Post Job Free
Sign in

Information Technology Technical Support

Location:
Charlotte, NC
Posted:
March 08, 2025

Contact this candidate

Resume:

ENOCH LANKWEI HOLM

*********@*****.*** • 336-***-**** • Charlotte, NC • linkedin

SUMMARY

Results-oriented Cybersecurity Analyst with extensive experience in cybersecurity, threat analysis, and risk management. Proven ability to detect, mitigate, and prevent security incidents using industry-standard tools and frameworks. Skilled in implementing robust security protocols, conducting vulnerability assessments, and ensuring compliance with regulatory standards. Adept at translating complex technical information into actionable insights for stakeholders. Prepared to bring expertise in incident response and cybersecurity to Equitable.

EXPERIENCE

PerScholas, Security Analyst Intern (Part-Time Remote) Nov 2024 - Present

Vulnerability Management:

Conduct regular vulnerability assessments across all IT assets using iAnalyze and prioritize vulnerabilities based on risk, impact, and exploitability industry-standard tools.

Use SIEM (Security Information and Event Management) systems to monitor logs and alerts. Track anomalies, suspicious activities, or security incidents. Gather and analyze relevant data to determine the scope and impact of incidents. Help document and escalate incidents according to protocols. Server OS Patching:

Assist in managing the patching process for Windows Server and Redhat Linux operating systems. Develop and implement patch management strategies, ensuring minimal disruption to business operations. Amazon, Information Technology Support Specialist

Mar 2020 - Present

Provide technical support to employees, including troubleshooting and resolving hardware, software, and network issues in a timely manner

Provide installation and support of remote support technologies for individuals served. Assist in the onboarding process for new employees, including setting up laptops and other necessary equipment. Proficiency in implementation, administration and troubleshooting of virtualization technologies including: Hyper-V, ESXi, vCenter Server, SRM, VSAN, and NSX.

New user account creation (Active Directory, Office 365, FTP, Phone System, and within SAS applications). Machine Specialties Inc., Information Technology Security Specialist Aug 2018 - Mar 2020

Install, configure, and maintain computer hardware, software, networks, and systems. Perform system updates, patches, and backups to safeguard data and system integrity. Design, implement, and monitor local area networks, wide area networks, and wireless networks. Troubleshoot network connectivity issues and ensure high availability. Configure routers, switches, firewalls, and VPNs to secure and optimize network traffic.

Provide Tier 1 and Tier 2 technical support to employees, troubleshooting hardware, software, and connectivity issues Implement and monitor cybersecurity measures to protect organizational data by performing risk assessment and penetration testing

EDUCATION

PerScholas

Certificate • Cybersecurity - 15 Weeks Full time hands on Technical Training Course • Jul 2024 - Nov 2024 Core Cybersecurity Topics:

Network Security – Firewalls, VPNs, IDS/IPS, and network protocols Ethical Hacking & Penetration Testing – Kali Linux, Metasploit, Nmap Security Operations & Incident Response (SOC Analysis) – SIEM tools, threat detection Cloud Security – AWS, Azure, Google Cloud security fundamentals Identity & Access Management (IAM) – Authentication, MFA, role-based access control Data Loss Prevention (DLP) & Compliance – GDPR, HIPAA, PCI-DSS, ISO 27001 Cryptography & Encryption – Hashing, SSL/TLS, PKI, digital signatures Endpoint & Application Security – Secure coding, DevSecOps, malware analysis Risk Management & Governance (GRC) – NIST, CIS controls, risk assessments ENOCH LANKWEI HOLM - page 1 of 2

Cyber Threat Intelligence & Analysis – MITRE ATT&CK, threat hunting Technical Skills & Tools Covered:

Operating Systems: Windows, Linux, Kali Linux

Scripting & Automation: Python, PowerShell, Bash

Security Tools: Wireshark, Splunk, Nessus, Burp Suite Cloud Security Tools: AWS Security Hub, Azure Security Center Incident Response Tools: SIEM (Splunk, IBM QRadar), EDR solutions Technical Skills & Tools Covered:

Operating Systems: Windows, Linux, Kali Linux

Scripting & Automation: Python, PowerShell, Bash

Security Tools: Wireshark, Splunk, Nessus, Burp Suite Cloud Security Tools: AWS Security Hub, Azure Security Center Incident Response Tools: SIEM (Splunk, IBM QRadar), EDR solutions University of Ghana

Bachelors • Geography and Resource Development & Information Communication Technology • Aug 2005 - Mar 2009 LICENSES & CERTIFICATIONS

NDG Linux Unhatched

Issued Mar 2024

CompTia Security+ Certified

Issued Jul 2024

Cisco Networking Essentials Certification

Issued Aug 2024

NDG Linux Essentials

Issued Sep 2024

Cybersecurity Essentials Certification

Issued Nov 2024

ComTia CYSA+ Certification

Issued Nov 2024

SKILLS

SIEM Tools • Threat Analysis • NIST • ISO (27001) • Problem Solving • Team work • Analytical thinking • Malware analysis • Threat Intelligence • Encryption ENOCH LANKWEI HOLM - page 2 of 2



Contact this candidate