Post Job Free

Resume

Sign in

Computer Specialist Cybersecurity Analyst

Location:
Jacksonville, FL
Posted:
February 28, 2023

Contact this candidate

Resume:

**** ***** **** ** *, Jacksonville, FL ***** 904-***-**** advmbf@r.postjobfree.com

Education

Doctorate in Computer Science- DCS (Cybersecurity, Information Assurance, and Big Data Analytics Track) Colorado Technical University, Colorado Springs, CO 12/2020

GPA: 3.80

Security policy procedures & architecture, Project management; Digital sys sec, Network Security Practices and Policies; Cyber Laws, Regulations and Compliance; Ethical Hacking; Vulnerability Assessment; CISCO (2013), Advanced Big Data Analytics; Databases; Business continuity plan; Governance compliance & ethics; Featuring & innovation; Network security practices and policies; Digital Info'. Systems Security; Enterprise Security Architecture, Tools for Big Data Analytics, Advanced Security Management, Quantitative and Qualitative Research methods.

Cybersecurity Analyst

Providing over 15 years of experience in security, computer networking, and various systems with experience configuring, monitoring, upgrading, and maintaining systems hardware, software, and related infrastructure.

Strong analytical skills: able to work with technicians from various engineering disciplines to troubleshoot complex system-level issues.

Knowledgeable in Cyber Laws and Ethical Hacking

Microsoft Systems Engineer Certification (MCSE)

Certified Information System Professional (CISSP) Trained

Certified Netware Administrator (CNA)

Technical & Special Skills

Knowledge of Cyber Incident Handling/Triage.

Knowledge of LANs/WANs and general internetworking technologies, HPE (SERVER FARMS).

Experience with detection, response, mitigation, and/or reporting of cyber threats affecting networks using IDS, NIDS, SSW, and SLM tools.

SIEM Tool experience includes IBM QRadar, GoAccessk, and Splunk.

System Troubleshooting, VIO Administration, LDAP, Web Services (IIS,

Apache), NoSQL and MySQL, Cisco Routers, Domain Controllers, IPVS,

Security Controls: Conduct security risk analyses and IT system vulnerability assessments; Provide incident response and conduct digital forensics analyses of computer systems; Comfortable briefing Senior Leaders on findings.

•LAN/WAN/Firewalls

• Disaster Recovery

•Computer Networking

•Operating Systems

•Troubleshooting

•Active Directory, MS Server, Infosec, NIST,

•Cybersecurity

•Information Security

•Identity theft prevention

•Big Data Analytics

•Systems Analysis

•DHCP, DNS, TCP/IP, VOIP, HITECH, HIPAA, CHIP

•VMWare, Help Desk

•Network Support/monitor

Professional Experience

All Systems and Financial Matters 2014 - Current

Ezedike Foundation, Inc.

Field Engineer

Implement, design, maintain, support, and integrate various firms’ security systems and infrastructure (Switches, Patches, Mother boards replacement in PC, Servers, SERVER FARMS & and Printers).

Barrister Global Services Network, Inc.

Cybersecurity/Math Instructor 2016 - 2017

SALTech Institute, Jacksonville, FL

Prepare students for A+/Compu TIA Certification

Mathematics Teacher 2013 - 2014

Biscayne High School, Jacksonville Florida

Prepare and present lessons to enable students to learn math skills and concepts following the curriculum

Develop classroom rules and procedures making them clear for the students to understand

Grade and evaluate students; listen to their concerns and encourage them

Help students learn technology e.g., computers and calculators.

Computer Network Systems Analyst 2010 - 2011

US Census/NFCAA, Jacksonville, FL

Northeast Community Action Agency, Barrister GL Networks, Temps

Manage company computer infrastructural networks

Integrate, configure hardware and software

Monitor server and system security and performance

Test and evaluate HW/SW for efficiency, reliability, and compatibility

Research, test, evaluate and recommend data communication HW/SW

Consult with users to identify operating procedure issues

Relative Experience

Technology Coordinator 1997-2004

Multisoft Technology Institute, New Carrollton, MD

Manage the day-to-day LAN security operations.

Install, manage, maintained, configure, and troubleshot servers and workstations of the LAN/WAN in Windows Operating Systems, Novell, and Power MAC environments.

Install and configure microcomputers, switches (including those with Fiber Optic modules), routers, firewalls, anti-virus, operating systems, and application software.

Monitor and resolve communication network issues to ensure availability

Computer Specialist 1991 - 1997

BenTech Computer/Electronics, Hyattsville, MD

Systems analysis and design, integration, and configuration to include preliminary/detailed systems investigation, analysis of present/proposed system, input/output file, processing, storage, organization, testing, debugging, user training, and equipment procurement.

Designed, coded, and modified computer programs following input/output specifications using tools such as flow charts, pseudo codes, hierarchy, and printer spacing charts.

Monitor server and system performance

Dissertation: A QUALITATIVE STUDY OF CYBERSECURITY STRATEGIES TO REDUCE MEDICAL IDENTITY THEFT FOCUSING ON THE MANAGERS’ LIVED EXPERIENCES.

The research is published and available on ProQuest Dissertation and Theses in March 2021.



Contact this candidate