Versatile Cybersecurity Professional with over 4 years of experience in threat monitoring, incident response, and security operations. Proficient in using SIEM tools (Splunk, ArcSight), conducting vulnerability assessments, and implementing security policies. Strong analytical and problem-solving skills with a commitment to staying current with emerging cybersecurity threats and technologies. Experienced in collaborating with cross-functional teams to drive security initiatives and protect organizational assets.
Overview
6
6
years of professional experience
1
1
Certification
Work History
Supply Specialist
United States Army
07.2023 - Current
Maintained accurate inventory records, ensuring optimal stock levels to meet demand without overstocking.
Conducted regular inventory audits and reconciliations to identify discrepancies and ensure data accuracy.
Managed the procurement process, including identifying suppliers, negotiating contracts, and placing orders.
Evaluated supplier performance to ensure quality, cost-effectiveness, and timely delivery.
Developed and maintained strong relationships with key suppliers and vendors.
Analyzed historical data and market trends to forecast demand and plan inventory accordingly.
Ensured compliance with industry regulations and company policies regarding procurement and inventory management.
Maintained accurate and up-to-date records of all supply chain activities, including purchase orders, invoices, and inventory reports.
Conducted regular reviews to ensure documentation accuracy and compliance with audit requirements.
DevSecOps Engineer
Konica Minolta Business Solutions US
09.2021 - 09.2023
Designed and implemented CI/CD pipelines using tools such as Jenkins, GitLab CI, and CircleCI to automate code integration and deployment.
Managed source code repositories using GIT, GitHub, GitLab, and SVN, facilitating collaborative development and version control.
Administered and maintained systems running Red Hat, Ubuntu, CentOS, and Windows, ensuring high availability and performance.
Integrated automated testing and security checks into CI/CD pipelines to ensure code quality and security compliance.
Developed and maintained infrastructure as code using tools like Terraform, Ansible, and CloudFormation.
Automated provisioning and configuration of infrastructure on cloud platforms such as AWS, Azure, and Google Cloud.
Ensured consistency and repeatability in infrastructure deployment and management.
Built and managed containerized applications using Docker, ensuring consistent development and production environments.
Deployed and orchestrated container workloads using Kubernetes, Docker Swarm, or OpenShift.
Implemented configuration management solutions using Ansible, Puppet, or Chef to automate system configuration and management.
Set up and maintained monitoring and alerting systems using tools like Prometheus, Grafana, Nagios, and ELK stack (Elasticsearch, Logstash, Kibana).
Configured and managed Apache, Tomcat, WebLogic, TFS, and Nginx web servers to ensure secure and efficient web application hosting.
Monitored system performance, identifying and resolving issues to maintain uptime and performance.
Developed automation scripts using Shell, Bash, and Python to streamline system administration tasks and improve operational efficiency.
Collaborated with development, QA, and operations teams to streamline software development and deployment processes.
Ensured compliance with industry standards and regulatory requirements through automated compliance checks.
IT Security Analyst
Centaurus Technology Partners
08.2020 - 10.2021
Monitored network traffic and system activities using SIEM tools to identify and mitigate potential security threats.
Analyzed security alerts and logs from various sources to detect and respond to incidents in real-time.
Conducted regular vulnerability assessments and penetration testing to identify and address security weaknesses.
Led incident response efforts to quickly address and resolve security breaches and cyberattacks.
Conducted thorough root cause analysis of security incidents to prevent future occurrences.
Developed and implemented incident response plans and playbooks to streamline the response process.
Configured and managed security infrastructure, including firewalls, intrusion detection/prevention systems (IDS/IPS), and antivirus solutions.
Ensured systems and applications were up-to-date with the latest security patches and updates.
Designed and enforced security policies, standards, and procedures to protect sensitive data and systems.
Conducted regular security audits to ensure compliance with industry standards and regulatory requirements.
Generated comprehensive reports for management, highlighting security status, incident trends, and risk assessments.
Ensured compliance with industry standards (e.g., ISO 27001, NIST) and regulatory requirements (e.g., GDPR, CCPA).
Assisted in the development and maintenance of security governance frameworks.
Participated in internal and external security audits and assessments.
Security Operations Center Technician
Merck & Company
09.2018 - 03.2020
Responded to security incidents promptly, performing triage, containment, eradication, and recovery actions.
Conducted root cause analysis of security breaches and incidents to prevent future occurrences.
Conducted forensic analysis on compromised systems to identify the extent of the breach and gather evidence.
Documented incident response activities and generated detailed reports for management and stakeholders.
Conducted vulnerability assessments and penetration testing to identify and remediate security weaknesses.
Coordinated with IT teams to ensure timely patch management and system hardening.
Monitored and evaluated emerging vulnerabilities and threats, recommending appropriate mitigation strategies.
Managed and maintained security tools and technologies, including firewalls, intrusion detection/prevention systems (IDS/IPS), and antivirus solutions.
Configured and tuned SIEM systems to improve detection capabilities and reduce false positives.
Implemented and managed endpoint detection and response (EDR) solutions to enhance security visibility.
Conducted real-time monitoring of network traffic, endpoints, and security events to identify suspicious activities.
Analyzed alerts and security incidents to determine their severity and potential impact.
Education
Bachelor of Science - Management Information Systems
East Central University
Associate of Science - Management Information Systems
Oklahoma City Community College
Skills
Operating System: Red Hat, Ubuntu, Linux & Windows, CentOS
Build Tools: ANT, MAVEN, Jenkins
Version Control Tools: GIT, GIT Hub, Gitlab, SVN
CI Tool & Monitoring: Jenkins, CloudWatch, Nagios, Zabbix
Logistics & Medical Material Management at United States Army/ United States Army ReservesLogistics & Medical Material Management at United States Army/ United States Army Reserves
Military Intelligence Officer at United States Army Reserve, United States ArmyMilitary Intelligence Officer at United States Army Reserve, United States Army