Post Job Free

Resume

Sign in

Security Analyst University Of

Location:
Stanhope, NJ
Posted:
June 22, 2021

Contact this candidate

Resume:

Molly Wellesly Correia

https://www.linkedin.com/in/mollycorreia

201-***-****

adnako@r.postjobfree.com

EMPLOYMENT

Cyber Forensic Analyst Intern International Forensic Sciences (IFS) May 2016-June 2016

• Responded to cyber forensic incidents covering all phases including collection, identification, containment and evaluation.

• Analyzed digital evidence and evaluate its relevance to the case under investigation.

• Employed Forensic Tool Kit to create images of the Hard Disks and other hard drives before performing any investigation to maintain the authenticity of the evidence.

• Used Slueth Kit to carry out file system analysis of the evidence and carry out analysis of files like obtaining Metadata, MAC timings etc

• Monitored identity and access management, in addition to monitoring for abuse of permissions.

• Transferred the evidence into a format that can be used for legal purposes. Cyber Security Analyst Intercode Technologies Jan 2017 – May 2018

• Intercode is an Electronics Distributor company, I worked with their security team and assisted them to plan, design, develop, validate, and verify Cyber Solutions across the Lifecycle.

• Conducted penetration testing, security configuration checks, and system configuration scans to meet Cyber Security requirements.

• Performed network traffic analysis, host behavior analysis, PC forensics, windows event analysis, etc. to effectively detect and protect company assets.

• Monitored and maintained anti-virus, anti-spam and patch management applications.

• Analyze suspicious emails, phone calls, and other potential security incidents to determine false positives or needs for escalation.

• Implemented and utilized security tools such as endpoint protection, network analysis, SIEM(Splunk), and other essential security solutions.

• Developed technical summary information for presentation to supervisor.

• Participated in the development and maintenance of IT policies and procedures and spearheads all IT related audits conducted by 3rd parties.

Help Desk Analyst New Jersey Institute of Technology Dec 2018 – May 2020

• Provided front Desk Reception, acted as a primary liaison between the advisors and administrative office.

• Assisted students and faculty with completing registration and enrollment forms and received and delivered telephone messages as necessary.

• Assisted and performed the installation of new software releases, system upgrades, patches, and resolves problems.

• Assisted internal users with processes, data corrections and troubleshooting.

• Maintained anti-virus programs and firewalls to ensure network and system integrity.

• Responded to breakdowns, investigated, diagnosed and solved computer software and hardware faults.

• Run reports to determine malfunctions.

• Direct unresolved issues to the next level of support personnel.

• Recorded events and problems and their resolution in logs.. Network and System Engineer Bavelle Technologies May 2020- Present

• Design and support diverse IT business solutions, including Cyber Security, Virtualization, and Cloud

• Perform Cyber Security Audits, Penetration Testing, and Attack Simulations.

• Configure and deploy emerging on-premise and cloud Cyber Security solutions, including Content Disarm and Reconstruction (CDR), Secure Browsing, Next-Gen Firewalls, and more.

• Design, deploy and support VMware virtualization clusters.

• Develop and implement Disaster Recovery and Business Continuity solutions

• Support and maintain customer networks as their Managed Service Provider – MSP and MSSP

• Identify and research emerging technologies

Prioritize efforts towards compliance and communicate priorities to clients(HIPPA,DFA). EDUCATION

Newark, NJ New Jersey Institute of Technology Aug 2018 – May 2020

• M.S. in Cyber Security and Privacy.

1. Internet and Higher layer protocols: Socket programming and security aspects of every OSI layer. 2. Network management and security: Configured Wireshark filters, snort, Hping commands. 3. Security & Privacy in Computer systems: Explored Linux system vulnerabilities using SUID,GUID & sticky bit and Shell scripting Performed application-based security testing(OWASP). Mumbai, MH University of Mumbai Aug 2015 – May 2018

• Bachelor in Forensic Science.

PROJECTS

• DNS Server (Socket Programming): A simple DNS Server program written in C language in which the server will be listening at specific port for the incoming client connections and once the connection has been established it receives input request and replies the client with the list of IP addresses along with preferred IP. The client and server communicated over Telnet

• Proxy Server, C: Developed a Proxy Server.

• Offline Brute Force Attack, Java: Developed a java code which takes the input from Linux style shadow file and brute force each user password with the common passwords file and the hashing algorithm used is MD5.

• Cross Site Scripting (XSS), JavaScript: Developed Scripts which created and inserted worms into profiles by various means

• Counter Hacking Techniques, Assembly Language: Performed buffer overflow attack.

• Cisco Packet Tracer: Designed and Configured an organizational network consisting of routers, switches, servers and hosts (IOTs and other appliances) using Cisco Packet Tracer, Configured various access rules for hosts and servers

• Carried out vulnerability assessment of a exploitable machine using Nessus, and exploited the machine by gaining access to machine using MSF (Kali Linux) and using Password Hashing tool John the ripper(Kali) obtained passwords and thus gained full

(Desktop Interface) access to the Machine.

• Cloud Computing: Built Multi-node (Four Node) Apache Hadoop Cluster in Cloud (AWS EC2) and set up password less SSH client connection to the instances using Putty and carried out word count analysis on Data. Monitored various features of the cloud infrastructure such as Load-Balancing, High Performance and Fail-Over by increasing/decreasing the number of the nodes. CERTIFICATIONS

• Achieved Fortinet’s Network Security Expert Certification by NSE 1 and NSE2 Network Security Associate.

• Completed AWS Cloud Practitioner Essentials (Second Edition) by AWS Training and Certification.

• CompTIA Security+ expected July 2020.

• Completed Diploma in International Cyber Law awarded by Government Law College, Mumbai and Asian School of Cyber Laws.

• Secured German Language Certification: Goethe-Zertifikat A1 Start Deutsch 1 (German A1 level).

• Participated in Workshop on “Transnational Crimes with focus on Human Trafficking” organized by Centre of Research in Criminal Justice, Maharashtra National Law University and International Justice Mission LANGUAGES, TECHNOLOGIES AND SKILLS

• Languages and Frameworks: C; Java; JavaScript; SQL; HTML.

• Database Technologies: SQL Server, My SQL

• Tools and Technologies: Sleuth Kit; FTK Imager; Encase, Wireshark; Tcpdump; TCP/IP; IPv6; HTTP; NIST; SSL; LDAP; DNS, Nmap, Metasploit Framework, Nessus. Amritage,, Maltego.

• Operating Systems: Kali Linux,; Windows; Linux/UNIX.

• Soft Skills: Detail Oriented; Multi-tasking; Written and Verbal communication; Problem-solving; Self-starter; Analytical thinking.



Contact this candidate