A veteran and recent summa cum laude college graduate with a Master of Science in Cybersecurity with 12 years of work experience, looking for an entry level position. Aiming to leverage academic experience with a proven ability to conduct critical analysis, research, technical skills and issue briefing to successfully fill the Cyber Security Analyst role at your company. Frequently praised as a detailed oriented and hardworking by my peers and can be relied upon to help your organization achieve its goals.
Experience
CYBER SECURITY STUDENT
University of Maryland
Adelphi, MD
Self-sufficient student gaining applied skills in hardening network systems, network penetration testing and threat analysis.
SENIOR INTELLIGENCE ANALYST
Department of Defense (DoD)
Ft. Benning, GA
Managed and directed a large analysis division providing direction, production and review of comprehensive intelligence reports for senior DoD leadership.
SENIOR TARGETING ANALYST
National Ground Intelligence Center
Charlottesville, VA
Senior targeting analyst using various advance technical systems and critical thinking skills in order to meet organizational objectives.
MILITARY ANALYST
US Army
FT Bragg, NC
Senior highly decorated military analyst with multiple combat tours conducting intelligence analysis in counter insurgency operations.
Skills
PROFESSIONAL
Critical Analysis
Report Writing
Communication
Briefing
SECURITY
Network Analysis
Penetration Testing
Scanning Tools
AWS
Linux Hardening
CODING
Java
Python
HTML
Education
MBS CYBER SECURITY
University of Maryland University College
Adelphi, MD
2018-2019 (Graduated Summa Cum Laude)
BS CYBER SECURITY POLICY
University of Maryland University College
Adelphi, MD
2016 – 2018 (Graduated Summa Cum Laude)
MBA AND BA BUSINESS ADMIN
University of Washington
Seattle, WA
1995 – 2000 (Graduated Cum Laude)
Documentation and references can be provided on request.
Giang Hoang
Cyber Security Analyst
Phone: 910-***-**** Email: **********@*****.***
Address: 3757 Galenta CT Olympia, WA 98512
Giang Hoang
Cyber Security Analyst
Phone: 910-***-**** Email: **********@*****.***
Address: 3757 Galenta CT Olympia, WA 98512
Technical Abilities
Proficient in remote Linux security hardening techniques to include configuration of firewall (Netfiter, ufw, Firewalld, nftables), encryption methods, discretionary access control and various scanning and baseline tools.
Able to conduct network analysis using various network analyzing tools such as Wireshark, Snort and Splunk.
Able to use baseline scanning tools such as OPENScap, in order to identify vulnerabilities, threats regulatory gaps in order to remediate to ensure systems are following standards such as NIST and ISO.
Able to apply access control lists (ACL) and other control measures in order to segregate and secure access to network resources.
Experienced in writing organizational cyber security policy to ensure compliance with industry standards and government regulation.
Familiar with AWS architecture, operations and security measures. Can develop and implement basic AWS SaaS platform for testing purposes.
Familiar with penetration testing techniques and methods used to identify potential security vulnerabilities, threats and gaps.
Previous Duties
Prepared comprehensive written, oral briefings, analysis and charts based on research, collection and analysis of intelligence data.
Managed and oversaw the production and briefing of finished intelligence products to senior National Security leadership.
Validated intelligence by fusing and cross corelating data points with other sources of information.
Collaborated and coordinated with senior representatives from other agencies, foreign governments and military services in order to synchronize efforts.
Using multiple intelligence sources, data points, statistical analysis and advanced game theory, provided senior leadership with predictive analysis in order to shape effects of the battlespace.
Gathered and evaluated new information, using various tools such as signal intelligence, imagery, human collection and surveillance.
Conducted network analysis in order to identify high value targets.
Conducted in depth technical exploitation and forensic analysis of electronic material taken from various sites such as criminal scenes.
Interviewed, interrogated and interacted with various witnesses, detainees, targets and high value individuals to collect human intelligence.