- Utilized the Nessus tool to conduct vulnerability scans on a network of 500+ devices, identifying and remediating 25
- Performed regular system scans to detect potential cyber-attacks and intrusions
- Collaborated with a team of cybersecurity professionals to implement STIGs (Security Technical Implementation Guides) on 10 servers, ensuring compliance with government regulations and reducing potential security risks by 75
- Monitored network traffic for malicious or unauthorized activity
- Used Metasploit (penetration testing tool) to identify weaknesses in security systems
- Learned about the latest security threats from blogs and online publications
- Collaborated with stakeholders to implement and update disaster recovery plans