Knowledgeable IT security professional with 2 years of experience designing and implementing security solutions in high-availability environments. Skilled in [Skill] and [Skill] and adept at delivering strong risk management practices.
Overview
3
3
years of professional experience
1
1
Certification
Work History
Cyber Security Analyst
PNC
Westminster, MD
02.2022 - Current
Audited networks and security systems to identify vulnerabilities.
Generated reports using statistical software in response to user requests.
Collaborated with stakeholders to implement and update disaster recovery plans.
Worked closely with fellow security personnel to remedy and alleviate technology issues.
Analyzed system risk to identify and implement appropriate security countermeasures.
Developed and implemented security policies and procedures to protect the company's assets from unauthorized access.
Assisted with developing strategies for responding to potential cyber attacks such as malware outbreaks, phishing campaigns, ransomware attacks.
Performed regular system audits of all network resources to ensure compliance with corporate security policies.
Participated in risk assessment exercises designed to identify areas of vulnerability within the organization's IT infrastructure.
Provided training on various topics related to cybersecurity awareness and best practices.
Assisted with creating disaster recovery plans in case of a major security incident.
Cyber Security Specialist
Nationwide
Columbus, OH
03.2021 - 02.2022
Conducted regular audits of IT systems to ensure compliance with corporate data security policies.
Investigated computer security incidents as they occurred, analyzed root cause of incidents, documented findings and recommended corrective actions.
Created detailed reports outlining current cyber security measures in place across the organization.
Provided guidance on cyber security awareness training for employees at all levels of the organization.
Assisted in developing a comprehensive disaster recovery plan in case of a major breach or attack.
Recommended changes to existing processes or procedures based on analysis of threat intelligence data.
Worked closely with other members of the IT team to ensure proper implementation of new hardware and software solutions into production environments is completed securely.
Made recommendations to improve security procedures and systems.