Natashia Turner, M.A.
Details
b. Learned the fundamentals of cybersecurity in order to apply this knowledge as a cybersecurity professional in various IT roles.
c. Gained knowledge of security fundamentals such as Network security architecture concepts - CIA triad, defense in depth; Network monitoring - IoC, Pen testing concepts, ports, and protocols; Types of attacks - network, application, social engineering, malware and types of attackers; Security controls – physical, hardware, authentication, PKI, access and administrative; Encryption – algorithms, use of, protecting data; Risk – types, vulnerabilities, assessments, preparedness, response; Wireless – standards, encryption and authentication, technologies, infrastructure, and types of attacks; and Mobile – types of devices, deployment models, monitoring, and defense against attacks. learned and used fundamental security principles to install and configure cybersecurity controls and participate in incident response and risk mitigation.
2022 : Present
ACI Learning
Information Security Analyst Intern
• Completed 8 week, full-time, classroom-based skills development and training program on IT fundamentals, AWS Cloud, and professional skills.
• Built IT fundamental skills, including : working knowledge of Linux OS, SaaS, PaaS, IaaS, writing scripts in Python and Shell.
• Learned how to apply core AWS services in the area of compute, storage and networking, including EC2, S3, IAM, VPC, Lamda, Cloud Formation, RDS and Route 53.
• Demonstrated strong verbal and written communication skills, including the ability to explain technical information and terminology to non-technical end users.
• Learned how to configure, monitor, and support the suite of core AWS Services.
2022 : 2022
Amazon Web Services (AWS)
AWS re/Start Intern
• Organized, led, and taught weekly and monthly workshops, seminars, and briefings to federal agencies and British employers.
• Developed, taught, and participated in the facilitation of leadership development and training in preparation for Unit Readiness.
• Trained employees and senior-level management on expanding opportunities, regulations, and guidelines for military personnel.
• Co-led meetings for the enterprise networking with other training leaders and team members in the organization.
• Managed Change Management process for training including client, compliance, and internal needs paying attention to quality of delivery vs stated requirements and timeliness of delivery.
• Provided professional development, training, direction, and documentation to all trainers and leaders, and established performance measurements for the team.
2006 : 2014
US Army
Human Resources Manager/Training Manager
• Developed and executed Human Resources (HR) strategies in support of the overall business plan and strategic direction of the organization, specifically in the areas of succession planning, talent management, change management, organizational and performance management, training and development, and compensation.
• Initiated, directed, and coordinated HR projects for the organization and gathered input from employees and management.
• Planned, coordinated, and executed projects across the organization including tracking and reporting on status, risks, issues, and dependencies.
• Coordinated internal resources and third parties/vendors for the flawless execution of projects.
• Ensured that all projects are delivered on-time, within scope and within budget.
• Developed project scopes and objectives, involving all relevant stakeholders and ensuring technical feasibility.
• Managed and developed other HR generalists to administer, oversee, and/or partner with other HR functions to support the assigned business areas on all employee relations, leave administration, promotions, special projects, payroll, compensation, benefits, talent acquisition, performance management, organizational development, and other HR issues.
2006 : 2011
National Security Agency
Human Resources Manager/Senior Program Manager
• Examined checks for endorsements and to verify other information such as dates, bank names, identification of the persons receiving payments and the legality of the documents.
• Serviced and maintained ATM, safe deposit area, and vault and night drops.
• Received and maintained checks, coins, and cash for deposit verified authenticity, amounts, and accuracy of deposit slips, checks, and cash for both bank and customer protection.
• Balanced currency, coin, and checks in cash drawers, and calculated daily transactions using computers, calculators, and adding machines to prepare them for deposit or shipment to branch banks or the Federal Reserve Bank.
• Received and counted daily inventories of cash, drafts, and travelers' checks. Sorted and filed deposit slips and checks.
2005 : 2006
Alliance Bank
Bank Teller
About
Dynamic multi-certified professional with superior technical and analytical acumen demonstrated through a progressive career in the industry. Bringing forth leadership, drive, passion, and talent for aligning security architecture, plans, controls, processes, policies and procedures with security standards and operational goals. Technical expertise in cyber security, risk analysis, incident management, and project management with honed skills in Computer Sciences. Highly proficient in developing processes that facilitate continual progress and objective achievement. Strong team leader capable of driving teams and delivering projects on time and under budget by effectively collaborating, facilitating, leading, and coaching. Capable of driving project awareness, applying expert judgment to remove impediments, keeping teams focused, and delivering success in rapidly evolving and dynamic environments.
TECHNICAL EXPERTISE
Incident Management Process, Penetration Testing, Footprinting Identification, Footprinting Tools, and Countermeasures Implement Network Scanning Techniques and Countermeasures Application of Enumeration Techniques and Countermeasures System Hacking Methodology, Steganalysis, Attacks and Covering Tracks, Trojan Analysis, and Trojan Countermeasures Identify Viruses, Virus Analysis, Computer Worms, and Malware Application of Packet Sniffing Techniques and How to Defend Against Sniffing Identify Social Engineering Techniques, Theft, and Countermeasures Application of DoS/DDoS Attack Techniques, Botnets, Tools and Countermeasures Skills: Computer Hacking, Cybersecurity, DDos, Ethical Hacking, Information Security, Intrusion Detection, Penetration Testing, Social Engineering
CORE COMPETENCIES
• Effective leadership and analytical skills with strong project management abilities
• Monitor & measure project performance using appropriate tools and techniques
• Ability to support/model appropriate agile practices to improve team performance
• Sound expertise troubleshooting network issues and analyzing security protocols
• Extremely tech savvy with the ability to learn new skills, latest software and apps
• Maintain team focus by removing roadblocks and managing cross-team dependencies
• Adept at removing impediments to the ability of the team to deliver the project goals
• Excellent communication skills with the ability to communicate with peers/leadership
• Skilled in mediation, problem-solving, and conflict management for smooth workflow
• Solid time management and organization skills with the ability to prioritize and multi-task