Anthony Mencini
Details
Business Administration and Management, General
Kent State University
Network Support Specialist
Cisco Routing Switching
Cuyahoga Community College
Computer Application Integration Specialist
Computer Engineering
Lorain County Community College
Provide actionable recommendations to address identified vulnerabilities, collaborating with teams to prioritize and implement security patches or configuration changes.
Experienced in the design, configuration, and management of Azure Active Directory Single Sign-On (Azure AD SSO) for enterprise settings.
Implemented and maintained secure and streamlined user authentication processes using Azure AD SSO, simplifying access to multiple cloud-based applications.
Developed and executed strategies to integrate various software-as-a-service (SaaS) applications with Azure AD SSO, enhancing productivity and user experience.
Collaborated with cross-functional teams to assess business requirements and align Azure AD SSO configurations accordingly, ensuring smooth deployment and adoption.
Proficient in using Microsoft Defender to detect and mitigate email-based threats, including phishing, malware, and ransomware.
Conducted thorough investigations of suspicious emails, utilizing Microsoft Defender to analyze email headers, attachments, and embedded links to determine their legitimacy.
Proficient in end-to-end management of digital certificates, ensuring secure communication and data integrity across web applications, services, and networks.
Extensive experience in the provisioning, installation, renewal, and troubleshooting of SSL/TLS certificates to secure websites and data transmissions.
Stayed updated with the latest attack techniques, trends, and vulnerabilities, enabling proactive measures to protect against evolving threats.
2013 : Present
Cuyahoga Community College
Information Security Analyst
Implemented changes on Cisco Routers and Wireless Access Points using scripts to :
• Enable SSH
• Use Trivial File Transfer Protocol to update system firmware images
• Disable Radios
Server Audit
• Use Remote Desktop Software to verify and update or install :
• Simple Network Management Protocol Services
• Symantec Anti Virus client software from 11.x to 12.1
• Symantec Anti Virus Configuration
Domain Name System Audit
• Added routers to DNS server
• Added wireless access points to DNS server
Installation and configuration of Dell OpenManage Essentials
• Pushed firmware and driver updates
• Addressed critical issues on servers as required
• Added subnet ranges to scan for Dell servers
Google Fusion Heat Map
• Converted blocked list of IP addresses to latitude and longitude coordinates
• Used Google Fusion Tables to place latitude and longitude coordinates on a world map
• Map shows areas where potential network intrusions are originating
2013 : 2013
Dental One Partners
IT Intern
• Trained and supervised employees emphasizing sales performance, standards of store operations and delivering stellar customer service
• Resolved customer complaints to ensure satisfaction for all customers
• Fostered an environment of continuous learning with employees in order to promote customer satisfaction
2007 : 2012
RadioShack
Manager
• Handled guest and employee concerns calmly, efficiently and professionally to promote a positive, enjoyable experience
• Communicated with company executives during private events to ensure all expectations were met or exceeded
• Performed accounting tasks after every shift such as; balancing cash drawers verifying accuracy of bartenders and servers as well as prepared cash for daily bank deposit
2006 : 2011
Howl At The Moon
Manager
Skills
CCNA, Certificate Management, Cisco Certified, Cisco Routers, Cisco Technologies, CompTIA A+ Certification, Customer Service, Disaster Recovery, Email Security, Email Threat Hunting, Information Security Analysis, IT Security Assessments, Leadership, Microsoft Office, Network Administration, Networking, Routers, Sales, Security Patch Management, Servers, Single Sign-On (SSO), Software Installation, Subnetting, Threat & Vulnerability Management, Training, Troubleshooting, Two-factor Authentication, Windows 7, Wireless Networking
About
I'm an Information Security Analyst with a decade of experience, committed to safeguarding organizations from evolving cyber threats. My expertise spans a range of critical technologies, including:
Vulnerability Scan Management: I excel in proactively identifying weaknesses within systems and networks, allowing for strategic mitigation to fortify an organization's defenses. I've leveraged managed vulnerability software to continuously assess and address security weaknesses and mitigate security vulnerabilities.
Email Security: I've honed my abilities in safeguarding organizations against email-based threats, from phishing attacks to malware infiltration. My expertise extends to the identification, analysis, and swift quarantine of phishing emails to mitigate risks.
TLS, SSL, and Signing Certificate Management: I've played a vital role in certificate management, ensuring the secure, efficient and tracking expiration of various types of certificates .
URL Filtering: I'm adept at controlling and monitoring web access to reduce security risks, maintain compliance, and optimize network performance.
Microsoft Defender: I specialize in harnessing the full potential of Microsoft Defender to detect, respond to, and neutralize advanced threats across various endpoints.
Single Sign-On: I've mastered the art of simplifying access while enhancing security through implementing Single Sign-On solutions.
Next-Generation Firewall Management: I have a deep understanding of next-gen firewalls, utilizing them to protect networks from evolving threats and vulnerabilities and also troubleshooting inbound/outbound connection issues.
Two-Factor Authentication: I specialize in addressing user issues such as lost access to devices, guiding them through identity verification steps before making necessary changes, ensuring a seamless and secure Multi-factor Authentication process.
Documentation: I place a strong emphasis on meticulous documentation, ensuring that all security processes and incident responses are well-documented for compliance and future improvements, and knowledge sharing.
Beyond my technical skills, I am an advocate for diversity and inclusive, recognizing the importance of a varied and inclusive workforce in strengthening an organization's resilience against cyber threats. I bring a holistic approach to security, combining technical skills with a commitment to fostering an inclusive security culture.