Collaborated with cross-functional teams to develop comprehensive cybersecurity policies and procedures.
Designed secure network architecture, mitigating potential risks and vulnerabilities.
Served as a liaison between technical teams and executive leadership, effectively communicating complex cybersecurity concepts in layman''s terms.
Cybersecurity Engineer
BCS
08.2022 - 09.2023
Represented company's technical security interests to partners to provide bi-directional flow of technical information and best practices in information security.
Provided consultation and technical services on all aspects of information security.
Performed and reviewed technical security assessments of Software and identify points of vulnerability and non-compliance with established information security standards and recommend mitigation strategies.
Counseled senior-level management on current privacy and security trends and recommendations to mitigate risk.
Reviewed Functional Spec and Security Requirement documentation.
Perform GAP Analysis.
Evidence collection and documentation using Software Verification Record (SVR).
SOC Analyst
LaScala It Solutions
05.2022 - 08.2022
Reviewed violations of computer security procedures and developed mitigation plans.
Monitored computer virus reports to determine when to update virus protection systems.
Monitored use of data files and regulated access to protect secure information.
Engineered, maintained and repaired security systems and programmable logic controls.
Performed risk analyses to identify appropriate security countermeasures.
IT Technician
Brian H. Kelemen And Associates
08.2020 - 05.2022
Set up hardware and software in optimal configurations to meet network performance requirements.
Investigated and corrected problems with printers, copiers and other peripheral devices.
Managed system-wide operating system and software deployments, as well as related software upgrade problems.
Established, repaired and optimized networks by installing wiring, cabling and devices.
Configured hardware, devices and software to set up work stations for employees.
Manage 26 Wendy's and TIm Horton's site across Eastern Michigan.
SOC Analyst
Novacoast
05.2021 - 09.2021
Monitored SIEM environments such as LogRhythm, Splunk, VM Carbon Black.
Performed risk analyses to identify appropriate security countermeasures and creating a formal report to send to the client.
Engineered, maintained and repaired security systems and programmable logic controls.
Used critical thinking to break down problems, evaluate solutions and make decisions.
Resolved problems, improved operations and provided exceptional service.
Education
Bachelor of Science - Information Assurance And Cyber Defense
Eastern Michigan University
Ypsilanti, MI
12.2021
High School Diploma -
Early College Alliance/Lincoln Consolidated
Ypsilanti
04.2018
Skills
Rapid7
Solar Winds
Qualys
Splunk
LogRhythm
Jira
CANoe
Linux (Kali, Ubuntu, CentOS, Security Onion)
ISO
NIST
Python
Wireshark
Relevant Academic Projects
Network Forensics:
Was given multiple PCAP files from a breached network was tasked with investigating the scope of the damage and how the attacker was able to breach the network.
Using Wireshark to replay network traffic contained within the PCAP files and the in addition tools my team and I were able to deduce that there was an attack conducted on the network the attackers were able to infiltrate the network using Virtual Network Computing (VNC Protocol). Once connected they attempted a brute force attack.
Capstone:
The task we were assigned was to wirelessly attack a vehicle infotainment system using a pentesting platform and infotainment system provided by our client.
Due to limitations to both the infotainment system and the pentesting tool our group built our own access point and connected the infotainment system to our network to see what information would could obtain using both the given infotainment system and our own.
We were successful in creating our own access point and getting information from both the given infotainment system that was unsupported by the OEM and supported infotainment system from a team members vehicle.
The data received was the version and build number as well as communication from the vehicle and GM's Onestar API servers
Once successful in creating and preforming an attack using our own access point we attempted to replicate this using the given pentest platform and infotainment system.
Due to limitations to both systems and time constraints we unsuccessful with replicating it on the pentesting platform
Certification
FEMA IS-100.C: Introduction to the Incident Command System, ICS 100
Intro to Splunk
Relevant Coursework
Networking I
Networking II
Network Forensics & Analytics
Administration of Computer System
Managing Security Projects
Database & Web Application Security
Digital Forensics I
Advanced Operating System Security & Administrator
Policy Development Info Assurance
Malware Analysis & Reverse Engineering
Ethical Hacking & Offensive Security
Intro Human-Comp Interaction (Web Design)
Task Automation for IT Admins
Applied Programming & Scripting
Additional Information
ACTIVITIES/MEMBERSHIPS
, National Honor Society January 2008- June 2010
Student Leaders May 2017- December 2018
Peer Mentor Sept. 2017- December 2018
Timeline
Cyber Security Engineer
Roush Industries
09.2023 - Current
Cybersecurity Engineer
BCS
08.2022 - 09.2023
SOC Analyst
LaScala It Solutions
05.2022 - 08.2022
SOC Analyst
Novacoast
05.2021 - 09.2021
IT Technician
Brian H. Kelemen And Associates
08.2020 - 05.2022
Bachelor of Science - Information Assurance And Cyber Defense
Eastern Michigan University
High School Diploma -
Early College Alliance/Lincoln Consolidated
FEMA IS-100.C: Introduction to the Incident Command System, ICS 100