Trayon Drummond


Location

Pembroke Pines, FL
Education
    Broward College
    August 2006 - July 2010
    degree
    Bachelor's
    major
    Information Technology (IT)
    Broward College
Work Experience
    Atlantic Data Security
    Security Analyst
    January 2024 - present
    company
    Atlantic Data Security
    title
    Security Analyst
    overview
    - Enhanced network security by implementing intrusion detection systems and monitoring - Conducted regular vulnerability assessments to identify weaknesses and implement - Collaborated with IT teams to develop comprehensive cybersecurity strategies, reducing - Analyzed log files for anomalies, identifying potential intrusions or malicious activity before - Intergrated Azure Active Directory for centralized user authentication and authorization - Implemented Azure Key Vault for securely storing and managing sensitive information - Configured Azure Security Center to continuously monitor and assess security posture of cloud environment - Integrated Azure Active Directory for centralized user authentication and authorization - Conducted regular vulnerability assessments and penetration testing using Azure Security - Center and other third-party tools - Stayed current on emerging security threats and vulnerabilities - Deployed SentinelOne endpoint protection platform to defend against threats - Monitored and analyzed security alerts and incidents in SentinelOne console, and led
    Trinity Metro
    Cyber Security Engineer
    Fort Worth, TX, US
    January 2022 - January 2024
    Dallas County
    SOC Analyst
    January 2019 - January 2022
    Redcon Solutions Group
    Cyber Security Analyst
    January 2018 - January 2019
    IT Support Specialist
    October 2016 - January 2018
Skills
24/7 ServicesAccess Control ListAccess ControlsActive DirectoryAdministrative OperationsAdvanced Cardiovascular Life Support (ACLS)Agile MethodologyAmazon Web ServicesAnalytical ThinkingAntivirus SoftwaresArchitectural DesignAutomationAzure Active DirectoryBackup DevicesBash ShellBusiness Process ImprovementCloud ComputingCommunication SkillsCompTIA Security+Computer ForensicsComputer NetworksComputer SecurityConfiguration Management DatabasesContinuous MonitoringCritical ThinkingCryptographyCultural ActivitiesCyberarkDashboardsData CollectionData IntegrityData SecurityDesktop ComputingDesktop SupportElectrical SwitchesEmail ManagementEvent ManagementFile SystemsFiling SkillsFirewalls (Computer Science)Google AnalyticsHard Work and DedicationHealth AssessmentHelp DeskHuntingIdentity and Access ManagementImprovisationIncident ResponseIndustrial PolishingInformation TechnologyInfrastructure ManagementInnovation ManagementIntelligence AnalysisIntrusion Detection SystemsIntrusion Prevention SystemsISO/IEC 27001Key ManagementLeadershipLightweight Directory Access Protocols (LDAP)LinuxLog FilesMaintenanceMalwareMcAfee VirusScanMetricsMicrosoft AccessMicrosoft AzureMicrosoft Exchange ServerMicrosoft OfficeMicrosoft WindowsMonitoring of SystemsNational Institute of Standards and TechnologyNetwork ArchitectureNetworking SkillsNetwork RoutersNetwork SecurityNetwork ServerNmapOperational SystemsOperations SecurityPredictive Data AnalysisPresentationsPreventive MaintenancePrioritization of RequirementsProblem SolvingProxy ServersPython (Programming Language)Regulatory ComplianceRegulatory RequirementsRisk AnalysisRisk ReductionSafety PrinciplesSecurity AdministrationSecurity AnalysisSecurity Assertion Markup Language (SAML)Security AuditsSecurity ControlsSecurity EngineeringSecurity Information and Event ManagementSecurity ManagingSecurity PoliciesSecurity Support Provider InterfaceSecurity SystemsSelf MotivationSimulationsSnort (Software)Software as a ServiceSoftware System Penetration TestingSoftware Vulnerability ManagementSplunkSQL DatabasesStakeholder ManagementStrategic ThinkingSuccess Driven PersonSystem SafetyTeam WorkingTechnical SupportTesting SkillsThreat ModelingTransport Layer SecurityUnixUser AuthenticationVirtual Private Networks (VPN)VirusesVulnerabilityVulnerability AnalysisWeb ApplicationsWindows APIWindows PowerShellWindows ServersWiresharkWorkflows