Summary
Overview
Work History
Education
Skills
Technical Skills
Certification
Timeline
Generic

Sequoya Jackson

Acworth,GA

Summary

Dedicated and detail-oriented Cyber Security undergraduate studying at Kennesaw State University and in pursuit of Google Cybersecurity Professional Certificate in addition to Security+ Certification. Seeking to expand knowledge and gain hands-on experience in cybersecurity to support and enhance IT capabilities.

Overview

5
5
years of professional experience
1
1
Certification

Work History

Cleaning Technician

Sparkle Cleaning Services
11.2022 - Current
  • Performed detailed cleaning services for office buildings, flight schools, and airports, including private aircraft.
  • Managed 25+ cleaning projects weekly and supervised a cleaning service team to ensure quality and efficiency.
  • Train, manage, and supervise a cleaning service team to ensure optimal performance and services.

Marketing Coordinator

Spot My Home Real Estate
08.2021 - 12.2021
  • Directed email campaigns and social media content, designed advertising materials, and improved online presence.

Team Member

Chick-Fil-A
05.2021 - 08.2021
  • Provided exceptional customer service and maintained high standards of cleanliness and organization.

Assistant Manager/ Direct Sales Associate

Vector Marketing
05.2020 - 12.2020
  • Conducted sales, recruited and trained new team members, and managed the ordering process.

Education

Bachelor of Science - Cyber Security

Kennesaw State University
Kennesaw, GA
05-2027

High School Diploma -

Etowah High School
Woodstock, GA
05-2020

Skills

  • Multitasking
  • Communication
  • Detail-Oriented
  • Teamwork/Collaboration
  • Customer Service Oriented
  • Strong work ethic
  • Leadership

Technical Skills

  • Cybersecurity Tools: SIEM, IDS/NIDS
  • Networking: Protocols, Vulnerability Scanning
  • Programming: SQL, Linux CLI
  • Software: Microsoft Office Suite

Certification

Foundations of Cybersecurity Coursera https://www.coursera.org/account/accomplishments/certificate/2V2W38X4Z3EZ October 2023

  • Introduced security ethics.
  • Improve and acquire knowledge and skills essential to cybersecurity analysts.
  • Identify security attacks and the severity/impact of the organization.
  • Recognize customary tools used by cybersecurity analysts.


Play It Safe: Manage Security Risks Coursera https://www.coursera.org/account/accomplishments/certificate/LXBM727Z8TQA October 2023

  • Identify severe threats, risks, and vulnerabilities to an organization's assets.
  • Implement and establish a 'playbook' to respond to threats, vulnerabilities, and risks.
  • Examination of an organization's use of security frameworks and security controls to defend it's assets.
  • Introduced to Security Information Event Management tools.


Connect and Protect: Networks and Network Security Coursera https://www.coursera.org/account/accomplishments/certificate/LH9HRY5SLPUJ November 2023

  • Identified a variety of networks and network components.
  • Ensuring the security of a network against intrusive attacks.
  • Enhanced understanding of system hardening techniques.
  • Network protocols involving the transfer of data.


Tools of the Trade: Linux and SQL Coursera https://www.coursera.org/account/accomplishments/certificate/4BN89TTJ8YZR February 2024

Utilized SQL to filter and retrieve information from a database.

Compared and implemented the use of GUI (Graphical User Interface) and CLI (Command Line Interface).

Executing Linux commands to manage and navigate the FHS (File Hierarchy System).


Assets, Threats, and Vulnerabilities Coursera https://www.coursera.org/account/accomplishments/certificate/7HKLEB3MCDXM March 2024

  • Classify assets
  • Identified social engineering, malware, and web-based exploit threats.
  • Inspect attack surfaces to discover risks and vulnerabilities.
  • Observed the threat modeling process.


Sound the Alarm: Detection and Response Coursera https://www.coursera.org/account/accomplishments/certificate/582JU7WSXNCA April 2024

  • Identify the steps to contain, eradicate, and recover from an incident
  • Analyze packets to interpret network communications
  • Perform queries in Security Information and Event Management (SIEM) tools to investigate an event
  • Understand basic syntax, components of signatures and logs in Intrusion Detection Systems (IDS) and Network Intrusion Detection Systems (NIDS) tools


Timeline

Cleaning Technician

Sparkle Cleaning Services
11.2022 - Current

Marketing Coordinator

Spot My Home Real Estate
08.2021 - 12.2021

Team Member

Chick-Fil-A
05.2021 - 08.2021

Assistant Manager/ Direct Sales Associate

Vector Marketing
05.2020 - 12.2020

Foundations of Cybersecurity Coursera https://www.coursera.org/account/accomplishments/certificate/2V2W38X4Z3EZ October 2023

  • Introduced security ethics.
  • Improve and acquire knowledge and skills essential to cybersecurity analysts.
  • Identify security attacks and the severity/impact of the organization.
  • Recognize customary tools used by cybersecurity analysts.


Play It Safe: Manage Security Risks Coursera https://www.coursera.org/account/accomplishments/certificate/LXBM727Z8TQA October 2023

  • Identify severe threats, risks, and vulnerabilities to an organization's assets.
  • Implement and establish a 'playbook' to respond to threats, vulnerabilities, and risks.
  • Examination of an organization's use of security frameworks and security controls to defend it's assets.
  • Introduced to Security Information Event Management tools.


Connect and Protect: Networks and Network Security Coursera https://www.coursera.org/account/accomplishments/certificate/LH9HRY5SLPUJ November 2023

  • Identified a variety of networks and network components.
  • Ensuring the security of a network against intrusive attacks.
  • Enhanced understanding of system hardening techniques.
  • Network protocols involving the transfer of data.


Tools of the Trade: Linux and SQL Coursera https://www.coursera.org/account/accomplishments/certificate/4BN89TTJ8YZR February 2024

Utilized SQL to filter and retrieve information from a database.

Compared and implemented the use of GUI (Graphical User Interface) and CLI (Command Line Interface).

Executing Linux commands to manage and navigate the FHS (File Hierarchy System).


Assets, Threats, and Vulnerabilities Coursera https://www.coursera.org/account/accomplishments/certificate/7HKLEB3MCDXM March 2024

  • Classify assets
  • Identified social engineering, malware, and web-based exploit threats.
  • Inspect attack surfaces to discover risks and vulnerabilities.
  • Observed the threat modeling process.


Sound the Alarm: Detection and Response Coursera https://www.coursera.org/account/accomplishments/certificate/582JU7WSXNCA April 2024

  • Identify the steps to contain, eradicate, and recover from an incident
  • Analyze packets to interpret network communications
  • Perform queries in Security Information and Event Management (SIEM) tools to investigate an event
  • Understand basic syntax, components of signatures and logs in Intrusion Detection Systems (IDS) and Network Intrusion Detection Systems (NIDS) tools


Bachelor of Science - Cyber Security

Kennesaw State University

High School Diploma -

Etowah High School
Sequoya Jackson