Post Job Free
Sign in

Network Security Information

Location:
Mackinaw City, MI, 49701
Posted:
February 03, 2025

Contact this candidate

Resume:

Contact information: Lena Thompson 313-***-**** www.linkedin.com/in/lenathompsonllc

Professional Summary GIAC certified cybersecurity professional with background in automotive technology, high impact concern, problem solving. Disciplined and responsible leader and/or team member, currently seeking opportunities in system security analysis and cyber defense infrastructure.

Competencies and Skills

Security Principles

Business Continuity (BC), Disaster Recovery (DR) & Incident Response Concepts

Access Controls Concepts

Network Security

Security Operations Defense in depth, access control and password management

Cryptography: basic concepts, algorithms and deployment, and application

Cloud: AWS and Azure operations

Defensible network architecture, networking and protocols, and network security

Incident handling and response, data loss prevention, mobile device security, vulnerability scanning and penetration testing

Linux: Fundamentals, hardening and securing

SIEM, critical controls, and exploit mitigation

Web communication security, virtualization and cloud security, and endpoint security

Windows: access controls, automation, auditing, forensics, security infrastructure, and services

Tcpdump; Wireshark; AWS VPC Flow Logs

Password Auditing; Data Loss Prevention; Mobile Device Backup Recovery

Network Discovery; Binary File Analysis and Characterization; Web App Exploitation; SIEM Log Analysis

Hashing and Cryptographic Validation; Encryption and Decryption; Intrusion Detection and Network Security Monitoring with Snort3 and Zeek

Windows Process Exploration; Windows Filesystem Permissions; Applying Windows System Security Policies; Using PowerShell for Speed and Scale

Linux Permissions; Linux Containers; Linux Logging and Auditing

Education & Certifications

SANS Cyber Academy 2024: GIAC-GFACT Foundations: Computers, Technology, & Security, GIAC-GSEC (Security Essentials - Network, Endpoint, and Cloud

University of Michigan 2023: Program Certificate, Cybersecurity Professional Bootcamp

Coursera 2023: Google Certified in Cybersecurity

ISC2 2023: Certified in Cybersecurity

Siena Heights University 1997: B.A.S. Automotive Technology

Employment Experience

Lena Thompson LLC 2020-present: Independent Contractor

Contracted work with several Mortgage & Bankers field service companies. Perform property inspections to determine condition and occupancy. Attempt to collect a debt by delivering correspondence. Provide comprehensive photo portfolio to the Bankers. Tag homes as vacant or abandoned. Perform interior inspections on homes reclaimed by the bank. Provide marketing photos for foreclosure auctions.

Cheboygan County 2021-2023: Planning and Zoning Commissioner

Public service. Municipal planning, site reviews, special use permit requests, etc..

Ford Motor Company 2009-2019: Engineering Program Manager

Highly respected within the Ford Customer Service Engineering community

•Continually influenced engineering to work diligently on investigating design, manufacturing, or supplier quality issues

•Utilized end customer and technician data, to justify resources be allocated to fix concerns.

•Led cross functional teams to engage in root cause analysis, investigation, repair trials.

•Owned the concern from beginning to end. Then, communicated the fix to the field, by authoring the technical service bulletin.

•Provided “fresh eyes” to safety engineering groups. Collaborated with Design and Release engineers, quality engineers, vehicle operation engineers, end of line engineers, repair technicians.

•Provided a clearinghouse of serviceability information and support to the vehicle team and other stakeholders.

•Utilized 6-Sigma Blackbelt processes, such as the DMAIC principle (design, measure, analyze, improve, control). Certified as a Consumer Driven, 6-Sigma Blackbelt, by Ford Motor Company

Additional Information

University of Michigan 2023: 440 lab hours

Volunteer 2024: Safe & Secure Online (ISC2)

Side projects

Case #1: During a walkthrough of a multi-million-dollar manufacturing facility, I was asked to look at some suspicious emails, by the office manager. I immediately reviewed the Company’s website functionality and found one page, “partner login” had a broken captcha. New users can register as a “sales rep” or “distributor” without using captcha, but they use it on other pages. This concerned me, so I asked the office manager to check for any new users in the system and sure enough, she found bot accounts from other countries, in the “partner program”. That program, however, is not something they can sign up for. The office manager must assign access, yet 10 or so accounts, the manager had never seen before. The 3rd party company uses VMWare. I assume this is what they spin up for their customers to use. This web or software Company says they have blocked /deleted the bots. I advised that they need to check periodically for rogue accounts because those accounts elevated their privileges.

Case #2: I am also working with a client who has Pegasus on her phone. She has been terrorized by her neighbor for two years and law enforcement won’t help. My intention is to use the (MVT) Mobile Verification Tool to identify and enumerate IOCs for use in a possible court case. Currently, we are stuck at determining the best way to make and transport the iPhone backup file, since the attacker seems to corrupt anything that she does on her phone and laptop. A faraday cage of some sort may be in order. This is an ongoing project.



Contact this candidate