We provide IT Staff Augmentation Services!

Cloud Engineer Resume

3.00/5 (Submit Your Rating)

SUMMARY:

  • IT Security Analyst. Demonstrable experience in information security technologies and methods. Has strong trouble shooting skills with natural curiosity and the ability to learn new skills quickly. Proficiency in vulnerability assessment and documentation of findings.
  • Understands X86 assembly language and the use of debuggers, like Olly DB or IDA Pro. Identified and used tools and techniques to conduct static and dynamic analysis of malware, including building a lab environment.
  • Used honeypots to acquire live malware and analyze its activity. Continues to develop technical skills to expand one’s knowledge and understanding of key Information Security controls. Security clearance: Secret SCI Clearance

TECHNICAL SKILLS:

Networking Security: Nmap | Wireshark | Burp Suite | Kali Linux | Windows (Active Directory) | Mac OS |Firewall Configuration | Penetration Testing | Metasploit

Network Principles: PING, NETSTAT, DHCP, DNS, and NSLOOKUP

Systems: Windows and Linux Administration

SIEM Tool Management: Splunk Enterprise | Dashboard Creation | IDS |IPS | Kibana | ELK StackMalware Analysis| Dynamic Analysis | Static Analysis| Yara Rules| Cuckoo Sandbox | Olly DB | IDA Pro

Application Deployment: Kubernetes |Ansible Playbook | Docker | YAML

Cloud: Microsoft Azure | VMware ESXI Configuration and Deployment | ActiveDirectory | Security Configuration

Reporting: Threat Mitigation Reporting | Penetration Test Reporting

Digital Forensics Methods: Cyber Threat Intelligence | Penetration Testing | Vulnerability Assessment | Security Operations and Analytics| Autopsy

PROFESSIONAL EXPERIENCE:

Cloud Engineer

Confidential

Responsibilities:

  • Maintained GIT workflows for version control (Source Code Management) for multiple EOS block chains.
  • Built and deployed Docker containers for Block chain processes in EOS block chain.
  • Maintained and updated Linux cloud infrastructure. (Hetzner)
  • Implemented Containerized environment security best practices.
  • Use of Docker Bench for auditing
  • Assessed all endpoint devices (laptops, desktops,) security posture with pfsesnes reporting.
  • Analyze endpoint application data in real time to identify potential threats, rogue systems, vulnerabilities, system changes, and data loss prevention on Hetzner server.
  • Leveraged pfsenses snort based packet analyzer to monitor traffic.
  • Helped Launch KROWN token on EOS block chain.

Unit Deployment Manager

Confidential

Responsibilities:

  • Planned, directed, supervised, and coordinated work activities relating to mission requirements, labor relations, and employee relations; ensuring operational readiness of 233 personnel.
  • Modernized base deployment database by inputting updated medical and information.
  • Accounted for and maintained $35k of sensitive deployable equipment
  • Organized and trained 100 plus personnel for 48 hour short notice deployment
  • Performed accounting and deployment of logistical items and equipment for Air Force operations.

Fuel Service Center

Confidential

Responsibilities:

  • Responsible for all accounting functions needed for proper inventory management, to include ordering product receipts, inputting all fuel movements, tracking tank inventories and maintaining a ledger for government reporting
  • Manage the movement of vehicles and fueling personnel to the customer’s satisfaction and control all fuels reporting.
  • Trouble shooting tank Scada system endpoints for accurate fuel data representation.
  • Servicing DLA customers and fuel inquiries for fulfillment.

Senior Marketing Rep

Confidential

Responsibilities:

  • Document loan history, respond to customers, investors, vendors and authorized third parties inquires, research and/ or resolve inquires, analyze request per policy and procedures to ensure proper actions.
  • Collected payments and set up payment plans.
  • Provided customers with information requested through verbal or written correspondence and maintained accurate records.
  • Direct calls or correspondence to proper departments in event information is not available or requires research.
  • Respond to the needs of dissatisfied customers.
  • Generated revenue by bringing in new customer accounts and exceeding expectations earning monthly incentive bonuses.

We'd love your feedback!