Post Job Free

Resume

Sign in

Customer Service Clerk

Location:
Pikesville, MD
Posted:
November 11, 2022

Contact this candidate

Resume:

MARIE KAMGA

Baltimore, MD ***** 443-***-**** adtgze@r.postjobfree.com

Key Qualifications:

Experience Cybersecurity and honor student with 2 years of demonstrated experience with an openness to learning and eagerness to contribute to team success through strong work ethics, honesty, attention to detail, problem-solving, and dependability. Communication ability and knowledge of Cyber tools and infrastructure and willingness to master any task. Excellent organizational, collaboration, and interpersonal skills with the flexibility to remain highly focused in a demanding environment

Technical Skills

Knowledge of networking concepts and technology

Familiar with IDS/IPS (Snort, Palo Alto), Antivirus Endpoint Solution, Wires hark, Active Directory, Firewalls, Network monitoring, TCP dump.

Comprehensive knowledge of common networking protocols: HTTP, DNS, DHCP, SMTP, NTP, SSH, FTP. Implementing security programs

Use of operating system command line/prompt Knowledge of TCP/IP and OSI model

Programming Language C

SQL statement

Cloud Computing

Skills

Familiar with TCP/IP and OSI Model, IDS/IPS, Firewalls, and Wireshark.

Knowledge of JIRA, C-Cure, Exact Vision, FireEye, Virus Total, CSAM, XACTA, and Header Analyzer.

Knowledge of routing, wireless, and network protocols (SMTP, HTTPS, FTP, SSH, Telnet, DHCP,

DNS).

Familiar with some regulatory policies (FISMA, NIST, FIPS, RMF, HIPAA).

Basic knowledge of operating systems, Windows, and Linus command line.

Excellent Organizational, Interpersonal, Managerial, and Collaborative skills.

Risk Assessment and Compliance.

Presentation ability using PowerPoint and ability to do research.

Knowledge of incidence response and DLP.

Customer service and troubleshooting.

Microsoft Office 365 (outlook, teams, excel)

Leadership skills: Excellent oral and written communication skills, value-oriented, strategic planning, team mentoring, effective decision-making, excellent time management, problem-solving, collaboration, adapting to changes, and team building.

Organizational Skills: Collaboration, planning, and budgeting, project management

Education

University of Maryland Global Campus Bachelor of Science, Computer Network and Cybersecurity January 2022 December 2023

Capitol Technology University, Laurel, MD Bachelor of Science, Cybersecurity January 2021 - January 2022

Community College of Baltimore County, Baltimore, MD Associate of Applied Science, Cybersecurity December 2020 GPA: 3.75, Dean's List at CCBC

Professional Experience

Exelon, Baltimore MD

Exelon Security Operator Center (ESOC) April 2022 - Present

Monitor and remediate intrusion detection alarms

Answer, prioritize, and respond to telephonic security incident reporting

Manage and log site entry/exit system disarm events

Write and submit security incident reports

Submit service requests for corrective maintenance of security systems, perform service ticket validation

Perform and document system checks and video tours

Perform forensic investigative support of video and access control records

Perform administrative ESOC tasks

Exelon, Baltimore Gas & Electric, MD

Transmission and substation cybersecurity Intern June 2021 — November 2021

Assist the T&S Cyber Security Team by learning the applicable compliance regulations and helping to apply them to our environment at BGE. This included a data integrity effort within the Relay Database and AssurX systems. Implemented to establish a new compliance control and document the new control and other associated controls.

Performed SQL statement to execute queries against Aspen database.

Performed SQL to retrieve data from the Aspen database.

Develop CVA form script/GUI and Create a job aid to walk People through running the program.

Exelon, Baltimore, MD

Risk Management / Third Party Security Intern June 2020 — December 2020

Performed research work for the Third-Party Security Team to ensure all artifacts have been uploaded in SharePoint and are available.

Performed security risk assessments with the result of identifying the security hygiene, and security

posture of vendor products and services of Third Parties.

Verified that vendors encrypt data in transit, including data stored on laptops, external hard

Check that vendors enforce role-based access for information systems Ensured that third-party vendors have a disaster recovery program in place.

Looked for vendors that have industry-leading security certifications or attestations. Assist with re-organizing the Third-Party Security Team's SharePoint site with the corresponding artifacts for the vendor assessments.

Used Visio for color coding on background check answers. I used Microsoft Form to create a survey.

Worked on the innovation Team on multiples projects Learned about the International Hire Risk Mitigation process

Ali Sarl & Compagnie - Douala, Cameroon

Bookkeeping, Accounting, and Auditing Clerk June 2011 - November 2013

Entered costs (debits) and income (credits) into the software, assigning each to an appropriate account

Used bookkeeping software, spreadsheets, and database

Entered (post) financial transactions into the appropriate computer software Received and recorded cash, checks, and vouchers

Produced reports, such as balance sheets (costs compared with income), income statements, and totals by account

Checked for accuracy in figures, postings, and reports

Reconciled or noted and reported any differences found in the records

Training

The Mid-Atlantic Collegiate Cyber Defense Competition (MACCD) February 2021

Building Network Protection against malicious activities

Making sure the very onery of our perisarc secure

ADVANCED CYBERSECURITY TRAINING

Baltimore Cyber Range - Baltimore, MD May 2020

Investigated security incidents on the network using network security tools like Palo Alto and Management Network Services tools such as Splunk

Security Operations Center and Threat training

Analyzed logs generated by these tools to identify the threat, and further steps were taken to contain and eradicate the threat

Took appropriate security measures were taken to mitigate the threat Managing and responding to Cyber Security Risks

Detect prevents fuzzing events in monitoring systems

Enumerate all the binding ports on the machine by running the netstat command on the web server

Activities and Recognitions

Phi Theta Kappa Honor Society, Member Technology Club, Member

Women in Technology Club, Member



Contact this candidate