Post Job Free
Sign in

Information Security

Location:
Detroit, MI
Posted:
April 05, 2017

Contact this candidate

Resume:

Jeffery Ervin

248-***-**** **************@*****.***

EDUCATION

Master of Science, Technology Studies/Information Assurance December 2014

Eastern Michigan University, Ypsilanti, MI

Bachelor of Science, Technology Management December 2012

Eastern Michigan University, Ypsilanti, MI

Associate in Applied Science in Energy Technology HVAC April 2008

Henry Ford College, Dearborn, MI

OBJECTIVE

My main goal is to obtain a job that will utilize my skills. As well, I have very strong problem solving skills and I’m very detail oriented. I keep current with the latest technology by receiving updates from Technology websites such as Infosecurity-magazine and Information Security Buzz. In addition, I have a great passion for learning about new technology. I am welling to learn about new software application or hardware components in order to do the job.

PROFESSIONAL EXPERIENCE

American Furukawa Inc. (Contract) Plymouth, MI

Technical Support Analyst

Microsoft Office 365 Business 2016 Migration Project

10/1/2016 – 02/10/2017

Help migrated users to Microsoft Office 365 Business 2016

Resolve issues for clients via phone, in person, or electronically

Used Active Directory to reset users passwords

Configured the Multifunction Devices (MFDs)

Change Group Policy settings

Restored computers from backups

Log tickets, resolve user issues and problems

Used Active Directory to find user contact information or find end users IP addresses

Communicated with third party out source services

Backed up users computers

Installed Microsoft Office 365 Business 2016 on end user computers

Used Anti-virus software Sophos

Upgraded computers such as hardware and software

Troubleshoot Microsoft Office 365 Business 2016 problems

Created new User Accounts using Active Directory

Used Active Directory to Remotely connect to users computers and installed software

Install new Software end user’s computers

Upgrade hardware in computers

Support Hardware and Application for Windows 7, 8 & 10

Troubleshooting and fixing computers, printers, fax machines and scanners software and hardware issues.

Keep IT equipment updates current

Troubleshoot Android and Apple IOS mobile devices issues

Remove Viruses from user’s computers

Perform Hardware installation, troubleshooting and repairs on PC's and printers

Provided special assistance to key departments such as: Engineer, Sales, and Customer Service

Trained end users on how to use software applications

Troubleshoot Network issues and resolved the network problem

Assist with planning and execution of upgrades and software implementations

Escalated issues as needed and maintained communication with customers and Technical teams

Installed software, configured and tested customer PC’s, analyzed functionality of peripheral appendages.

Respond to phone calls, emails, and in-person requests

Domino’s Pizza (6 month contract) Ann Arbor, MI

Security Analyst 1/1/2016 – 7/1/2016

Identify, detect, and escalate incidents

Used Active Directory to Remotely connect to users computers to install patches to security software

Used Active Directory to located end users information

Analyzes security system logs, security tools, and available data sources on a regular basis to identify attacks

Responsible for removing Malware, or Adware on end user’s computers

Operate and utilize the SIEM toolset to investigate and triage the security events. As well, provided reporting and analysis of the security events.

Analyzed potential risks and vulnerabilities in the network and providing actionable recommendation in the event of malicious activity by using Security Various Tools

Documented and triages security events

Help deploy Phishing Campaigns to change the behaviors of the end users

Conduct remediation activities to bring affected systems back to a known-good state.

Investigated emails that where suspected to be ether spam or phishing emails by various security tools

Investigate any file that was block by Bit9 Parity software

Responsible for approving or reject files that where block by Bit9 Parity

Assist in inspections of services and technologies and ensure that corrective actions are taken for all identified findings and vulnerabilities

Removed Malware, or Adware on end user’s computers

Correlated information by using various security tools

Responsible for triaging tickets to different departments using the Ticket System Service Now

Responsible troubleshooting assistance and ticket resolution for personal computer users.

Supports computer users with installation software, and Investigate problems and develop recommendation for resolution.

QUALIFICATIONS

Understanding Cisco Cybersecurity Fundamentals

Experience troubleshooting and fixing computers, printers, fax machines and scanners.

Experience Microsoft Office 365 Business 2016

Experience using Open Source Technology

Knowledge of common browsers (i.e. Internet Explorer, Chrome, Firefox, and Safari)

Knowledge of current desktop/tablet/mobile device and software operating systems

Experience With Group Policy

Experience upgrading computers

Know how to communicate with various organizational professional levels

Experience restoring computers from backups

Experience supporting malware and anti-virus software

Knowledge on pc configuration

Can easily learn and adapt to new technology quickly

Experience with Service ticket queues and answer customer questions

Remote Desktop Access in to end user computers

Experience with Windows Active Directory Domain

Proficient in electrical repair

Work well in groups and independently

Experience analyzing network, event and security logs, and/or IDS alert logs

Experience with standard security tools: Firewalls, Intrusion Detection/Prevention Systems, Anti-Virus, Vulnerability Scanners

Understanding of PCI DSS v3.x standards

Skill in identifying Digital Forensic Evidence

Knowledge of Criminal and Investigative Process

Strong at Problem Solving

Knowledge of computer seizure techniques

Knowledge of Technology Strategies

knowledge of Virus Protection Software

Experience at writing Forensic Reports

Experience at collecting evidence from a hard drive image

Experience at creating an imagery of a hard drive

Understand on how to follow Chain of Custody

Knowledge of the Health Insurance Portability and Accountability Act (HIPAA)

Risk Management

Knowledge of the Family Education Rights and Privacy Act (FERPA)

Knowledge of the Guide to Integrating Forensic Techniques into Incident Response (NIST). SP.800-86/

Basic understanding of application protocols (HTTP, DNS, FTP, etc.) and networking protocols

Proficient with Microsoft products applications (Word, Excel, PowerPoint and Outlook)

Security Information and Event Manager (SIEM), Intrusion Prevention (IDS/IPS), Data Loss Prevention (DLP)

Experience with using Wireshark

Experience with using Active Directory

Knowledge on using Bit9 Parity on a daily basis as a compliance security tool

Knowledge of Microsoft System Center Endpoint Protection

Skilled at using Ticket System Service Now

Remote Desktop Access in to end user computers

Knowledge on using ArcSight Command Center

Checkpoint

Experience with using RSA Data Loss Prevention

Malwarebytes

Proficient at investigating spam and phishing emails

Experience with Palo Alto IDS

Proficiency at using Microsoft Word Excel and Power Point

SPSS (Statistical Package for the Social Sciences)

Experience at repairing Software and Hardware problems

Proficient using Access Data Digital Forensic Tool Kit (FTK) Password Recovery, Registry Viewer, Data Carving, Indexed Searching, Verifying Images Integrity, Creating Thumbnails and Analyzing Evidence

Weka Data Mining

Open Source Forensic Software

Understanding on how to use Encase forensic software

Proficient using Network Tools: NsLookup, Ping and Whois

Microsoft Lync



Contact this candidate