Summary
Overview
Work History
Education
Skills
Certification
Projects
Relevant Coursework
Timeline
Christopher Roberts

Christopher Roberts

Silver Spring,MD

Summary

Cybersecurity Specialist with proficiency in online security research, planning, execution and maintenance. Skilled at training internal users on security procedures and preventive measures. Information Security Specialist with passion for aligning security architecture plans and processes with security standards and business goals. Extensive experience developing and testing security framework for cloud-based software. Versed in robust network defense strategies.

Overview

6
6
years of professional experience
1
1
Certification

Work History

Security Analyst

IT-CNP
03.2023 - Current
  • Lead Security Analyst for State Government Systems
  • Create and submit POA&M reports
  • Respond to crisis or urgent situations within system to mitigate immediate and potential threats
  • Use mitigation, preparedness, and response and recovery approaches as needed to maximize information security
  • Oversee, evaluate, and support documentation, validation, and accreditation processes necessary to assure that IT systems meet organization's security requirements
  • Ensures appropriate treatment of risk, compliance, and assurance from internal and external perspectives
  • Provide security advice and recommendations to leadership and staff based on NIST and FIPS guidelines
  • Analyze security assessment reports
  • Develop estimates of security risks associated with deployment of new technologies
  • Use defensive measures and information collected from variety of sources to identify, analyze, and report events

Customer Service Representative

Harris Teeter
05.2017 - 12.2022
  • Assist customers by processing payments and resolving product concerns
  • Use strong interpersonal skills to provide service recovery when needed
  • Provide customers with special services, account updates and promotional options
  • Answer questions about store policies to support a positive customer experience
  • Western Union Agent Certified
  • Oversee and monitor sales floor to ensure efficient workflow and facilitate throughput
  • Facilitate positive customer interactions to ensure complete customer satisfaction
  • Accurately audit and count large sums of cash to record negative or positive balances

Education

Bachelor of Science - Computer Networks And Cyber Security

University of Maryland Global Campus
12.2022

Associate of Science - Cyber Security

Montgomery College
12.2020

Skills

  • Communications verbal/written
  • FedRAMP Documentation
  • Vulnerability Scanning
  • Leadership
  • Plan of Actions and Milestones (POA&M)
  • Attention to Detail
  • Excellent computer hardware and Windows troubleshooting capability
  • Strong interpersonal and customer relation skills
  • Linux
  • Python
  • Penetration testing
  • Nessus
  • Tenable

Certification

CompTIA Security+

Projects

I set up two virtual machines; one attacker machine, and one victim machine. The victim machine was a fictional company requesting a penetration test against one of their systems. Using the attacker machine, I performed multiple scans against the victim machine looking for possible exploits. I demonstrated how to gain root access to the victim machine and steal information as well as crack passwords.

My attack demonstration : https://www.youtube.com/watch?v=_Mw23Dxj5uc

I then created a report for the fictional company, demonstrating my ability to break into the system and extract their information. I meticulously broke down each vulnerability I discovered, the dangers of not correcting them, and what actions could be taken to ensure they and their customers would be protected.

My report :

https://docs.google.com/document/d/1gnJuVh0Simx-3ByCv1T13mCp6-2ThLQn9Kj5FQeI2D

Relevant Coursework

Network Security - An in-depth review of systems security, access control, network infrastructure, assessments and audits, cryptography and organizational security across both private and public enterprises. Real-world scenarios reinforce material covered.

Defending the Network - An overview of network defense and countermeasures and the fundamentals of defending networks, such as layered defense. The course introduces students to protective technologies commonly deployed on today's networks, such as system hardening, enterprise firewalls, VPNs, IDS, and antivirus. The course also develops and examines risk analysis and security policies to help build a secure network within Windows and Linux operating systems.

Attacker Tools and Techniques - Focuses on methods attackers use to successfully compromise target networks. Students learn how attackers perform initial reconnaissance and footprinting and then move on to scanning and eventual exploitation. This course approaches security from the hacker's perspective.

Introduction to Digital Forensics - Introduction to the techniques and tools of digital forensics investigations. The course emphasizes digital forensic procedures, digital forensic tools, and legal issues relating to digital forensics.

Penetration Testing and Cyber Red Teaming - An introduction to the concepts and skills necessary to perform penetration testing and red teaming. The goal is to use penetration testing techniques focused on the Penetration Testing Execution Standard (PTES) -including pre-engagement interactions, intelligence gathering, threat modeling, vulnerability analysis, exploitation, post-exploitation, and reporting to perform a penetration test and present findings to management.

Timeline

Security Analyst - IT-CNP
03.2023 - Current
Customer Service Representative - Harris Teeter
05.2017 - 12.2022
University of Maryland Global Campus - Bachelor of Science, Computer Networks And Cyber Security
Montgomery College - Associate of Science, Cyber Security
Christopher Roberts