Summary
Overview
Work History
Education
Skills
Certification
Timeline
Generic

Phurba Sherpa

Queens,NY

Summary

Versatile Cybersecurity Professional with over 4 years of experience in threat monitoring, incident response, and security operations. Proficient in using SIEM tools (Splunk, ArcSight), conducting vulnerability assessments, and implementing security policies. Strong analytical and problem-solving skills with a commitment to staying current with emerging cybersecurity threats and technologies. Experienced in collaborating with cross-functional teams to drive security initiatives and protect organizational assets.

Overview

6
6
years of professional experience
1
1
Certification

Work History

Supply Specialist

United States Army
07.2023 - Current
  • Maintained accurate inventory records, ensuring optimal stock levels to meet demand without overstocking.
  • Conducted regular inventory audits and reconciliations to identify discrepancies and ensure data accuracy.
  • Managed the procurement process, including identifying suppliers, negotiating contracts, and placing orders.
  • Evaluated supplier performance to ensure quality, cost-effectiveness, and timely delivery.
  • Developed and maintained strong relationships with key suppliers and vendors.
  • Analyzed historical data and market trends to forecast demand and plan inventory accordingly.
  • Ensured compliance with industry regulations and company policies regarding procurement and inventory management.
  • Maintained accurate and up-to-date records of all supply chain activities, including purchase orders, invoices, and inventory reports.
  • Conducted regular reviews to ensure documentation accuracy and compliance with audit requirements.

DevSecOps Engineer

Konica Minolta Business Solutions US
09.2021 - 09.2023
  • Designed and implemented CI/CD pipelines using tools such as Jenkins, GitLab CI, and CircleCI to automate code integration and deployment.
  • Managed source code repositories using GIT, GitHub, GitLab, and SVN, facilitating collaborative development and version control.
  • Administered and maintained systems running Red Hat, Ubuntu, CentOS, and Windows, ensuring high availability and performance.
  • Integrated automated testing and security checks into CI/CD pipelines to ensure code quality and security compliance.
  • Developed and maintained infrastructure as code using tools like Terraform, Ansible, and CloudFormation.
  • Automated provisioning and configuration of infrastructure on cloud platforms such as AWS, Azure, and Google Cloud.
  • Ensured consistency and repeatability in infrastructure deployment and management.
  • Built and managed containerized applications using Docker, ensuring consistent development and production environments.
  • Deployed and orchestrated container workloads using Kubernetes, Docker Swarm, or OpenShift.
  • Implemented configuration management solutions using Ansible, Puppet, or Chef to automate system configuration and management.
  • Set up and maintained monitoring and alerting systems using tools like Prometheus, Grafana, Nagios, and ELK stack (Elasticsearch, Logstash, Kibana).
  • Configured and managed Apache, Tomcat, WebLogic, TFS, and Nginx web servers to ensure secure and efficient web application hosting.
  • Monitored system performance, identifying and resolving issues to maintain uptime and performance.
  • Developed automation scripts using Shell, Bash, and Python to streamline system administration tasks and improve operational efficiency.
  • Collaborated with development, QA, and operations teams to streamline software development and deployment processes.
  • Ensured compliance with industry standards and regulatory requirements through automated compliance checks.

IT Security Analyst

Centaurus Technology Partners
08.2020 - 10.2021
  • Monitored network traffic and system activities using SIEM tools to identify and mitigate potential security threats.
  • Analyzed security alerts and logs from various sources to detect and respond to incidents in real-time.
  • Conducted regular vulnerability assessments and penetration testing to identify and address security weaknesses.
  • Led incident response efforts to quickly address and resolve security breaches and cyberattacks.
  • Conducted thorough root cause analysis of security incidents to prevent future occurrences.
  • Developed and implemented incident response plans and playbooks to streamline the response process.
  • Configured and managed security infrastructure, including firewalls, intrusion detection/prevention systems (IDS/IPS), and antivirus solutions.
  • Ensured systems and applications were up-to-date with the latest security patches and updates.
  • Designed and enforced security policies, standards, and procedures to protect sensitive data and systems.
  • Conducted regular security audits to ensure compliance with industry standards and regulatory requirements.
  • Generated comprehensive reports for management, highlighting security status, incident trends, and risk assessments.
  • Ensured compliance with industry standards (e.g., ISO 27001, NIST) and regulatory requirements (e.g., GDPR, CCPA).
  • Assisted in the development and maintenance of security governance frameworks.
  • Participated in internal and external security audits and assessments.

Security Operations Center Technician

Merck & Company
09.2018 - 03.2020
  • Responded to security incidents promptly, performing triage, containment, eradication, and recovery actions.
  • Conducted root cause analysis of security breaches and incidents to prevent future occurrences.
  • Conducted forensic analysis on compromised systems to identify the extent of the breach and gather evidence.
  • Documented incident response activities and generated detailed reports for management and stakeholders.
  • Conducted vulnerability assessments and penetration testing to identify and remediate security weaknesses.
  • Coordinated with IT teams to ensure timely patch management and system hardening.
  • Monitored and evaluated emerging vulnerabilities and threats, recommending appropriate mitigation strategies.
  • Managed and maintained security tools and technologies, including firewalls, intrusion detection/prevention systems (IDS/IPS), and antivirus solutions.
  • Configured and tuned SIEM systems to improve detection capabilities and reduce false positives.
  • Implemented and managed endpoint detection and response (EDR) solutions to enhance security visibility.
  • Conducted real-time monitoring of network traffic, endpoints, and security events to identify suspicious activities.
  • Analyzed alerts and security incidents to determine their severity and potential impact.

Education

Bachelor of Science - Management Information Systems

East Central University

Associate of Science - Management Information Systems

Oklahoma City Community College

Skills

  • Operating System: Red Hat, Ubuntu, Linux & Windows, CentOS
  • Build Tools: ANT, MAVEN, Jenkins
  • Version Control Tools: GIT, GIT Hub, Gitlab, SVN
  • CI Tool & Monitoring: Jenkins, CloudWatch, Nagios, Zabbix
  • Web Servers: Apache, Tomcat, WebLogic, TFS, Nginx
  • Containerization Tools: Docker, Docker swarm, Kubernetes
  • Languages/Scripts: HTML, Shell, Bash, Python
  • SDLC: Agile, Scrum, Waterfall
  • Configuration Management Tools: Chef, Puppet, Ansible
  • Databases: Oracle, MySQL, MongoDB, SQL Server, MS SQL, NoSQL

Certification

  • Comptia Security +
  • Microsoft Office Specialist: Microsoft Excel 2016

Timeline

Supply Specialist

United States Army
07.2023 - Current

DevSecOps Engineer

Konica Minolta Business Solutions US
09.2021 - 09.2023

IT Security Analyst

Centaurus Technology Partners
08.2020 - 10.2021

Security Operations Center Technician

Merck & Company
09.2018 - 03.2020

Bachelor of Science - Management Information Systems

East Central University

Associate of Science - Management Information Systems

Oklahoma City Community College
Phurba Sherpa