Information Technology & Security Consultant Resume
Orlando, FL
SUMMARY:
- Accomplished, solutions - oriented professional with a proven track record in coordinating efforts to identify, test, mitigate, and resolve cyber threats. Go above and beyond to meet the needs of customers and organizations by utilizing vast knowledge, effective methodologies, and best practices. Thrive in fast-paced and team-collaborative settings. Expertise includes:
- Information Security Consulting • Ethical Hacking • Penetration Testing • Vulnerability Assessments • Vulnerability Management • Reconnaissance • Information Gathering • Enumeration • Footprinting • Web Application Security Testing • Physical Security • Cyber Threat Intelligence • Threat Hunting • Social Engineering • Security Awareness Training • Red Team Operations • Purple Team Operations
- Developed and guided the transition of Confidential from a break-fix model into an MSP.
- Founded a successful consulting business ( Confidential, Inc. ) that specializes in managed information technology & security services, systems engineering, network engineering, security awareness training, web design, and web development.
- Maintained high levels of client satisfaction by developing policies and procedures to mitigate security risks , secure networks, and implement cost-saving initiatives.
- Conducted vulnerability assessments for an international non-profit organization using tools such as Nessus, OpenVAS, Burp Suite, and Vega vulnerability scanner.
- Handled cyber security threats and improved server security for Confidential after spearheading the build of Linux servers and intranet sites.
- Resolved pertinent Windows server and network misconfigurations of a businesses while consulting the owners on wide ranges of information security-related matters.
- Successfully completed many information security training programs, hands-on labs, and assessments in vulnerability assessment, penetration testing, security operations, reverse engineering, and many other subjects.
- Enhanced overall efficiencies for a JP Morgan Chase call center after deploying Avaya phone systems for a location comprised of approximately 500 systems.
- Awarded a National Defense Service Medal while in the United States Marine Corps.
PROFESSIONAL EXPERIENCE:
Confidential - Orlando, FL
Information Technology & Security Consultant
- Developed and guided the transition of Infotech CFL from a break-fix model into an MSP.
- Triage customer support tickets and optimize support by organizing, prioritizing, and defining ticket severity.
- Provided information technology and security consultations and services to small and medium-sized businesses in Central Florida.
- Facilitated the risk assessment process by applying knowledge of internal audit policies and practices, risk assessment methodologies, and current laws and regulations for various clients.
- Conducted remote monitoring and patch management for various clients using RMM software which increased security.
- Configured Sonicwall and ADT Pulse for increased physical security of client office environment.
- Assisted a team with the migration of email services to G Suite for a retail and wholesale organization.
- Conducted troubleshooting and resolved issues in Microsoft Outlook 2016 after migrating to G Suite.
- Resolved network issues that prevented the availability of important printers functions.
- Resolved issues relating to RealVNC that were interrupting productivity for remote employees.
- Recovered passwords for key staff members to quickly have access to their system in order to perform critical job functions.
- Conducted threat hunting and eliminated threats that were disrupting critical operations, and implemented measures to prevent those threats from coming back.
- Led the design and deployment of Sonicwall Global VPN for an accounting firm which increased productivity for accounting consultants.
- Resolved Windows 2012 and Sonicwall misconfigurations which led to better availability of resources and increased productivity.
- Provided information security consultation to the owners of accounting firms.
Confidential - Orlando, FL
Information Security Consultant / Owner
- Developed report templates and presented reports for penetration tests.
- Conducted penetration tests with various tools within Kali Linux; such as Metasploit, Armitage, Burpsuite, and many others.
- Utilized tools like Maltego and Spiderfoot during the reconnaissance phase of penetration testing.
- Conducted scanning using Nmap, Zenmap, and various tools during the enumeration phase of penetration testing.
- Used SET and tools from KnowBe4 for Social Engineering campaigns.
- Provided cyber security consultations and services to non-profit organizations, enterprises, medical centers, graphic & web design firms, and individual customers.
- Led risk assessments and developed and established security policies and procedures for small and medium-sized businesses in Central Florida.
- Conducted threat hunting on client networks utilizing threat hunting methodologies and Alienvault OTX threat hunter along with other tools.
- Developed and delivered security awareness programs to employees of major call centers, medical centers, finance offices, HR departments, and manufacturing facilities; which included modules on PCI compliance, HIPAA compliance, social engineering, email security, end user best practices, active shooter awareness, and other end user security awareness subjects.
- Responded to a network breech of a major manufacturing company by developing and implementing a plan with their IT department to harden network and systems while providing consultation to company executives on mitigation strategies.
- Corrected systems and network misconfigurations for a major medical center and provided consultation to executives and staff on end-user security best practices.
- Conducted vulnerability assessments and penetration tests on web applications for an international charitable organization using Nessus vulnerability scanner, Burp Suite, Vega Vulnerability Scanner, OpenVAS, OWASP-Zap, Metasploit, BeEF, Searchspolit, Armitage, SQLmap, and many other tools.
- Led forensic investigations for an enterprise.
- Performed analysis of log data and threat intelligence feeds through SIEM systems, such as Alienvault OSSIM.
- Provided consultation and implemented best practices for a transport company to maintain TSA compliance.
- Secured networks for a medical center by backing up important data, removing malware from client systems by utilizing malware removal tools and reinstalling operating systems, and advising staff on best practices.
- Headed network engineering and systems engineering initiatives that aligned with the needs of various businesses.
- Facilitated the development of numerous web applications and web development trainings.
- Built LAMP (Linux, Apache, MySQL, and PHP) web servers to host and build websites for various clients.
Confidential - Lake Mary, FL
Dell Technical Support Engineer September
- Initiated troubleshooting functions and root cause analyses while managing customer issues in support of a business offering a suite of services, including customer relationship management and back office support.
- Oversaw many troubleshooting initiatives involving Dell hardware and various software applications.
- Advised and guided clients in using and troubleshooting various software products; such as Microsoft Windows, Microsoft Office, Office 365, McAfee Endpoint Security, Symantec Endpoint Protection, Carbon Black Protection, Dell Security Center, Malwarebytes, and a variety of Adobe Products.
- Achieved complete customer satisfaction and achieved a 100% resolution rate by resolving issues and improving system performances.
- Served as the main customer contact during the timely resolution of escalated issues.
- Assisted other staff members in handling critical situations.
Confidential - Lake Mary, FL
IT Consultant
- Enhanced overall efficiencies for a JP Morgan Chase call center after deploying Avaya phone systems for a location comprised of approximately 500 systems.
- Advised and assisted other team members in Avaya phone system configurations.
Confidential
Network Engineer
- Held accountability for a network of Windows and Linux systems.
- Identified and mitigated cyber security threats using tools such as Nessus vulnerability scanner, Metasploit, Wireshark, Snort, and various anti-malware products.
- Developed an Intranet that supported the sales department with the ability to share information, promptly access data, and create stronger internal communications.
- Provided in-depth client consultations to address all key security-related issues.
- Built, maintained and secured Linux servers.
Tools: / Software
Tools: Kali Linux • Metasploit • Nmap • Zenmap • Nessus • Qualysguard • OpenVAS • SET • Spiderfoot • Maltego • Metagoofil • KnowBe4 • Cain & Abel • John the Ripper • Armitage • Nikto • MITRE ATT&CK • Alienvault OSSIM • Alienvault OTX Endpoint Threat Hunter • Alienvault Open Threat Exchange • MISP • Wireshark • Snort • Aircrack-ng • Burpsuite • Arachni OllyDbg • VMware • VirtualBox • TOR • Joomla • Wordpress • AWS EC2 • AWS S3 • AWS Cloudfront • AWS IAM (Identity and Access Management) • Comodo One RMM (Remote Montioring and Management) • Malwarebytes • McAfee Anti-Virus • McAfee ePO • ProxySG • Active Directory • G Suite • Symantec Anti-Virus • AVG Anti-Virus • ClamAV • Hugo • Git • GitHub • PyCharm • Google Analytics • Facebook Ads Manager • Hootesuite • Tweetdeck
Operating Systems: Linux • Windows • MacOS • iOS • Android • Kali Linux • Tails
Languages: Python, Ruby, Go, Bash, PowerShell, PHP, JavaScript, SQL, HTML
Languages: English • Arabic • Urdu • Punjabi