CompTIA Security
Cyber Security Analyst with an active secret clearance and 5 years of experience in monitoring vulnerabilities, analyzing generated reports from diverse electronic communications. Expertise in identifying and mitigating cyber threats, managing personnel, project management, implementing security policies, and managing compliance. Proven success in reducing system vulnerabilities, leading cross-function teams, and knowledge a strong foundation in risk management and infrastructure security. Ready to apply skills to new challenges.
ACAS
Active Directory
AESMP
Analytical Review
ASANA
Audit reporting
Azure Intelligence
Cloud Technology
Compliance Monitoring
Data Warehousing
eMass
Ethical AI Practices
Global Intelligence
Governance, Risk Management and Regulatory Compliance
Information Security Program
Infrastructure Security
ISO27002
IT security
MECM
NIST SP 800s
Nmap
People Leadership
PowerShell
Project management
Risk Management
Security Architecture
Security Threat Monitoring
SIEM Management
STIGs
Threat Analysis
Vulnerability Assessment
Windows Systems
CompTIA Security
Certified Ethical Hacking
Splunk, Core User
AIGPE Six SIGMA Green Belt
Cyber Warrior Pathway | Intellectual Point | Nov 2023 – Feb 2024
Learned skills in threat detection, network security, ethical hacking, cybersecurity tools, and compliance, preparing them to secure IT environments.
· Gained hands-on experience in identifying and responding to various cyber threats, including malware, phishing, and network intrusions.
· Mastered the implementation and management of secure network architectures, firewalls, and encryption techniques to protect sensitive data.
· Developed skills in ethical hacking, including conducting penetration tests to identify vulnerabilities and improve organizational security.
· Proficiently used industry-standard cybersecurity tools, such as SIEM systems, intrusion detection systems, and vulnerability scanners, to monitor and secure IT environments.
· Learned to ensure organizational compliance with cybersecurity regulations and standards, such as NIST, ISO 27001, and GDPR, while effectively managing and mitigating risk.
DevOps | Intellectual Point NOV 2020 – JAN 2021
• Skilled in analyzing security implications when integrating systems and data encryption
• Skilled with using anti malware software, VPNs, and operating systems.
• Demonstrated understanding of the life cycle of network threats, attacks, and attack vectors.
• Perform Infrastructure qualification activities, testing and change controls.
• knowledge of regulations with (GDRP) General Data Protection Regulation, PCI and privacy.
• Skilled in conducting network monitoring and intrusion detection analysis using various computer network defense tools.
• Efficient in identifying malicious factors on customer networks through triage alerts
• Hands-on expertise in configuring rules for firewall, VLAN, and router, access control list, port security, and unified threat management.
• Knowledge of SIEM and Incident Response.