Post Job Free

Resume

Sign in

Cyber Security Specialist

Location:
Colonia, NJ
Posted:
January 14, 2024

Contact this candidate

Resume:

Stefan W. Lachiver

Colonia, NJ *****908-***-**** • ad2rex@r.postjobfree.com

https://www.linkedin.com/in/slachiver/

CYBER SECURITY SPECIALIST

CUSTOMER SERVICE INNOVATIVE TECHNOLOGICALLY LITERATE Cyber Security enthusiast with expertise as experienced Human Services Specialist with a proven track record as a leader and high performer. Proficiency in the growing field of Cyber-Security and evolving technological knowledge. Expertise in developing strategic plans in driving results and exceeding goals that contribute to the organizational objectives. Skilled in developing and maintaining high quality relationships, and identifying and allocating appropriate resources. Collaborating with all members in achieving and surpassing targets. TECHNICAL SKILLS

Technology: Wireshark, HoneyPot, Pycharm

Programming Languages: Python

Operating Systems: Windows 10, Windows 16 Server, Kali Linux, Ubuntu, Debian, Redhat, Centos Windows Security: Active Directory, Windows Server, Group Policy, DNS, Shares and Permissions, DHCP, Disk Management, Microsoft Endpoint Security, Security Policy, Microsoft Authentication, Powershell Networking: Networking, Switch & IOS, IP & Routing, Subnetting, IPv4/6 Static Routing, Dynamic Routing, VLANs and Trunking, Diagnostics & Troubleshooting, Access Control List, Infrastructure Services, Cloud: AWS, Cloud Security, Virtualization and Container, and Advanced Cloud Security Additional Experience: Microsoft Security, Computer Networking, Cloud Security, Linux Security, Network Security, Cyber Technologies, Python, Ethical Hacking, DFIR, Game Theory Spoken Languages: Bilingual Proficiency English, French EDUCATION & CREDENTIALS

Bachelor of Science in Political Science, Kean University, Union, NJ Cyber Security Degree, NJIT, Newark, NJ

Technical Proficiencies

• Cyber Infrastructure and Technology • Digital Forensics and Incident Response • Computer Networking • Windows and Linux based operating systems • Microsoft, Network, Linux and Cloud Security • Risk Analysis EDUCATIONAL EXPERIENCE NJIT

Built a Windows Server Virtual Machine

Scope: Utilized virtualization software to create a virtual machine.

● Loaded operating system (Windows Server 2019), and performed basic setup; encrypt username and password.

● Ran a test and set up the network. Looked up the IP address and ping virtual machine to ensure a connection was established.

Installation of WAN

Scope: Built Wide Area Network (WAN) for a bank branch including three LANs.

● Identified ISP, designed layout for bandwidth, line quality, and hardware

● Built WAN utilizing VPN.

● Utilized Cisco Packet Tracer

Network Configuration

Scope: Set up a corporate network and implement security settings for a new bank branch.

● Devised network Topology plan and where to assign the IP address. Stefan W. Lachiver Page 2

● Built VLANs, trunks, and routers to allow multiple stream communication. Arranged switches to communicate with port security and routers to work with OSPF.

● Configured network devices to prevent unauthorized access by securing privilege mode, encrypting passwords, and designing security messaging. Conducted a successful connectivity test. Network Security

Scope: Act as a security analyst to protect company communication

● Set up 3 machines: client, host, and threat; established connection and engaged in communication through network requests and emails.

● Imitate a threat to extract info and intercept traffic-utilizing Wireshark.

● Configured firewall using pfSense

Python

Scope: Create code that receives input; a program that will accept user information.

● Create Python script(s) using Pycharm

● Create input fields

● Create a statement for the desired output.

● Test/Run to ensure correct output.

● Established protocols, secured channels in a sandbox environment, translated and encrypted code. Ethical Hacking

Scope: Use Wireshark to track passwords.

● Using Windows and Linux, lookup IP addresses. Try to crack passwords by monitoring the flow of traffic Digital Forensics and Incident Response

Scope: Performed a forensic investigation within a lab environment using SIFT Workstation & Flare VM. Learned techniques concerning finding “noisy” IP addresses using Zeek to parse pcap Files, filtering techniques, finding malicious files on infected computers/backdoors, investigating malware behavior, and finding secrets.

● Learned about the DFIR Lifecycle

● Able to acquire data from live and dead Windows & Linux systems. (dd, mount, CAINE, FTK, OSFMount, Sysinternals.

● Knowledge in memory-analysis (Volatility), log analysis, and timeline analysis (log parser/Splunk)

● Learned about network forensics (proxy, DNS tunnel, malware). PROFESSIONAL EXPERIENCE & SELECTED ACHIEVEMENTS

SOMERSET COUNTY BOARD OF SOCIAL SERVICES, Somerville, NJ 2011 to Present Human Services Specialist 3

Administer government welfare program processing encompassing application reviews for program eligibility, conducting applicant interviews, recertifying applications, scheduling appointments, and responding to customer questions. Currently the acting Supervisor overseeing a staff of 15 people.

● Enhanced operational efficiencies by designing training class curriculum in educating team members on welfare programs; conducted training sessions with team members on programs and regulations.

● Process the highest number of client cases within the department through strategic planning and execution.

● Achieved third best score statewide in open competitive certification test.

● Exceed customer expectations consistently through exceptional and timely service.



Contact this candidate