Highly-motivated employee with desire to take on new challenges. Strong worth ethic, adaptability and exceptional interpersonal skills. Adept at working effectively unsupervised and quickly mastering new skills.
Overview
9
9
years of professional experience
1
1
Certification
Work History
Cybersecurity Analyst
COLLEBRA INC,
, New Jersey
11.2020 - Current
Responded promptly to cyber incidents by analyzing attack signatures, isolating affected systems, and restoring normal operations.
Monitored user activities on the network for suspicious behavior or malicious activity.
Analyzed network traffic logs, firewall logs, intrusion detection system alerts, and antivirus reports to identify potential threats.
Conducted vulnerability scans using automated tools to detect any weaknesses in the system.
Implemented firewalls and other security measures to protect data from external threats.
Provided technical support for troubleshooting issues related to security systems and networks.
Assisted with developing strategies for responding to potential cyber attacks such as malware outbreaks, phishing campaigns, ransomware attacks.
Performed regular system audits of all network resources to ensure compliance with corporate security policies.
Created detailed incident reports following a successful breach or other security event.
Participated in risk assessment exercises designed to identify areas of vulnerability within the organization's IT infrastructure.
Investigated suspected intrusions or breaches into the company's computer networks and systems.
Reviewed audit logs daily for unusual activity or patterns that could indicate an attempted breach or attack.
Updated existing processes and procedures related to cybersecurity best practices regularly.
Maintained up-to-date knowledge of evolving cybersecurity trends and technologies.
Installed patches and upgrades on a regular basis as part of ongoing maintenance efforts.
Configured systems with encryption software to secure sensitive data against unauthorized access.
Provided training on various topics related to cybersecurity awareness and best practices.
Analyzed system risk to identify and implement appropriate security countermeasures.
Assisted with creating disaster recovery plans in case of a major security incident.
Updated virus protection systems based on computer virus reports.
Monitored server event logs to identify and resolve performance and security issues.
Managed user authentication and authorization of data access.
Generated reports using statistical software in response to user requests.
Duplicated and backed up data to preserve availability and security in event of data breach.
Created and implemented Active Directory group policy settings to manage workstations.
Built firewalls and encrypted data to secure confidential information.
Alleviated leakage of company proprietary data to unauthorized resources and analyzed past performance data to enhance operations.
Made recommendations to improve security procedures and systems.
Researched, planned and implemented small- and large-scale improvements to address changing conditions and needs.
Analyzed security procedure violations and developed plans to prevent recurrence.
Promoted security awareness among employees and clients to alleviate risks and breaches.
Updated computer security policies and procedures upon learning of new risks.
Used penetration testing tools to identify weaknesses in security systems.
Designed, implemented and maintained security systems and controls.
Investigated information security breaches to identify vulnerabilities and evaluate damage.
Worked closely with fellow security personnel to remedy and alleviate technology issues.
Coordinated security updates to avoid outages and downtime.
Cybersecurity Analyst
BANK OF NEW YORK MELLON
, NY
06.2015 - 10.2020
Developed and implemented security policies and procedures to protect the company's assets from unauthorized access.
Analyzed network traffic logs, firewall logs, intrusion detection system alerts, and antivirus reports to identify potential threats.
Monitored user activities on the network for suspicious behavior or malicious activity.
Implemented firewalls and other security measures to protect data from external threats.
Assisted with developing strategies for responding to potential cyber attacks such as malware outbreaks, phishing campaigns, ransomware attacks.
Responded promptly to cyber incidents by analyzing attack signatures, isolating affected systems, and restoring normal operations.
Conducted vulnerability scans using automated tools to detect any weaknesses in the system.
Provided technical support for troubleshooting issues related to security systems and networks.
Created detailed incident reports following a successful breach or other security event.
Reviewed audit logs daily for unusual activity or patterns that could indicate an attempted breach or attack.
Participated in risk assessment exercises designed to identify areas of vulnerability within the organization's IT infrastructure.
Investigated suspected intrusions or breaches into the company's computer networks and systems.
Configured systems with encryption software to secure sensitive data against unauthorized access.
Provided training on various topics related to cybersecurity awareness and best practices.
Maintained up-to-date knowledge of evolving cybersecurity trends and technologies.
Installed patches and upgrades on a regular basis as part of ongoing maintenance efforts.
Assisted with creating disaster recovery plans in case of a major security incident.
Analyzed system risk to identify and implement appropriate security countermeasures.
Updated virus protection systems based on computer virus reports.
Protected secure data files and regulated access.
Monitored server event logs to identify and resolve performance and security issues.
Supported users with in-person and remote technical assistance.
Provided training and support to users for both hardware and software needs.
Managed user authentication and authorization of data access.
Duplicated and backed up data to preserve availability and security in event of data breach.
Generated reports using statistical software in response to user requests.
Designed and implemented plans to secure computer files against breach, destruction or accidental modification.
Created and implemented Active Directory group policy settings to manage workstations.
Built firewalls and encrypted data to secure confidential information.
Researched, planned and implemented small- and large-scale improvements to address changing conditions and needs.
Alleviated leakage of company proprietary data to unauthorized resources and analyzed past performance data to enhance operations.
Made recommendations to improve security procedures and systems.
Promoted security awareness among employees and clients to alleviate risks and breaches.
Analyzed security procedure violations and developed plans to prevent recurrence.
Updated computer security policies and procedures upon learning of new risks.
Learned about latest security threats from blogs and online publications.
Used penetration testing tools to identify weaknesses in security systems.
Collaborated with stakeholders to implement and update disaster recovery plans.
Designed, implemented and maintained security systems and controls.
Coordinated security updates to avoid outages and downtime.
Worked closely with fellow security personnel to remedy and alleviate technology issues.
Reviewed security bulletins and vulnerability patch releases.
Conducted record searches and coordinated with other units on procedural problems involving complex cases.
Cyber Security Specialist
American Income Life
, NY
10.2014 - 10.2020
Conducted risk assessments of existing information systems.
Performed regular system scans to detect potential cyber-attacks and intrusions.
Monitored network traffic for malicious or unauthorized activity.
Developed and implemented security protocols to protect corporate networks and systems.
Created detailed reports on current security threats and vulnerabilities.
Assisted in the development of incident response plans, procedures, and policies.
Identified and addressed security gaps in existing applications and services.
Provided technical advice on cyber defense strategies, tools, and technologies.
Researched emerging trends in cybersecurity threats, risks, and countermeasures.
Collaborated with IT teams to ensure data integrity across multiple platforms.
Implemented software patches to address identified system vulnerabilities.
Configured firewalls to protect against external attacks and malware infections.
Documented processes for responding to cyber threats in accordance with industry standards.
Evaluated the effectiveness of existing security infrastructure by running penetration tests.
Tracked reported incidents using ticketing systems for further investigation.
Coordinated with remote IT personnel to resolve any issues related to network security.
Investigated new methods of authentication such as biometrics or two-factor authentication.
Participated in threat intelligence sharing initiatives with other organizations.
Developed comprehensive training programs on best practices for data protection.
Analyzed system risk to identify and implement appropriate security countermeasures.
Ensured compliance with all applicable laws regarding data privacy and security.
Audited networks and security systems to identify vulnerabilities.
Built firewalls and encrypted data to secure confidential information.
Worked closely with fellow security personnel to remedy and alleviate technology issues.
Learned about latest security threats from blogs and online publications.
Analyzed security procedure violations and developed plans to prevent recurrence.
Promoted security awareness among employees and clients to alleviate risks and breaches.
Investigated information security breaches to identify vulnerabilities and evaluate damage.
Made recommendations to improve security procedures and systems.
Educated individuals on complex computer terms using easy-to-understand wording.
Reviewed security bulletins and vulnerability patch releases.
Designed, implemented and maintained security systems and controls.
Designed and implemented plans to secure computer files against breach, destruction or accidental modification.