Summary
Overview
Work History
Education
Skills
Certification
Timeline
Generic

John Christian

Portland,OR

Summary

Detail-oriented and proactive cybersecurity professional with a Bachelor's degree in [Your Degree, e.g., Cybersecurity, Information Technology] and hands-on experience in securing IT infrastructures and mitigating cyber threats. Skilled in network security, penetration testing, risk management, and incident response, with a deep understanding of security protocols, compliance frameworks, and threat analysis tools. Proficient in deploying and managing security solutions for cloud environments, identifying vulnerabilities, and conducting security audits to ensure adherence to best practices. Committed to staying ahead of evolving threats and continuously enhancing security posture to protect sensitive data and systems. Adept at collaborating with cross-functional teams and effectively communicating complex security concepts to non-technical stakeholders

Overview

2
2
years of professional experience
1
1
Certification

Work History

IT Specialist

Atlanta Community Support Project
06.2022 - Current
  • Maintained a comprehensive knowledge of current industry trends, developments, tools, or techniques relevant to the role of an IT specialist.
  • Secured sensitive data by establishing robust cybersecurity measures and protocols.
  • Walked individuals through basic troubleshooting tasks.
  • Created software to automate work flow and boost productivity

Education

Bachelor of Science - Cyber Security And Asset Assurance

Western Governors University
Salt Lake City, UT
06-2026

Associate of Science - Computer Information Systems

Portland Community College
Portland, OR
08-2023

Skills

  • Network Security
    Knowledge of securing computer networks, firewalls, intrusion detection/prevention systems (IDS/IPS), and VPNs
  • Risk Management
    Ability to assess, mitigate, and manage risks, using tools and frameworks like NIST, ISO 27001, or CIS Controls
  • Incident Response & Forensics
    Experience in responding to security incidents, conducting digital forensics, and managing post-incident recovery
  • Penetration Testing (Pen Testing)
    Skills in ethical hacking, vulnerability assessments, and using tools like Kali Linux, Metasploit, or Burp Suite
  • Cryptography
    Understanding encryption techniques, secure key management, and protocols like SSL/TLS, PGP, and AES
  • Security Audits & Compliance
    Familiarity with auditing tools and ensuring compliance with regulations such as GDPR, HIPAA, or PCI-DSS
  • Malware Analysis
    Ability to identify, analyze, and mitigate malware using sandboxing techniques, reverse engineering, and threat intelligence
  • Cloud Security
    Understanding of securing cloud platforms (AWS, Azure, GCP) and concepts like identity management, access controls, and cloud encryption
  • Identity and Access Management (IAM)
    Experience in managing user authentication, Single Sign-On (SSO), Multi-Factor Authentication (MFA), and privileged access
  • Security Information and Event Management (SIEM)
    Knowledge of SIEM tools like Splunk, QRadar, or ELK Stack for real-time monitoring and analysis of security events
  • Security Protocols & Frameworks
    Proficient in understanding and applying security protocols like TCP/IP, DNSSEC, IPsec, and frameworks like MITRE ATT&CK
  • Operating Systems & Virtualization
    Strong experience with securing various operating systems (Windows, Linux, macOS) and virtualization technologies (VMware, Hyper-V)

Certification

CompTIA A+

CompTIA Network +

CompTIA Security+


Timeline

IT Specialist

Atlanta Community Support Project
06.2022 - Current

Bachelor of Science - Cyber Security And Asset Assurance

Western Governors University

Associate of Science - Computer Information Systems

Portland Community College
John Christian