Cybersecurity Specialist with proficiency in online security research, planning, execution and maintenance. Skilled at training internal users on security procedures and preventive measures.
Overview
3
3
years of professional experience
1
1
Certification
Work History
IT Systems Administrator
Eager Trading LLC
06.2022 - Current
Researched and recommended new technologies and strategies for improving system performance.
Led server infrastructure development, quality assurance, staging and production systems.
Reviewed deficiencies based on internal audits and suggested remedies.
Managed vendor relationships effectively for timely procurement of IT equipment while adhering to budget constraints.
Directed budgeting studies on current and proposed IT spending plans, determining maximally impactful business enhancements and minimizing wasteful spending.
Safeguarded sensitive information with robust data encryption techniques and secure password management practices.
Resolved critical incidents swiftly via remote assistance or on-site troubleshooting, ensuring minimal business disruption.
Increased customer interaction from 25% to 50% through establishment of digital communication channels.
Network and Security Administrator
Eager Building Contracting LLC
06.2021 - Current
Maintained network hardware and software and monitored network to support network availability to end users.
Managed vendor relationships to negotiate favourable contracts for hardware procurement while maintaining budgetary requirements.
Maintained applications to keep software current with necessary software updates and upgrades.
Consulted with management to determine scope and priorities of projects and to discuss system capacity and equipment acquisitions.
Monitored networks and network devices to resolve technical problems quickly.
Installed, configured and supported local area network (LAN), wide area network (WAN) and Internet system.
Improved employee satisfaction by promptly addressing technology-related concerns raised during periodic performance evaluations.
Implemented necessary controls and procedures to protect information system assets from intentional or inadvertent modification, disclosure or destruction.
Advised management on technology investment decisions based on thorough cost-benefit analysis.
Authored security and vulnerability reports, detailing logged incursions and suggesting remediation efforts.
Education
Bachelor of Science - Cyber Security And Digital Systems Security