*************@*****.***
Bachelor Of Science In Cybersecurity
Metropolitan State University
Excellent Customer Service
Troubleshooting & Problem-Solving
Vulnerability Scanning
Governance, Risk, and Compliance (GRC) Fundamentals Attention to Detail & Documentation
763-***-**** Minneapolis, Minnesota
CompTIA Security+
EC-Council Certified Encryption Specialist
Active Secret Security Clearance (U.S. Department of Defense) Kareem Peterson
Army Cyber Defense Warrant Officer
******.*.********.***@****.***
Tim Armstrong
IT Manager
Cassia Services
***.*********@**********.***
SUMMARY
MY SKILLS
EDUCATION
WORK EXPERIENCE
REFERENCE
CERTIFICATION
MICHAEL BLESSED
INFORMATION TECHNOLOGY SPECIALIST
E : P :
Cybersecurity graduate from Metropolitan State University with a solid foundation in risk assessment, security controls, and policy-based security frameworks. Academic experience evaluating vulnerabilities, documenting risks, and aligning security practices with organizational and compliance requirements. Detail-oriented and analytical IT professional eager to continue developing skills in risk management, governance, and security operations while contributing to a team as a Junior Information Security Analyst. www.linkedin.com/in/mzblessed2531
(2022 - 2024) U.S. Army Help Desk/Information Assurance
(2025 - Present) Cassia Service Desk Level I
(2025 - Present) Cyber Security Risk Assessment Analyst Internship Metropolitan State University Conducted risk assessments by identifying vulnerabilities, threats, and potential business impacts Evaluated security controls and documented gaps aligned with organizational and compliance requirements Reviewed security policies, standards, and procedures for clarity, consistency, and effectiveness Documented risk findings and mitigation recommendations in clear, business-friendly language Provided Tier 1 technical support for end users, troubleshooting hardware, software, and access-related issues Managed user accounts, password resets, and access permissions in accordance with security and least-privilege principles Identified and escalated potential security issues such as suspicious activity, phishing attempts, and unauthorized access Documented incidents, resolutions, and recurring issues to support auditability and continuous improvement Supported endpoint security best practices, including system updates and basic hardening procedures Assisted users with security awareness topics, including password hygiene and safe computing practices Collaborated with IT and security teams to ensure timely issue resolution and policy adherence User Account Management: Create, modify, and deactivate user accounts and permissions in systems like Active Directory and Office 365.
Documentation: Update Knowledge bases, FAQs, and procedural documentation for common issues. Network Connectivity: Diagnose basic network issues such as Wi-Fi disconnections, VPN problems, and printer connectivity. Asset Management: Track and maintain inventory of IT hardware, software licenses, and accessories. Escalate Complex Issues: Forward unresolved or high-priority problems to higher-level IT staff or specialist.