Emily Sawyer
Atlanta, GA • Cell: 612-***-****
Email: *.********@*****.***
SUMMARY of QUALIFICATIONS
•Active TS/SCI w/ Polygraph Clearance, Actively Pursuing Security+ CE and CEH Certification.
•Driven young I.T. professional looking to further my acumen in the Cloud/Cyber Security industry.
•Familiar with incident response, malware analysis, and root cause analysis.
•Knowledge in Windows, Linux, and networking with practical experience in the most prevalent cyber tools and techniques.
•Apply exceptional leadership skills, abilities, and support the organization’s mission and goals while making a positive difference.
•Strong leadership skills that facilitate growth for all team members.
Areas of expertise include:
•System Administration
•Wireshark
•SQL Server
•Information Assurance
•Risk Management Framework
•Linux/Windows/Solaris Command line
•SIEM
•HIPPA Compliance
•PowerShell
•Windows Server 2016
•Information Security
•Medical Software
•Java/C++
EDUCATION
Bachelors of Art. Arizona State University, 2017
Paralegal Certificate University of Alaska Fairbanks 2018
Joint Cyber Analysis Course Python Scripting, Bash Scripting, Network Fundamentals 2019
Cyber Common Technical Core Linux/Unix/Windows Forensics, Network Obfuscation 2020
PROFESSIONAL EXPERIENCE
Cybersecurity Operations Specialist (17C) at Army National Guard (January 2019- Present)
•Conduct static or dynamic malware analysis on potentially malicious artifacts.
•Perform in depth analysis of exploits and triage of exploits and attacks to identify root cause.
•Use host-based forensic tools (e.g. EnCase, The Sleuth Kit, etc.) to identify and extract potentially malicious artifacts.
•Classify, document, and report the findings of malicious activity associated with known threat actors and common threat TTPs.
•Provide crucial intelligence and network support that safeguards the cyber domain and collect, analyze and report digital data.
•Collect, analyze, and report digital data while maintaining network defense tools.
•Evaluate network defense operations and respond to incidents in cyberspace.
•Surveillance and reconnaissance actions on specified systems and networks.
•Conduct penetration testing, basic digital forensics and software threat analysis
•Create, edit, and manage changes to network access control lists on specialized defensive systems (e.g., firewalls and intrusion prevention systems).
•Manage and administer the updating of rules and signatures (e.g., Intrusion Detection Systems (IDS) / Intrusion Prevention Systems (IPS), antivirus, and content blacklists) for specialized defense applications.