I am a results-driven Cyber Security professional with extensive expertise in technical infrastructure and advanced troubleshooting techniques. Adept at managing security incidents and resolving complex issues to enhance enterprise-wide security frameworks.
- Exceptional communicator with strong oral, written, and interpersonal skills.
- Proficient in data analysis, including collection, extraction, synthesis, and summarization, with a proven ability to perform root cause analysis and implement scalable solutions.
- Demonstrated aptitude for quickly assessing challenges, leveraging data and innovative methods to develop effective, long-term solutions for clients and customers.
- Experienced in building and maintaining strategic relationships through collaborative engagement with executive leadership, operations management, peers, and clients.
To leverage my extensive expertise in cyber security, technical infrastructure, and advanced troubleshooting to enhance enterprise-wide security frameworks. I aim to contribute to a forward-thinking organization by applying my strong analytical skills, innovative problem-solving abilities, and exceptional communication to drive effective solutions and foster strategic relationships with clients and stakeholders.
Skill | Associated Project / Experience |
---|---|
SIEM Implementation and Log Analysis | Guardsight, Inc |
Network Traffic Monitoring and Attack Detection | Guardsight, Inc |
Incident Response Planning and Execution | Guardsight, Inc |
Case Management with JitBit | Guardsight, Inc |
Scripting and Automation for Threat Mitigation | Guardsight, Inc |
Python scripting / Automation | Script Road |
Solis Security -- 2024-Present
Guardsight, Inc -- 2023-2024
- Develop and implement cybersecurity strategies, policies, and procedures to protect organizational assets.
- Conduct vulnerability assessments, penetration testing, and manage security controls (firewalls, IDS, data encryption).
- Monitor and analyze network/system logs for suspicious activities, ensuring proactive threat detection and response.
- Respond to and investigate security incidents, providing detailed reports and coordinating with external stakeholders and law enforcement as needed.
- Perform forensically sound artifact collection and document network defense incidents from detection through resolution.
- Analyze and correlate log files from various sources (host, proxy, network traffic, firewall, IDS) to identify and mitigate threats.
- Stay updated on emerging cyber threats and technologies; conduct security awareness training to promote a security-conscious culture.
- Ensure compliance with industry standards and regulations; contribute to disaster recovery and business continuity planning.
- Collaborate with automation teams to streamline ticketing systems, achieving over a 75% reduction in response time and enhancing operational efficiency.
T-Mobile -- 2018-2022
- Provided technical support and customer service for mobile devices (Android & iOS) and technology equipment, including troubleshooting, protocol analysis, and on-site support.
- Diagnosed and resolved hardware/software issues, managed device activations, and performed maintenance on laptops, desktops, and peripherals.
- Installed, configured, and documented technology equipment; ensured system compatibility and logged events in the ticketing system.
- Executed hard drive encryption, decryption, recovery, and administration; managed user accounts and device configurations.
- Conducted quality reviews of tickets and security engagements; coordinated with internal and external teams to resolve security incidents.
Freelance -- 2014-2019
- Researched and negotiated with vendors for software and hardware purchases to ensure successful network project completion.
- Led the deployment and integration of software applications across LANs, supporting information processing and security needs for various organizations.
- Provided expertise on IT security policies and compliance; trained end-users on best practices and security trends.
- Installed, configured, and optimized hardware/software; offered remote assistance using desktop technologies.
- Guided users through new equipment setup and real-time troubleshooting.
- Managed service desk calls and emails, ensuring prompt and effective resolution of end-user issues.
Master of Computer Science - Cyber Security and Software Engineering
University of Texas at San Antonio
Bachelor of Arts - Applied Mathematics and Computer Science
University of Connecticut - Storrs
- Automation (Desktop / Downloads Cleaner)
- Web Scraper (Food Prices) (Beautiful Soup, Selenium)
- Web Development (Budget Tracking) (Django, Flask) (ThemeForest)
- AI (Recommendation System) (surpr!se scikit)
- Clone App (Flutter)