• Extensive knowledge of all common business-related IT functions
• Able to identify potential online security risks
• Adept at preparing detailed training procedures
• Solid understanding of various security software applications
• Strong work ethic that includes solid attendance record and frequent overtime
• Excellent internal and external communications skills
• Developed and implemented online security procedures.
• Worked with management to update security manuals and address current concerns.
• Updated security software to prevent database security threats.
• Implemented system recovery procedures to minimize losses should an attack occur.
• Reviewed system access data and monitored database access.
• Updated cyber security protocol and developed effective training procedures.
• Educated management on how to prevent or minimize cyber security attacks.
• Compiled daily database reports to identify possible vulnerabilities.
• Ensured compliance with internal and external email safety standards.
• Recommended software updates.
• Prepared daily weekly and monthly database security reports.
• Discussed cyber security efforts with management.
• Performed comprehensive investigations of cyber security breaches.
• Purchased new security software and made update recommendations.
Companies Worked For:
Job Titles Held: