- Job description
- Implemented and maintained HIPAA regulations, covering privacy, security, and breach notification protocols to ensure patient data
- Interacted with customers by phone, email, or in-person to provide information, Completed research, compiled data, updated spreadsheets, and produced timely reports.Drive exploration of Healthy People 2023 objectives mainly for Hospitals and Adolescents, Worked on Project
- Management Tasks
O
Open and Scada BR
December 2023 - December 2023
A
American Tower
Information System Executive
June 2022 - July 2023
S
Supraja Technologies
Cybersecurity Engineer
May 2020 - July 2022
Skills
Ability to Speak in PublicAmazon Web ServicesApplication Programming Interfaces (APIs)AutomationBurp SuiteBusiness EfficiencyBusiness InformaticsCascading Style Sheets (CSS)Certified Ethical HackerCertified Information Systems Security ProfessionalCisco CertificationCisco Certified Network AssociateCommunication SkillsCompTIA Security+Computer ProgrammingComputer SecurityContent ManagementCoordination SkillsC++ (Programming Language)CryptographyCybercrimeData AnalysisDatabase AdministrationData RetrievalData StructuresFirewalls (Computer Science)FriendlinessFundraisingHealth AdministrationHealth CareHealth Insurance Portability and Accountability Act ComplianceHTMLIdentity and Access ManagementImage AnalysisIncident ResponseInformation SharingInformation SystemsInformation TechnologyInfrastructure ManagementIntrusion Detection SystemsISO/IEC 27001Java (Programming Language)JavaScript (Programming Language)Kali LinuxKibanaLeadershipMedical RecordsMetasploitMicrosoft AzureMicrosoft SoftwareMicrosoft WindowsModbusNational Institute of Standards and TechnologyNessusNetworking SkillsNetwork ProtocolsNetwork SecurityNexposeNmapOpen Web Application SecurityOperational SystemsOperation CentersOperations ManagementOracle ApplicationsOSI ModelsPHP (Programming Language)Physician Patient PrivilegeProcess Control SystemsProject ManagementPython (Programming Language)Raw DataRegulatory ComplianceRequirements AnalysisRisk AnalysisRisk ManagementSafety PrinciplesSecurity AnalysisSecurity Information and Event ManagementSelf MotivationSimulationsSoftware EngineeringSoftware LibrarySoftware SecuritySoftware System Penetration TestingSoftware Vulnerability ManagementSplunkSpreadsheetsSQL DatabasesStakeholder ManagementSteganographySupervisory Control and Data Acquisition (SCADA)System SafetySystems Development Life CycleTask ManagementTeam WorkingTechnical SkillsTransmission Control Protocol (TCP)TriageUbuntu (Operating System)Virtual Private Networks (VPN)VulnerabilityVulnerability AnalysisWeb ApplicationsWindows PowerShellWireshark