Post Job Free
Sign in

Supply Technician Information Security

Location:
Detroit, MI
Posted:
November 22, 2022

Contact this candidate

Resume:

Raymond Parham

313-***-****

* ************@*****.***

Information Security Analysts

ABOUT: U.S. Marine Veteran with exemplary extensive experience as a Information Security Analysts In the fleld of Cyber Security. Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. Assess system vulnerabilities for security risks and propose and implement risk mitigation strategies. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. May respond to computer security breaches and viruses. CORE COMPETENCIES ~

•:• Active Listening

•:• Interacting with Computers

•!• Monitoring

•:• Leadership

•:• Development of Software

•!• Analyzing Data or Information

•:• Test Computer Systems

•!• Interface and query software

•!• Critical Thinking

: Problem Sensitivity

EDUCATION W

WAYNE COUNTY COMMUNITY COLLEGE

ASSOCIATE IN APPLIED SCIENCE

CYBER SECURITY

SHORT TERM CERTIFICATES

COMPUTER INFORMATION SYSTEMS

CERTIFIED ETHICAL HACKER SCERT

MILITARY EXPERIENCE 8

United States Marine E-3

Marine/ Infantry

KEY PROFESSIONAL EXPERIENCE II)

• Develop plans to safeguard computer files against accidental or unauthorizec modification, destruction, or disclosure and to meet emergency data processing needs.

• Develop plans to safeguard computer files against accidental or unauthorizec modification, destruction, or disclosure and to meet emergency data processing needs.

• Make decisions and solving problems to Analyze information and evaluating results to choose the best solution and solve problems.

• Using computers and computer systems (including hardware and software) t, program, write software, set up functions, enter data, or process information

• Test computer system operations to ensure proper functioning.

• Encrypt data transmissions and erect firewalls to conceal confidential information as it is being transmitted and to keep out tainted digital transfer~

• Perform risk assessments and execute tests of data processing system to ensure functioning of data processing activities and security measures

• Modify computer security files to incorporate new software, correct errors, o change individual access status.

• Analyzing Data or Information, Identifying the underlying principles, reasons, or facts of information by breaking down information or data into separate parts.

• Develop computer or information security policies or procedures. WORK HISTORY (D

Veterans Medical Center

Supply Technician/

Detroit, Ml 48211

Comcast Cablevision

Field Service Technician

Detroit, Ml 48203

Vital Communications

Field Service Technician

Livonia, Ml 48150.

2022-present

2006-2017

2004-2006



Contact this candidate