Summary
Overview
Work History
Education
Skills
Value Offered
Work Availability
Timeline
ANGELA GAYHEART

ANGELA GAYHEART

CHICO,United States
Far and away the best prize that life offers is the chance to work hard at work worth doing.
Theodore Roosevelt

Summary

ENTRY LEVEL CYBER SECURITY ENGINEER | DEVOPS AUTOMATION ENGINEER | DEVOPS CONSULT Committed job seeker with a history of meeting company needs with consistent and organized practices. Skilled in working under pressure and adapting to new situations and challenges to best enhance the organizational brand.

Overview

8
8
years of professional experience

Work History

Airborne Cryptologic Language Analyst

US Air Force Reserve
07.2006 - 12.2014
  • Processed, exploited, analyzed, and disseminated signal intelligence information
  • Operated airborne signals intelligence systems and mission equipment
  • Identified and analyzed traffic for reportable significance
  • Improved analytical methods and procedures for maximum operational effectiveness
  • Provided threat warnings and actionable intelligence to customers.

Education

Airborne Linguist -

06.2004

DevOps Career Pathway Program, CompTIA Security+, Certified Ethical Hacker (CEH), Splunk Core User -

Skills

  • Cyber Security Analysis
  • Threat Analysis
  • Incident Management, Audit, and Data Loss Prevention (DLP) Controls
  • Data Handling, Normalization, and Log Ingestion Analysis
  • Prototyping and Cyber Security Architecture
  • Vulnerability Assessment and Penetration Testing
  • Continuous Diagnostics and Mitigation
  • Intrusion Prevention and Detection
  • Access Control, Authorization, and Endpoint Protection
  • Protocol Analysis, Firewall Management, and Encryption
  • DevOps Tools Administration
  • Asset Protection
  • Emergency Readiness and Response
  • Team Collaboration
  • Works Well Under Pressure
  • Cultural Sensitivity
  • Report Generation
  • Analytical Thinking
  • Conducting Risk Assessments
  • Combat Control Systems
  • Mission Planning
  • Training Expertise
  • Combat Control Logs

Value Offered

  • Understanding of the life cycle of network threats, attack vectors, and methods of exploitation.
  • Strong knowledge of TCP/IP, networking, system administration, and defense-in-depth.
  • Documentation of analysis, findings, and actions in incident reports.
  • Efficient utilization of security products to identify compromises on networks/endpoints.
  • Analysis of security implications when integrating systems and data with third-party vendors.
  • Review of massive log files, correlation of evidence for incident investigations, and alert triaging.
  • Familiarity with security frameworks (NIST, MITRE, OWASP, SANS CWE) and secure coding practices.

Work Availability

monday
tuesday
wednesday
thursday
friday
saturday
sunday
morning
afternoon
evening
swipe to browse

Timeline

Airborne Cryptologic Language Analyst - US Air Force Reserve
07.2006 - 12.2014
- Airborne Linguist,
- DevOps Career Pathway Program, CompTIA Security+, Certified Ethical Hacker (CEH), Splunk Core User,
ANGELA GAYHEART