Summary
Overview
Work History
Education
Skills
Certification
Timeline
Generic

Esther Yusuf

Networking And Cybersecurity
Crowley,TX

Summary

Cybersecurity Specialist with proficiency in online security research, planning, execution and maintenance. Skilled at training internal users on security procedures and preventive measures. Computer security professional with Number years of progressive experience in Industry industry. Demonstrated skill identifying business risks and compliance issues and designing proactive solutions. Background designing and implementing layered network security approaches. Organized and dependable candidate successful at managing multiple priorities with a positive attitude. Willingness to take on added responsibilities to meet team goals. Detail-oriented team player with strong organizational skills. Ability to handle multiple projects simultaneously with a high degree of accuracy. To seek and maintain full-time position that offers professional challenges utilizing interpersonal skills, excellent time management and problem-solving skills. Hardworking and passionate job seeker with strong organizational skills eager to secure entry-level Job Title position. Ready to help team achieve company goals.

Overview

4
4
years of professional experience
5
5
years of post-secondary education
2
2
Certificates

Work History

Cybersecurity Analyst

Hill College
Cleburne, Texas
05.2019 - Current
  • Performed risk analyses to identify appropriate security countermeasures.
  • Recommend improvements in security systems and procedures.
  • Developed and maintained incident response protocols to mitigate damage and liability during security breaches.
  • Conducted security audits to identify vulnerabilities.
  • Designed company-wide policies to bring operations in line with Center for Internet Security (CIS) standards.
  • Managed relationships with third-party intrusion detection system providers.
  • Maintained company-wide compliance with industry standards and Area of certification.
  • Authored security incident reports, highlighting breaches, vulnerabilities and remedial measures.
  • Spearheaded bring your own device program, defining necessary security parameters and designing complementary security deployments.
  • Monitored use of data files and regulated access to protect secure information.
  • Monitored computer virus reports to determine when to update virus protection systems.
  • Developed, tested and implemented security policies, plans and procedures for organizational protection.
  • Administered and monitored firewalls, intrusion detection systems and anti-virus software to detect risks.
  • Executed penetration testing to identify security weaknesses and develop disaster recovery plans.
  • Implemented security measures to reduce threats and damage related to cyber attacks.
  • Investigated and resolved incidents of unauthorized access to sensitive information.
  • Analyzed network traffic and system logs to detect malicious activities.
  • Worked with other teams to enforce security of applications and systems.

Education

Associate - Network And Cybersecurity

Hill College
Hillsboro, TX
05.2019 - 12.2023

Skills

IDS Integration

undefined

Certification

National Cyber League

Timeline

National Cyber League

03-2023

Cybersecurity Analyst

Hill College
05.2019 - Current

Associate - Network And Cybersecurity

Hill College
05.2019 - 12.2023

Microsoft Word 2016 introductory

04-2019
Esther YusufNetworking And Cybersecurity