Proud Navy veteran dedicated Cyber Security Analyst combining a deep understanding of technology, cloud platforms, and customer needs to deliver resilient and responsive solutions. Highly skilled in cloud security operations, I blend my AWS, Azure, and digital forensics skills to safeguard national security interests. My continuous pursuit of industry training and hands-on approach to cybersecurity resilience makes me an asset in dynamic tech landscapes.
Cloud Security (AWS, Azure, Google Cloud) Agile Methodology Active Directory Networking & System Administration Forms & Workflows SaaS Process Automation JavaScript Jira
Software Production Life Cycle Salesforce IAM Documentation Okta SOAR Netskope Python EDP SIEM Threat Analysis Security Information And Event Management (SIEM) Digital Forensics & Investigation Ethical Hacking & Endpoint Detection and Response
Data Analytics & Collection Network & System Administration Microsoft Defender, Python Security Operations Center (SOC) Management Incident Triage & Escalation Customer-Centric Technology Solutions Cyber Resilience & National Security Defense training
Designed a Python script to automate a manual data handling process, leveraging the Python Image Library for advanced image manipulation and API integrations to ensure seamless data exchange, thereby streamlining operational workflows and significantly enhancing productivity.
Spearheaded a comprehensive security assessment, conducting rigorous vulnerability testing on servers. Implemented robust hardening measures to fortify system defenses, aligning with best practices for information security and matching the role's requirements for a strong security posture.
Designed a Python script to automate a manual data handling process, leveraging the Python Image Library for advanced image manipulation and API integrations to ensure seamless data exchange, thereby streamlining operational workflows and significantly enhancing productivity.
Spearheaded a comprehensive security assessment, conducting rigorous vulnerability testing on servers. Implemented robust hardening measures to fortify system defenses, aligning with best practices for information security and matching the role's requirements for a strong security posture.