Post Job Free
Sign in

Project Management Information Technology

Location:
Oakdale, PA
Posted:
October 21, 2024

Contact this candidate

Resume:

Emmanuel Davies

Phone: 412-***-****

Email: *.******@*********.*** / *****************@*****.***

LinkedIn: linkedin.com/in/emmanuel-davies-58a269222

Address: **** ****** ******, **********, **

PROFESSIONAL SUMMARY

Dedicated cybersecurity professional pursuing a Master's degree in Information Technology Management, with a solid foundation in network engineering and computer science. Experienced in implementing security measures, conducting vulnerability assessments, and managing IT infrastructure. Ability to deliver high-impact projects and apply theoretical knowledge to real-world scenarios.

EDUCATION

Master of Science in Information Technology Management (in progress)

Seton Hill University, Greensburg, PA

Expected Graduation: December 2024

GPA: 4.0

Relevant Coursework: Enterprise Security & Cyber Policy, Cyber Risk Mitigation, Data Mining & Big Data, Agile Project Management, Business Intelligence & Data Visualization

Bachelor of Science in Computer Science

Njala University, Sierra Leone, West Africa

Graduated: April 2021

GPA: 4.29/5.0

Relevant Coursework: Data Structures, Algorithms, Computer Networks, Information Security

SKILLS

Technical Skills:

•Network & System Security: Network Security, Computer Systems Security, Firewall Configuration, SIEM Tools, OSINT, Active Directory, Cyber Kill Chain Strategy, IDS

•Security Assessments: Vulnerability Assessment, Penetration Testing

•Programming & Scripting: Python, JavaScript, HTML, CSS, SQL

•Data Management & Analysis: Data Analysis, Database Management

•Operating Systems: Linux, Windows, macOS

•Project Management: Agile Project Management, General Project Management

Soft Skills:

•Problem-solving, Team Collaboration, Critical Thinking, Communication

Certifications:

•Preparing for CompTIA Security+ SY0-701

•Google IT Support (in progress)

PROFESSIONAL EXPERIENCE

Cybersecurity Analyst (Graduate Assistant)

Seton Hill University, Greensburg, PA October, 2023- Present

•Conducted regular vulnerability assessments and penetration testing on university networks.

•Implemented and maintained security tools to monitor and protect against cyber threats.

•Developed and delivered cybersecurity awareness training for faculty and staff.

•Assisted in developing university-wide IT security policies and procedures.

•Provided technical support for students and faculty, resolving hardware and software issues.

•Maintained and repaired university computer systems and peripherals.

•Assisted in the implementation of new technologies across campus.

•Developed documentation for common technical issues and solutions.

Network Engineer

Kingho Mining Company, Sierra Leone June 2020 - July 2022

•Designed and implemented network infrastructure for small to medium-sized businesses.

•Configured and maintained firewalls, routers, and switches for optimal network performance.

•Conducted network troubleshooting and resolved complex connectivity issues.

•Implemented VPNs and other secure remote access solutions for clients.

PROJECTS

•Secure SSH Configuration with User Privilege Management (University Production System)

•Implemented key-based authentication and user-specific access controls.

•Enhanced system security by disabling password authentication and restricting sudo privileges.

•Configured SSH server for key-only authentication, improving overall security posture.

•Applied the principle of least privilege by managing user permissions effectively.

•Secure SFTP Server with User Jails and SNMP (University Production System)

•Designed and implemented a secure file transfer system with isolated user environments (chroot jails).

•Integrated SNMP for improved network monitoring and management.

•Configured SFTP jails for multiple user groups, enhancing data segregation and security.

•Implemented logging and monitoring for SFTP activities to detect potential security breaches.

•Intrusion Detection System (IDS) Implementation

•Designed and implemented a custom IDS using Snort and the ELK stack.

•Improved network security posture by detecting and alerting on potential threats.

•Configured rules to identify and respond to several types of network intrusions.

•Secure Web Application Development

•Developed a secure e-commerce platform using OWASP best practices.

•Implemented multi-factor authentication and secure payment processing.

•Conducted thorough security testing to identify and mitigate vulnerabilities.

AWARDS & ACHIEVEMENTS

•Invited Member, National Society of Leadership and Success

•Recipient, General Board of Higher Education and Ministry Scholarship, United Methodist Church, 2024

•Active Member, Church Worship Team, and Technology Support Group

PUBLICATIONS

Securing Critical Infrastructure: Challenges and Solutions (In Progress)

•Conducting research on the vulnerabilities and security measures for critical infrastructure systems, focusing on identifying challenges and proposing solutions to enhance resilience against cyber-attacks.

•Zero Trust Architecture in Modern Cybersecurity Frameworks (In Progress)

•Exploring the principles and implementation strategies of Zero Trust Architecture, evaluating its effectiveness in improving organizational security postures and mitigating cyber threats.

References available on Request



Contact this candidate