We provide IT Staff Augmentation Services!

Cyber Security Specialist Resume

5.00/5 (Submit Your Rating)

Washington D, C

SUMMARY:

  • I believe that I am qualified for this position because of my diverse background in both education and work experience that spans most of the cybersecurity domains.
  • This experience has provided me with unique perspectives, and has taught me how to adapt quickly and effectively within the risk management framework.
  • My ability to effectively evaluate organizational goals from multiple valid, yet contrasted sources will be valuable to effectively implement organizational initiatives needed to accomplish the cybersecurity needs within an enterprise environment.
  • Moreover, my competencies in psychology, criminology, legal policy, and cybersecurity have also provided me with knowledge of and the passion needed to develop fresh ideas for intelligence analysis and forensic security skills alike.
  • When combined with my existing and developing business management capacities and certifications, I will prove to be a valuable operator.

TECHNICAL SKILLS:

Programming Languages: Cyber Tools Operating Systems Lanugages Java (Beginner) Nmap, Wireshark Windows SpanishSQL (Beginner) Nessus, Snort Mac (IntermediateJack the Ripper Linux level proficiency)Encase, Cryptool

EXPERIENCE:

Confidential, Washington D.C

Cyber Security Specialist

Responsibilities:

  • Serves as thought leader to maximize security posture through innovation and provides next generation real world cyber security solutions.
  • Develops white papers and assists business development team with proposal efforts.
  • Creates presentations with business development team for cyber security conferences.
  • Develops cyber security solutions for transportation Industrial Control Systems and Supervisory Control and Data Acquisition (SCADA) systems in accordance with NIST 800 - 82.
  • Implements computer and terminal physical security by developing standards, policies, and procedures; coordinates with CEO, Facility Security Officer (FSO), and the Director of Client Services (DCS) to recommend internal and external contracted improvements.
  • Conducts incident management; performs vulnerability and compliance scans (i.e., NESSUS, NMap, and Wireshark); interprets results; supports remediation activities; and manages Intrusion Detection Systems and firewalls.
  • Performs NIST-based C&A activities using NIST 800-53 process for assessing federal agency IT systems; reviews implemented procedural and technical security controls; and provides recommendations to resolve identified deficiencies.
  • Maintains Cyber Security Laboratory consisting of test servers, desktops, network components, and security software (e.g., intrusion detection software). Ran malware analysis and “trust lockdown” experiments to determine the viability of malware against kernel based security software instances.
  • Conducts security awareness trainings for employees and manages monthly cyber awareness program. Performs other duties as required.
  • Guides contracted clients on risk and vulnerability assessments, as well as remediation efforts needed to meet their desired FISMA/NIST/FEDRAMP & FIPS compliance initiatives.
Confidential, CT

Cyber Security Consultant/IT Director

Responsibilities:

  • Developed and engineered hybrid system architecture which implemented appropriate cybersecurity controls and protocols into existing business workflows by provisioning access control policies such as: separation of duties, least privilege, access enforcement, supervisory and review, and independent audit information sharing to maintain the CIA triad principles.
  • Worked with executive management and stakeholders to develop, evaluate and implement organizational security policies and plans to meet compliance with current NIST 800-30, (37), and (53) guidelines.
  • Used 800-37 to select document and implement the appropriate controls needed to satisfy initial security control baselines according to Risk Management Framework.
  • Consulted with stakeholders to explain how the implementation of businesses continuity plans (BCP), disaster recovery plans (DRP) and continuity of operations protocols and procedures, will affect management objectives.
  • Used 800-53 (Rev 4)and PCI-DSS v. 3.2 “cross-map” to develop appropriate access controls, audit and accountability practices focusing on data (quality, integrity and retention),
  • Conducted security awareness and training on new hires, configuration and asset management processes, and contingency planning.
  • Used various cybersecurity tools such as Nmap, Wireshark and Nessus on and machines during risk and vulnerability assessments.
  • Identified and remediated issues on internal networks when conducting risk management duties used to determine network posture.
  • Performs system and network administrative duties on local and cloud based infrastructure and moderated support tickets for employees that need issues troubleshooted and resolved

We'd love your feedback!