Serge Tchabo
Aspiring security Engineer
Monroeville, Pennsylvania, United States
*******@*****.***
EDUCATION
University Of Pittsburgh
Pittsburgh, Pennsylvania, United States
Analysis and information system
Security and Privacy
Network and Information
Data analyst
Database Management
• COMPUTER SCIENCES
SKILLS
Clerk Budgets Encryption Networking Virtualization SIEM Splunk Shark Cyber Security Linux Wireless DSP Remediation InVision Maintenance Healthcare Computer Security LANGUAGES
French - Intermediate English - Intermediate
EXTRACURRICULARS
Volunteer Food Bank
Volunteer at the Battlefield Gettysburg
WORK EXPERIENCE
January 2023-May 2023
aspiring cyber security
Perscholas
Pittsburgh, Pennsylvania, United States
Networking with packet tracer
Malware analyst
Encryption
Threat modelling
September 2022-January 2023
Bootcamp, security Engineer
Careerera
Pittsburgh, Pennsylvania, United States
Threat Management
Implemented Multilayer protection.
Advance Patch Management
Security Assessment
February 2015-2023
DSP
WRC
Pittsburgh, Pennsylvania, United States
Collaborated with departmental leaders to establish organizational goals, strategic plans, and objectives. Developed departmental objectives, budgets, policies, procedures, and strategies. Modified computer security files to incorporate new software, correct errors and change individual access status. Monitored current reports of computer viruses to determine when updated virus protection systems. Monitored use of data files and regulated access to safeguard information in computer files. Reviewed violations of computer security procedures and discuss procedures with violators to keep violations from being repeated.
Performed routine and scheduled maintenance services. Demonstrated ability to manage multiple tasks while remaining adaptable and flexible. January 2022-June 2022
SECURITY ANALYST
TranfoTech Academy
Pittsburgh, Pennsylvania, United States
Monitor network traffic for security incidents and events. Investigate incidents and respond to events in real time. Write detailed incident response reports.
Install and operate firewalls, encryption programs, and other security software. Fix vulnerabilities
Develop and promote best practices for information security. Conduct threat research.
Perform periodic risk assessments and penetration tests. WORK AUTHORIZATION
I am authorized to work in the following countries:
• United States