Post Job Free
Sign in

Forklift Operator Service Rep

Location:
Orem, UT
Posted:
May 13, 2023

Contact this candidate

Resume:

Madison Hind

Security Analyst - SOC Analyst

385-***-**** ************@*****.*** Orem, UT http://linkedin.com/madison-hind/

Results-driven information security professional with a strong interest in security infrastructure. Adept at designing solutions for aligning security architecture plans and processes with SOC standards. Eager to join a team and positively contribute to team and organizational goals.

TECHNICAL SKILLS

Knowledgeable: Linux, Windows Server, Active Directory, Python, Bash, Snort, Splunk, Wireshark, Burp Suite, SIEM, Scripting, Metasploit, Nmap, OSINT, Firewalls, Networking, Command Line, Virtual Machines

Certificates

CompTIA Security+ (In Progress - Expected: June 2023)

ADDITIONAL TRAINING

Whizlab- Completed training/earned certificates

TryHackMe- Presecurity & Introduction to Cybersecurity certificates

Projects

Red 1 - As a final project our group was tasked with regaining access to a vulnerable machine.

Tools used in this project: Kali Linux, NMap, netdiscover, dirbuster, burpsuite, cyber chef, hashcat, hydra.

EXPERIENCE

Customer Service Rep Teleperformance Orem, UT (Remote) Oct 2021 – Feb 2022

Handle Inbound calls from USAA customers

Assist customers with account inquiries, billing issues, payment arraignments, and promote services

Machine Operator Danone NA West Jordan, UT Jul 2019 – Sept 2022

As a trainer created a new training template for new-hires

Collaborated on an engineering project on how to run a change-over more efficiently

Machine Operator Walmart DC Corrine, UT June 2013 – Oct 2018

Implemented a new forklift operator training programs

Designed a new program on how to orderfill certain items more efficiently

EDUCATION

Oct 2022 – Apr 2023

Utah State University Cyber Bootcamp

Powered by Fullstack Academy

Six-month immersive program designed to train in advanced red team/blue team skills and use of security tools.

Formed a solid foundation of computer knowledge including Windows client/server and various Linux distros

●Mastered common CLI navigation for Linux through Fullstack’s CTF challenges

●Learned Python basics and Bash scripting as well as PowerShell cmdlets

●Practiced offensive techniques and how to mitigate these threats using blue team industry tools to align with cybersecurity frameworks such as NIST and MITRE ATT&CK

●Wrote and modified rule sets for IPS/IDS such as Snort and ACLs for firewalls based on parameters provided

●Used packet capture tools such as Wireshark and TCPdump to investigate traffic for Indicators of Compromise

●Executed basic incident response procedures and gained familiarity with digital forensics tools and utilities

●Performed simulated threat hunting by analyzing large data sets in Splunk

●Gained familiarity with a variety of tools including Snort, Splunk, Wireshark, Burp Suite, Metasploit, Nessus, Nmap, and ping/netstat



Contact this candidate