(555) 432-1000,
Montgomery Street, San Francisco, CA 94105
Professional Summary

SOC Analyst I-II, Entry-level Information Security Analyst, IT Security Analyst, Cyber Threat Analyst, Incident Responder Upcoming University of Maryland Global Campus offering a strong academic background in IT combined with excellent customer service experience as a concierge. To apply my education in Information Systems Security to a position in a successful company where I can begin to establish my career in this growing and vital field. Quickly learn and master new technology; equally successful in both team and self-directed settings; and proficient in a range of computer systems, languages, tools, and testing methodologies. Design, implement, and administer local-area and wide-area networks to satisfy organizational goals. Resolve IT system problems and meet the needs of end users by applying troubleshooting methodologies. Apply relevant policies and procedures to effectively secure and monitor IT systems. Communicate IT knowledge effectively using a wide range of presentation styles. Meet organizational goals using effective workforce skills, best practices, and ethical principles. Strong oral and written communication skills essential

  • Microsoft Hyper-V Server
  • Developing security plans
  • Wireshark software
  • Erecting firewalls
University of Maryland Global Campus Graduate School Largo, Expected in 04/2022 M.D. : Cybersecurity Technology - GPA :
  • Majored in [Subject]
University of Maryland Global Campus Largo, MD Expected in B.S : Computer Networks and Cybersecurity, Information, Technology minor - GPA :
Community College of Baltimore County Baltimore, MD Expected in AAS : Information Systems Security - GPA :
Le Groupe CETPA-CESTIA Abidjan Cote, Expected in Ivory Coast) : - GPA :
, Expected in BTS-Advanced : - GPA :
, Expected in Diploma : Technology - GPA :
CompTIA Security+, Certificate of Continuing Education (Vulnerability management)
Work History
Aac Asssociates Inc - IT Security Administrator I- SOC analyst
Bethesda, MD, 12/2019 - Current
  • Analyze data from multiple sources and sensors such as antivirus/antimalware scanners, firewalls, insider threat monitoring systems, intrusion detection/prevention systems, SIEMs, vulnerability scanners, web application scanners, and other tools.
  • Process logs from applications, auditing, network infrastructure devices, internet of things (IoT) devices, mobile communications devices, printers, servers, security appliances, and generalized logging collectors like syslog and Windows Event Logs.
  • Recommend and implement system enhancements that will improve the performance and reliability of the system including installing, upgrading/patching, monitoring, problem resolution, and configuration management in Windows Server 2012 R2.
  • Administer and maintain end user accounts, permissions, and access rights.
  • Perform server, storage, and security audits!.
  • Perform audits as directed by the Information Systems Security Manager (ISSM).
  • Ensure network (LAN/WAN, telecommunications, and voice security access and protect against unauthorized access, modification, or destruction.
  • Install, configure, and support local area networks (LAN), wide area networks (WAN), and Internet systems or a segment of a network system.
  • Monitor network to ensure network availability to all system users and perform necessary maintenance to support network availability.
  • Monitor and test network performance to ensure networks operate correctly and without interruption.
  • Plan, implement, upgrade, and monitor security measures for the protection of computer networks and information.
  • Assess the system vulnerabilities for security risks and propose and implement risk mitigation strategies.
  • Respond to reports of computer security breaches and viruses on networks.
Securitas - System Administrator
City, STATE, 10/2017 - 12/2019
  • Perform Banner Grabbing using Telnet, Netcap, Nmap and enable HTTP web Service on PC.
  • Install and configure WSUS, WSUS Server Certificates Security and GPO policy for WSUS, and create computer Groups for WSUS.
  • Compare Hashing Algorithms and Hash Values (Just basic cryptographic).
  • Install and configure Active Directory Certificate Services, Certificate Revocation Lists (CRLs), Certificate Auto Enrollment.
  • Manage certificate Templates and Key recovery, implement key archival and enroll for user certificate.
  • Configure Bit locker on Portable Media, implement Full disk encryption using it.
  • Manage security for removable media and hide documents in a graphics file.
  • Install NLB nodes and configure a new one.
  • Add a secondary Node to a NLB cluster and examine the working of a NLB cluster.
  • Configure and validate port rules for NLB cluster.
  • Configure Firewall Rules (from the command line interface) using Windows Firewall with Advanced Security, Remote Desktop.
  • Implement a Clientless SSL VPN and AnyConnect using the Cisco ASA device manager.
  • Configure Static and dynamic Port Security Configuration settings and Err-disable Recovery.
  • Install and configure an anti-spyware application using anti-virus programs.
  • Create an Endpoint Protection and configure alerts and updates.
  • Create and deploy antimalware policies for Endpoint Protection and provide it in a disk image.
  • Work with RDP and administer Windows with PowerShell remoting.
  • Configure standard and extended access lists for IPv4 and modify IPv6 access-lists.
  • Install Zenmap, Nmap, Hping3 to identify Live Systems or hosts in the Network.
  • Connect to Kali, upgrade OpenSSH, add Sudo User, regenerate SSH keys to avoid MITM attacks, and the SSH Port.
  • Install and test Snort, configure Iptables and re-test Snort.
  • Enable Name Resolution and prepare System Requirements for ADFS Server resource and accounts Partner.
  • Install, create, and configure ADFS trusts.
  • Configure Google Authenticator.
  • Install and configure Network Policy Server, Remote Access Server, and VPN Client.
  • View the NPS Logs.
  • Prepare a target Drive for Acquisition in Linux, delete NTFS Files, and use Sleuth kit and Autopsy.
Artemis Consulting, Inc - Pen Tester Intern
City, STATE, 04/2019 - 09/2019
  • Perform network vulnerability assessments and penetration testing as requested; testing may also include application assessments, threat analysis, wireless network assessments and social engineering.
  • Recognize and safely utilize vulnerability assessment tools as well as attacker tools, tactics and procedures.
  • Develop scripts, tools or methodologies to enhance the vulnerability assessment and penetration testing processes.
  • Experience with tools, including Nessus, Nmap, Zen map, Kali Linux, Airgeddon, Metasploit, Air crack–ng.
  • Knowledge of applications, database, and Web server design and implementation.
  • Knowledge of open security testing standards and projects.
Schmidt Baking Company - Minor, Driver
City, STATE, 04/2013 - 10/2017
  • Operate a computerized system to mix large volumes of dough at a controlled temperature for commercial bread production.
  • Weigh and mold bread.
  • Operate forklift to upload and download ingredients in the room and the warehouse.
  • Network, Firewall, PCAP, Unix, Linux, Windows, VMware, Window Server 2008| R2 & 2016, CISCO Server, Database ORACLE SQL SERVER, MS SQL Languages OOP, SQL, HTML, CSS, C++, XML, PL/SQL Software MS Office, VMware Horizon, Wireshark, Kali Linux, Parrot Systems OS, Burp Suite, Nessus, FireEye, Splunk, Virus Total, Panorama (Palo Alto), IP locator, SecureWorks, McAfee ePO.

By clicking Customize This Resume, you agree to our Terms of Use and Privacy Policy


Resumes, and other information uploaded or provided by the user, are considered User Content governed by our Terms & Conditions. As such, it is not owned by us, and it is the user who retains ownership over such content.

Resume Overview

School Attended

  • University of Maryland Global Campus Graduate School
  • University of Maryland Global Campus
  • Community College of Baltimore County
  • Le Groupe CETPA-CESTIA Abidjan

Job Titles Held:

  • IT Security Administrator I- SOC analyst
  • System Administrator
  • Pen Tester Intern
  • Minor, Driver


  • M.D.
  • B.S
  • AAS
  • Ivory Coast)
  • BTS-Advanced
  • Diploma

By clicking Customize This Resume, you agree to our Terms of Use and Privacy Policy

*As seen in: