Versatile Cyber Security Professional adept at performing cyber assessments and implementing security solutions across diverse platforms including Azure, AWS, and Red Hat Linux environments. Expertise in deploying SIEM systems, DLP strategies, and ensuring compliance with NIST frameworks. Demonstrates strong capabilities in system administration, cloud security, and stakeholder communication. Proven track record of enhancing organizational security postures through strategic cybersecurity standards and practices.
Overview
2025
2025
years of professional experience
1
1
Certification
Work History
Cyber Security Analyst
TownPark
Plymouth Meeting, Pennsylvania
09.2016 - Current
Leveraged SIEM systems for enhanced threat detection, incorporating NIST cybersecurity framework to streamline response protocols, resulting in improved security incident handling
Implemented DLP policies and practices, ensuring the protection of sensitive information in alignment with NIST guidelines
Orchestrated security initiatives for Azure and AWS cloud platforms, integrating NIST standards to achieve robust security and compliance
Utilized SAST, DAST, and IAST methodologies for vulnerability assessments, reinforcing application and network security per NIST recommendations
Conducted detailed assessments of network infrastructures, identifying vulnerabilities and formulating strategic remediation plans, leading to a 35% improvement in security posture within local government units
Designed and implemented cybersecurity policies and best practices, tailoring solutions to the specific needs of each unit, enhancing their resilience against cyber threats
Facilitated training sessions on cybersecurity principles and best practices, significantly improving the knowledge base and preparedness of organizational personnel
Compiled and presented comprehensive risk assessment reports to senior leadership, translating complex technical findings into actionable insights, driving strategic decision-making
Fostered strong collaborative relationships with state, federal, and local government partners, ensuring cohesive efforts in cybersecurity initiatives
IT Manager/SP
GMU
Fairfax, VA
01.2006 - 09.2016
Risk Management Framework Project: Led the implementation of the RMF process for a critical infrastructure upgrade project
This involved categorizing system information and processes, selecting appropriate security controls, implementing these controls, and assessing their effectiveness
Continuously monitored security controls and conducted comprehensive risk assessments to ensure compliance with federal standards and organizational policies
This approach significantly reduced potential security risks and enhanced the overall security posture of the organization
Configured and managed firewall and network TAP technologies
Involved in Information Assurance Vulnerability Alert processes
Facilitated training on SAST and DAST methodologies
Affiliated Computer Services ACS
Wasington
05.2003 - 01.2005
Install, configure, and maintain Red Hat Linux operating systems
Manage kernel and system software updates, patches, and upgrades
Monitor system performance and utilization, including CPU usage, memory consumption, and disk I/O
Tune systems to ensure optimum performance levels
Implement and manage security tools and policies to ensure system security
Handle user authentication, authorization, and encryption services
Regularly update systems to patch vulnerabilities
Configure and manage network services and protocols such as SSH, FTP, and NFS
Troubleshoot network issues
Manage file systems and disk space
Implement and routinely test backup and recovery plans
Ensure data integrity through effective disaster recovery strategies
Manage job scheduling for routine processes
Maintain comprehensive documentation of the system's configuration and architecture
Ensure compliance with internal policies and external regulations
Provide technical support to other IT staff and end-users
Train users on new systems or software applications
Interact with vendors for system support and troubleshooting
Worked on PCI DSS and HIPPA requirements
Vulnerability scanning and remediation using Insight VM, OpenVAS, and Nessus
Fixed and detected vulnerabilities to maintain a high-security standard and documented security breaches & assessed the damage
Managed OAuth and OpenID Connect (OIDC)
Extensive experience in Open Web Application Security Project OWASP
Worked on Security information and event management (SIEM)
Hardened Servers and Workstations using CIS benchmark
Updated Servers and Workstation using Kaseya Patch management module
Very good in Scriptwriting using PowerShell
Maintaining firewalls, IDS/IPS, Email Security Appliances, and Web Security Appliances
Remaining conversant with the industry's computer security technology and practices
Enhanced cyber security awareness through end-user training and ongoing communications
Developed reviews and updated cybersecurity plans and procedures
Performed vulnerability, risk, and threat analysis
Ensured all changes to systems are performed in accordance with configuration controls
Developed playbooks to improve processes ocesses and information sharing across teams
Designed and implemented advanced security solutions, including Zero Trust Architecture, significantly enhancing organizational security posture
Managed the integration and operation of security technologies such as MFA and EDR, aligning with enterprise security requirements and standards
Supported critical cybersecurity operations as a key escalation point, effectively resolving complex issues and incidents
Ensured compliance with NIST frameworks and FISMA regulations, conducting regular audits and adjustments to meet federal standards
Education
Master of Science in Information Systems - Computer Security Management
Strayer University
08.2015
Skills
Cyber Assessment & DLP: Advanced execution of cyber assessments and deployment of Data Loss Prevention strategies to protect sensitive data
Cloud and Linux Security (Azure, AWS, Red Hat): Secures cloud infrastructures and Red Hat Linux systems, applying best practices for security and compliance
SIEM & NIST Framework Compliance: Proficient in the deployment and management of SIEM tools with a strong focus on NIST cybersecurity frameworks
System Administration: Extensive experience in maintaining system and network performance and security across multiple platforms including Linux Red Hat
Application Security Testing: Expert in SAST, DAST, and IAST methodologies for comprehensive vulnerability assessments
Stakeholder Engagement: Effective at communicating complex cybersecurity issues to non-technical stakeholders to aid decision-making
Technical Skills: Skilled in Perl, Python, C, and various cybersecurity tools for problem-solving and automation
Incident Response & Regulatory Compliance: Leads incident response and maintains compliance with NIST and other regulatory standards
Zero Trust Architecture: Experienced in designing and implementing Zero Trust solutions to enhance security
Enterprise Cybersecurity Solutions: Deploys and manages technologies such as MFA and EDR within large organizations
NIST & FISMA Compliance: Deep understanding of compliance requirements and security best practices
Security Operations Support: Provides expert support during major incidents, effectively managing impacts and resolutions
Collaborative Leadership: Collaborates under the guidance of Cybersecurity Architects and CISOs, supporting strategic security initiatives
Certification
Security Plus
CySA
CASP
References
Available upon request
Timeline
Cyber Security Analyst
TownPark
09.2016 - Current
IT Manager/SP
GMU
01.2006 - 09.2016
Affiliated Computer Services ACS
05.2003 - 01.2005
Master of Science in Information Systems - Computer Security Management