Blonnie J.
Details
● Collaborate with the security operations team to ensure that security logs are properly analyzed, and potential security incidents are identified and mitigated.
● Conduct security awareness training for employees to help them identify and report potential security threats.
● Conduct vulnerability scans using Nessus, Qualys, and OpenVAS regularly to identify vulnerabilities in the network and systems.
● Analyze and prioritize vulnerabilities based on their risk levels and collaborate with the IT team to remediate them promptly.
● Conduct penetration testing using Metasploit and Nmap to identify potential security threats and recommend remedial actions to mitigate them.
● Investigate and resolve incidents of unauthorized access to sensitive information.
● Administer and monitor firewalls, intrusion detection systems, and anti-virus software to detect risks.
● Develop, test, and implement security policies, plans, and procedures for organizational protection.
2020 : Present
Top Group Technologies
Vulnerability Management / Cybersecurity Analyst
About
💻 🔐🌩️ Experienced Technical Cybersecurity Analyst with 5+ years in IT and Cybersecurity. Proficient in Systems Security, Vulnerability Threats, Risk Management, and Compliance. Specializing in network systems security testing, vulnerability assessments, and threat detection for private corporations. Skilled in network monitoring, software exploitation, and innovative risk mitigation, maintaining intrusion containment. Adept in Risk Management Framework, FIPS, FISMA, and NIST compliance. Committed to real-world simulation testing for safeguarding security networks. Manage projects involving security research, assessments, analysis, mitigation, monitoring, compliance, and governance, enhancing cybersecurity.
💻 🔐 Technical Expertise:
Cybersecurity Analysis| Information Security | Systems Security | Security Compliance | Security Testing Security Planning| Security Breaches | Security Authorization Packages | IT Security | Network Security Network Vulnerability Scanning | Data Security | Cloud Security | Data Encryption | Incident Response Intrusion Detection Malware Analysis | Risk Analysis | Risk Assessments | Risk Management | Risk Control & Mitigation | Security Life Cycle Systems Development Life Cycle Threat Vulnerability Assessments | Threat Reports Contingency Planning | Technical Project Management Program Management | Federal & State Legal Security Policies
💻 Technical Skills:
Microsoft 365 | Excel | Power Point | Teams | Amazon Web Services | Nessus | Wireshark | App Scan
Tenable | Neap | Nmap | Snort |Metasploit | Sharepoint| Visual Studio |Oracle Cloud