Cyber Security Specialist Resume
5.00/5 (Submit Your Rating)
Columbus, OH
SUMMARY:
Extensive knowledge of security vulnerabilities, solutions, and risks in IT. Highly organized and top attention to detail. An ability to work together with a large team. Skills with multitasking and time management
SKILLS:
- JAVA, .NET, R - Studio, Python, C++
- Tableau, Microsoft Project, IBM SPSS
- Vulnerability Assessment Penetration Testing
- Technical Risk Assessment Report
- Risk Assessment
- Data privacy applications
- Intrusion detection
- Malware analysis and reversing
WORK EXPERIENCE:
Cyber Security Specialist
Confidential, Columbus, OH
Responsibilities:
- Extensively analyzed project proposals from various operational teams within the Confidential to mitigate vulnerabilities.
- Reviewed Nexpose, AppScan, and Imperva scans to confirm whether systems and internal applications continue to report vulnerabilities.
- Utilized FireEye to thoroughly analyze phishing and spam correspondences submitted through Service Desk Manager to mitigate malicious malware from affecting employee s workstations.
- Monitored various LogRythm alerts to investigate potential anomalous activity and initiated follow - ups to countermeasure network attacks, insider threats or compromised accounts.
- Tested Risk Acceptance Application user stories in both development and quality assurance environments.
- Reviewed URL requests via Virus Total and Palo Alto network software to assist with rejecting and granting access to policy approved business-related categories and websites.
Cyber Security Intern
Confidential, Columbus, OH
Responsibilities:
- Ensure network, systems and data availability and integrity through preventative maintenance.
- Implemented company policies, technical procedures and standards.
- Recommended network security standards to management.
- Managing firewalls, network and server monitoring.
Cyber Security Specialist
Confidential
Responsibilities:
- Compiled daily database reports to identify possible vulnerabilities.
- Reviewed system access data and monitored database access.
- Updated cyber security protocol and also updated security software to prevent database security threats.
- Ensured compliance with internal and external email safety standards.
Confidential
Responsibilities:
- Reported a bug on one of the company’s website.
- Bug is related to no spoofing protection on Email domain.
- Successfully listed the bug and received 2 points.
