Post Job Free

Resume

Sign in

Mental Health Cloud Security

Location:
Cary, NC, 27513
Salary:
55,000
Posted:
August 27, 2023

Contact this candidate

Resume:

Toronto Meadows

Raleigh, NC ady9wi@r.postjobfree.com 919-***-****

www.linkedin.com/in/toronto-meadows-57273a234

PROFESSIONAL SUMMARY

Dedicated and skilled Security Analyst with a strong background in information security, risk assessment, and incident response. Proven ability to identify vulnerabilities, implement effective security measures, and safeguard critical data. Seeking a challenging role to contribute my expertise in ensuring the confidentiality, integrity, and availability of sensitive information. EDUCATION

North Carolina State University

Professional Cybersecurity Certificate, November 2022 A defensive cybersecurity program, complete with in-depth networking, Cloud, Windows, and Linux security courses that aided in the mastery of cyberinfrastructure technologies, and digital forensic theories. Cisco TCE Apprenticeship Incubation Program

Technical Consultant Engineer, expected March 2023 Saint Augustine’s University

Bachelor of Science, Physical Science, May 1999

TECHNICAL SKILLS

Technology: Foundational Knowledge of Wireshark, HoneyPot, Nessus, Pycharm Programming Languages: Foundational knowledge of Python Operating Systems: Knowledge of Windows 10, Windows 16 Server, Kali Linux, Ubuntu, Debian, Redhat, Centos Windows Security: Knowledge of Active Directory, Windows Server, Group Policy, DNS, Shares and Permissions, DHCP, Disk Management, Microsoft Endpoint Security, Security Policy, Microsoft Authentication, Powershell Networking: Networking fundamentals, Networking, Switch & IOS, IP & Routing, Subnetting, IPv4/6 Static Routing, Dynamic Routing, VLANs and Trunking, Diagnostics & Troubleshooting, Access Control List, Infrastructure Services, Cloud: Foundational Knowledge of Cloud Security, Virtualization and Container, and Advanced Cloud Security Additional Relevant Experience: Microsoft Security, Computer Networking, Cloud Security, Linux Security, Network Security, Cyber Technologies, Python, Ethical Hacking, DFIR, Game Theory PROJECT EXPERIENCE North Carolina State University Installation of WAN

Scope: Built Wide Area Network (WAN) for a bank branch including three LANs.

• Identified ISP, designed layout for bandwidth, line quality, and hardware

• Built WAN utilizing VPN.

• Utilized Cisco Packet Tracer 7.2.2.

Network Configuration

Scope: Set up a corporate network and implement security settings for a new bank branch.

• Devised network Topology plan and where to assign the IP address.

• Built VLANs, trunks, and routers to allow multiple stream communication. Arranged switches to communicate with port security and routers to work with OSPF.

• Configured network devices to prevent unauthorized access by securing privilege mode, encrypting passwords, and designing security messaging. Conducted a successful connectivity test. Toronto Meadows

Raleigh, NC ady9wi@r.postjobfree.com 919-***-****

www.linkedin.com/in/toronto-meadows-57273a234

Network Security

Scope: Act as a security analyst to protect company communication

• Set up 3 machines: client, host, and threat; established connection and engaged in communication through network requests and emails.

• Imitate a threat to extract info and intercept traffic-utilizing Wireshark.

• Kali.org. Configured firewall using pfSense

Python

Scope: Create code that receives input; a program that will accept user information.

• Create Python script(s) using Pycharm

• Create input fields

• Create a statement for the desired output.

• Test/Run to ensure correct output.

• Established protocols, secured channel in a sandbox environment, translated and encrypted code. Ethical Hacking

• Use Wireshark to track passwords. Using Windows and Linux, look up IP addresses. Try to crack passwords by monitoring the flow of traffic

DFIR

Scope: Performed a forensic investigation within a lab environment using SIFT Workstation & Flare VM. Learned techniques concerning finding “noisy” IP addresses using Zeek to parse pcap Files, filtering techniques, finding malicious files on infected computers/backdoors, investigating malware behavior, and finding secrets.

• Learned about the DFIR Lifecycle

• Able to acquire data from live and dead Windows & Linux systems. (dd, mount, CAINE, FTK, OSFMount, Sysinternals.

• Knowledge in memory analysis (Volatility), log analysis, and timeline analysis (log parser/Splunk)

• Learned about network forensics (proxy, DNS tunnel, malware). PROFESSIONAL EXPERIENCE

Abound Healthcare Feb 2015 – Present

Mental Health Counselor

• Helped clients deal with substance abuse, mental illness, and other concerns by delivering personalized counseling support.

• Provided mental health support services to patients and family members by creating client treatment plans based on assessments and goals.

• Adhered to HIPAA confidentiality requirements.

• Educated family members and helped each support clients by improving coping techniques. Guardsmark July 2006-Feb 2013

Supervisor

• Supervised property entrances and exits and monitored employee safety.

• Recorded required data for incident reports and files quickly and accurately.

• Provided security team leadership and contributed to on-call duties.

• Monitored the entire facility using CCTV while simultaneously performing dispatch duties. CERTIFICATIONS

CompTIA Security+, CompTia, January 07, 2023



Contact this candidate