- Enhanced network security by implementing intrusion detection systems and monitoring
- Conducted regular vulnerability assessments to identify weaknesses and implement
- Collaborated with IT teams to develop comprehensive cybersecurity strategies, reducing
- Analyzed log files for anomalies, identifying potential intrusions or malicious activity before
- Intergrated Azure Active Directory for centralized user authentication and authorization
- Implemented Azure Key Vault for securely storing and managing sensitive information
- Configured Azure Security Center to continuously monitor and assess security posture of cloud environment
- Integrated Azure Active Directory for centralized user authentication and authorization
- Conducted regular vulnerability assessments and penetration testing using Azure Security
- Center and other third-party tools
- Stayed current on emerging security threats and vulnerabilities
- Deployed SentinelOne endpoint protection platform to defend against threats
- Monitored and analyzed security alerts and incidents in SentinelOne console, and led
T
Trinity Metro
Cyber Security Engineer
Fort Worth, TX, US
January 2022 - January 2024
D
Dallas County
SOC Analyst
January 2019 - January 2022
R
Redcon Solutions Group
Cyber Security Analyst
January 2018 - January 2019
IT Support Specialist
October 2016 - January 2018
Skills
24/7 ServicesAccess Control ListAccess ControlsActive DirectoryAdministrative OperationsAdvanced Cardiovascular Life Support (ACLS)Agile MethodologyAmazon Web ServicesAnalytical ThinkingAntivirus SoftwaresArchitectural DesignAutomationAzure Active DirectoryBackup DevicesBash ShellBusiness Process ImprovementCloud ComputingCommunication SkillsCompTIA Security+Computer ForensicsComputer NetworksComputer SecurityConfiguration Management DatabasesContinuous MonitoringCritical ThinkingCryptographyCultural ActivitiesCyberarkDashboardsData CollectionData IntegrityData SecurityDesktop ComputingDesktop SupportElectrical SwitchesEmail ManagementEvent ManagementFile SystemsFiling SkillsFirewalls (Computer Science)Google AnalyticsHard Work and DedicationHealth AssessmentHelp DeskHuntingIdentity and Access ManagementImprovisationIncident ResponseIndustrial PolishingInformation TechnologyInfrastructure ManagementInnovation ManagementIntelligence AnalysisIntrusion Detection SystemsIntrusion Prevention SystemsISO/IEC 27001Key ManagementLeadershipLightweight Directory Access Protocols (LDAP)LinuxLog FilesMaintenanceMalwareMcAfee VirusScanMetricsMicrosoft AccessMicrosoft AzureMicrosoft Exchange ServerMicrosoft OfficeMicrosoft WindowsMonitoring of SystemsNational Institute of Standards and TechnologyNetwork ArchitectureNetworking SkillsNetwork RoutersNetwork SecurityNetwork ServerNmapOperational SystemsOperations SecurityPredictive Data AnalysisPresentationsPreventive MaintenancePrioritization of RequirementsProblem SolvingProxy ServersPython (Programming Language)Regulatory ComplianceRegulatory RequirementsRisk AnalysisRisk ReductionSafety PrinciplesSecurity AdministrationSecurity AnalysisSecurity Assertion Markup Language (SAML)Security AuditsSecurity ControlsSecurity EngineeringSecurity Information and Event ManagementSecurity ManagingSecurity PoliciesSecurity Support Provider InterfaceSecurity SystemsSelf MotivationSimulationsSnort (Software)Software as a ServiceSoftware System Penetration TestingSoftware Vulnerability ManagementSplunkSQL DatabasesStakeholder ManagementStrategic ThinkingSuccess Driven PersonSystem SafetyTeam WorkingTechnical SupportTesting SkillsThreat ModelingTransport Layer SecurityUnixUser AuthenticationVirtual Private Networks (VPN)VirusesVulnerabilityVulnerability AnalysisWeb ApplicationsWindows APIWindows PowerShellWindows ServersWiresharkWorkflows