Yosse Phanuel
ON. Canada.
************@*****.***, **********@*******.***
OBJECTIVES:
To obtain a full-time job position.
TECHNOLOGIES:
AMAZON WEB SERVICES
CROWDSTRIKE FALCO
SPLUNK
Datadog
qualy
I am a results-driven IT manager with a successful track record at Toronto Community Hostel (From 2017 to 2023). I am also known for spearheading transformative IT initiatives, optimizing technological infrastructure, and seamlessly integrating cutting-edge systems to elevate operational performance. Skilled in team management, fostering collaboration, and aligning technology with organizational goals. Committed to excellence, innovation, and impactful change in the IT realm.
PERSONAL STRENGTH OUTLINED.
Leadership:
I provide strong leadership, guiding the IT team toward achieving organizational goals and fostering a collaborative work environment.
Problem-Solving Skills:
I excel in analyzing complex issues and implementing effective solutions, ensuring smooth and efficient IT operations.
Effective Communication:
I communicate technical information clearly and concisely, facilitating understanding between IT professionals and non-technical stakeholders.
Adaptability:
I thrive in dynamic IT environments, adapting quickly to emerging technologies and evolving business requirements.
Strategic Planning:
I engage in strategic planning, aligning IT initiatives with overall business objectives to drive innovation and efficiency.
Team Collaboration:
I foster a collaborative team environment, encouraging open communication and leveraging diverse strengths for optimal project outcomes.
Detail-Oriented:
I pay meticulous attention to detail, ensuring the accuracy and reliability of IT systems, processes, and project implementations.
Continuous Learning:
I stay abreast of the latest trends and advancements in IT, demonstrating a commitment to continuous learning and professional development.
Professional Experiences
While working as the IT Manager at Toronto Community Hostel, I was able to lead incident response efforts, effectively coordinating with cross-functional teams to analyze and contain security breaches swiftly, minimizing potential damage, and ensuring a rapid return to normal operations.
I was able to successfully manage vulnerability assessments, identifying and prioritizing security risks across systems and networks. This involved collaborating with IT teams to implement timely remediation strategies, enhancing overall security posture.
I was able to conduct comprehensive security audits and assessments, ensuring compliance with industry standards such as ISO 27001 and NIST. This involved meticulous evaluation of existing security controls and policies to align them with regulatory requirements.
I was able to perform penetration testing and ethical hacking exercises, identifying and exploiting vulnerabilities to simulate real-world cyber threats. This proactive approach helped in fortifying defenses and providing actionable recommendations for risk mitigation.
I was able to contribute to the design and implementation of secure architectures, integrating security into the development lifecycle. This included collaborating with stakeholders to understand business requirements and devising robust security solutions.
I was able to analyze threat intelligence sources, staying ahead of emerging cyber threats and understanding the tactics employed by threat actors. This proactive approach enabled the implementation of preemptive security measures.
I was able to implement and manage security tools, including SIEM, intrusion detection/prevention systems, and antivirus solutions. This involved configuring and fine-tuning these tools to enhance their effectiveness in identifying and mitigating security incidents.
KEY SKILLS
Vulnerability Assessment and Penetration Testing:
I demonstrated proficiency in conducting thorough vulnerability assessments and penetration tests to identify and address potential security risks in systems and networks.
Network Security:
I set up and configured firewalls, Intrusion Detection Systems (IDS), and Virtual Private Networks (VPNs) to enhance network security.
Incident Response and Forensics:
I executed incident response procedures, including evidence collection, analysis, and reporting to investigate and mitigate security incidents.
Secure Coding and Application Security:
I implemented secure coding practices and application security measures to prevent common vulnerabilities like SQL injection, cross-site scripting (XSS), and buffer overflow attacks.
Identity and Access Management:
I managed user authentication and authorization mechanisms to control access to systems and sensitive information.
Security Information and Event Management (SIEM):
I utilized SIEM tools to monitor and analyze security events, detect anomalies, and respond to potential threats.
Threat Intelligence Analysis:
I stayed informed about the latest cyber threats, analyzed threat intelligence data, and implemented proactive security measures.
Security Policy Development:
I developed and implemented security policies and procedures to ensure compliance with industry standards and regulatory requirements.
Network Protocols and Packet Analysis:
I understood and analyzed network protocols and conducted packet analysis to identify and address network vulnerabilities.
Risk Assessment and Management:
I assessed and managed cybersecurity risks, identified potential threats, and implemented risk mitigation strategies.
Encryption and Cryptography:
I implemented encryption techniques and cryptographic protocols to secure data in transit and at rest.
Intrusion Detection and Prevention Systems (IDPS):
I configured and managed IDPS to detect and prevent unauthorized access or malicious activities within the network.
Security Awareness Training:
I conducted security awareness training for employees to promote a culture of security and educate them on cybersecurity best practices.
Security Auditing and Compliance:
I performed regular security audits and ensured compliance with industry regulations and standards.
Collaboration and Communication:
I effectively collaborated with cross-functional teams, communicated security concepts to technical and non-technical stakeholders, and fostered a secure work environment.
skills along with some of the latest tools
Penetration Testing and Ethical Hacking:
Skill: Conducting penetration tests to identify and exploit vulnerabilities in systems and networks ethically.
Tools: Burp Suite, Metasploit, Nmap, Wireshark, Kali Linux.
Security Information and Event Management (SIEM):
Skill: Monitoring, analyzing, and managing security events and incidents in real-time.
Tools: Splunk, IBM QRadar, LogRhythm, Elastic Security, ArcSight.
Threat Intelligence Analysis:
Skill: Gathering, analyzing, and interpreting threat intelligence to identify potential security threats.
Tools: ThreatConnect, Recorded Future, Anomali, Maltego, MISP.
Security Orchestration, Automation, and Response (SOAR):
Skill: Automating and orchestrating security processes to improve incident response and efficiency.
Tools: Demisto (now part of Palo Alto Networks), Phantom (now part of Splunk), Swimlane, Cortex XSOAR.
Endpoint Security:
Skill: Protecting endpoints (devices) from cybersecurity threats.
Tools: CrowdStrike Falcon, Carbon Black, SentinelOne, Symantec Endpoint Protection, Microsoft Defender for Endpoint.
Cloud Security:
Skill: Securing cloud environments and applications.
Tools: AWS Security Hub, Microsoft Azure Security Center, Google Cloud Security Command Center, Cloudflare, Trend Micro Cloud One.
Identity and Access Management (IAM):
Skill: Managing user identities and controlling access to resources.
Tools: Okta, Microsoft Azure Active Directory, Ping Identity, OneLogin, ForgeRock Identity Platform.
Data Loss Prevention (DLP):
Skill: Preventing unauthorized access, use, or transmission of sensitive data.
Tools: Symantec Data Loss Prevention, McAfee DLP, Digital Guardian, Forcepoint DLP, Microsoft Azure Information Protection.
Container Security:
Skill: Securing containerized applications and environments.
Tools: Docker Bench for Security, Aqua Security, Twistlock (now part of Palo Alto Networks), Sysdig Secure, Anchore.
Secure DevOps (DevSecOps):
Skill: Integrating security into the DevOps process to ensure secure software delivery.
Tools: GitLab, Jenkins, GitHub Actions, SonarQube, Snyk.[1]
EDUCATION:
Master school Certificate.
CompTIA. (USA/ CANADA) Information system security Certification. (From May to December 2023) (CompTIA Security+ Certification Exam SY0-601) in progress.
Plus, Two-year self-directed learning. (Cyber security as major.)
(From January 2019 to March 2021.) Check me in LinkedIn, Yosse Phanuel.
As an Information System Security Manager, I configured and set up network security measures, including firewalls, Intrusion Detection Systems, and Virtual Private Networks.
I conducted packet analysis, followed network protocols, and identified network vulnerabilities to enhance overall security.
I performed Vulnerability Assessment and Penetration Testing to identify and address potential security weaknesses in systems and networks.
I executed incident response and forensics procedures, involving evidence collection, analysis, and reporting to investigate and mitigate security incidents.
I focused on secure coding and application security, implementing measures to prevent common application vulnerabilities such as SQL injection, cross-site scripting (XSS), and buffer overflow attacks.
I managed identity and access, controlling user authentication and authorization mechanisms, among other responsibilities.
1 Other work Histories:
Walmart, Global Logistics.
Walmart Canada.ca
1501 Industrial Park Dr, CORNWALL ONTARIO K6H 7M4+1-613-***-**** (2022 to 2023)
My daily responsibilities and duties are as follows:
Opening the right trailer, with the right goods.
Inspecting incoming shipments for accuracy and completeness
Scanning, printing tags, labeling goods, and placing them on conveyors or skeds for the next shipping process.
Recording and documenting received goods and materials.
Checking for damages or discrepancies and reporting them to the right parties.
Organizing and storing received items in designated areas.
Inspect work done and give reports.
Update inventory records and systems to reflect received items
2 Gudele 2, Muraba 8, Juba, South Sudan.
TELEPHONE NUMBER:
EMAIL ADDRESS:
************@*****.***
JOB TITLE/DUTIES AND RESPONSIBILITIES
2018 TO 2021 CYBER SECURITY AND DATA ANALYSIS
Conducting security assessments and vulnerability assessments to identify potential threats and risks to computer systems and networks.
Monitoring and analyzing network traffic, system logs, and security alerts to detect and respond to potential security breaches.
Set and lead the technology strategy.
Conducting forensics analysis to investigate and mitigate security incidents, such as data breaches or unauthorized access.
Coordinates the installation and support of network hardware and software.
Designs security countermeasures to defend against cyber threats and cyber-attacks.
Monitor and investigate security breaches.
Monitor performance.
Enforce standards and security.
Penetration test and Data encryption.
Upgrading existing technological system.
Data analysis/monitor security access
Internal and external security auditing.
3-Aluminum Window Designs
www.aluminumwindowdesigns.com
440 Hanlan Rd, Woodbridge ON L4L 3P6 ·
+1-905-***-**** (2016 to 2018)
Responsibilities and Duties
Taking measurements and layouts of windows for accurate installation.
Follow safety protocols and guidelines to prevent accidents or injuries.
Cutting and shaping aluminum profiles using power tools and machinery.
Assembling and installation of aluminum window frames and components.
Operate and keep equipment such as saws, drills, and routers.
Clean and organize work area to ensure a safe and efficient work environment.
Handling and storing materials in a careful and organized manner.
Loading and unloading of materials and equipment.
Help with other tasks as directed by supervisors or team leaders.
Collaborating with other team members to ensure timely completion of project.
4-FIO Automotive Canada Corporation
www.fioautomotive.com
220 Dunn Rd, Stratford ON N4Z0A7
+1-519-***-****(2013 to 2016)
Responsibilities and Duties
Inspecting and preparing welding equipment and materials.
Programming and running robotic welding systems.
Ensure perfect welding as needed.
Reinstall robotic welding tips.
Monitoring and adjusting welding parameters to ensure quality and accuracy.
Conducting visual inspections of welded parts to find defects or imperfections.
Adhering to safety protocols and keeping a clean and organized work area.
Recording and parking welded car parts ready for shipment.
5-Depute head teacher (2001-2008).
Bhar El Naam and Unity primary school,
kakuma – Kenya.
(Credentials: Diploma in Education-Kenya,
Primary and Secondary Education Certificates-Uganda)
Supporting the head teacher in curriculum planning and ensuring the delivery of quality education
Helping the head teacher in managing the coverall operation of the school.
Supervising and evaluating teaching staff and providing feedback and support.
Collaborating with other school leaders to develop and implement school policies and procedures.
Handling disciplinary matters and addressing student behavior issues.
Representing the school in meetings with parents, community members and external stakeholders.
Interpreter and designer of learning programs and materials.
Maintain daily role calls.
Maintain and monitor pupil’s continuous progressive assessment records of work done weekly, monthly, and yearly.
REAFERENCE: Peter Kleto. 647-***-****.