Experienced with identifying and mitigating cybersecurity threats to protect sensitive data. Utilizes comprehensive knowledge of network security protocols and tools to prevent unauthorized access. Track record of implementing effective incident response strategies and ensuring compliance with industry standards.
Overview
13
13
years of professional experience
1
1
Certification
Work History
Cybersecurity Analyst
Allied Universal Security Services
02.2021 - Current
Policies are being followed
Analyzed security incidents post-resolution, identifying areas for improvement in both technical controls and incident response processes.
Collaborated with IT teams to integrate security measures into the development and deployment of new applications.
Conducted security audits to identify vulnerabilities.
Managing Daily Hour Log
Maintaining all shifts are fully covered
Manage End of Shift
Assist with TSA application compliance
Reduced risk of cyber attacks by conducting regular vulnerability assessments and penetration testing.
Improved incident response times by developing and maintaining cybersecurity playbooks for common attack scenarios.
Performed regular reviews of user access rights, minimizing the risk posed by insider threats or compromised accounts.
Performed risk analyses to identify appropriate security countermeasures.
Optimized security monitoring processes by implementing automated tools for real-time threat detection and analysis.
Ensured compliance with industry regulations by performing comprehensive audits on existing security policies and procedures.
Advocated for and achieved significant improvements in security posture by leading change in organizational culture towards cybersecurity.
Optimized incident response times by developing and implementing streamlined process for handling security breaches.
Customized and managed security information and event management (SIEM) systems for real-time threat detection and analysis.
Reduced downtime caused by security incidents by establishing robust incident management and recovery framework.
Facilitated cross-departmental collaboration to ensure integration of security best practices in all IT projects.
Developed and enforced stringent cybersecurity policies, significantly reducing risk of data breaches.
Led cybersecurity awareness training sessions, increasing staff vigilance against phishing and social engineering attacks.
Played key role in regulatory compliance projects, ensuring adherence to industry standards and legal requirements related to cybersecurity.
Enhanced data integrity and availability by designing and implementing comprehensive backup and disaster recovery plans.
Spearheaded adoption of encryption technologies, safeguarding sensitive information during transmission and storage.
Leveraged cutting-edge cybersecurity tools and technologies for continuous monitoring and protection of IT infrastructure.
Enhanced network security by implementing robust intrusion detection systems and conducting regular vulnerability assessments.
Conducted regular security risk assessments, enabling proactive identification and mitigation of potential threats.
Delivered cybersecurity training programs, raising employee awareness on potential threats and best practices.
Implemented data loss prevention strategies, safeguarding valuable company information from unauthorized access.
Enhanced network security by implementing multi-factor authentication and intrusion detection systems.
Managed a diverse team of cybersecurity professionals to achieve organizational goals effectively.
Optimized incident response time with the development of clear and concise communication protocols.
Liaised with other departments to minimize network interruptions and possible downtimes.
Oversaw development and implementation of improvements to support network operations.
Coordinated secure system access of users to various department systems and platforms.
Led technical upgrade projects for clients by working and coordinating with consultants and developers for integrations.
Implemented and maintained technology and software budget.
Managed anonymous online and phone-call tips, implementing uncovered information into investigation processes to solve cases.
Monitored confidential company data and mitigated hacking through network systems updates.
Championed a culture of continuous improvement within the cybersecurity team, fostering innovation and collaboration among members.
Ensured compliance with industry regulations by developing and enforcing comprehensive security policies and procedures.
Influenced executive decision-making through concise presentations on cybersecurity risks, trends, and best practices.
Evaluated emerging technologies for potential application in strengthening overall security posture.
Maintained up-to-date knowledge on current threat landscape trends by attending conferences, webinars, and engaging in professional networking opportunities.
Oversaw vendor relationships, including negotiating contracts, monitoring performance, and ensuring adherence to established security standards.
Security Analyst
Tom Thumb Grocery
02.2012 - 11.2019
Provided excellent customer service to all customers
Recognized as “Employee of the Month”
Maintained up-to-date knowledge of emerging threats by attending professional development events and staying informed on industry trends.
Analyzed log files for anomalies, identifying potential intrusions or malicious activity before significant damage occurred.
Coordinated incident response efforts across multiple departments, fostering teamwork in resolving complex issues effectively.
Educated employees on cybersecurity awareness through training sessions, significantly reducing instances of human error-related breaches.
Developed and maintained detailed documentation on security processes, facilitating knowledge transfer and ensuring consistency in procedures.
Conducted regular vulnerability assessments to identify weaknesses and implement appropriate countermeasures.
Reviewed existing security architecture for improvements that aligned with evolving business needs while minimizing risk exposure.
Evaluated third-party vendors'' security posture during contract negotiations, ensuring adherence to organizational requirements and minimizing risk exposure.
Delivered cybersecurity training programs, raising employee awareness on potential threats and best practices.
Liaised with other departments to minimize network interruptions and possible downtimes.
Analyzed network security and current infrastructure, assessing areas in need of improvement.
Oversaw development and implementation of improvements to support network operations.
Coordinated secure system access of users to various department systems and platforms.
Led technical upgrade projects for clients by working and coordinating with consultants and developers for integrations.
Identified computer hardware and network system issues, performing troubleshooting techniques for remediation.
Managed life cycle replacement of hardware and software.
Managed anonymous online and phone-call tips, implementing uncovered information into investigation processes to solve cases.
Monitored confidential company data and mitigated hacking through network systems updates.
Built relationships and fostered effective communication with legal personnel to conduct practical investigations.
Championed a culture of continuous improvement within the cybersecurity team, fostering innovation and collaboration among members.
Ensured compliance with industry regulations by developing and enforcing comprehensive security policies and procedures.
Maintained up-to-date knowledge on current threat landscape trends by attending conferences, webinars, and engaging in professional networking opportunities.
Evaluated emerging technologies for potential application in strengthening overall security posture.
Coordinated with external partners such as law enforcement agencies during major cyber incidents for swift resolution and mitigation efforts.
Oversaw vendor relationships, including negotiating contracts, monitoring performance, and ensuring adherence to established security standards.
Collaborated with cross-functional teams to develop robust business continuity plans in the event of a cyber attack.
Reduced cybersecurity risks by conducting regular vulnerability assessments and penetration tests.
Managed a diverse team of cybersecurity professionals to achieve organizational goals effectively.
Cyber Security Manager, IT Manager
Chick-Fil-A
01.2013 - 01.2014
Supported implementation of secure cloud-based solutions, facilitating seamless collaboration between remote teams while maintaining data integrity.
Aided in creating documentation outlining proper procedures for handling sensitive information securely to protect against unauthorized disclosure or misuse.
Reviewed employee access rights regularly to ensure appropriate permissions were granted based on job roles while limiting unnecessary exposure of confidential data resources internally.
Assisted in developing comprehensive incident response plans for potential cybersecurity threats, ensuring rapid recovery and minimal downtime.
Participated in security awareness training sessions, improving overall team knowledge and preparedness for potential threats.
Evaluated third-party vendors'' security practices as part of due diligence reviews prior to entering into partnerships or contracts with external organizations.
Assisted in the development of security policies governing employee use of personal devices for work purposes, balancing productivity with risk management concerns.
Assisted in performing regular audits of physical access points throughout the facility, ensuring full compliance with established security policies.
Monitored developments in global cybersecurity regulations closely so that adjustments could be made promptly when necessary to maintain a robust security posture.
Acted as a liaison between the security team and other departments, fostering improved communication channels and promoting a culture of shared responsibility for safeguarding critical organizational assets.
Collaborated with IT team members to optimize network security, reducing the risk of unauthorized access and data breaches.
Provided timely technical support during critical incidents, enabling swift resolution and minimizing potential damage to company assets.
Conducted security audits to identify vulnerabilities.
Performed risk analyses to identify appropriate security countermeasures.
Recommend improvements in security systems and procedures.
Developed plans to safeguard computer files against modification, destruction, or disclosure.
Provided technical support, resolving IT issues to maximize productivity for team members.
Delivered assistance and support for team-based IT projects.
Followed up with clients to verify optimal customer satisfaction following support engagement and problem resolution.
Managed customers' expectations of support and technology functionality in order to provide positive user experience.
Implemented and maintained software solutions according to customer requirements.
Studied client requirements, developing and implementing software solutions that fit with expectations.
Utilized Java, C#, and other programming languages to develop software solutions.
Analyzed user requirements and developed solutions to meet needs.
Education
High School Diploma -
Byron Nelson High School
Trophy Club, Texas
06-2014
Skills
Risk management assessment
Incident management
Digital forensics
Network security
Certification
CISSP - Certified Information System Security Professional