Noah Yoshimura
Springfield, Virginia J 808-***-**** **************@*****.***
DevOps Tools Administrator, CompTia Security+, Certified Ethical Hacker (CEH), and Splunk Core User trained United States Air Force veteran, acquired skills in designing, developing, deploying, and operating software and services faster for the benefit of the business. Developing proficiency in conducting vulnerability assessment and penetration testing using tools, including Nessus, Rapid7, Metasploit, Nmap, Wireshark, Burp Suite, etc. Working knowledge of tuning and configuration of Enterprise Splunk and Splunk App for Enterprise Security (ES). Deploy and maintain Splunk Dashboards, Visualization and Alerts as well as develop, and build content, and correlations in Splunk as well as develop security use cases in Splunk. Understanding of DevOps objectives and terminologies with skills in driving continuous integration, delivery, testing, and security. Academically conversant in data ownership, backups, policies around unauthorized data sharing, and evaluating the risk associated with Cloud Computing and Virtualization. Ability to use sound judgment & decision-making skills and effectively perform in a self-directed environment. Academic Level Competencies;
DevOps Consulting I Enterprise Splunk and Splunk App for Enterprise Security (ES) I Splunk, Plug-Ins, Loggers, and Connectors I Threat Analysis I Incident Management, Audit, and Data Loss Prevention (OLP) Controls I Data Handling I Data Normalization I Log Ingestion and Analysis I Requirements Gathering I Prototyping I Triaging I Automation I DevOps Transformation I Security Configuration I Vulnerability Assessment and Penetration Testing I Deployment Pipelines and DevOps Toolchains I Penetration Testing I Helpdesk Management I Risk Evaluation I DevOps Tools Administration J IPSec, SNMP. SSH, DNS, TLS, SSL, TCPIP, FTPS, HTTPS, SCP. lCMP. 1Pv4, 1Pv6, FTP. SFTP, TFTP. Telnet, HTTP, and NetBiOS I Continuous Diagnostics and Mitigation I Intrusion Prevention and Detection I Access Control and Authorization I Endpoint Protection I Application Security I Protocol Analysis I Firewall Management I Incident Response I Encryption I Web-filtering I Advanced Threat Protection Professional Value Offered
Skilled in analyzing the security implications when integrating systems and data with third-party vendors/solutions considering data ownership, backups, policies around unauthorized data sharing, etc. Proficient in evaluating mitigation controls and deterrent techniques to handle attacks. Demonstrated knowledge of Risk Management Framework (RMF) Package, Artifacts, and SOPs as well as FISMA Compliance, NIST SP 800-53 Controls, and Cloud security. Good understanding of security configuration parameters of network devices. Exhibit strong project management, and superior organizational and analytical skills. Excellent interpersonal and problem-solving skills. Ability to meet deadlines and work on multiple projects simultaneously. IT Courses
CompTIA Security+; Certified Ethical Hacker (CEH); Splunk Core User.