KEVIN EAR
404-***-**** **********@*****.*** GitHub
CERTIFICATES & SKILLS
Certificates: Security+, Azure Fundamentals (AZ-900), Azure Security Engineer Associate (AZ-500) Programming Languages: Python, C#, JavaScript, SQL, T-SQL, PowerShell Frameworks: ASP.NET, .NET Core, .NET 8, Blazor, Agile/Scrum, SOLID, SDLC, xUnit.net, CI/CD Tools: Postman, SQL Server Management Studio, Git Version Control, GitHub, Visual Studio Code, Azure DevOps EDUCATION
The University of Georgia - Terry College of Business, B.B.A, Management Information Systems – Cybersecurity Relevant Coursework: Computer Programming in Business, C# Programming, Computing in Python, Object-Oriented Programming, Database Management, Developing Secure Applications, Data Structures & Algorithms SOFTWARE DEVELOPMENT PROJECTS
MoneyWizz (Python)
• Developed an AI Chatbot that provides financial advice to users who aim to achieve financial literacy
• Implemented Natural Language Processing (NLP) using Python’s NLTK library and Machine Learning/Deep learning algorithm to configure the rule-based chatbot to analyze user input and generate a response
• Implemented DevOps practices by creating work items for new features & bugs, and tracked these improvements throughout the Software Development Life Cycle
Cat Lovers Generator (HTML, CSS, and JavaScript)
• Developed an application that interacts with Cat API to serve fun facts about each breed based on the user’s input
• Fetched data from the API to display breed name, life span, and description of the specific breed Exercise Tracker (Python)
• Developed a script that uses Natural Language Processing to take in user’s input and store exercise statistics
• Followed secure development principles by storing credentials in Environment Variables to authenticate requests to Nutritionix API
Password Manager (Python)
• Developed feature that enabled users to generate a 9-character password, search and retrieve their credentials
• Implemented unit tests and shift-left testing to identify bugs before deployment
• Aligned with stakeholders in designing high-level system architecture and collecting feature requirements
• Analyzed user needs and requirements to determine the feasibility of design and constraints WORK EXPERIENCE
Freelancer, Full Stack Software Developer, Atlanta, GA January 2022 – Present
• Developed web applications using C#, .NET, and ASP.NET Core, enhancing application performance by 20%
• Collaborated with cross-functional teams to implement RESTful APIs and integrate third-party services
• Assisted in database management and optimization using SQL Server and Entity Framework.
• Participated in Agile/Scrum meetings to refine development processes and improve productivity
• Conducted unit testing and debugging of applications to ensure quality and functionality
• Partnered with stakeholders to determine user requirements for a set of features and collected design requests BlackRock, Cybersecurity Analyst – Data Protection, Atlanta, GA January 2022 – Present
• Increased productivity for the team and saved two hours of incident response by analyzing SNOW tickets and configuring current Data Protection Symantec rules which eliminated 50,000 false positives
• Safeguarded restrictive financial data and prevented data exfiltration from insider threats by responding to hundreds of incidents across various security tools identifying behaviors indicative of anomalous activity
• Developed detailed incident response playbooks from ground zero by collaborating with a globally distributed team and created easy-to read internal documentation in Confluence
• Built weekly reports summarizing security incidents and number of investigations performed for team/CISO Protiviti, AWS/Azure Cloud Security Consultant, Atlanta, GA June 2019– January 2022
• Improved 15 organizations’ cloud security posture by identifying potential vulnerabilities in their cloud environment systems and implemented controls that aligned with Microsoft Cloud Security Benchmark
• Led efforts to remediate 75,000 vulnerabilities in 500 AWS autoscaling groups containing EC2 instances by collaborating with Application owners and recommended patching and using hardened AWS images
• Utilized Azure DevOps Board to track work items for multiple projects, ensured our team were aligned with department objectives, and cross-collaborated with various teams to provide daily updates on multiple sprints
• Analyzed security alerts generated by CrowdStrike Falcon Cloud Security platform and implemented controls to remediate indicators of misconfigurations in Azure and AWS to ensure a secure cloud environment
• Generated $1.5 million on an 8-month project by interviewing clients, documenting their current processes, and building out improved business process models for new hires/trainees
• Assessed new cloud security technologies such as CrowdStrike Falcon CNAPP and Defender for Cloud and worked with vendors to test proof of value and proof of concept AZURE CLOUD SECURITY EXPERIENCE, How-to-tutorials
• Collaborated with security architects in assessing their current security controls, identified vulnerabilities, and created a roadmap to work towards aligning organizations with the Zero-Trust Rapid Modernization Plan (RaMP) and its goal to modernize a company’s security controls
• Shared knowledge on Azure Security architecture to clients to help organizations reach their security goals by designing their security solutions to align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF)
• Implemented security best practices to protect Azure resources based on Defender for Cloud recommendations
• Configured network security groups for Just-in-Time access, utilized NSGs to secure virtual networks, and deployed dynamic rules to automate the management of security groups
• Implemented data collection process by connecting various data connectors to Microsoft Sentinel Workspace to analyze Azure AD Sign-In logs, Audit logs, and Security Events from an on-premise environment
• Administered Azure RBAC and Azure AD roles to test users to control access to services and adhered to the principle of least privilege using Privileged Identity Management (PIM)
• Implemented Azure AD Connect to sync on-premise users to the cloud to satisfy the company’s requirements by configuring SSPR and Password Writeback for hybrid identities
• Created Conditional Access policies to restrict access to Azure services and deploy access reviews to ensure users and groups have the least privilege to access Azure resources
• Configured network security groups for JIT access, managed virtual networks, and deployed dynamic rules to automate the management of security groups
• Secured hybrid environment and securing solutions using firewalls/VPNs, deploying and securing access to Azure Key Vault, and storing keys and secrets within Key Vault