We provide IT Staff Augmentation Services!

Cyber Security Specialist Resume

5.00/5 (Submit Your Rating)

Columbus, OH

SUMMARY:

Extensive knowledge of security vulnerabilities, solutions, and risks in IT. Highly organized and top attention to detail. An ability to work together with a large team. Skills with multitasking and time management

SKILLS:

  • JAVA, .NET, R - Studio, Python, C++
  • Tableau, Microsoft Project, IBM SPSS
  • Vulnerability Assessment Penetration Testing
  • Technical Risk Assessment Report
  • Risk Assessment
  • Data privacy applications
  • Intrusion detection
  • Malware analysis and reversing

WORK EXPERIENCE:

Cyber Security Specialist

Confidential, Columbus, OH

Responsibilities:

  • Extensively analyzed project proposals from various operational teams within the Confidential to mitigate vulnerabilities.
  • Reviewed Nexpose, AppScan, and Imperva scans to confirm whether systems and internal applications continue to report vulnerabilities.
  • Utilized FireEye to thoroughly analyze phishing and spam correspondences submitted through Service Desk Manager to mitigate malicious malware from affecting employee s workstations.
  • Monitored various LogRythm alerts to investigate potential anomalous activity and initiated follow - ups to countermeasure network attacks, insider threats or compromised accounts.
  • Tested Risk Acceptance Application user stories in both development and quality assurance environments.
  • Reviewed URL requests via Virus Total and Palo Alto network software to assist with rejecting and granting access to policy approved business-related categories and websites.

Cyber Security Intern

Confidential, Columbus, OH

Responsibilities:

  • Ensure network, systems and data availability and integrity through preventative maintenance.
  • Implemented company policies, technical procedures and standards.
  • Recommended network security standards to management.
  • Managing firewalls, network and server monitoring.

Cyber Security Specialist

Confidential

Responsibilities:

  • Compiled daily database reports to identify possible vulnerabilities.
  • Reviewed system access data and monitored database access.
  • Updated cyber security protocol and also updated security software to prevent database security threats.
  • Ensured compliance with internal and external email safety standards.

Confidential

Responsibilities:

  • Reported a bug on one of the company’s website.
  • Bug is related to no spoofing protection on Email domain.
  • Successfully listed the bug and received 2 points.

We'd love your feedback!