordinates
Ensure ongoing awareness and understanding of business needs and provide specific recommendations for improvement.
Managed inventory control, cash control, and store opening and closing procedures.
Managed store employees successfully in fast-paced environment through proactive communication and positive feedback.
Completed point of sale opening and closing procedures.
Rotated merchandise and displays to feature new products and promotions.
Maintained proper product levels and inventory controls for merchandise and organized backroom to facilitate effective ordering and stock rotation.
Assisted with hiring, training and mentoring new staff members.
Approved regular payroll submissions for employees.
Maximized sales and minimized shrinkage through excellent customer service and adherence to standard practices.
Set effective store schedules based on forecasted customer levels, individual employee knowledge, and service requirements.
Coached sales associates in product specifications, sales incentives, and selling techniques, significantly increasing customer satisfaction ratings.
Reconciled daily sales transactions to balance and log day-to-day revenue.
Promoted team collaboration, performance, and efficiency by fostering healthy environments focused on mutual success.
Education
Bachelor of Science - Business Management
University of Buea
Cameroon
10.1997
Master of Science - Cyber Security Management and Policy
University of Maryalnd Global Campus
Adelphi,MD
05.2023
Skills
RMF and NIST Security Controls (SP 800-37, 800-53) and other applicable Controls, FIPS and NIST Special Publication
SCCM/SCOM-Enterprise Management Platform, SEIM, JIRA Ticketing and Wireshark
Carbon black, AZURE defender, SOAR, SENTINEL 1, Microsoft defender, Fire eye and cisco amp as running tools for end point security
Active Directory ,Firewall Configuration and Microsoft window server
Experience in HRIS-Human Resource Information System
Security Control Assessment experienceISA-95, ISO27001 and other security tools
Ticket Management and Applications-Service Now
Security assessment, Risk management and compliance
Remediation recommendations
Microsoft 365 office Suite, SaaS model and share point
Cyber Security detection and response
LAN and WAN Technologies and Paolo Alto Firewall
Microsoft Office Suite, Visio, power point, MS Project, oracle, and SAP Globe
Active Directory Support, DNS Server, and Boarder Gateway Protocol and commands
Qualys Cloud Platform
Tenable Nessus
Flaw Detection
Risk Management Evaluations
Vulnerability and Penetration Testing
Best Practice Implementation
Compliance with Security Requirements
Incident Response Management
Remediation Activities
Information Auditing
Languages
Danish
Professional Working
English
Full Professional
Norwegian
Professional Working
Dutch
Limited Working
Swedish
Limited Working
Timeline
Cybersecurity Management, University of Maryland Global Campus
10.2021 - 06.2023
Cyber Security Analyst
Vector Talent Resources
12.2018 - 09.2022
IT Support Technician
Fisher Automotive Group
06.2015 - 10.2018
Security Assessor
Advanced Auto parts Inc
04.2011 - 05.2015
Store Manager
Pep boys Auto parts
01.2008 - 03.2011
Bachelor of Science - Business Management
University of Buea
Master of Science - Cyber Security Management and Policy
Regional Director at University of Maryland Global Campus, University of Maryland University College, UMUCRegional Director at University of Maryland Global Campus, University of Maryland University College, UMUC
Program and National Test Center Coordinator at University of Maryland Global CampusProgram and National Test Center Coordinator at University of Maryland Global Campus
Research Fellow at Smithsonian National Zoo & Conservation Biology InstituteResearch Fellow at Smithsonian National Zoo & Conservation Biology Institute