Experience & qualifications
CompTIA Security+
A globally recognized certification, developed and maintained by IT experts that evaluates the candidates knowledge of a range of security topics. The exam includes questions pertaining to a variety of fields including: network security, compliance and operational security, threats and vulnerabilities, application, data and host security, access control and identity management, and cryptography. |
skillsLanguages - Java, PHP, SQL, HTML
Operating Systems - Windows, Linux Applications - Slack, Triton AP-Endpoint, NNT Change Tracker, McAfee, Logmein Rescue, Lansweeper, Yammer, ServiceNow, Netbeans, FTK, Wireshark, Notepad++, Carbon Black, SQL 2014 Server Management Studio, Visio 2016, Analyst Notebook, SPSS, Kali Linux, and more |
Featured Curriculum & Internship
IST 456 - Information Security Management Currently enrolled Spring 2019
IST 440W - Information Science and Technology Integration and Problem Solving (Capstone Project) Currently enrolled Spring 2019 IST 495 - Internship - TMNAS Security Operations Team Over the summer of 2018 I got the opportunity to work as a security operation intern in Bala Cynwood, PA. I spent two an half months working with professionals in the company on various tasks and projects. The major project I was a part of got to take a minor lead on was the implementation of a new FIM agent (File Integrity Monitoring). I was able to communicate with the vendor to fix problems, design the specific file paths of the FIM agent to the unique applications that were to be monitored, and communicate with other IT teams and service owners to help move the project along. I also performed various daily tasks and tickets from ServiceNow and really got to grow my professional experience in the work place. I would be happy to discuss more about my internship over the phone or in an interview with you! IST 454 - Cyber Forensics Not having much forensic experience made this class very interesting for me. There were numerous labs with each chapter of the course involving stenography, creating forensic images, learning the legal procedures and use of forensic evidence in court, email forensics, different parts of storage devices, and much more. For our semester project my group covered an in depth report and presentation on IoT devices and the security risks they hold, specifically examining a case involving Amazon's Alexa (Echo Dot) and the different areas of security involved with the device. IST 402 - Emerging Issues and Technologies Slightly different from what the title of 402 suggests, the vast majority of this class was focused on communities of practice (CoPs), and how to effectively create, sustain, and manage a CoP in an organization. The class utilized various social web tools to evaluate which are ideal for creating knowledge sharing and flow between members of a CoP and organization. We became familiar with Skype, Zoom, Slack, Twitter, Yammer, and several other social web tools to help facilitate and sustain and CoP. IST 302 - IT Project Management Exploration and application of the basic concepts, methodologies, and tools of project management in the field of information sciences and technology. Worked with a team to create various project management deliverable such as a charter, WBS, project plan, cost estimate and others on a how Gantt charts have evolved over time and become an important tool for any project manager today. IST 432 - Legal and Regulatory Environment of IST Legal environment of information technology, constitutional/political issues, intellectual property, management, e-commerce, privacy, access, computer contracting, cyberspace regulation. Created a professional educational video describing the facts leading up, the court case and outcome of A&M Record v Napster which had greatly impacted intellectual property law to this day. IST 451 - Network Security Learned about various cryptographic methods, security tools including IPS/IDS, Firewalls, anti-virus, and attacks from DDOS to browser spoofing. This class encompassed a wide range of classic topics in the information security field as well as some emerging topics security professionals are dealing with today. SRA 221 - Overview of Information Security Designed an Intrusion Detection System with several distinct rules using Snort, followed by a detailed report on how to implement the IDS into a corporate network to help prevent data breaches. Gained an understanding of information security including security architecture, access control, and internet secure applications. IST 220 - Networking and Telecommunications Created a detailed strategic plan for State College High School, to implement a robust wired and wireless network infrastructure efficiently connecting all buildings. Accompanied with real locations maps, actual population statistics, and taking into account the design needs, different user domains, security requirements, as well as legal issues. Developed knowledge in digital network topologies; transmission media, signal modulation, TCP and UDP protocols, digital packet switching and routing, systems integration, communications management, and security. SRA 311 - Risk Analysis Conducted a semester-long in-depth, group risk assessment on the vulnerabilities of Penn State diving boards in order to keep a narrow scope. Learned about assessment and mitigation of security vulnerabilities for people, organizations, and the nation. SRA 231 - Risk Decision Theory Facilitated a mock investigation of a terrorist attack on the DC Metro within the authority of our assigned organization, the District of Columbia Metropolitan Area Transit Authority or DC MTA. Utilizing Analyst notebook, ACH tables, along with other analytic and investigative methods, we were able to gain an extensive understanding of the flaws within our organizations policies and security procedures preceding the attack. SRA 211 - Threat of Terrorism and Crime Participated in a G8 simulation as the nation of Japan that required the process of intelligence sharing with other nations (groups) in the classroom. After sifting through and analyzing a plethora of terrorist intelligence reports, this eventually accumulated to a predictive analysis of a future terrorist attack. |
|