Raymond Parham
* ************@*****.***
Information Security Analysts
ABOUT: U.S. Marine Veteran with exemplary extensive experience as a Information Security Analysts In the fleld of Cyber Security. Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. Assess system vulnerabilities for security risks and propose and implement risk mitigation strategies. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. May respond to computer security breaches and viruses. CORE COMPETENCIES ~
•:• Active Listening
•:• Interacting with Computers
•!• Monitoring
•:• Leadership
•:• Development of Software
•!• Analyzing Data or Information
•:• Test Computer Systems
•!• Interface and query software
•!• Critical Thinking
: Problem Sensitivity
EDUCATION W
WAYNE COUNTY COMMUNITY COLLEGE
ASSOCIATE IN APPLIED SCIENCE
CYBER SECURITY
SHORT TERM CERTIFICATES
COMPUTER INFORMATION SYSTEMS
CERTIFIED ETHICAL HACKER SCERT
MILITARY EXPERIENCE 8
United States Marine E-3
Marine/ Infantry
KEY PROFESSIONAL EXPERIENCE II)
• Develop plans to safeguard computer files against accidental or unauthorizec modification, destruction, or disclosure and to meet emergency data processing needs.
• Develop plans to safeguard computer files against accidental or unauthorizec modification, destruction, or disclosure and to meet emergency data processing needs.
• Make decisions and solving problems to Analyze information and evaluating results to choose the best solution and solve problems.
• Using computers and computer systems (including hardware and software) t, program, write software, set up functions, enter data, or process information
• Test computer system operations to ensure proper functioning.
• Encrypt data transmissions and erect firewalls to conceal confidential information as it is being transmitted and to keep out tainted digital transfer~
• Perform risk assessments and execute tests of data processing system to ensure functioning of data processing activities and security measures
• Modify computer security files to incorporate new software, correct errors, o change individual access status.
• Analyzing Data or Information, Identifying the underlying principles, reasons, or facts of information by breaking down information or data into separate parts.
• Develop computer or information security policies or procedures. WORK HISTORY (D
Veterans Medical Center
Supply Technician/
Detroit, Ml 48211
Comcast Cablevision
Field Service Technician
Detroit, Ml 48203
Vital Communications
Field Service Technician
Livonia, Ml 48150.
2022-present
2006-2017
2004-2006