Richard J. Smith
Details
Criminology, Concentration in Computing / Statistics
Penn State University
2001 : 2005
Highlights :
• Identify vulnerabilities, define threat landscape, and mitigate potential breaches through internal and external pen testing across networks and applications.
• Formulate and roll out comprehensive weakness mitigation strategies leveraging advanced technical expertise and the latest technologies.
• Remain at the forefront of potential security concerns by monitoring security consoles and dashboards, as well as discussion lists and websites.
2021 : Present
University of Scranton
Information Security Analyst
Planned and conducted remote IT support and network management by partnering with customers and onsite field technicians to direct planned project installations, as well as resolve unplanned technical concerns.
Highlights :
• Heightened cybersecurity for a wide range of clients by driving in-depth vulnerability and risk assessments with current methodologies and technology.
• Engaged with clients to communicate possible network vulnerabilities, define solutions to eliminate threats, and ensure compliance with PCI / HIPPA.
• Boosted system efficiency by continuously monitoring network and remotely using various tools to swiftly identify and resolve issues.
2019 : 2021
SK Tech Group
Network Administrator
In this role, I drove the end-to-end management, maintenance, and testing of a dedicated IP video surveillance system, including video viewer configurations, system administration access levels, and alarm monitoring ingress and egress features.
Highlights :
• Capitalized on various testing techniques to maximize safety and security across Wilkes-Barre Direct Operations Center, a Level 4 Federal Facility under Homeland Security.
• Governed and improved security and surveillance systems with optimal efficiency and attention to detail.
• Defined, prevented, and reported on threats to the President and government employees with regard to Secret Service and Federal Protective Services.
• Eliminated threats and resolved security issues by leading hands-on high-level help-desk support.
2006 : 2019
AmeriGuard Services, Inc. | Southeastern Paragon Systems | Southeastern Paragon Systems
Contracted Officer Federal Protective Services
Skills
Active Directory, Burp Suite, CCNA, CEH, Cisco IOS, Cloud Resources, Customer Service Management, Ethical Hacker, Exploit, Hashcat, Kali Linux, Linux, Metasploit, Network Administration, Network Management, Network Security, Network Troubleshooting, Nmap, OSCP, OWASP, Penetration Testing, Python (Programming Language), Red Team, Security Controls Assessments, Social Engineering, Tenable Nessus, Virtualization, Vulnerability, Vulnerability Scanning, Windows, Windows Server, Wireshark
About
Throughout my career, I have forged a reputation as a solutions-oriented professional who is skilled at elevating technical security and system resilience by identifying and addressing threats through penetration testing and vulnerability assessments. I am adept at planning and heading security operations against system exploitation attempts on networks, servers, web applications, and cloud systems.
Self-driven and industry-savvy, I am forward-thinker who is able to collaborate cross-functionally across all organizational levels to surpass goals, while managing workload in a remote working environment
My passion lies in innovating security and mitigating network risks by defining the threat landscape, identifying vulnerabilities, compiling pen testing reports, and spearheading hard-hitting mitigation strategies for customer networks, servers, web applications, and cloud systems.
With a focus on heightening client satisfaction and retention, I possess the demonstrated ability to build rapport with industry-diverse clients to advise on mitigation recommendations and gain buy-in. I am trained in forging superior customer relationships and offering extensive support to meet and surpass expectations.
Furthermore, I remain ahead of current and emerging malicious code threats and possible attack vectors through consistent research and training.
Connect with me today to find out how I’ll make your mission my mission, strengthen your IT security, and advance your business objectives.
Please feel free to contact me at richardjsmith9582@gmail.com with any thoughts, comments, or questions about my work.