{"id":222,"date":"2023-11-26T15:06:54","date_gmt":"2023-11-26T15:06:54","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/rbaduids493\/?p=222"},"modified":"2023-11-26T15:14:42","modified_gmt":"2023-11-26T15:14:42","slug":"resume","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/rbaduids493\/2023\/11\/26\/resume\/","title":{"rendered":"Resume"},"content":{"rendered":"\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-e0d65505-826f-48c8-9280-6d8e85f9ab64\" href=\"https:\/\/sites.wp.odu.edu\/rbaduids493\/wp-content\/uploads\/sites\/34043\/2023\/11\/Resumeee-1.docx\">Resumeee-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/rbaduids493\/wp-content\/uploads\/sites\/34043\/2023\/11\/Resumeee-1.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-e0d65505-826f-48c8-9280-6d8e85f9ab64\">Download<\/a><\/div>\n\n\n\n<p><strong>RESUME<\/strong><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>SUMMARY<\/strong><\/p>\n\n\n\n<p>A Skilled and detail-oriented cyber security professional with experience and exposure in Risk Management, Vulnerability Scanning, remediation, Federal Information Security Management Act (FISMA), NIST Cyber Security Risk Management Framework (RMF), System Security Monitoring and Auditing, Risk Assessments, and Security Control Assessment (SCA).Well versed in direct and remote analysis with strong critical thinking, communication, and people skills. Able to thrive in fast-paced and challenging environments where accuracy and efficiency matter.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>TOOLS<\/strong><\/p>\n\n\n\n<p>CSAM, IBM Big Fix, IBM Guardiam, SCCM, SharePoint, Exacta, Nessus, Web Inspect, Splunk, PowerShell Scripting, Microsoft word, Excel &amp;PowerPoint, Azzure Active Directory, IAM,<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>SKILLS &amp; EXPERTISE<\/strong><\/p>\n\n\n\n<p>FISMA, FIPS 199 &amp; 200, NIST 800-37 rev2, NIST 800-60 vol 2, NIST 800-18, NIST 800 -53A,<\/p>\n\n\n\n<p>NIST 800- 53B, NIST 800-53rev5, NIST 800-137, RMF, SDLC, Incidence Response Plan (IRP),<\/p>\n\n\n\n<p>Disaster Recovery Plan (DRP), ISO 27001 &amp; 2, GRC, Configuration Management Plan,<\/p>\n\n\n\n<p>Contingency Plan, 3rd Party\/ Vendor Risk Management, Vulnerability Scan Report Analysis, Vulnerability Assessment, Patching and remediating Vulnerability, Security Control Assessment, PTA &amp; PIA, E-authentication<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>PROFESSIONAL CERTIFICATIONS<\/strong><\/p>\n\n\n\n<p>CompTIA Security+<\/p>\n\n\n\n<p>CySA+<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>EDUCATION<\/strong><\/p>\n\n\n\n<p>MSc. Cybersecurity<\/p>\n\n\n\n<p>Old Dominion University, Norfolk VA&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 2024-In progress<\/p>\n\n\n\n<p>BSc. Cybersecurity<\/p>\n\n\n\n<p>Old Dominion University, Norfolk VA&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;2021-2023<\/p>\n\n\n\n<p>ASc. Cybersecurity<\/p>\n\n\n\n<p>Northern VA Community College, Manassas, VA\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 2018-2020<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>EXPERIENCE<\/strong><\/p>\n\n\n\n<p>Information System Security Officer (ISSO)&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p>Amazon Web Services Inc, Seattle, WA &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Sep 2019-Present<\/p>\n\n\n\n<ul>\n<li>Continuous monitoring of computer networks for security issues.<\/li>\n\n\n\n<li>Investigate security breaches and other cybersecurity incidents.<\/li>\n<\/ul>\n\n\n\n<ul>\n<li>Install security measures and operate software to protect systems and information infrastructure, including firewalls and data encryption programs.<\/li>\n\n\n\n<li>Document security breaches and assess the damage they cause.<\/li>\n\n\n\n<li>Work with the security team to perform tests and uncover network vulnerabilities.<\/li>\n\n\n\n<li>Fix detected vulnerabilities to maintain a high-security standard.<\/li>\n\n\n\n<li>Stay current on IT security trends and news.<\/li>\n\n\n\n<li>Develop company-wide best practices for IT security.<\/li>\n\n\n\n<li>Perform vulnerability scanning and remediation.<\/li>\n\n\n\n<li>Help colleagues install security software and understand information security management.<\/li>\n\n\n\n<li>Research security enhancements and make recommendations to management.<\/li>\n\n\n\n<li>Stay up to date on information technology trends and security standards.<\/li>\n\n\n\n<li>Verify and authenticate individuals based on their roles and contextual information such as geography, time of day, or (trusted) networks.<\/li>\n\n\n\n<li>Capture and record user login events<\/li>\n\n\n\n<li>Monitor security policies for sensitive data access, vulnerabilities management and\u00a0 privileged user actions, change control, application user activities and security exceptions using IBM Guardiam.<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<p>Help Desk Technician<\/p>\n\n\n\n<p>Navy Federal Credit Union Vienna, VA\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0       Feb 2016-Aug 2019<\/p>\n\n\n\n<ul>\n<li>Provide first level contact and convey resolutions to customer issues.<\/li>\n\n\n\n<li>Properly escalate unresolved queries to the next level of support<\/li>\n\n\n\n<li>Track, route, and redirect problems to correct resources.<\/li>\n\n\n\n<li>Update customer data and produce activity reports.<\/li>\n\n\n\n<li>Walk customers through problem solving process.<\/li>\n\n\n\n<li>Follow up with customers, provide feedback and see problems through to resolution.<\/li>\n\n\n\n<li>Utilize excellent customer service skills and exceed customers\u2019 expectations.<\/li>\n\n\n\n<li>Ensure proper recording, documentation, and closure.<\/li>\n\n\n\n<li>Recommended procedure modifications or improvements<\/li>\n\n\n\n<li>Preserve and grow your knowledge of help desk procedures, products and services.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>RESUME SUMMARY A Skilled and detail-oriented cyber security professional with experience and exposure in Risk Management, Vulnerability Scanning, remediation, Federal Information Security Management Act (FISMA), NIST Cyber Security Risk Management Framework (RMF), System Security Monitoring and Auditing, Risk Assessments, and&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/rbaduids493\/2023\/11\/26\/resume\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":22965,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/rbaduids493\/wp-json\/wp\/v2\/posts\/222"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/rbaduids493\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/rbaduids493\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/rbaduids493\/wp-json\/wp\/v2\/users\/22965"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/rbaduids493\/wp-json\/wp\/v2\/comments?post=222"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/rbaduids493\/wp-json\/wp\/v2\/posts\/222\/revisions"}],"predecessor-version":[{"id":229,"href":"https:\/\/sites.wp.odu.edu\/rbaduids493\/wp-json\/wp\/v2\/posts\/222\/revisions\/229"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/rbaduids493\/wp-json\/wp\/v2\/media?parent=222"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/rbaduids493\/wp-json\/wp\/v2\/categories?post=222"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/rbaduids493\/wp-json\/wp\/v2\/tags?post=222"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}