Post Job Free

Resume

Sign in

Security Information

Location:
Miami, FL
Posted:
April 21, 2020

Contact this candidate

Resume:

JOAB KOSE

E-mail:adcwol@r.postjobfree.com Mobile: +1-786-***-**** LinkedIn: Joab Kose Twitter: @JoabKose

Professional Summary

Cybersecurity Specialist, with proficiency in security research, implementation of Cybersecurity measures, planning execution and maintenance. Adept at training and educating internal users on relevant cyber security procedures and preventative measures. Specialized in security analysis: threats and response, with focus in malware analysis and digital forensics.

Education

Florida International University, Miami, FL April 2020

Master of Science in Cybersecurity

Michigan State University, East Lansing, MI August 2018

English for Graduate Students (Fulbright Scholarship Program)

Maseno University, Kisumu, Kenya December 2016

Bachelor of Science (Honors) Information Technology

Work Experience

Remote Jobs, International. 2018 - Present

Security Analyst:

●Responsible for the development and design of Cyber Security computer solutions for an Information Security Division consisting of several Information Technology Analysts

●Collaborated with analysts for Security awareness outreach programs and tech lead for annual recertification of all privileged users within the department. Briefed all the new employees in security awareness as well as computer security basics

●Partnered with the management team to enhance and define applications, policies, and controls utilized by company employees.

●Led the Violation Escalation Process, exemption process used for complying with the company’s policies and standards as well as outlined baseline security configurations.

●Collaborated with primary phishing awareness vendors to provide training programs to prevent security breaches in company resources and equipment.

●Cyber Threat intelligence- management of the program, collection and analysis of the threat data and intelligence sources, correlation of findings to the company’s corporate portfolio to aid with identifying threats to the company.

●Computer Security incident response – collection and analysis of information regarding incidents, engagement of actionable contacts, development and execution of remediation procedures.

●Computer Forensics – collection and analysis of a variety of data sources (hard drives, computer memory, network packets, etc.) to aid with internal corporate investigations.

●Information Assurance – occasionally assist in creation, review, and enforcement of new Cyber Security policies.

●Researched and implemented new technology and methodologies to aid with cyber Operations.

●Acted as an incident responder for low to medium impact incidents: documentation of the findings and processing for the knowledge base

●Monitored the critical systems and changes to the highly sensitive computer security controls to ensure appropriate system administrative actions, investigate and report on noted irregularities.

●Identification of vulnerabilities, recommendation on corrective measures and ensuring the adequacy of the existing information security-controls.

●Set and implemented of user access controls, identity and access management systems

●Monitored network and application performance to identify and irregular activity

●Performed regular audits to ensure security practices are compliant

●Deployed endpoint detection and prevention tools to thwart malicious hacks

●Set up patched management systems to update applications automatically

●Worked with IT operations to set up a shared disaster recovery/business continuity plan

●Worked with HR and/or team leads to educate employees on how to identify suspicious activity

Course Development, Florida International University. Miami, United States. March 2019-Present

Online Course Developer

IT Network Support, SwahiliPot Hub. Mombasa, Kenya. April 2016 - September 2017

Network Administrator

●Configuration of Cisco network devices: 5500 Series wireless controllers, routers, switches and Access points.

●Communicating and negotiating with users, specialists and other staff.

●Network connectivity troubleshooting, ping, tracert, telnet.

●Investigating, diagnosing and resolving all network problems.

●Monitoring of the network usage and troubleshooting of network problems.

●Electrical power management and monitoring of the power backup generators.

Network and Transmission Engineering (NOC), SEACOM LTD. Mombasa April 2015 - October 2017

●Planning (fiber-route determination), implementation and deployment of IP-Access service.

●Installation and deployment of Tejas SDH and CIENA 6500 metro DWD/SDH equipment at the station

●Configuration of Cisco ASA 5510 firewall for internet access

●Maintenance checks on the IP/MPLS, transmission equipment (DWDM, SDH, ODFs), fire extinguishing and air-conditioning systems, generator maintenance including on and off load weekly testing, and DC power of all the transmission and equipment.

●Assisting station Engineers in patching new connections on equipment and troubleshooting faults

●Implementation of routing protocols: BGP and EIGRP, VPN and IPsec

IT Network Support, Cellnet-Doshi. Mombasa, Kenya. April 2014 - February 2015

●Administering & designing LANs, WANs internet/intranet, and voice networks.

●Maintaining pre-packaged software applications on the LAN

●Installation and maintenance of IP phones and IP surveillance cameras

●Computer Hardware repair and maintenance.

Publications and Keynotes

●Keynote Speaker at the 2019 ISSA INTERNATIONAL SUMMIT

●Keynote Speaker at Penn State World Campus Tech Club

●ISSA Journal on Smartphone Privacy Concerns

Awards and Honors

●Fulbright Scholarship (2018-2020)

Community and Volunteer work

●SparkDev Cybersecurity, Upsilon Pi Epsilon (UPE). Miami, United States. January 2019 - Present

●Super Bowl Miami January-February 2020

●Swahilipot Hub - Mombasa, Kenya

●The Catholic Charities Appeal (CCA) - Philadelphia, Pennsylvania March 2019

●Amizade volunteers - Williamson, West Virginia.

●BSU Community Service - Miami, Florida

Key Skills

●Experienced with Linux/UNIX and shell scripting, Assembly Language, Python and C

●Ghidra and IDA Pro SRE (Reverse Engineering) tools

●Malware Analysis and Reverse Engineering, Digital Memory Forensics

●Proficient in writing and verbal communication skills

●Fluent in Swahili and English, intermediate fluency in Spanish and French

●Experience with security tools, including IDS, SIEM, EDR, CASB, Wireshark

●Knowledge of security in a Linux-focused environment, and Splunk

●Risk Frameworks: NIST, Cyber Kill Chain, MITRE ATT@CK, OWASP, SOC2, ITIL and ISO



Contact this candidate