Contact information: Lena Thompson 313-***-**** www.linkedin.com/in/lenathompsonllc
Professional Summary GIAC certified cybersecurity professional with background in automotive technology, high impact concern, problem solving. Disciplined and responsible leader and/or team member, currently seeking opportunities in system security analysis and cyber defense infrastructure.
Competencies and Skills
Security Principles
Business Continuity (BC), Disaster Recovery (DR) & Incident Response Concepts
Access Controls Concepts
Network Security
Security Operations Defense in depth, access control and password management
Cryptography: basic concepts, algorithms and deployment, and application
Cloud: AWS and Azure operations
Defensible network architecture, networking and protocols, and network security
Incident handling and response, data loss prevention, mobile device security, vulnerability scanning and penetration testing
Linux: Fundamentals, hardening and securing
SIEM, critical controls, and exploit mitigation
Web communication security, virtualization and cloud security, and endpoint security
Windows: access controls, automation, auditing, forensics, security infrastructure, and services
Tcpdump; Wireshark; AWS VPC Flow Logs
Password Auditing; Data Loss Prevention; Mobile Device Backup Recovery
Network Discovery; Binary File Analysis and Characterization; Web App Exploitation; SIEM Log Analysis
Hashing and Cryptographic Validation; Encryption and Decryption; Intrusion Detection and Network Security Monitoring with Snort3 and Zeek
Windows Process Exploration; Windows Filesystem Permissions; Applying Windows System Security Policies; Using PowerShell for Speed and Scale
Linux Permissions; Linux Containers; Linux Logging and Auditing
Education & Certifications
SANS Cyber Academy 2024: GIAC-GFACT Foundations: Computers, Technology, & Security, GIAC-GSEC (Security Essentials - Network, Endpoint, and Cloud
University of Michigan 2023: Program Certificate, Cybersecurity Professional Bootcamp
Coursera 2023: Google Certified in Cybersecurity
ISC2 2023: Certified in Cybersecurity
Siena Heights University 1997: B.A.S. Automotive Technology
Employment Experience
Lena Thompson LLC 2020-present: Independent Contractor
Contracted work with several Mortgage & Bankers field service companies. Perform property inspections to determine condition and occupancy. Attempt to collect a debt by delivering correspondence. Provide comprehensive photo portfolio to the Bankers. Tag homes as vacant or abandoned. Perform interior inspections on homes reclaimed by the bank. Provide marketing photos for foreclosure auctions.
Cheboygan County 2021-2023: Planning and Zoning Commissioner
Public service. Municipal planning, site reviews, special use permit requests, etc..
Ford Motor Company 2009-2019: Engineering Program Manager
Highly respected within the Ford Customer Service Engineering community
•Continually influenced engineering to work diligently on investigating design, manufacturing, or supplier quality issues
•Utilized end customer and technician data, to justify resources be allocated to fix concerns.
•Led cross functional teams to engage in root cause analysis, investigation, repair trials.
•Owned the concern from beginning to end. Then, communicated the fix to the field, by authoring the technical service bulletin.
•Provided “fresh eyes” to safety engineering groups. Collaborated with Design and Release engineers, quality engineers, vehicle operation engineers, end of line engineers, repair technicians.
•Provided a clearinghouse of serviceability information and support to the vehicle team and other stakeholders.
•Utilized 6-Sigma Blackbelt processes, such as the DMAIC principle (design, measure, analyze, improve, control). Certified as a Consumer Driven, 6-Sigma Blackbelt, by Ford Motor Company
Additional Information
University of Michigan 2023: 440 lab hours
Volunteer 2024: Safe & Secure Online (ISC2)
Side projects
Case #1: During a walkthrough of a multi-million-dollar manufacturing facility, I was asked to look at some suspicious emails, by the office manager. I immediately reviewed the Company’s website functionality and found one page, “partner login” had a broken captcha. New users can register as a “sales rep” or “distributor” without using captcha, but they use it on other pages. This concerned me, so I asked the office manager to check for any new users in the system and sure enough, she found bot accounts from other countries, in the “partner program”. That program, however, is not something they can sign up for. The office manager must assign access, yet 10 or so accounts, the manager had never seen before. The 3rd party company uses VMWare. I assume this is what they spin up for their customers to use. This web or software Company says they have blocked /deleted the bots. I advised that they need to check periodically for rogue accounts because those accounts elevated their privileges.
Case #2: I am also working with a client who has Pegasus on her phone. She has been terrorized by her neighbor for two years and law enforcement won’t help. My intention is to use the (MVT) Mobile Verification Tool to identify and enumerate IOCs for use in a possible court case. Currently, we are stuck at determining the best way to make and transport the iPhone backup file, since the attacker seems to corrupt anything that she does on her phone and laptop. A faraday cage of some sort may be in order. This is an ongoing project.