Livecareer-Resume
Jessica Claire
  • , , 100 Montgomery St. 10th Floor
  • H: (555) 432-1000
  • C:
  • resumesample@example.com
  • Date of Birth:
  • India:
  • :
  • single:
Summary

Knowledgeable IT security professional with 20+ years of experience designing and implementing security solutions in high-availability environments. Skilled in IAM and THREAT AND RESPONSE and adept at delivering strong risk management practices.

Skills
  • Tenable Nessus
  • Encryption
  • Managing security breaches
  • Monitoring computer viruses
  • Problem resolution
  • Risk mitigation
  • Organization
  • Team building
  • Websense Data Loss Prevention
Experience
Information Security Specialist, 03/2017 - Current
Department Of Defense Hickam Air Force Base, HI,
  • Monitored systems for indications of threats, security breaches or intrusions.
  • Investigated information security breaches to identify vulnerabilities and evaluate damage.
  • Implemented software tools to assist in threat detection, prevention and analysis.
  • Directed vulnerability assessments or analysis of information security systems.
  • Provided technical support related to security product installation and use.
  • Conducted penetration tests to uncover security system weaknesses.
  • Safeguarded data through installation of firewalls and data encryption programs.
  • Evaluated performance indicators to assess security control quality.
  • Directed risk assessment operations and system test execution.
  • Worked successfully with diverse group of coworkers to accomplish goals and address issues related to our products and services.
  • Worked closely with team members to deliver project requirements, develop solutions and meet deadlines.
  • Prioritized and organized tasks to efficiently accomplish service goals.
  • Juggled multiple projects and tasks to ensure high quality and timely delivery.
  • Demonstrated self-reliance by meeting and exceeding workflow needs.
  • Demonstrated leadership by making improvements to work processes and helping to train others.
  • Provided excellent service and attention to customers when face-to-face or through phone conversations.
  • Improved operations by working with team members and customers to find workable solutions.
  • Motivated and encouraged team members to communicate more openly and constructively with each other.
  • Exceeded customer satisfaction by finding creative solutions to problems.
  • Protected secure data files and regulated access.
  • Made recommendations to improve security procedures and systems.
  • Managed [Software] information system accounts, facilitating transfer of data to users.
  • Researched and designed advanced computer forensic tools.
  • Partnered with legal staff, [Job title]'s office and other law enforcement agencies to optimize favorable outcomes.
  • Updated network systems to support confidential company operations and eliminate hacking.
  • Successfully processed hundreds of cyber tips, receiving information and initiating investigation for speedy resolution.
  • Analyzed system risk to identify and implement appropriate security countermeasures.
  • Audited networks and security systems to identify vulnerabilities.
  • Analyzed security procedure violations and developed plans to prevent recurrence.
  • Designed, implemented and maintained security systems and controls.
  • Updated virus protection systems based on computer virus reports.
  • Designed and implemented plans to secure computer files against breach, destruction or accidental modification.
  • Conducted record searches and coordinated with other units on procedural problems involving complex cases.
Technical Support Specialist III, 05/2015 - 03/2017
F5, Inc Cincinnati, OH,
  • Communicated with customers to identify issues, walk through solutions and initiate corrective actions to restore service and functionality.
  • Received inbound phone calls from customers to provide first-level support and remotely troubleshoot issues with service, equipment or customer accounts.
  • Documented and updated case notes for each customer and work order.
  • Maintained compliance with established and updated policies and procedures with minimal supervision.
  • Consulted via telephone to understand user problems, run through testing scripts and ask probing questions to locate root causes.
  • Monitored service orders to completion and closed service tickets.
  • Documented repair processes and helped streamline procedures for future technical support actions.
  • Set up new desktop systems and configured laptops for incoming employees and loaded required software and server permissions.
  • Disassembled computer systems to troubleshoot and resolve hardware issues.
  • Removed malware and viruses from laptops and desktop systems using specialized software.
  • Updated and processed programming changes, equipment upgrades and customer and billing information.
  • Reviewed current hardware and software configurations and recommended modifications to increase system speed.
  • Collaborated with support team to assist client stakeholders with emergent technical issues and develop effective solutions.
  • Cultivated client relations and drove retention by effectively authoring and updating technical documentation and manuals.
  • Observed system functioning and entered commands to test different areas of operations.
  • Consulted with clients on installed machine security applications and devices to recommend further safety measurements.
  • Conferred with vendors to obtain replacement hardware or software and escalate more complex concerns.
  • Installed software updates and vulnerability patches on servers to prevent possible threats from penetrating networks.
  • Assessed [Type] and [Type] issues to determine appropriate troubleshooting methods for remediation.
Network Technician, 03/2011 - 06/2014
Horizon Connects Indianapolis, IN,
  • Analyzed network issues, developing fixes and troubleshooting problems to maintain organizational effectiveness.
  • Troubleshot problems related to [Type] network infrastructure and performance.
  • Installed and managed connected hardware and application components to assure nonstop environment operations.
  • Verified proper working order of hardware and peripherals.
  • Established and maintained network systems using networking principles.
  • Collaborated with [Job title] to support and maintain network components, monitor system traffic and manage connectivity services.
  • Maintained software implementations to meet regulatory and organizational guidelines.
  • Reviewed specifications and installation diagrams to establish interfaces and integrations.
  • Configured [Type] series routers for [Type] networks and internet access.
  • Designed and updated firewalls, networks, infrastructures and network scanning.
  • Oversaw network administration, system access and vulnerability assessment to protect secured data.
  • Configured and managed [Type] routers, [Type] security appliances and [Type] switches.
  • Inspected temperature sensors visually to maintain health of servers and network devices.
  • Researched and administered system patch updates to maintain security and performance thresholds.
  • Managed [Number] desktops in Windows domain with several servers for multiple applications and deployed firewalls to connect and protect users.
  • Improved vendor network troubleshooting by coding system throughout company using different colors for each purpose.
  • Installed wiring, cabling and devices to establish, repair and improve network operations.
  • Installed and repaired network cables, including fiber optic cables, Ethernet cables and other networking cabling and conduits.
  • Configured hardware devices and software settings to optimize network performance.
  • Trained team members and users in newly implemented and emerging technology to enhance business productivity.
  • Evaluated local area network (LAN) and wide area network (WAN) performance data to verify availability and speed, identifying network problems.
  • Received and prioritized support requests to maximize resource utilization.
  • Updated and reconfigured existing and new computers with current software and operating systems.
  • Created and updated technical documentation for network installations and changes to existing installations.
  • Imaged OS and software deployments throughout system and addressed implementation concerns.
  • Documented all facets of technology department operations, including network infrastructure, licenses and FAQs, facilitating consistent responses and team operations.
Education and Training
Bachelor of Science: Computer Science, Expected in 10/1991
-
UNIVERSITY oF SAN JOSE-RECOLETOS - CEBU CITY, PH,
GPA:
Languages
English :
Full Professional:
Negotiated :
:
Accomplishments
  • Recommended new security software to management to improve ONBOARDING of employees.
  • Trained management teams on best practices for reducing the risk of security attacks.
  • Educated end users on relevant cybersecurity protocol to minimize security breaches.
  • Compiled daily database reports to identify possible vulnerabilities and implement corrective actions.
  • Investigated security breaches and implemented solutions to minimize risk of recurrence.
  • Revised security manuals to mitigate security threats.
  • Consistently maintained high customer satisfaction ratings.
  • Negotiated with vendors, saving the company $$$$ annually.
  • Created highly effective new Program that significantly impacted efficiency and improved operations.
  • Designed, implemented and maintained security procedures to achieve Result.
Websites, Portfolios, Profiles
  • https://www.nexxt.com/p/carlisit
Certifications
  • Certified Imprivata OneSign Engineer, Imprivata - 2017
  • Certified MECPA-ManageEngine Certified Product Associate, ManageEngine - June 5, 2019
  • Cybersecurity & Hybrid Identity Management Seminar - Manage Engine - June 5 2019
  • Security Center: Secuirty and Analysis - Tenable - April 2019
  • CCNA BOOT CAMP - IRONLINK COMPUTER LEARNING CENTER - OCT 2014
  • Unified IP System Management Essentials - ASPECT - MAR 2012

By clicking Customize This Resume, you agree to our Terms of Use and Privacy Policy

Disclaimer

Resumes, and other information uploaded or provided by the user, are considered User Content governed by our Terms & Conditions. As such, it is not owned by us, and it is the user who retains ownership over such content.

How this resume score
could be improved?

Many factors go into creating a strong resume. Here are a few tweaks that could improve the score of this resume:

87Good

resume Strength

  • Formatting
  • Length
  • Typos

Resume Overview

School Attended

  • UNIVERSITY oF SAN JOSE-RECOLETOS

Job Titles Held:

  • Information Security Specialist
  • Technical Support Specialist III
  • Network Technician

Degrees

  • Bachelor of Science

By clicking Customize This Resume, you agree to our Terms of Use and Privacy Policy

*As seen in: