PROFESSIONAL SUMMARY
Experienced IT professional with a strong background in cybersecurity, cloud technologies, and IT support. Proven success in driving IT initiatives, improving risk management, and optimizing IT support. Skilled in developing innovative solutions, such as bash scripts for logging efficiency and automated vulnerability scanning. Expertise in security policy implementation, risk assessments, and incident response to minimize downtime and resolve issues swiftly. Proficient in using tools like Nessus and Rapid7 for proactive risk mitigation. Known for delivering exceptional customer service and maintaining high satisfaction levels. TECHNICAL SKILLS
Wireshark
SIEMS Log
EDR
IDS/IPS
Investigation
Complex-problem solving
Detail-Oriented
Nessus
OpenVAS
Azure Directory
Account Management
Linux
ServiceNow Ticketing System
FTK Imager
Metasploit
Encryption software
Firewall policy ruling
AWS
PROFESSIONAL EXPERIENCE
JAN 2023 – AUG 2024
FORT BELVOIR, VIRGINIA
ALEXANDER T AUGUSTA MILITARY MEDICAL CENTER
TECHNICAL SUPPORT SPECIALIST
-Created and resolved tickets entered the ticketing system to provide issue resolution via email, chat, or phone call.
-Troubleshoot computer system issues pertaining to system misconfiguration, LAN network, hardware, or software issues to ensure continuity
-Assemble new devices ordered for computer systems based on task provided to track and restore workstation.
-Under DOD guidelines, I worked for optimal security and most efficient performance to ensure that time is saved by 50%
HAFSA PLASTIKWALA
Email: *****.***********@*****.*** Phone Number: 786-***-**** Address: Woodbridge, VA MAY 2024 – AUGUST 2024
FAIRFAX, VIRGINIA
GEORGE MASON UNIVERSITY
CYBERSECURITY INTERNSHIP
-Assessments of vulnerabilities in the vulnerabilities scan and determining false positive and true negative under supervision.
-Reviewing IDS/IPS logs for information on any ongoing or plausible attacks and using proper incident response tactic to follow through.
-Using packet tracer like Wireshark to acknowledge authorized and unauthorized packets within the network
-Use of bash script to hinder or stop attacks and enhance the investigation of information.
- Utilizing FTK imager software in order to gain an image of a device and perform a digital forensic investigation.
AUG 2024 – PRESENT
FALLS CHURCH, VIRGINIA
INOVA HEALTH SYSTEMS
IT DEPLOYMENT
-Deploying a massive number of workstations and other wall mounted computer stations in the departments for use in a projected amount of time.
-Testing of each workstation functionality to the access on the network, printers, peripheral devices, and etc.
-Deployment of software and firmware accordingly to peripheral product, user role and functionality of the device
-Establishing proper network mapping for devices, printer, and scanner to confirm cross connections
-IT inventory management, metrics, and distribution is thoroughly analyzed to validate full inventorial count.
EDUCATION
AUG 2021-JAN 2023
Associates Of Applied Science: Cyber Security
Northern Virginia Community College
JAN 2023 – DEC 2024
Bachelor of Applied Science: Cyber Security
George Mason University
CERTIFICATES: Security+ CE
CLEARANCE: DOD Active Public Trust Clearance