Highly qualified Information Systems Security Officer with 2 years of experience handling government classified information. Certified Network Administrator with 5 years of proven expertise in installing, maintaining, and administering a diverse array of networked devices both remotely and locally. Respected team member and leader, excelling in working within small groups of 2-5 and larger teams of 10+. Proven managerial capabilities in successfully managing equipment valued at $1 million, showcasing an ability to safeguard and optimize asset performance through meticulous oversight and strategic planning. Information systems security professional with proven expertise in safeguarding data and systems. Strong focus on team collaboration, achieving results, and adapting to changing needs. Skilled in risk assessment, threat management, and security protocol development. Trusted by peers for reliability and strategic problem-solving. Robust background in safeguarding digital assets and ensuring compliance with industry standards. Recognized for fostering collaboration among team members and delivering reliable security solutions. Known for adaptability and commitment to achieving dependable results.
Interpersonal skills
Professionalism
Written communication
User support
Technology integration
Information assurance
Adaptability and flexibility
Information technology security oversight
Multitasking
Problem-solving abilities
Time management
Problem-solving
Cross-functional teamwork
Data management practices
Cloud security management
Proficient in customer engagement
Third-party risk assessment
Regulatory compliance management
Customer education support
Business continuity planning
Real-time intrusion monitoring
Confidentiality assurance strategies
Network security management
Information security system architecture
Security measurement tools
Cybersecurity management
Incident management
Vulnerability remediation management
User identity management
Proficiency in secure authentication methods
Effective presentation delivery
Development of security protocols
Application security management
Risk management and compliance
Engaging presentation skills
Access control systems oversight
User access administration
Cybersecurity training