Highly skilled Cybersecurity Analyst with over 6 years of experience in developing and implementing security policies, procedures, and best practices resulting in a decrease in security incidents and breaches. Proven track record in conducting regular vulnerability scans and penetration tests, identifying and remediating 75% of security weaknesses before they could be exploited. Collaborative team player with exceptional skills in monitoring and analyzing security events and logs, identifying and responding to security alerts and notifications. Holding certifications in CyberArk Trustee and CRGC, my expertise include assisting with authorizations in alignment with company standards, leveraging in-depth knowledge of NIST and related Special Publications.
Overview
14
14
years of professional experience
Work History
Cyber Security Analyst
Mobile Paradigms in Communications Technology Systems LLC (mpacTsys)
Pennsyl, PA
11.2018 - Current
Assist in preparing system security documentation, ensuring compliance with relevant frameworks and regulatory requirements
Monitor user activities on the network for suspicious behavior or malicious activity.
Participate in risk assessment exercises designed to identify areas of vulnerability within the organization's IT infrastructure.
Conduct vulnerability scans using automated tools to detect any weaknesses in the system.
Analyzed network traffic logs, firewall logs, intrusion detection system alerts, and antivirus reports to identify potential threats.
Review audit logs daily for unusual activity or patterns that could indicate an attempted breach or attack.
Respond promptly to cyber incidents by analyzing attack signatures, isolating affected systems, and restoring normal operations.
Develop and implemented security policies and procedures to protect the company's assets from unauthorized access.
Collaborate closely with small teams to update and track Plans of Action and Milestones (POA&Ms), reviewed vulnerability scan results, and collaborated with system owners to mitigate identified vulnerabilities
Provided crucial support in control selection based on system categorization and impact levels, ensuring alignment with security standards
Offer hands-on support in the implementation of controls, contributing to the establishment of robust security measures.
Provide daily facilitation and support for the pre and post-assessment functions of the clients information and serve as an advisor to system administrators.
Senior Help Desk Analyst
Lambeth Borough Council (UK)
01.2015 - 06.2017
Monitored and analyzed security events and logs, identifying and responding to 95% of security alerts and notifications within 15 minutes
Investigated and remediated a security breach, reducing the impact on the organization by 80% and preventing further damage
Configured and maintained security tools and systems, resulting in a 30% increase in system reliability and availability
Developed and implemented security policies, procedures, and best practices, resulting in a 25% decrease in security incidents and breaches
Researched and evaluated emerging security threats and vulnerabilities, providing recommendations for mitigation and prevention that were implemented and resulted in a 40% decrease in potential threats
Assisted in the development of a security architecture and design, resulting in a 20% increase in system security and resilience.
Data Integrity Analyst
Hilton Hotel (UK)
06.2010 - 01.2016
Analyzed process data with various statistical tools.
Organized information for use by team members in data analytics, reports and presentations.
Identified trends in errors across multiple systems for further investigation by management team.
Developed automated scripts and programs designed to streamline manual processes involved in maintaining accurate records across multiple systems.
Ensured compliance with applicable regulations related to safeguarding confidential information stored in databases.
Maintained detailed documentation of all changes made during the course of an audit or assessment process.
Analyzed large databases to identify discrepancies in data and resolve issues quickly.
Performed data integrity checks on all incoming and outgoing records to ensure accuracy and completeness.
Education
Comptia Security+
Comptia
ISC2
Bachelor of Science Data Security Management -
Middlesex University
Skills
Excellent problem solving skills
RMF (Risk Management Framework)
FedRamp Cloud Computing
Cyber Security Assessment Management (CSAM) Training
Plan of Action & Milestones (POA&M)
NIST Special Publications (NIST SP)
Security Categorization (SC)
Security Assessment Reporting (SAR)
Archer GRC (Governance, Risk, and Compliance)
Cybersecurity Frameworks
Penetration Testing
Timeline
Cyber Security Analyst
Mobile Paradigms in Communications Technology Systems LLC (mpacTsys)
Program Analyst/Administrative Assistant at Oasis Systems, LLC/DKW Communications/OPTIMUSProgram Analyst/Administrative Assistant at Oasis Systems, LLC/DKW Communications/OPTIMUS