Skills
• Business Development • Promotional support • Vulnerability assesment
• Cloud Security • Network security • Risk Management
• Compliance • Incident Response • SIEM
• Threat intelligence • Encryption • Firewalls
• Troubleshooting
About
• Proficient in identifying and analyzing security vulnerabilities in computer systems and
networks, experienced in conducting security assessments and audits to identify security.
gaps and recommend remediation strategies.
• Skilled in configuring and securing Windows and Linux operating systems, including user
authentication and access control, and proficient in Active Directory and Identity Access
Management.
• Experienced in implementing cybersecurity measures to safeguard against data breaches
and unauthorized access, utilizing CIS Controls for enhanced security.
• Knowledgeable in cryptographic algorithms and techniques for ensuring data
confidentiality, integrity, and authentication, employing encryption and various types of
encryptions for data protection.
• Proficient in network security protocols, including TCP/IP, DNS, DHCP, and VPNs, to secure
network communication and data transmission, with expertise in IPSec VPN fundamentals.
and firewalling.
• Competent in configuring and managing Cisco networking devices, routers, and switches to
establish secure network infrastructures, utilizing Azure log analytics, OMS etc. tools for
monitoring and analyzing network activity.
• Familiar with cybersecurity best practices, including risk assessment, incident response,
and disaster recovery planning, integrating Threat Intelligence into daily practices.
• Skilled in mobile device security measures and techniques for protecting wireless networks
and mobile applications from cyber threats.
• Proficient in using cybersecurity tools and technologies for security analysis, threat
detection, and security intelligence collection, ensuring proactive defense measures.