Post Job Free

Resume

Sign in

Cybersecurity, Penetration Tester, DFIR IoT, Threat Hunting

Location:
Mackinaw City, MI, 49701
Salary:
50000
Posted:
December 13, 2023

Contact this candidate

Resume:

Lena M. Thompson

Cheboygan, MI ad1t0s@r.postjobfree.com 313-***-**** linkedin.com/in/lenathompsonllc

EDUCATION

University of Michigan, Ann Arbor, MI

Michigan Engineering Nov 2023

Siena Heights University, Adrian, MI

Automotive Technology Jun 1997

CERTIFICATION and SKILLS PROFILE

Certifications:

University of Michigan – Program Certificate for Cybersecurity Professional Bootcamp Nov 2023

ISC2 CC - Certified in Cybersecurity Jul 2023

Google – Cybersecurity Professional Oct 2023

PUBLIC SERVICE

Appointment:

Planning and Zoning Commissioner of Cheboygan County Feb 22, 2021 - Dec 15, 2023

PROFESSIONAL EXPERIENCE

Lena Thompson LLC, Cheboygan MI

Independent Contractor/Field Inspector for Mortgagers and Bankers Jun 2020-present

Ford Motor Company, Wayne and Allen Park, MI

Service Engineering Program Manager Sep 2004–May 2019

Highly respected within the Ford Customer Service Engineering community

Continually influenced engineering to work diligently on investigating design, manufacturing, or supplier quality issues

Utilized end customer and technician data, to justify resources be allocated to fix concerns.

Led cross functional teams to engage in root cause analysis, investigation, repair trials.

Owned the concern from beginning to end. Then, communicated the fix to the field, by authoring the technical service bulletin.

Provided “fresh eyes” to safety engineering groups. Collaborated with DandR engineers, quality engineers, vehicle operation engineers, end of line engineers, repair technicians.

Provided a clearinghouse of serviceability information and support to the vehicle team and other stakeholders.

Utilized 6-Sigma Blackbelt processes, such as the DMAIC principle (design, measure, analyze, improve, control). Certified as a Consumer Driven, 6-Sigma Blackbelt, by Ford Motor Company

Wayne County Community College, Taylor MI

Adjunct Faculty, Automotive Technology Jan 2009 - Jun 2019

Exceptionally engaged professor of automotive technology. Student reviews always positive due to the seriousness and enthusiastic atmosphere in the lab and classroom.

ASE and Michigan Certified Master Mechanic

CYBERSECURITY PROJECT EXPERIENCE

Cybersecurity Labs and Projects Nexus at University of Michigan Feb 2023–Present

Comprehensive Hands-on cybersecurity training program featuring real-world security simulations; led by subject matter experts. 30 hrs./wk. (Classroom and Home Lab)

Microsoft Security:

Compilation of all Microsoft Security labs: Simulate the role of a help-desk technician by identifying and responding to a series of issues within a domain by utilizing Active Directory

Skills and Tools:

Active Directory, Windows Server 2016 OS, virtualization, Windows Client, DHCP server, IP address scheme, Group Policy (GPO), PowerShell, AppLocker, BitLocker, Windows Firewall

Computer Networking:

Simulate Jr. Network Administrator tasked with designing and deploying a corporate network for a new bank branch.

Skills and Tools:

TCP/IP, DHCP, DNS, subnetting, Cisco IOS, routing, switching, OSPF, RIPv2, EIGRP, AAA, 802.1X, 802.1Q, WANs, LANs, OSI model, VPN, ACLs, VLANS, Wireshark, Packet Tracer

Cloud Security:

Simulate AWS Cloud Practitioner. Received an essential understanding of cloud platforms that includes knowing how to leverage, work with, and secure the Cloud.

Skills and Tools:

Cloud Security Fundamentals, including the Shared Responsibility Model, Cloud Architecture, Identity and Access Management (IAM), Encryption, Network Security, Compliance Frameworks and Regulations.EC2 Instance. WAF.

Linux Security:

Using Virtual Machines: Navigated the Linux file system, run basic commands, configured network services, handled access permissions, and exploited mitigations. Secured and hardened the Linux environment.

Skills and Tools: Configure Allow Lists, IP Lockout, SSL Encryption, PAM Authentication, Bash Scripting for Security, Samba, Apache, Debian, Gnome, Ubuntu

Network Security:

Secure, manage, and operate network communication equipment and systems for different organizations.

Skills and Tools: AAA Concepts, RADIUS and TACACS+, 802.1X Authentication, MAC Spoofing, CAM Table overflow, Port Security Mitigation VLAN Hopping, CDP/LLDP Reconnaissance, Secure Dynamic Routing, NTP Attacks, DHCP Attacks, Advanced Wireshark, Wireshark Statistics, File Extraction, Network Miner, Network Monitor, Cryptography Concepts, Hash Algorithms, Encryption, Digital Signatures and Certificates, NS-06, pfSense, VPN Concept, VPN Types, Remote Access VPN, Site to Site VPN, Modern VPN, SNMP, NetFlow, Nagios, Deep Packet Inspection, Protocol Analyzer, NW Investigator, Detection Methods, Working with IPS and IDS

Cyber Infrastructure and Technologies:

Design and maintain secure infrastructures and technologies. Implement security countermeasures, tools, SIEM, and other cyber technologies to protect organizations.

Skills and Tools: Create Yara Rules, Install modern Honeypot network, POP3, Telnet, OpenDLP, ClamAV, Valhalla Honeypot, Regex, Snort, Splunk, SIEM, SOAR, Cortext XSOAR, Physical Security Strategy, Network Architecture Topol

Python for Security:

Learned essential concepts of Python for both Windows and Linux environment.

Skills and Tools: Python scripting for automation

Offensive Security: Ethical Hacking:

Execute and defend against various attacks, such as network, application, cryptographic, and social engineering.

Skills andTools: Network Scanning, MITM Attacks, Brute-force, Social Engineering, Windows and Linux Privilege Escalation, Web Application Security, XXS and File Inclusion. SQL Injection, Vulnerability Scanners and Reporting.

DFIR and Threat Hunting:

Understand digital forensics and incident response, utilizing advanced threat hunting techniques such as situational awareness, machine learning, intelligence, and user behavior analytics.

Skills and Tools: Incident Response Preparation and Implementation, Data Acquisition, Windows Live Analysis, Memory Analysis, Linux Forensics, Log Analysis and Timeline, DFIR Simulation, Threat Hunting, Dynamic Malware Analysis, Network Forensics, Network Defense and Persistence.

IoT and Mobility Security:

Knowledge and practice training to secure Internet of Thing and mobility devices.

Skills and Tools: Hardware Security, Arduino IDE, IoT File Systems. Firmware Extraction and Emulation, RF Attacks and Mitigations, Common Attacks in Automotive Security



Contact this candidate