MARIE KAMGA
Baltimore, MD ***** 443-***-**** *****.*********@*****.***
Key Qualifications:
Experience Cybersecurity and honor student with 2 years of demonstrated experience with an openness to learning and eagerness to contribute to team success through strong work ethics, honesty, attention to detail, problem-solving, and dependability. Communication ability and knowledge of Cyber tools and infrastructure and willingness to master any task. Excellent organizational, collaboration, and interpersonal skills with the flexibility to remain highly focused in a demanding environment
Technical Skills
Knowledge of networking concepts and technology
Familiar with IDS/IPS (Snort, Palo Alto), Antivirus Endpoint Solution, Wires hark, Active Directory, Firewalls, Network monitoring, TCP dump.
Comprehensive knowledge of common networking protocols: HTTP, DNS, DHCP, SMTP, NTP, SSH, FTP. Implementing security programs
Use of operating system command line/prompt Knowledge of TCP/IP and OSI model
Programming Language C
SQL statement
Cloud Computing
Skills
Familiar with TCP/IP and OSI Model, IDS/IPS, Firewalls, and Wireshark.
Knowledge of JIRA, C-Cure, Exact Vision, FireEye, Virus Total, CSAM, XACTA, and Header Analyzer.
Knowledge of routing, wireless, and network protocols (SMTP, HTTPS, FTP, SSH, Telnet, DHCP,
DNS).
Familiar with some regulatory policies (FISMA, NIST, FIPS, RMF, HIPAA).
Basic knowledge of operating systems, Windows, and Linus command line.
Excellent Organizational, Interpersonal, Managerial, and Collaborative skills.
Risk Assessment and Compliance.
Presentation ability using PowerPoint and ability to do research.
Knowledge of incidence response and DLP.
Customer service and troubleshooting.
Microsoft Office 365 (outlook, teams, excel)
Leadership skills: Excellent oral and written communication skills, value-oriented, strategic planning, team mentoring, effective decision-making, excellent time management, problem-solving, collaboration, adapting to changes, and team building.
Organizational Skills: Collaboration, planning, and budgeting, project management
Education
University of Maryland Global Campus Bachelor of Science, Computer Network and Cybersecurity January 2022 December 2023
Capitol Technology University, Laurel, MD Bachelor of Science, Cybersecurity January 2021 - January 2022
Community College of Baltimore County, Baltimore, MD Associate of Applied Science, Cybersecurity December 2020 GPA: 3.75, Dean's List at CCBC
Professional Experience
Exelon, Baltimore MD
Exelon Security Operator Center (ESOC) April 2022 - Present
Monitor and remediate intrusion detection alarms
Answer, prioritize, and respond to telephonic security incident reporting
Manage and log site entry/exit system disarm events
Write and submit security incident reports
Submit service requests for corrective maintenance of security systems, perform service ticket validation
Perform and document system checks and video tours
Perform forensic investigative support of video and access control records
Perform administrative ESOC tasks
Exelon, Baltimore Gas & Electric, MD
Transmission and substation cybersecurity Intern June 2021 — November 2021
Assist the T&S Cyber Security Team by learning the applicable compliance regulations and helping to apply them to our environment at BGE. This included a data integrity effort within the Relay Database and AssurX systems. Implemented to establish a new compliance control and document the new control and other associated controls.
Performed SQL statement to execute queries against Aspen database.
Performed SQL to retrieve data from the Aspen database.
Develop CVA form script/GUI and Create a job aid to walk People through running the program.
Exelon, Baltimore, MD
Risk Management / Third Party Security Intern June 2020 — December 2020
Performed research work for the Third-Party Security Team to ensure all artifacts have been uploaded in SharePoint and are available.
Performed security risk assessments with the result of identifying the security hygiene, and security
posture of vendor products and services of Third Parties.
Verified that vendors encrypt data in transit, including data stored on laptops, external hard
Check that vendors enforce role-based access for information systems Ensured that third-party vendors have a disaster recovery program in place.
Looked for vendors that have industry-leading security certifications or attestations. Assist with re-organizing the Third-Party Security Team's SharePoint site with the corresponding artifacts for the vendor assessments.
Used Visio for color coding on background check answers. I used Microsoft Form to create a survey.
Worked on the innovation Team on multiples projects Learned about the International Hire Risk Mitigation process
Ali Sarl & Compagnie - Douala, Cameroon
Bookkeeping, Accounting, and Auditing Clerk June 2011 - November 2013
Entered costs (debits) and income (credits) into the software, assigning each to an appropriate account
Used bookkeeping software, spreadsheets, and database
Entered (post) financial transactions into the appropriate computer software Received and recorded cash, checks, and vouchers
Produced reports, such as balance sheets (costs compared with income), income statements, and totals by account
Checked for accuracy in figures, postings, and reports
Reconciled or noted and reported any differences found in the records
Training
The Mid-Atlantic Collegiate Cyber Defense Competition (MACCD) February 2021
Building Network Protection against malicious activities
Making sure the very onery of our perisarc secure
ADVANCED CYBERSECURITY TRAINING
Baltimore Cyber Range - Baltimore, MD May 2020
Investigated security incidents on the network using network security tools like Palo Alto and Management Network Services tools such as Splunk
Security Operations Center and Threat training
Analyzed logs generated by these tools to identify the threat, and further steps were taken to contain and eradicate the threat
Took appropriate security measures were taken to mitigate the threat Managing and responding to Cyber Security Risks
Detect prevents fuzzing events in monitoring systems
Enumerate all the binding ports on the machine by running the netstat command on the web server
Activities and Recognitions
Phi Theta Kappa Honor Society, Member Technology Club, Member
Women in Technology Club, Member