Post Job Free
Sign in

Security Engineer

Location:
Brooklyn, NY, 11231
Posted:
June 21, 2013

Contact this candidate

Resume:

Alex J. McCarty

**-** ***** ******, ******, NY **432 315-***-**** ****.*********@*******.***

OBJECTIVE

Seeking an entry level position as a Cyber Security Engineer or related IT field utilizing my

knowledge of a variety of tools and programming languages

Strengths:

• Computational analysis background adds creative insight to problem solving

• Ability to learn and apply new concepts quickly

• Can work efficiently with team members on projects

EDUCATION

2011 – Present St. Johns University

Queens, NY

Computer Security Systems

GPA: 3.6

Niagara Falls, NY

2009 2011 Niagara University

Computer Science

• Wrote payroll program in VB.Net utilizing two files to keep track of

names and contact information

• Created a program that simulated the card game blackjack

COMPUTER SKILLS

Platforms: W indows (98, XP, Vista, 7, 8), Macintosh OS X, Kali Linux,

V MWare

Languages: V B.NET, COBOL, SQL, H T M L

Applications: M S Office (Excel, Access, Outlook, PowerPoint), Adobe

P hotoshop

Security Technologies:

Vulnerability Exploitation Password Sniffers

Scanners Crackers

Nessus Metasploit Aircrack Suite Wireshark

Cain and Abel Kismet

OpenVas

John the Ripper Nmap

COURSE EXPERIENCE

Fundamentals of Cyber Security

Fall 2011

• Utilized protocols such as TCP/IP and UDP

• Framework behind firewalls and intrusion detection systems

• Techniques to mitigate cyber crimes

Network Security

Spring 2012

• Malware and social engineering attacks

• Application and network attacks

• Vulnerability assessment

• Host, application and data security

• Administering a secure network

• Risk mitigation

Network Fundamentals

Fall 2012

• Affiliated with the Cisco Networking Academy Program

• Studied OSI an TCP/IP reference models

• Calculated IPv4 addresses and subnets

• Applied configuration to a router

Data Security and Cryptography

Fall 2012

• Methods for maintaining the security and integrity of computer data, via encryption algorithms

and protocols

Wireless Security

Spring 2012

• Attacking and defending WEP and WPA-Protected networks

• Linux/Windows/Macintosh discovery tools

• 802.11 Intrusion Detection



Contact this candidate