0% found this document useful (0 votes)
21 views2 pages

Example Resume Security Specialist 5

Uploaded by

md sakib nazmus
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views2 pages

Example Resume Security Specialist 5

Uploaded by

md sakib nazmus
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

John Smith, Cyber Security Specialist

1515 Pacific Ave, Los Angeles, CA 90291, United States, 3056478349, [email protected]

Place of birth San Antonio Driving license Full

PROFILE Organized and an excellent communicator with a bachelor’s degree in Cybersecurity. Looking to obtain a
Security Analyst – Cybersecurity Operations position to apply a deep understanding of Networking, attack vectors,
Cybersecurity, and OS’s. Coming with six years of cybersecurity experience.

E M P L OY M E N T H I S TO RY

Jan 2018 — Jan 2021 Cyber Security Specialist, G4S Nouna

Responsible for evaluating architectural designs and implement security-focused tools and services such as firewalls,
intrusion detection & prevention systems and to define secure build standards across Windows, Unix, and other
common operating systems to ensure proper security oversight pertaining to systems and online platforms.
• Monitored organizational networks for security breaches and investigated any violations.
• Prepared reports which documented security breaches and the extent of damage caused by breaches.
• Conducted penetration testing and located vulnerabilities within systems before they could be exploited.
• Conduct security risk assessments on both new and current CIB applications and infrastructure and utilize
the appropriate security diagnostic tools.

Jan 2016 — Dec 2018 Cyber Security Specialist, Investec Colorado Springs

Tasked with different testing tools and required to use different design techniques (e.g., OO. Top-down, structured
analysis, component-based design), and tools to ensure proper oversight of any potential internal and external
cybersecurity risks that may compromise the organization.
• Listened to client concerns to determine the best method of defending WordPress sites from attack.
• Scanned sites for malware and security risks regularly.
• Quarantined and removed any security issues found.
• Design and deploy Enterprise Security technologies and solutions, e.g., Firewalls, IDS/IPS, SIEM, malware
detection and analytics, and vulnerability scanning.
• Evaluate architectural designs and implement security-focused tools and services such as firewalls,
intrusion detection & prevention systems.

E D U C AT I O N

Jan 2021 — Present Master’s Degree Majoring in Cybersecurity (Cyber Operations Albany
Concentration) , Excelsior College
• Expected Graduation: 2024
• Relevant Coursework: Computer Forensics, Cryptography, Risk Management, Web Architecture,
Security Defense Countermeasures, Cyberattacks and Defenses, , Access Control and Intrusion Detection
Technology

Jan 2021 — Jan 2021 Bachelor of Science in Cyber Forensics and Information Security , Amberg
Cornell University. Brooklyn

SKILLS Vulnerability Management Expert Cyber Security Expert

PHP Expert CSS Expert

Penetration Testing Expert Cryptography Expert

Python Expert

INTERNSHIPS

Jan 2014 — Jul 2016 Intern, Allan Gray Cape Town

• Tasked with different testing tools.


• Required to use different design techniques (e.g., OO. Top-down, structured analysis, component-based
design), and tools.
• Monitor desktop and email security.
• Design and deploy Enterprise Security technologies and solutions, e.g., Firewalls, IDS/IPS, SIEM, malware
detection and analytics, and vulnerability scanning.
• RBC HR philosophy, principles, direction, policies, and guidelines

L A N G UAG E S Englis Native speaker Mandarin Native speaker

HOBBIES Golf, Cycling, Running

You might also like