You're about to read the resume of an individual that is intentionally showing you how easy it is to sneak in like a trojan, gain access to your data, and be gone without a trace. Cyber crimes happen every 3-5 seconds, around the clock, and the individuals behind these attacks will not stop until they gain access to your world. This is where my robust skills come into play. I work relentlessly to identify any possible vulnerabilities that may lead to an attack on your years of data and hard work. Hackers may try to invade blindly, but knowing the intent behind the invasion is what sets this individual apart from your average cyber security applicant.
My years of working in many different areas of IT, the several occasions I was able to follow a hacker in the process of trying to gain access to a companies' data, and my personal drive to protect a company from these silent invasions.
Dedicated, driven, team player, dependable on many levels makes this individual a perfect fit for a Cyber security position. Working from the bottom up to the top is accomplished through hands on experience, patience, hard work and an understanding of what path was taken to achieve the end results is what groundwork i have laid and continue to build on.
Do you want Someone you can count on and trust with your most vulnerable systems and data? Then, read on to see a glimpse of what i bring to any companies table. From being a Systems Administrator to Desktop Support to now graduating in several months with a degree in cyber security, this well rounded individual has what it takes to be a cut above the rest.
|
|
Obtained Academic Achievement award
Resumes, and other information uploaded or provided by the user, are considered User Content governed by our Terms & Conditions. As such, it is not owned by us, and it is the user who retains ownership over such content.
Many factors go into creating a strong resume. Here are a few tweaks that could improve the score of this resume:
School Attended
Job Titles Held:
Degrees