Post Job Free
Sign in

Security Analyst

Location:
Olympia, WA
Posted:
May 29, 2019

Contact this candidate

Resume:

A veteran and recent summa cum laude college graduate with a Master of Science in Cybersecurity with 12 years of work experience, looking for an entry level position. Aiming to leverage academic experience with a proven ability to conduct critical analysis, research, technical skills and issue briefing to successfully fill the Cyber Security Analyst role at your company. Frequently praised as a detailed oriented and hardworking by my peers and can be relied upon to help your organization achieve its goals.

Experience

CYBER SECURITY STUDENT

University of Maryland

Adelphi, MD

Self-sufficient student gaining applied skills in hardening network systems, network penetration testing and threat analysis.

SENIOR INTELLIGENCE ANALYST

Department of Defense (DoD)

Ft. Benning, GA

Managed and directed a large analysis division providing direction, production and review of comprehensive intelligence reports for senior DoD leadership.

SENIOR TARGETING ANALYST

National Ground Intelligence Center

Charlottesville, VA

Senior targeting analyst using various advance technical systems and critical thinking skills in order to meet organizational objectives.

MILITARY ANALYST

US Army

FT Bragg, NC

Senior highly decorated military analyst with multiple combat tours conducting intelligence analysis in counter insurgency operations.

Skills

PROFESSIONAL

Critical Analysis

Report Writing

Communication

Briefing

SECURITY

Network Analysis

Penetration Testing

Scanning Tools

AWS

Linux Hardening

CODING

Java

Python

HTML

Education

MBS CYBER SECURITY

University of Maryland University College

Adelphi, MD

2018-2019 (Graduated Summa Cum Laude)

BS CYBER SECURITY POLICY

University of Maryland University College

Adelphi, MD

2016 – 2018 (Graduated Summa Cum Laude)

MBA AND BA BUSINESS ADMIN

University of Washington

Seattle, WA

1995 – 2000 (Graduated Cum Laude)

Documentation and references can be provided on request.

Giang Hoang

Cyber Security Analyst

Phone: 910-***-**** Email: **********@*****.***

Address: 3757 Galenta CT Olympia, WA 98512

Giang Hoang

Cyber Security Analyst

Phone: 910-***-**** Email: **********@*****.***

Address: 3757 Galenta CT Olympia, WA 98512

Technical Abilities

Proficient in remote Linux security hardening techniques to include configuration of firewall (Netfiter, ufw, Firewalld, nftables), encryption methods, discretionary access control and various scanning and baseline tools.

Able to conduct network analysis using various network analyzing tools such as Wireshark, Snort and Splunk.

Able to use baseline scanning tools such as OPENScap, in order to identify vulnerabilities, threats regulatory gaps in order to remediate to ensure systems are following standards such as NIST and ISO.

Able to apply access control lists (ACL) and other control measures in order to segregate and secure access to network resources.

Experienced in writing organizational cyber security policy to ensure compliance with industry standards and government regulation.

Familiar with AWS architecture, operations and security measures. Can develop and implement basic AWS SaaS platform for testing purposes.

Familiar with penetration testing techniques and methods used to identify potential security vulnerabilities, threats and gaps.

Previous Duties

Prepared comprehensive written, oral briefings, analysis and charts based on research, collection and analysis of intelligence data.

Managed and oversaw the production and briefing of finished intelligence products to senior National Security leadership.

Validated intelligence by fusing and cross corelating data points with other sources of information.

Collaborated and coordinated with senior representatives from other agencies, foreign governments and military services in order to synchronize efforts.

Using multiple intelligence sources, data points, statistical analysis and advanced game theory, provided senior leadership with predictive analysis in order to shape effects of the battlespace.

Gathered and evaluated new information, using various tools such as signal intelligence, imagery, human collection and surveillance.

Conducted network analysis in order to identify high value targets.

Conducted in depth technical exploitation and forensic analysis of electronic material taken from various sites such as criminal scenes.

Interviewed, interrogated and interacted with various witnesses, detainees, targets and high value individuals to collect human intelligence.



Contact this candidate