Lena M. Thompson
Cheboygan, MI ad1t0s@r.postjobfree.com 313-***-**** linkedin.com/in/lenathompsonllc
EDUCATION
University of Michigan, Ann Arbor, MI
Michigan Engineering Nov 2023
Siena Heights University, Adrian, MI
Automotive Technology Jun 1997
CERTIFICATION and SKILLS PROFILE
Certifications:
University of Michigan – Program Certificate for Cybersecurity Professional Bootcamp Nov 2023
ISC2 CC - Certified in Cybersecurity Jul 2023
Google – Cybersecurity Professional Oct 2023
PUBLIC SERVICE
Appointment:
Planning and Zoning Commissioner of Cheboygan County Feb 22, 2021 - Dec 15, 2023
PROFESSIONAL EXPERIENCE
Lena Thompson LLC, Cheboygan MI
Independent Contractor/Field Inspector for Mortgagers and Bankers Jun 2020-present
Ford Motor Company, Wayne and Allen Park, MI
Service Engineering Program Manager Sep 2004–May 2019
Highly respected within the Ford Customer Service Engineering community
Continually influenced engineering to work diligently on investigating design, manufacturing, or supplier quality issues
Utilized end customer and technician data, to justify resources be allocated to fix concerns.
Led cross functional teams to engage in root cause analysis, investigation, repair trials.
Owned the concern from beginning to end. Then, communicated the fix to the field, by authoring the technical service bulletin.
Provided “fresh eyes” to safety engineering groups. Collaborated with DandR engineers, quality engineers, vehicle operation engineers, end of line engineers, repair technicians.
Provided a clearinghouse of serviceability information and support to the vehicle team and other stakeholders.
Utilized 6-Sigma Blackbelt processes, such as the DMAIC principle (design, measure, analyze, improve, control). Certified as a Consumer Driven, 6-Sigma Blackbelt, by Ford Motor Company
Wayne County Community College, Taylor MI
Adjunct Faculty, Automotive Technology Jan 2009 - Jun 2019
Exceptionally engaged professor of automotive technology. Student reviews always positive due to the seriousness and enthusiastic atmosphere in the lab and classroom.
ASE and Michigan Certified Master Mechanic
CYBERSECURITY PROJECT EXPERIENCE
Cybersecurity Labs and Projects Nexus at University of Michigan Feb 2023–Present
Comprehensive Hands-on cybersecurity training program featuring real-world security simulations; led by subject matter experts. 30 hrs./wk. (Classroom and Home Lab)
Microsoft Security:
Compilation of all Microsoft Security labs: Simulate the role of a help-desk technician by identifying and responding to a series of issues within a domain by utilizing Active Directory
Skills and Tools:
Active Directory, Windows Server 2016 OS, virtualization, Windows Client, DHCP server, IP address scheme, Group Policy (GPO), PowerShell, AppLocker, BitLocker, Windows Firewall
Computer Networking:
Simulate Jr. Network Administrator tasked with designing and deploying a corporate network for a new bank branch.
Skills and Tools:
TCP/IP, DHCP, DNS, subnetting, Cisco IOS, routing, switching, OSPF, RIPv2, EIGRP, AAA, 802.1X, 802.1Q, WANs, LANs, OSI model, VPN, ACLs, VLANS, Wireshark, Packet Tracer
Cloud Security:
Simulate AWS Cloud Practitioner. Received an essential understanding of cloud platforms that includes knowing how to leverage, work with, and secure the Cloud.
Skills and Tools:
Cloud Security Fundamentals, including the Shared Responsibility Model, Cloud Architecture, Identity and Access Management (IAM), Encryption, Network Security, Compliance Frameworks and Regulations.EC2 Instance. WAF.
Linux Security:
Using Virtual Machines: Navigated the Linux file system, run basic commands, configured network services, handled access permissions, and exploited mitigations. Secured and hardened the Linux environment.
Skills and Tools: Configure Allow Lists, IP Lockout, SSL Encryption, PAM Authentication, Bash Scripting for Security, Samba, Apache, Debian, Gnome, Ubuntu
Network Security:
Secure, manage, and operate network communication equipment and systems for different organizations.
Skills and Tools: AAA Concepts, RADIUS and TACACS+, 802.1X Authentication, MAC Spoofing, CAM Table overflow, Port Security Mitigation VLAN Hopping, CDP/LLDP Reconnaissance, Secure Dynamic Routing, NTP Attacks, DHCP Attacks, Advanced Wireshark, Wireshark Statistics, File Extraction, Network Miner, Network Monitor, Cryptography Concepts, Hash Algorithms, Encryption, Digital Signatures and Certificates, NS-06, pfSense, VPN Concept, VPN Types, Remote Access VPN, Site to Site VPN, Modern VPN, SNMP, NetFlow, Nagios, Deep Packet Inspection, Protocol Analyzer, NW Investigator, Detection Methods, Working with IPS and IDS
Cyber Infrastructure and Technologies:
Design and maintain secure infrastructures and technologies. Implement security countermeasures, tools, SIEM, and other cyber technologies to protect organizations.
Skills and Tools: Create Yara Rules, Install modern Honeypot network, POP3, Telnet, OpenDLP, ClamAV, Valhalla Honeypot, Regex, Snort, Splunk, SIEM, SOAR, Cortext XSOAR, Physical Security Strategy, Network Architecture Topol
Python for Security:
Learned essential concepts of Python for both Windows and Linux environment.
Skills and Tools: Python scripting for automation
Offensive Security: Ethical Hacking:
Execute and defend against various attacks, such as network, application, cryptographic, and social engineering.
Skills andTools: Network Scanning, MITM Attacks, Brute-force, Social Engineering, Windows and Linux Privilege Escalation, Web Application Security, XXS and File Inclusion. SQL Injection, Vulnerability Scanners and Reporting.
DFIR and Threat Hunting:
Understand digital forensics and incident response, utilizing advanced threat hunting techniques such as situational awareness, machine learning, intelligence, and user behavior analytics.
Skills and Tools: Incident Response Preparation and Implementation, Data Acquisition, Windows Live Analysis, Memory Analysis, Linux Forensics, Log Analysis and Timeline, DFIR Simulation, Threat Hunting, Dynamic Malware Analysis, Network Forensics, Network Defense and Persistence.
IoT and Mobility Security:
Knowledge and practice training to secure Internet of Thing and mobility devices.
Skills and Tools: Hardware Security, Arduino IDE, IoT File Systems. Firmware Extraction and Emulation, RF Attacks and Mitigations, Common Attacks in Automotive Security