Cyber Security Professional with strong foundation in safeguarding digital assets and mitigating risks. Proven ability to develop and implement security protocols to protect sensitive information. Demonstrated expertise in threat analysis and vulnerability assessment. Been in the field of Software and Cyber Security for many years. Mostly self taught until I realized I wanted to pursue this field more in depth that's why I obtained a degree from Cal State University of Long Beach.
Overview
11
11
years of professional experience
1
1
Certification
Work History
Cyber Security Specialist
Law Offices of Helena Sunny, Esq.
09.2020 - Current
Maintained up-to-date knowledge of emerging threats, providing proactive solutions for potential vulnerabilities.
Reduced cyber risks by conducting regular vulnerability assessments and penetration tests.
Enhanced network security by implementing advanced threat detection and prevention tools.
Implemented multi-factor authentication methods to enhance user access controls, reducing unauthorized system access incidents.
Managed patch management procedures effectively, ensuring timely updates to mitigate vulnerabilities in the organization''s systems.
Designed effective business continuity plans that ensured minimal downtime during security incidents or disasters.
Optimized security infrastructure by evaluating, recommending, and implementing appropriate hardware and software upgrades.
Reviewed firewall configurations regularly to ensure optimal perimeter defense against external threats.
Increased employee awareness on cybersecurity best practices through comprehensive training programs.
Created strong encryption protocols for data protection, safeguarding sensitive information from potential breaches.
Conducted thorough digital forensics investigations to identify root causes of security incidents and prevent future occurrences.
Monitored confidential company data and mitigated hacking through network systems updates.
Conducted security audits to identify vulnerabilities.
Performed risk analyses to identify appropriate security countermeasures.
Recommend improvements in security systems and procedures.
Encrypted data and erected firewalls to protect confidential information.
Installed DMZ zones within the company to mitigate any threat actors against the companies data.
Installed Honeypots within the company to mitigate risk.
Software Engineer / Cyber Security Specialist
Marlo
03.2017 - 08.2020
Consistently met project deadlines by effectively managing time and prioritizing tasks according to importance.
Analyzed proposed technical solutions based on customer requirements.
Developed scalable and maintainable code, ensuring long-term stability of the software.
Developed robust, scalable, modular and API-centric infrastructures.
Reduced system downtime by proactively addressing potential issues through regular maintenance activities.
Enhanced system security by implementing robust encryption algorithms, safeguarding sensitive data from potential threats.
Built databases and table structures for web applications.
Corrected, modified and upgraded software to improve performance.
Inspected equipment, assessed functionality, and optimized controls.
Reduced cyber risks by conducting regular vulnerability assessments and penetration tests.
Enhanced network security by implementing advanced threat detection and prevention tools.
Implemented multi-factor authentication methods to enhance user access controls, reducing unauthorized system access incidents.
Managed patch management procedures effectively, ensuring timely updates to mitigate vulnerabilities in the organization's systems.
Conducted security audits to identify vulnerabilities.
Encrypted data and installed firewalls to protect confidential data of my private clientele.
Computer Researcher
Harry Escoto & Associates, Inc.
01.2014 - 02.2017
Generated background checks and compiled all data research for private Liability Insurance Investigations
Data Entry of all personal and confidential information
Performed a variety of services, including liaison between all Investigators and Insurance Companies to find evidence of fraud
Reviewed insurance policy claims and collected evidence to determine the claim is valid
Dealt directly with the Insurance Investigators in all capacities, maintained all appointments and scheduled all investigative reports on a daily basis
Created online strategies to develop and expand explicit detailed reports to enhance the productivity and access to important detailed information for efficiency to our Private Investigators
Built programs to detect fraud.
Education
Cyber Security Professional Certification/HackerU - Cyber Security
Cal State University of Long Beach
1250 Bellflower Blvd, Long Beach, CA, 90840
12-2024
Skills
Java
Penetration Testing
Terraform
ISO Standards
HTML
SQL
Microsoft Azure
Amazon web services (AWS)
Python
Linux
Powershell
C
Incident response
Cyber Threat Hunting (CTH)
SIEM Tools (Elastic, Splunk)
Endpoint Detection Response (EDR)
Identity and Access Management (IAM)
Various Shells
Software vulnerability scanning
Zero trust architecture
Patch management
Ethical hacking techniques
Wireshark software
Certification
TDX - Incident Response
Hacker U - Cyber Security Professional Certification
CompTIA Sec+ (In progress)
CISSP (In Progress)
Interests
Hiking
Gym
Mountain Biking
Reading
Tech enthusiast, passionate about exploring the latest advancements and innovations
Blockchain Technology and Cryptocurrency
Getting involved in local advocacy groups to promote positive change in the community
Timeline
Cyber Security Specialist
Law Offices of Helena Sunny, Esq.
09.2020 - Current
Software Engineer / Cyber Security Specialist
Marlo
03.2017 - 08.2020
Computer Researcher
Harry Escoto & Associates, Inc.
01.2014 - 02.2017
Cyber Security Professional Certification/HackerU - Cyber Security
Cal State University of Long Beach
Similar Profiles
Marco InsuastiMarco Insuasti
Translator and Interpreter at Law offices of Nikki Lamay, EsqTranslator and Interpreter at Law offices of Nikki Lamay, Esq