Successfully led the implementation of Multi-Factor Authentication for 10,000 students, faculty, and staff, collaborating effectively with various departments. Currently seeking a new role to further enhance my skills and explore management opportunities.
Overview
15
15
years of professional experience
1
1
Certification
Work History
Information Security Engineer
Youngstown State University
07.2024 - Current
Assists with security awareness training programs and phishing simulations for all university employees and monitors stats and activity within these areas.
PCI Compliance and SOC II reporting.
Reducing risk by minimizing vulnerabilities and review and editing policies.
Identified and analyzed business violations of security polices and standards.
Ensure adherence to FIPS 140-2 compliance for sensitive information using Proofpoint
Log Monitoring of account activity and system abnormalities, ensure adherence to security baseline polices, and remediation of discovered abnormalities through technical, administrative, and policy actions.
Routinely monitor and audit organization systems and applications (servers, endpoints, applications, and web pages) to ensure best practice configurations and mitigation of vulnerabilities.
Develops and maintains IR Plan and playbooks while performing annual tabletop exercises and penetration tests.
Assists with vulnerability and risk management program, development and sustainment
Rapid7 vulnerability management, MS Defender and Tenable.
Responsible for managing boundary and data center firewalls as well as sustaining email security best practices using MS Exchange, Proofpoint and Abnormal platforms.
Responsible for training and supervising lower-level analysts and student employees.
In addition, I perform the duties of a Data Security Analyst 2
Data Security Analyst 2
Youngstown State University
07.2021 - 07.2024
Remediate Endpoints – Cortex XDR and MS Defender
Microsoft O365
Microsoft Azure
Monitor and implement policies to Microsoft Cloud APP Security for Data Loss Prevention
Block Malicious URL with Proofpoint Targeted Attack Protection
Add malicious URL or IP to Proofpoint Threat Response for blocking command and control servers or malicious websites.
Data Security Analyst 1
Youngstown State University
07.2019 - 07.2021
Reviews Security Report Logs and Remediates Compromised Accounts.
Vulnerability Management and Endpoint Protection
Enroll Staff and Students in Multi Factor Authentication
Conduct continuous monitoring of the network to maintain a security baseline and meet system and compliance by focusing on vulnerability analysis and remediation
Technology Support Technician 1
Youngstown State University
04.2019 - 07.2019
Support and repair endpoints
Mitigation of Security for Endpoint Devices
Upgrade Infrastructure
Network Service Technician 3
Youngstown State University
10.2010 - 04.2019
Upgrade and Maintained
Cisco and Ruckus Wireless Controllers and Access Points.
Upgrade and Maintained Cisco and Brocade Switches
NEC SV8500 Phone System - Analog and VoIP
Education
Master of Business Administration -
Youngstown State University
Youngstown
12.2021
Bachelor of Business Management -
Walsh University
Canton
12.2016
Skills
Cisco Switches, Cisco Wireless Controllers, Cisco Wireless Access Points, Proofpoint PPS Server, Proofpoint Threat Response, Abnormal, Tenable, Cortex XDR- End Point Protection, Proofpoint TAP, Nexpose, Palo Alto Firewall, Microsoft Defender, Microsoft Azure, Microsoft Purview, Bitsite, Cloud App Security, Microsoft DLP (Data Loss Prevention) MAT Terminal for NEC