We provide IT Staff Augmentation Services!

Volunteer Cyber Student Trainee Resume

4.00/5 (Submit Your Rating)

Germantown, MD

PROFESSIONAL SUMMARY:

Passionate Cyber Security Analyst proficient in online security research planning, execution, and maintenance. Adept at training and educating internal users on relevant cyber security procedures and preventative measures. I specialize in network monitoring, security software installation, and working to prevent cyber - attacks in business and corporate settings.

CORE COMPETENCIES:

  • Extensive knowledge of all common business-related IT functions
  • Able to identify potential online security risks
  • Adept in preparing detailed training procedures
  • Solid understanding of various security software applications
  • Excellent internal and external communication skills

TECHNICAL SKILLS:

Cybersecurity: Virtual machine configuration/security/topology, packet analysis, cryptography, access control and audits, policy, exploitation, information storage and backup, computer forensics, vulnerability risk/assessment, malware analysis, social engineering, physical security, application security, intrusion detection, log analysis, firewall and IDS implementation, PowerPoint presentations

Security Tools: Kali Linux, wireshark, nmap, aircrack, hashcat, johntheripper, hashcalc, ftk imager, Ubuntu, OSForensics

Operating Systems: Windows (7,8.1,10), Mac OS X, Linux

Software Languages: Python, C, C++, JavaScript, HTML, CSS, SQL

Selected Course Work: Computer concepts, microcomputer essentials, introduction to networking, cisco networking 2, UNIX/LINUX system administration, network security, digital forensics, Microsoft Windows Sever, Hardening the Infrastructure, introduction of ethics, network defense and countermeasures, information security capstone

PROFESSIONAL EXPERIENCE:

Volunteer Cyber Student Trainee

Confidential, Germantown, MD

Responsibilities:

  • Develop and implement online security procedures
  • Update security software to prevent database security threats
  • Update cyber security protocols and develop effective training procedures
  • Implement system recovery procedures to minimize losses should an attack occur
  • Implement cryptographic techniques to verify integrity and achieve confidentiality
  • Compile daily database reports to identify possible vulnerabilities
  • Ensure compliance with internal and external email safety standards
  • Discuss cybersecurity efforts with other program members
  • Perform comprehensive investigations of cybersecurity breaches
  • Recommend new security software and make update recommendations

Helpdesk Analyst

Confidential, Gaithersburg, MD

Responsibilities:

  • Educate management on strong password use
  • Maintain security of information systems - Servers, Windows/Apple Devices
  • Monitor and manage anti-virus and patching alerts ticketing board
  • Maintain technical migrations throughout process
  • Install and configure anti-virus
  • Write small programs to test functionality of computer systems
  • Manage users and computers in AD as well as group policy
  • Manage email accounts in Office 365
  • Troubleshoot and configure workstations and printers based on client’s request
  • Troubleshoot, install, and configure software
  • Troubleshoot printers and scanners
  • Escalate issues to appropriate management

Program Analyst Intern

Confidential, Bethesda, MD

Responsibilities:

  • Developed a new streamlined permissions strategy for a large trans-NIH SharePoint-based Intranet that incorporated best practices for improved information security and efficient administration
  • Developed reports and research proposals based on SharePoint security
  • Created and proposed ideas for future intern’s website and how security would be implemented
  • Met with business owners to identify the appropriate levels of user access to meet business needs
  • Developed interactive tools to present the new permissions proposal to the project team and leadership

Digital Learning Assistant

Confidential, Germantown, MD

Responsibilities:

  • Maintained workstations functionality and security
  • Tutored students taking information security courses
  • Reported any malicious actions to supervisor
  • Researched and documented solutions to issues

We'd love your feedback!