Summary
Overview
Work History
Education
Skills
Accomplishments
RELEVANT COURSES
Certification
Languages
Work Availability
Work Preference
Quote
Software
Interests
Timeline
Generic

Michelle Bennett

Snr Computer Operator
Stonecrest,GA

Summary

Experienced IT and Cybersecurity Professional with over 15 years of hands-on experience in enterprise-level system monitoring, incident response, and technical support across hybrid environments (Windows, Linux, UNIX). Skilled in managing critical infrastructure, conducting root cause analysis, and promoting cross-departmental collaboration for 24/7 operational continuity. Currently pursuing a Master’s in Cybersecurity, with expertise in SIEM tools, system hardening, and network forensics. Seeking opportunities in IT operations, system administration, cybersecurity analysis, or technical support roles. Proficient in overseeing critical data center systems, focusing on server performance monitoring, incident response, and adherence to uptime standards for enterprise hardware.

Overview

24
24
years of professional experience
1
1
Certification

Work History

Computer Operator III

International Gaming Technology
05.2024 - Current
  • Direct daily operations, analyzing workflows and troubleshooting escalated system issues
  • Monitor online system performance across UNIX, Linux, and Windows platforms
  • Oversee user acceptance testing and software deployments
  • Collaborate with engineers to implement new system updates
  • Utilized WinScan FTP to automate secure report uploads to remote servers
  • Conducted job monitoring, failover testing, and system documentation

Computer Operator II

International Gaming Technology
07.2019 - 05.2024
  • Monitored Windows Server and Linux systems to ensure uptime
  • Documented incidents and solutions using Jira and internal ticketing tools
  • Conducted networking troubleshooting and responded to lottery client requests

NDC DATA TECH II

Scientific Games International
05.2018 - 07.2019
  • Deployed software across Windows and Linux systems in compliance with change requests
  • Monitored over 400 virtual/physical servers and executed backups
  • Performed network checks using SolarWinds, ping, and trace route tools

Data Center/Computer Operator II

GTECH Foreign Holdings Corporation Jamaica
06.2001 - 12.2016
  • Conducted QA testing, system monitoring, and job scheduling
  • Coordinated incident reporting, vendor communications, and e-pin inventory
  • Trained end users and drafted procedural documentation

Control Room Dispatcher

GTECH Foreign Holdings, Jamaica
03.2001 - 06.2001
  • Coordinated technician dispatches based on customer requests
  • Maintained service records and collaborated with internal departments

Education

Master of Science - Cybersecurity

Grand Canyon University

Associate of Science - Management of Information System

University Commonwealth Caribbean
Jamaica

Diploma - Business Accounting

Durham College Of Commerce
Jamaica
01-1998

Bachelor of Science - Cyber Security

Grand Canyon University
01.2024

Skills

  • Operating systems proficiency
  • Infrastructure management with virtualization tools
  • Experience with malware analysis techniques
  • Data management expertise: Apache Solr, WinScan FTP
  • Scripting in Python and Assembly
  • Backup & Monitoring Tools: Veritas NetBackup, Tivoli Workload Scheduler, Control-M, SolarWinds
  • Task Management & Collaboration: Jira Ticketing System, Change Management, Incident Documentation

Accomplishments

  • Resolved pActive Directory Configuration & Hardening Lab
    - Configured Windows Server 2019 as a domain controller using Active Directory Services.
    - Created and managed users and groups via PowerShell and command line.
    - Implemented organizational password policies and user access controls.
    - Hardened server by disabling unnecessary services and applying baseline security settings.
    - Conducted system integrity checks using DISM, SFC, and CHKDSK.
    - Performed full backup and tested restore functionality for critical data recovery.

Digital Forensic Investigation & Malware Analysis
- Conducted forensic investigation using tools such as Autopsy, Wireshark, and FTK Imager.
- Analyzed a compromised Windows system to extract artifacts, including event logs, deleted files, and registry entries.
- Used Hybrid Analysis and VirusTotal to examine malware behavior and identify Indicators of Compromise (IOCs).
- Collected digital evidence by chain-of-custody best practices.
- Generated forensic report outlining system breach timeline, malicious payloads, and attacker techniques.
- Applied ethical and legal considerations by cybersecurity laws and digital privacy principles.

Kali Linux Penetration Testing & Vulnerability Assessment
- Used Kali Linux tools including Nmap, Nikto, and OWASP ZAP to scan and assess vulnerabilities in a virtual lab environment.
- Enumerated open ports, services, and potential exploits on a Kioptrix VM target system.
- Conducted web application analysis using OWASP ZAP to detect SQL injections and XSS vulnerabilities.
- Documented findings and provided remediation steps in a formal vulnerability assessment report.
- Practiced ethical hacking principles and followed penetration testing methodologies aligned with the MITRE ATT&CK framework.
- Enhanced technical skills in reconnaissance, exploitation, and post-exploitation techniques within a sandboxed environment.roduct issue through consumer testing.

RELEVANT COURSES

  • Cyber Forensic Investigations
  • Cybersecurity and Ethical Hacking
  • Cyber Law & Privacy in a Digital Age
  • System Administration and Maintenance
  • Platforms and Network Technologies
  • Routing and Switching
  • Routing & Switching
  • Edge Malware
  • Malware Analysis
  • Cyber Warfare and Applications
  • Technology Implementation of Security Solutions
  • Policy Management for Security Solutions
  • Penetration Testing and Risk Management
  • Enterprise Cyber Law and Compliance Strategies
  • Innovation in Security Frameworks
  • Cybersecurity Program Development

Certification

  • Resolved pActive Directory Configuration & Hardening Lab
    - Configured Windows Server 2019 as a domain controller using Active Directory Services.
    - Created and managed users and groups via PowerShell and command line.
    - Implemented organizational password policies and user access controls.
    - Hardened server by disabling unnecessary services and applying baseline security settings.
    - Conducted system integrity checks using DISM, SFC, and CHKDSK.
    - Performed full backup and tested restore functionality for critical data recovery.

Digital Forensic Investigation & Malware Analysis
- Conducted forensic investigation using tools such as Autopsy, Wireshark, and FTK Imager.
- Analyzed a compromised Windows system to extract artifacts, including event logs, deleted files, and registry entries.
- Used Hybrid Analysis and VirusTotal to examine malware behavior and identify Indicators of Compromise (IOCs).
- Collected digital evidence by chain-of-custody best practices.
- Generated forensic report outlining system breach timeline, malicious payloads, and attacker techniques.
- Applied ethical and legal considerations by cybersecurity laws and digital privacy principles.

Kali Linux Penetration Testing & Vulnerability Assessment
- Used Kali Linux tools including Nmap, Nikto, and OWASP ZAP to scan and assess vulnerabilities in a virtual lab environment.
- Enumerated open ports, services, and potential exploits on a Kioptrix VM target system.
- Conducted web application analysis using OWASP ZAP to detect SQL injections and XSS vulnerabilities.
- Documented findings and provided remediation steps in a formal vulnerability assessment report.
- Practiced ethical hacking principles and followed penetration testing methodologies aligned with the MITRE ATT&CK framework.
- Enhanced technical skills in reconnaissance, exploitation, and post-exploitation techniques within a sandboxed environment.roduct issue through consumer testing.

Languages

English
Full Professional

Work Availability

monday
tuesday
wednesday
thursday
friday
saturday
sunday
morning
afternoon
evening
swipe to browse

Work Preference

Work Type

Full TimeContract Work

Work Location

Remote

Important To Me

401k matchStock Options / Equity / Profit SharingWork from home option4-day work weekCompany CultureWork-life balanceCareer advancementHealthcare benefitsFlexible work hoursTeam Building / Company RetreatsPaid time offPersonal development programsPaid sick leave

Quote

"Success is not final, failure is not fatal: It is the courage to continue that counts."
Winston Churchill

Software

Wireshark – Network traffic analysis

Splunk – Log and threat monitoring

Kali Linux – Ethical hacking and penetration testing

Nessus – Vulnerability scanning

Hybrid Analysis – Malware detection and file analysis

Active Directory – User and policy management

PowerShell – Scripting and task automation

VMware / Hyper-V – Virtual machine administration

ServiceNow – IT ticketing and service management

Microsoft Office Suite – Documentation and reporting

Windows Server 2019 – Server configuration and security

Linux (Ubuntu, CentOS) – System administration

Interests

Cybersecurity research and ethical hacking

Threat intelligence and digital forensics

Solving cyber puzzles and CTF challenges

Continuous learning and IT certifications

Mentoring women and youth in cybersecurity

Exploring emerging tech and innovation

Volunteering in STEM and faith-based outreach

Helping others grow spiritually and professionally

Bible study and faith-building activities

Quality time with family and children

Listening to gospel and inspirational music

Traveling and learning about new cultures

Timeline

Computer Operator III

International Gaming Technology
05.2024 - Current

Computer Operator II

International Gaming Technology
07.2019 - 05.2024

NDC DATA TECH II

Scientific Games International
05.2018 - 07.2019

Data Center/Computer Operator II

GTECH Foreign Holdings Corporation Jamaica
06.2001 - 12.2016

Control Room Dispatcher

GTECH Foreign Holdings, Jamaica
03.2001 - 06.2001

Bachelor of Science - Cyber Security

Grand Canyon University

Master of Science - Cybersecurity

Grand Canyon University

Associate of Science - Management of Information System

University Commonwealth Caribbean

Diploma - Business Accounting

Durham College Of Commerce
Michelle BennettSnr Computer Operator
Want your own profile? Create for free at MyPerfectResume.com