Eunice Brathier, CompTIA SEC+
Colorado Springs, CO 316-***-**** **************@*****.***
Secret Clearance DoD
Summary
A team player with leadership skills, and the ability to manage diverse project teams with 7yrs Experience in information system security, risk management, and vendor-supply chain management. Fluent in multiple languages, English, and French. Experience working in a technical environment interfacing with all engineering disciplines and able to work well in a team environment. Possesses extensive experience using SAP and Microsoft Office Suite applications. BMC Remedy, IBM CLM, and Microsoft SharePoint.
Education
Bachelor of science with a concentration in Accounting Wichita State University – KS (Dec. 2016)
Certifications
CompTIA Security+ Certification (COMP001021992392) 02/2022, - (IAM-I) and (IAT-II) CSWF Compliance. Linux training
Core Competencies: Systems Administrator, Incident Response, Regulatory Compliance, Security & Vulnerability Assessment, Cybersecurity, NIST 800-37 Risk Management Framework (RMF) Security Assessment and Authorization (SA&A), Plan of Action and Milestones (POA&M), System Security Plans (SSP), Security Assessment Report (SAR), Continuous Monitoring (CM), Contingency Plans (ISCP)
Professional Experience
IT Specialist- T & H SERVICES, CO July 2023-Present
Assessed system vulnerabilities, implemented risk mitigation strategies, validated secure systems, and tested security products and systems to detect security weaknesses.
Supporting the processing, tracking, and monitoring of Change Requests and Configuration Change Requests submitted by the customer.
Providing patch management process support to ensure software patches being pushed from the corporate level are completed.
Supporting the tracking and publishing of relevant metrics as well as Updating and maintaining Standard Operating Procedures for Configuration Management process.
Install, operate, and perform unit maintenance on multi-functional/multi-user information processing systems, peripheral equipment, and auxiliary devices.
Gathering and auditing artifacts, as well as migrating and monitoring the necessary changes as related to system development.
Resolve network performance issues and establish a disaster recovery plan. Supporting the tracking and publishing of relevant metrics
Updating and maintaining Standard Operating Procedures for the CM process
Recommends upgrades, patches and new applications and equipment.
Develop and implement security policies, procedures, and measures to protect computer systems and data.
Supports, designs, maintains, and monitors internal and external networks.
Configure and manages all applications, and system including firewalls, intrusion detection system security, and antivirus software.
Assisted in integrating cybersecurity into the overall design and implementation of system application while ensuring that security aligns with the organization’s business objectives.
Trained system users on new or changed operating systems, IT equipment, software, and/or the application of security guidelines.
Educate users on best practices for safe computing and data protection.
System Administrator- - U.S. ARMY – Fort Carson, CO February 2017–December 2022
Worked with developer teams to understand their requirements and configure systems appropriately.
Troubleshooted application issues that arose during deployments and tuned environment for performance enhancements and security requirements.
Setting up SELinux, firewall configuration, ACLs, user management, sudo, yum.
Experienced configuring Grafana and Prometheus to monitor the system.
Experienced with Red Hat, CentOS, VMware ESXi, Filesystem management (ext4, VFAT, XFS).
Experienced Utilizing LVM to manage filesystem, & Linux server troubleshooting skills.
Linux server deployment, administration, patching, and network troubleshooting.
Experienced with NFS, DHCP, TCP/IP, SSH, LDAP, DNS.
Used vulnerability scan tools such as Nessus and Nmap to detect vulnerabilities within the system.
Investigated information system security violations and helped prepare reports specifying corrective and preventative actions.
Performed cybersecurity technical review of the system security configurations.
Identified security weaknesses and documented the weaknesses in the Security Assessment Report (SAR).
Continuously monitor computer systems, networks, and applications for security vulnerabilities and threats.