Career Objective
With a strong foundation in cybersecurity, coupled with four years of experience in the software engineering and development field, I am eager to leverage my technical skills and knowledge to contribute to your organization. My background includes extensive work with incident monitoring, response, and remediation, as well as AWS cloud services. Through collaboration with diverse teams and stakeholders, I have honed my communication and problem-solving abilities. I am excited to apply my expertise in both cybersecurity and software development to become a valuable asset to your team.
Technical Skills
Vulnerability Assessment - Scanning (Nessus, OpenVAS), SIEM (Splunk)
Incident Response - IDS/IPS, log analysis, Cyber Kill Chain, MITRE ATTACK
Application Security - OWASP, CVE, DAST (Burp Suite), SDLC, CI/CD
Security Audit Frameworks - NIST, ISO, CIS Benchmarks, PCI DSS
Networking - TCP/IP, network topologies, switching, routing, firewall configuration and management,
OSI model
Programming Languages - Java, HTML, CSS, JavaScript, TypeScript, PowerShell, Scala
Cloud Computing Platforms - AWS
Operating Systems - Windows, Linux, macOS
Virtualization - VMware, VirtualBox
Penetration Testing – OSINT, Nmap, Wireshark, Metasploit, ZAP
Digital forensics - Autopsy
Other - Active Directory, Docker, Version Control (Git), Postman, CyberArk, Datadog, New Relic, Jenkins Enterprise, JFrog Artifactory, GitHub, Jira, Slack, Microsoft Office 365
Education & Certifications
College/ University- The University of North Carolina at Charlotte (May 2019)
Major: Bachelor of Computer Science
Cyber Security Bootcamp - Springboard (October 2024)
CompTIA Security+ Certification (December 2024 to December 2027)
Experience
Springboard March-2024 to Present
`Cyber Security Analyst
•Performed host discovery and enumeration using tools such as Nmap for obtaining information on hosts and the services they are running, OpenVAS for identifying and managing security vulnerabilities in their networks and systems, and Wireshark for inspecting and capturing packets on their network
•Performed risk assessments adhering to NIST SP and OWASP Top 10 ensuring vendor compliance with industry standards
•Performed deep packet analysis using Wireshark to inspect network traffic and extract artifacts like files, credentials, and images from PCAP files
•Performed monitoring and log analysis by utilizing SIEM Splunk to identify malicious behaviors and activity, conducting both IDS/IPS
•Performed forensic analysis on compromised systems using Autopsy to identify the root causes of security incidents and deliver actionable remediation strategies to mitigate threats
•Utilized Cyber Kill Chain and MITRE ATT&CK Frameworks to help mitigate, defend, and contain threat actor activities.
•Conducted vulnerability scans using various network scanning tools, such as Burp Suite, Nessus, OWASP ZAP, and OpenVAS in order to mitigate weaknesses in a system
•Implemented account management by setting up group policies through the active directory, which gives greater control over the security of your network as a system administrator
•Implemented system hardening on Windows and Linux by removing duplicate root accounts and removing the anonymous FTP server, telnet, and default web server
•Experienced in a Production monitoring environment where alerts had to be responded to and remediated in a timely manner
•Conducted root cause analysis on incidents and escalated them to the appropriate party when needed
•Documented incidents and provided remediation recommendations for cyber threats, ensuring thorough reporting
Additional Technologies:
Nmap and Zenmap - network scanning and network mapping.
Wireshark - an open source network protocol analyzer.
Metasploit - enumeration, vulnerability scanning, and executing attacks.
Kali Linux - digital forensics and penetration testing.
Splunk - monitoring and DevSecOps.
OpenVAS and Nessus - vulnerability scanning and host enumeration.
GoPhish - to run phishing simulations.
Autopsy - digital forensics.
Capital One- McLean, VA August-2022 to October-2023
Production Support Engineer
Supported PD2.0 and Tessera Platforms by recovering failed campaigns in Production
Remediated container and infrastructure vulnerabilities in the QA and Production environments by rehydrating AMI and Docker images
Performed the Snowflake password rotation process in order to reduce vulnerabilities
Utilized Cloud Identity Warehouse to remediate vulnerabilities in different buckets
Performed Docker image scans to ensure no vulnerabilities were present
Archived old images after rehydration’s were completed
Used Well Managed Central to check for past due vulnerabilities
Performed PAR releases for Application images in order to remediate vulnerabilities in the QA and Production environments
Utilized the blue/green deployment strategy when performing QA and Production rehydration’s for Kubernetes clusters
Worked on the whitelisting of IAM roles and policies in AWS
Utilized curl commands and postman scripts to recover failed campaigns
Used Splunk and Amazon CloudWatch to identified any errors or issues with a campaign
Used Databricks to run Python scripts in order to gather performance test results after QA rehydration changes
Created Rehydration MBM Plans for application and Kubernetes images
Involved in the Rehydration Process from the building and testing stage to the image being in Production
Updated Pager Duty escalation policies and fixed schedules when needed
Provided on call support and weekend support for PagerDuty alerts.
Additional Technologies: Amazon S3, Amazon EC2, AWS Lambda, Amazon CloudWatch, Kubernetes, Splunk, IntelliJ, Postman, CyberArk, Amazon DynamoDB, Datadog, New Relic, Jenkins Enterprise, JFrog Artifactory, GitHub, Jira, Slack
Capital One- McLean, VA June-2021 to June-2022
Java Developer
Incorporated Scala to add new functionality for specific Credit Card users
Created AWS CloudFormation scripts to set up a new lambda function
Worked with Jenkins to build, test, and deploy new changes once they are pushed to GitHub
Utilized AWS Lambda, AWS CloudWatch, and Splunk to monitor logs, alerts, and test cases
Performed multiple levels of testing including smoke testing, unit testing, automation testing, and integration testing
Additional Technologies: IntelliJ, Postman, Amazon DynamoDB, CloudBees Jenkins Enterprise, TDM OneSource, JFrog Artifactory, GitHub, Jira, Slack
Cognixia- Lexington, NC Feb-2021 to June-2021
Full-Stack Java Developer
Cognixia’s JUMP program is a hyper-intense technical training program that gives top STEM talent from across the U.S. the equivalent of 12-18 months of industry experience. Not only do they up-skill their technical abilities, they also evolve their digital mindset to successfully adapt and utilize technology in an efficient manner so they can JUMP start their careers via deployment with Collabera clients.
Developed a Full suite Spring Boot REST API, implementing Spring Security, Hibernate, JPA, and Mockito Test Suite
Design Flexibility – experience with DAO and DTO design patterns, JDBC, JPA and Hibernate for interfacing with Data Persistence
Database Proficiency - in RDBMS MySQL as well as NoSQL with MongoDB
UST Global (Blue Cross & Blue Shield) - Wallingford, CT Nov 2019 to Aug 2020
Software Engineer
Incorporated Java, JSP, and JavaScript to update and edit the UI environment
Utilized MongoDB and Data Studio for data manipulation and monitoring
Utilized the Agile development methodology by splitting up work into sprints so that progress is ready to be displayed in a shorter amount of time