Summary
Overview
Work History
Education
Skills
Certification
Timeline
Generic

Steven Shaffer

Conway,AR

Summary

Resourceful IT Security Analyst known for high productivity and efficient task completion. Specialize in threat analysis, incident response, and security policy development. Excel in problem-solving, communication, and teamwork, ensuring optimal security posture in fast-paced environments. Skilled in safeguarding information systems and networks from potential threats. Have experience implementing security measures, conducting vulnerability assessments, and managing incident response activities. Strengths include analytical problem-solving, teamwork, and effective communication skills. Contributed to enhancing system security posture and reducing incidents of data breaches in previous roles.

Overview

26
26
years of professional experience
1
1
Certification

Work History

IT Security Analyst Specialist

FIS
Little Rock, AR
10.2000 - 10.2024
  • Developed and implemented security policies, standards, and procedures to ensure information systems security.
  • Maintained up-to-date knowledge of security trends, threats, and vulnerabilities.
  • Monitored network traffic for suspicious activity using intrusion detection systems and firewalls.
  • Investigated system incidents to determine root cause and recommend corrective action.
  • Assisted in developing disaster recovery plans for IT infrastructure components in case of a security breach or other emergency event.
  • Mentored junior employees in departmental activities and procedures.
  • Designed and implemented plans to secure computer files against breach, destruction, or accidental modification.
  • Collaborated with stakeholders to implement and update disaster recovery plans.
  • Researched and designed advanced computer forensic tools.
  • Worked closely with fellow security personnel to remedy and alleviate technology issues.
  • Updated computer security policies and procedures upon learning of new risks.
  • Designed, implemented, and maintained security systems and controls.
  • Coordinated security updates to avoid outages and downtime.
  • Developed and implemented specialized procedures for customer service operations.
  • Coordinated with other departments to ensure efficient workflow processes.
  • Provided technical support for customers in resolving complex issues.

Distributed Computing Analyst

Eclipsys
Little Rock, AR
08.1998 - 10.2000
  • Monitored system performance to ensure proper operation and security of the network.
  • Performed daily backups of critical data files.
  • Troubleshot and resolved server hardware and software issues.
  • Implemented virus protection measures on servers.
  • Upgraded existing systems with new releases of operating systems and applications.
  • Developed disaster recovery plans in case of system failure or data loss.
  • Managed multiple remote sites by providing maintenance services over the internet or phone line.
  • Analyzed log files to identify potential security threats.
  • Maintained inventory records of all installed hardware and software assets.
  • Evaluated system logs regularly to detect any suspicious activity or errors that require attention.
  • Installed, configured, and maintained server hardware and software.
  • Configured user accounts, permissions, and access rights.
  • Supported various operating systems and server technologies.
  • Monitored system upgrades, patches and new configurations.
  • Managed employee access, security roles and permissions.
  • Updated hardware and software upon availability and supervised network to eliminate bottlenecks.
  • Increased system security and performance with proactive changes.

Education

Associate of Science - Respiratory Therapy

University of Arkansas Medical Sciences
Little Rock, AR
06-1988

Some College (No Degree) - Computer And Information Sciences

University of Central Arkansas
Conway, AR

Skills

  • Vulnerability Assessment
  • Ethical Hacking
  • Virtual private networks
  • Business continuity planning
  • Network Security Management
  • ACL Audit Exchange
  • Intrusion detection and prevention
  • Malware Analysis
  • Incident Response
  • Security analysis
  • Application security
  • McAfee EPO, EPS, DLP
  • FireEye
  • Palo Alto Cortex XDR

Certification

  • Certified Ethical Hacker (CEH)
  • Bluecoat Certified Proxy Administrator (BCCPA)
  • Bluecoat Certified Proxy Professional (BCCPP)

Timeline

IT Security Analyst Specialist

FIS
10.2000 - 10.2024

Distributed Computing Analyst

Eclipsys
08.1998 - 10.2000

Associate of Science - Respiratory Therapy

University of Arkansas Medical Sciences

Some College (No Degree) - Computer And Information Sciences

University of Central Arkansas
Steven Shaffer