
Cybersecurity Analyst Professional Summary: Listed Skills ordered from most recent to least Communicate with stakeholder modifications for Security Policy, Incident Response Plans, Run Books Communicate with stakeholders modifications Disaster Recovery Plan (DRP). Communicate with Stakeholders modifications to Business Continuity Plans (BCP), and (BIA) Conducting Project Gap Analysis for further definition of Project Scopes. Standards: NIST 800-53, NIST 800-171, & FIPS Level3, Cybersecurity Maturity Model (CMMC). Provisioning and I&AM with OKTA, RSA, Microsoft Auth, Google Auth for both Multifactor Auth & SSO Requiring execution of KB involving Entrust & RSA on Mobile phones for token configs within Apps. Ensuring I&AM Configurations work seamlessly with authenticators involving SSO's onboarding. I&AM Provisioning IIS Views for Databases & SQL Queries. Assessing & Troubleshooting platform processes for seamless functionality. Python Scripting: Fixing code to mitigate corruption with OS, Apps, Files, and Processes. Python Scripting : Troubleshooting IOT Devices, Pen Testing, Installations, Maintenance hooks R Coding for Data Analytics for Health Data Analytics and other various focuses. PowerShell Scripting: for automation of Window, Registries, Processes, Memory, and Configurations. PowerShell Scripting: for Sys Admin duties regarding End User anomalous behaviors. Redhat Linux Scripting: IOT Devices (Upgrading, Updating, Mitigating, Hardening). Penetration Testing O.S's: Parrot OS, Kali Linux 2.0, Black Arch. Vulnerability Management scanning tools Nessus, Wireshark, Splunk, and Kali. Email Monitoring: SPM, DMARK, DKIM, MX Toolbox, Security O365 Security, Titan. Scanning: URL's, Attachments, Email Headers, and Email Body for malicious intent. Reputation Scans: IP's, DNS FQDNs, and URLs. Configuration Management: Intune 2020, Azure 2020 Network Monitoring Systems NMS tools for performance monitoring Zabbix Security Incident & Event Monitoring (SIEM): Carbon Black, Sentinel, Splunk, Arcsight. Web Content filters: Titan (Black Lists, White List) to control internet personal usage. Cloud Services: Azure, Citrix (Upgrading & Updating Gold Images). Provisioning: Baselining Apps (Intune 2020). Loglogics: Integrating Syslog Servers for the purpose of SIEM Pipelining. CISCO: Netflow (Dashboarding, UI Configuration of services, CLI Routing of nodes) CISCO: Configuring Firewalls via approved Security Policies (RIPv2, OSPF, EIGRP, BGP) SCADA: (ICS) Arch Hardening (SCADA, HMI's, RTU's, PLC's, Field Units, Libs). SCADA: Deep Malware Analysis with various Static and Dynamic tools malicious software affecting SCADA ICS (Sandworm, Chernovite, Xenotime, Erythrite, Dragonfly, Log4J Variants (Networked Systems)). Cabling: Ethernet (Cat5e, 6, 7), Fiber: MTP, LC-UPC, SC-UPC, FS ULL (Fluke test MS2-100). Results-driven IT professional with notable success in planning, analysis and implementation of security initiatives. Strengths in providing comprehensive network design and security frameworks. Certified in NIST,RMF,AGILE. IT professional with [10] years of experience developing and implementing security solutions in fast-paced environments. Skilled in [Risk Management] and [Network Security Infrastructure] with proven history of delivering exceptional risk management support. IT professional with [5] years of experience developing and implementing security solutions in fast-paced environments. Skilled in [Data Structure Analytics] and [Buisness Intelligence & Risk Management Dashboards] with proven history of delivering exceptional risk management support. IT professional with [20] years of experience developing and implementing security solutions in fast-paced environments. Skilled in Hardening Network Infrastructure and [Systems] with proven history of delivering exceptional risk management support.
Oct 22nd, 2024 – Scheduled