Details
Skills
• Identified precursors, indicators, and root causes of cyberattacks through network traffic analysis, event logs, and interviews, utilizing Fishbone Diagrams and the 5-Why’s methodology.
• Conducted gap analysis using risk rating matrices to identify vulnerabilities and aligned findings with NIST SP.800-53r5 standards.
• Prioritized recommended security measures through Six Sigma-based Prioritization Matrices and developed an implementation roadmap.
• Assessed an energy organization’s technology infrastructure, aligning existing security systems with the Purdue Model and identifying key gaps.
• Performed vulnerability scans using industry-standard tools, analyzed exploitability and threat environments, and prioritized mitigation measures.
• Created standardized incident and gap assessment reports, including root cause analysis, failed controls, prioritized recommendations, and conclusions.
• Translated findings into concise, actionable insights for decision-makers through executive summaries and professional reports.
• Ensured clear communication of security risks, fixes, and implementation strategies to support timely decision-making and improved cybersecurity posture.
About
To land a position as a cybersecurity analyst so I can use my knowledge of threat analysis, risk assessment, and incident response to safeguard data and systems within organizations. By keeping an eye on, assessing, and putting proactive security measures in place to protect against changing cyber threats, I hope to build cybersecurity frameworks.