IT Project Manager | Cybersecurity Analyst
Send a job offer directly to this candidate
Cyber Security Analyst, leveraging 10+ years of proven experience in Project management and SIEM, network security, and firewall configurations ( IDS & IPS).Utilized forensic tools such as Wireshark, WinSCP, and MS Network Monitor to analyze network traffic, identify security vulnerabilities, and generate hash codes when applicable.
United States Army Veteran Cyber Security Analyst, leveraging 10+ years of proven experience in Project management and SIEM, network security, and firewall configurations (IDS & IPS). Utilized forensic tools such as Wireshark, WinSCP, and MS Network Monitor to analyze network traffic, identify security vulnerabilities, and generate hash codes when applicable. Possess a comprehensive background in expanding organizational objectives and developing capabilities that support the growth and improvement of the organization.
Managed a project valued at over $1.5M while managing risk, safety, and quality assurance for the company. Career supported by a Master of Business Administration degree.
Cybersecurity (Certificate) North Carolina State University (August 2023)
Utilized forensic and ethical hacking tools such as Wireshark, WinSCP, Metasploit, FTK, and MS Network Monitor to analyze network traffic, identify security vulnerabilities, and generate hash codes when applicable. Demonstrated expertise in configuring Cisco network platforms using Cisco Packet Tracer, resulting in streamlined network operations and a 20% reduction in configuration time.
Directory best practices on Windows Server systems, reduced security risks by 25% within the operating environment, and improved network security and integrity. Analyzed complex network structures to determine optimal subnetting, static and dynamic routing, VLAN segmentation, and OSPF layout, optimizing network efficiency by 15% Monitored security logs and SIEM alerts to identify and address potential security incidents promptly; safeguarded network availability and integrity, minimizing security risks.