Summary
Overview
Work History
Education
Skills
Timeline
SeniorSoftwareEngineer
Tonisha Payne

Tonisha Payne

Cyber Security Specialist
Fredericksburg,Virginia

Summary

Hardworking and passionate job seeker with strong organizational skills eager to secure a entry-level Cyber Security position. I have gained skills in communication, collaboration, and industry best practices. Recently I have completed a Certificate in Cyber Security training, gaining hands-on technical skills and exposure to current business risks. Looking to build my career in Cyber Security, I am eager to land a cyber role and bring drive, passion, problem-solving, analytical and project management skills to your team.

Overview

1
1
year of professional experience
4
4
years of post-secondary education

Work History

Cyber Security Specialist

Virginia Commonwealth University
07.2023 - 02.2024

Cybersecurity Studies, Skills, Knowledge and Training


Risk Management

  • Knowledgeable in assessing and managing cyber risks to ensure the security posture of organizations.

Information Technology Foundations

  • Basic understanding of OSI and TCP/IP Models.
  • Knowledgeable in implementing security measures at different layers of network protocols.
  • Skilled in virtualization technologies and their security implications.
  • Familiarity with cloud technologies and their security considerations.

Consulting and Interpersonal Skills

  • Strong critical thinking abilities to analyze and evaluate complex cybersecurity challenges.
  • Proficient in conducting research and documenting findings to support decision-making processes.
  • Experienced in strategy development and project management methodologies in Waterfall model and Agile Methodology.

Offensive Cybersecurity Concepts and Techniques

  • Proficient in offensive cybersecurity techniques to identify and exploit vulnerabilities within systems.

The Defensive Mindset

  • Solid understanding of cybersecurity defense structures and strategies.
  • Proficient in implementing technical defense mechanisms to safeguard against cyber threats.
  • Knowledgeable in cyber security economics and its implications on defensive strategies.
  • Knowledgeable in implementing cyber security architectures.
  • Familiarity with taxonomy of controls to enforce security measures effectively.

Incident Response

  • Proficient in managing incident response lifecycles to mitigate cyber threats effectively.
  • Experienced in cyber security analysis and interpreting relevant logs for incident investigation.
  • Knowledgeable in ITIL lifecycle and its application in incident response processes.
  • Skilled in identifying security incidents within IT operations and responding accordingly.
  • Proficient in evidence collection and documentation for incident analysis and legal purposes.
  • Familiarity with risk assessment methodologies to prioritize incident response efforts.
  • Experienced in transitioning from incident response to threat intelligence gathering.
  • Knowledgeable in NIST Cybersecurity Framework for aligning incident response practices with industry standards.


Technical Skills:


Operating Systems:

  • Ubuntu
  • Kali Linux
  • Windows 10

Data Integrity & Security:

  • Data Integrity Verification using Powershell
  • Symmetric & Asymmetric Encryption/Decryption for Data Confidentiality

Network Management:

  • Network Configuration (Linux & Windows)
  • Telnet, FTP, SSH Server Setup
  • Network Data Capture with Wireshark
  • Traffic Capturing with Wireshark & Tcpdump
  • Web Service Installation & Apache Server Configuration
  • MySQL and PHP Tools Installation & Configuration
  • Basic Firewall Management (e.g., ufw)

Security Assessment & Penetration Testing:

  • Vulnerability Scanning & Management using NESSUS
  • Google Hacking
  • Dig Command for DNS Query
  • Whois Command for Domain Details
  • Nmap for Network Probing
  • Exploit Delivery with Metasploit Framework
  • Web Penetration Testing with Metasploit (DVWA)
  • Cross-Site Scripting (XSS) & Command Injection (DVWA)
  • Access Control Management in Linux
  • USB Drive Usage Control
  • Iptables Firewall Configuration

Access Controls & System Management:

  • Managing Users & Groups in Linux
  • Managing Ownership & Permissions in Linux
  • Limiting SSH Login & User Abilities in Linux
  • Exploring & Managing Certificates in Windows
  • SSL Certificate Creation & Configuration
  • Apache Web Server Configuration & Hardening
  • Log Analysis & Review (Ubuntu & Windows)
  • Collecting Digital Evidence
  • Data Copying & Write-Protection Management

Other:

  • Shell Scripting
  • SOC 2 Report Review


Education

Associate of Arts - Political Science (Incomplete)

UCONN
Storrs, CT
2000 - 2002

Certification of Achievement in Cybersecurity - Cyber Security Specialist

Virginia Commonwealth University
Richmond, VA
07.2023 - 02.2024

Certification - Paralegal Studies

Branford Hall Career Institute
Southington, CT
09.2004 - 07.2006

Skills

  • Understanding of Operation and Information Security
  • Security Vulnerability Assessment
  • Root Cause Analysis (RCA)
  • Data Encryption
  • Risk Mitigation Strategies
  • Security Assessment & Penetration Testing
  • Plan of Actions & Milestones (POA&M)
  • System Administration
  • Network Security Management
  • Customer Satisfaction
  • Access Controls & System Management
  • Shell Scripting
  • SOC 2 Report Review and Interpret

Timeline

Cyber Security Specialist

Virginia Commonwealth University
07.2023 - 02.2024

Certification of Achievement in Cybersecurity - Cyber Security Specialist

Virginia Commonwealth University
07.2023 - 02.2024

Certification - Paralegal Studies

Branford Hall Career Institute
09.2004 - 07.2006

Associate of Arts - Political Science (Incomplete)

UCONN
2000 - 2002
Tonisha PayneCyber Security Specialist