- Remote (NDAs with Clients
- Network Security Solutions: Implemented tailored security strategies that significantly reduced cyber threats and enhanced system efficiencies for clients. Specialized in optimizing clients' Palo Alto firewalls and Proofpoint PPS/POD solutions to bolster their defenses with best security practices
- Vulnerability Management: Conducted thorough security assessments to identify vulnerabilities, implementing strategic measures to mitigate risks and enhance overall security posture. Reduced clients' potential cyber threats by 50% and increased clients' satisfactions by 25
- Endpoint Security: Consulted and improved clients' endpoint security solutions (CrowdStrike, MS Defender) configuration utilizing best security practices
E
Enact Mortgage Insurance
Senior Cyber Security Engineer
Raleigh, NC, US
March 2023 - April 2023
W
WakeMed Health AND Hospitals
Cyber Security Engineer
Raleigh, NC, US
May 2022 - March 2023
N
Northrop Grumman
Principal Systems Administrator
River, MD, US
September 2020 - July 2021
T
Texas Christian University
Information Security Administrator IV
Fort Worth, TX, US
August 2019 - May 2020
See 1 More
Skills
Access ControlsActive DirectoryAgile MethodologyAmazon Web ServicesApple Mac SystemsArtificial IntelligenceAuditing SkillsAuthentication ProtocolsAutomationBash ShellBusiness EfficiencyBusiness Process ImprovementCarrying out AssessmentsCertificate of Cloud Security KnowledgeCertified Ethical HackerCertified Information Systems Security ProfessionalCiscoCitrix SystemsCloud Computing SecurityCompTIA A+CompTIA Network+CompTIA Security+Computer NetworksComputer SecurityConfluenceContinuous MonitoringCoordination SkillsCOVID-19 TestingCyberarkCybercrimeData AnalysisDatabasesDeployment SupportDevOpsEmployee OnboardingExpertise in CommunicationsFirewalls (Computer Science)Forensic SciencesFortinetGlobal Information Assurance CertificationHealth Insurance Portability and Accountability Act ComplianceHyper-VIdentity and Access ManagementIdentity Verification ServicesIncident ResponseInformation TechnologyISO/IEC 27001JenkinsJIRAJuniperLinuxLog AnalysisMcAfee VirusScanMicrosoft AccessMicrosoft AzureMicrosoft SQL ServerMicrosoft WindowsMitre Att&ckMobile Device ManagementMortgage InsuranceMulti-Factor AuthenticationNational Institute of Standards and TechnologyNetwork AdministrationNetworking SkillsNetwork SecurityOktaOperational SystemsOracle ApplicationsPalo Alto NetworksPCI Data Security StandardsPersonal Information Protection and Electronic Documents ActProject ManagementPython (Programming Language)Risk AnalysisSafety PrinciplesSailPointScrum MethodologySecurity AdministrationSecurity Information and Event ManagementSecurity ManagingSecurity Requirements AnalysisSecurity StrategiesSecurity SystemsSelf MotivationSoftware SafetySoftware Vulnerability ManagementSplunkSQL DatabasesSystem Center Configuration ManagerSystem SafetySystems EngineeringSystems IntegrationTeam BuildingTeam ManagementTeam WorkingTelemetry Control UnitTenable NessusTraining ActivitiesTrend MicroVirtualization TechnologyVmwareVulnerabilityWindows PowerShellWindows ServersWorkspace ONEWsus