SUMMARY
I have extensively worked in organizations where I am actively involved in ensuring various systems, networks, devices, cloud services and conform to security best practices
SKILLS
Strong understanding of AWS services:, IAM, S3, RDS, EBS, Elastic Load Balancer, Auto Scaling Groups, CloudFormation, CloudWatch, CloudTrail, QuickSight
Understanding of network and computer hardware and software interconnection and interfacing, such as routers, firewalls, hubs, bridges, gateways, routing protocols, etc
Experience with Active Directory (AD),Domain Name System (DNS), and Dynamic Host Configuration Protocol (DHCP)
Experience in technical support, help desk support, Office 365 and applications support
Microsoft Azure services, Active Directory and Group Policies Deployment
Windows Server 2008, UNIX Solaris 10, LINUX Centos 6.4, and RHEL 6.4.
PowerShell, Python
TOOLS
Splunk
Archer
ServiceNow
Tableau
Kali Linux
Wireshark
Nmap
Terraform
Ansible
GitHub
Metasploitable
BurpSuite
CERTIFICATIONS
CompTIA Security+
AWS Certified Cloud Practitioner
William Pefok
301-***-**** adrla5@r.postjobfree.com Baltimore, Maryland
EXPERIENCE
April 2021 – June 2022
Cloud Security Consultant
Infinitive – Ashburn, Virginia
Supported the Cloud Platform Security Team at Capital One in the Unified Tech Cloud Control exception process as owner and oversight of Tech Policy and Procedure requirements in ServiceNow
Provide Cloud governance enforcement for SaaS,IaaS and PaaS services across the Enterprise.
Assess Security compliance, security program, organizational policies and procedures, general risks, and vulnerabilities
Worked with Application Teams to asses risk of AWS services used to create solutions for critical applications and infrastructure
Created dashboards to illustrate risk metrics to Senior Leadership
February 2020-April 2021
Cyber Security Analyst
CyberData– Rockville, Maryland
Installed and configured Nessus Essentials to perform credentialed vulnerability scans against windows 10 host
Knowledgeable on NIST Cybersecurity Framework and how the Identify, Protect, Detect, Respond, and Recover categories comprise and facilitate an information security program
Ensured policy documents are aligned with business objectives, implementable by the organization, and practical for compliance by ensuring purpose, scope, authority, and policy statements incorporate operational perspective and constraints
Conducted vulnerability assessments with Nessus: remediated vulnerabilities
Research new and evolving threats and vulnerabilities with potential impact to monitored environment.
January 2019– February 2020
Jr. Network/Systems Administrator
JDF Academy, Gwynn Oak Maryland
•Assisted in the Designing of Network Infrastructure, incorporating LAN, WAN, Server and security architecture and policies
•Notify leadership of issues involving performance of the operating environment.
•Assist in troubleshooting, system management, and end-user guidance.
•Assist with the offboarding and onboarding users
•Physical and virtual asset management.
•Develop Automation for routine processes
•Administered and maintained user access controls and procedures
EDUCATION
June 2016 – May 2019
Morgan State University
B.A in Philosophy Pre-Law,
Minor in Information Systems
June 2015 – June 2016
Trinitech Global Network Academy
Linux/Windows System Administration
Volunteer Work
JDF Academy- Technology Instructor
Support students using experience in Computer Science to teach students the fundamentals of programming through various languages such as: Python and HTML
Introduce students to basic aspects of computers such as logging in, accessing websites, and connecting to wi-fi
Mentor students as they explore possible careers in tech and cybersecurity.