Post Job Free
Sign in

Software Engineering Cyber Security

Location:
Topeka, KS, 66625
Posted:
May 28, 2025

Contact this candidate

Resume:

Career Objective

With a strong foundation in cybersecurity, coupled with four years of experience in the software engineering and development field, I am eager to leverage my technical skills and knowledge to contribute to your organization. My background includes extensive work with incident monitoring, response, and remediation, as well as AWS cloud services. Through collaboration with diverse teams and stakeholders, I have honed my communication and problem-solving abilities. I am excited to apply my expertise in both cybersecurity and software development to become a valuable asset to your team.

Technical Skills

Vulnerability Assessment - Scanning (Nessus, OpenVAS), SIEM (Splunk)

Incident Response - IDS/IPS, log analysis, Cyber Kill Chain, MITRE ATTACK

Application Security - OWASP, CVE, DAST (Burp Suite), SDLC, CI/CD

Security Audit Frameworks - NIST, ISO, CIS Benchmarks, PCI DSS

Networking - TCP/IP, network topologies, switching, routing, firewall configuration and management,

OSI model

Programming Languages - Java, HTML, CSS, JavaScript, TypeScript, PowerShell, Scala

Cloud Computing Platforms - AWS

Operating Systems - Windows, Linux, macOS

Virtualization - VMware, VirtualBox

Penetration Testing – OSINT, Nmap, Wireshark, Metasploit, ZAP

Digital forensics - Autopsy

Other - Active Directory, Docker, Version Control (Git), Postman, CyberArk, Datadog, New Relic, Jenkins Enterprise, JFrog Artifactory, GitHub, Jira, Slack, Microsoft Office 365

Education & Certifications

College/ University- The University of North Carolina at Charlotte (May 2019)

Major: Bachelor of Computer Science

Cyber Security Bootcamp - Springboard (October 2024)

CompTIA Security+ Certification (December 2024 to December 2027)

Experience

Springboard March-2024 to Present

`Cyber Security Analyst

•Performed host discovery and enumeration using tools such as Nmap for obtaining information on hosts and the services they are running, OpenVAS for identifying and managing security vulnerabilities in their networks and systems, and Wireshark for inspecting and capturing packets on their network

•Performed risk assessments adhering to NIST SP and OWASP Top 10 ensuring vendor compliance with industry standards

•Performed deep packet analysis using Wireshark to inspect network traffic and extract artifacts like files, credentials, and images from PCAP files

•Performed monitoring and log analysis by utilizing SIEM Splunk to identify malicious behaviors and activity, conducting both IDS/IPS

•Performed forensic analysis on compromised systems using Autopsy to identify the root causes of security incidents and deliver actionable remediation strategies to mitigate threats

•Utilized Cyber Kill Chain and MITRE ATT&CK Frameworks to help mitigate, defend, and contain threat actor activities.

•Conducted vulnerability scans using various network scanning tools, such as Burp Suite, Nessus, OWASP ZAP, and OpenVAS in order to mitigate weaknesses in a system

•Implemented account management by setting up group policies through the active directory, which gives greater control over the security of your network as a system administrator

•Implemented system hardening on Windows and Linux by removing duplicate root accounts and removing the anonymous FTP server, telnet, and default web server

•Experienced in a Production monitoring environment where alerts had to be responded to and remediated in a timely manner

•Conducted root cause analysis on incidents and escalated them to the appropriate party when needed

•Documented incidents and provided remediation recommendations for cyber threats, ensuring thorough reporting

Additional Technologies:

Nmap and Zenmap - network scanning and network mapping.

Wireshark - an open source network protocol analyzer.

Metasploit - enumeration, vulnerability scanning, and executing attacks.

Kali Linux - digital forensics and penetration testing.

Splunk - monitoring and DevSecOps.

OpenVAS and Nessus - vulnerability scanning and host enumeration.

GoPhish - to run phishing simulations.

Autopsy - digital forensics.

Capital One- McLean, VA August-2022 to October-2023

Production Support Engineer

Supported PD2.0 and Tessera Platforms by recovering failed campaigns in Production

Remediated container and infrastructure vulnerabilities in the QA and Production environments by rehydrating AMI and Docker images

Performed the Snowflake password rotation process in order to reduce vulnerabilities

Utilized Cloud Identity Warehouse to remediate vulnerabilities in different buckets

Performed Docker image scans to ensure no vulnerabilities were present

Archived old images after rehydration’s were completed

Used Well Managed Central to check for past due vulnerabilities

Performed PAR releases for Application images in order to remediate vulnerabilities in the QA and Production environments

Utilized the blue/green deployment strategy when performing QA and Production rehydration’s for Kubernetes clusters

Worked on the whitelisting of IAM roles and policies in AWS

Utilized curl commands and postman scripts to recover failed campaigns

Used Splunk and Amazon CloudWatch to identified any errors or issues with a campaign

Used Databricks to run Python scripts in order to gather performance test results after QA rehydration changes

Created Rehydration MBM Plans for application and Kubernetes images

Involved in the Rehydration Process from the building and testing stage to the image being in Production

Updated Pager Duty escalation policies and fixed schedules when needed

Provided on call support and weekend support for PagerDuty alerts.

Additional Technologies: Amazon S3, Amazon EC2, AWS Lambda, Amazon CloudWatch, Kubernetes, Splunk, IntelliJ, Postman, CyberArk, Amazon DynamoDB, Datadog, New Relic, Jenkins Enterprise, JFrog Artifactory, GitHub, Jira, Slack

Capital One- McLean, VA June-2021 to June-2022

Java Developer

Incorporated Scala to add new functionality for specific Credit Card users

Created AWS CloudFormation scripts to set up a new lambda function

Worked with Jenkins to build, test, and deploy new changes once they are pushed to GitHub

Utilized AWS Lambda, AWS CloudWatch, and Splunk to monitor logs, alerts, and test cases

Performed multiple levels of testing including smoke testing, unit testing, automation testing, and integration testing

Additional Technologies: IntelliJ, Postman, Amazon DynamoDB, CloudBees Jenkins Enterprise, TDM OneSource, JFrog Artifactory, GitHub, Jira, Slack

Cognixia- Lexington, NC Feb-2021 to June-2021

Full-Stack Java Developer

Cognixia’s JUMP program is a hyper-intense technical training program that gives top STEM talent from across the U.S. the equivalent of 12-18 months of industry experience. Not only do they up-skill their technical abilities, they also evolve their digital mindset to successfully adapt and utilize technology in an efficient manner so they can JUMP start their careers via deployment with Collabera clients.

Developed a Full suite Spring Boot REST API, implementing Spring Security, Hibernate, JPA, and Mockito Test Suite

Design Flexibility – experience with DAO and DTO design patterns, JDBC, JPA and Hibernate for interfacing with Data Persistence

Database Proficiency - in RDBMS MySQL as well as NoSQL with MongoDB

UST Global (Blue Cross & Blue Shield) - Wallingford, CT Nov 2019 to Aug 2020

Software Engineer

Incorporated Java, JSP, and JavaScript to update and edit the UI environment

Utilized MongoDB and Data Studio for data manipulation and monitoring

Utilized the Agile development methodology by splitting up work into sprints so that progress is ready to be displayed in a shorter amount of time



Contact this candidate