Presence of Social Media at Linkedin Creative Writing

Total Length: 1513 words ( 5 double-spaced pages)

Total Sources: 5

Page 1 of 5

Social Media Presence at LinkedIn

Professional Picture Here

Ibrahim Swaray

Cyber Security Graduate/Cyber Security Officer at University of Maryland

Ridgewood Area, Baltimore, Maryland -- Information and Cyber Security

Current: University of Maryland University of College

Previous: Northrop Tech, CPCI,

Education: University of Maryland

Send Ibrahim InMail

Connect

us.linkedin.com/pub/ibrahim-swaray/35/ab7/537 Contact Info

Innovative cyber security graduate seeking position as an IT and Cyber Security Analyst to provide cyber, technical and information security advice for your organizations to protect your information assets.

A broad knowledge of cyber and information security with a good understanding of practical application of various security technologies and their theoretical frameworks.

My Values and Experience

I am a graduate from University of Maryland University College with Bachelor of Science and Master Degree in Cyber Security. My university education and practical knowledge during my industrial experience have assisted me to gain practical knowledge in cyber security that enhanced my greater understanding on the method to shape market as well as delivering the cyber security services to your organization. My practical experiences have enhanced my expertise on the technique to design effective security platforms as well as implementing the troubleshooting network security and infrastructures.

Proven record and skills in evaluating system vulnerability, identify potential security threats and recommend proven security improvement to improve security efficiency that will be aligned to business process coupled with network infrastructure. Having superior capacity in order to solve wide varieties of complex problems that involve a variety of information systems problems. Ability to work under pressure within a fast pace information system environment.

Moreover, my accumulated practical experience will enable me to assist your organization in securing the information assets and combat increasing level of cybercrimes. (Hughe, & Cybenko, 2013).

I can also assist in incident analysis to respond to security-related incidents by using the state-of-art technology and tools to monitor behaviors of hackers and threat actors, which will assist in effectively protect your businesses. More importantly, I have gained accumulated research experience in my Master's degree program that will assist me to design and implement a cutting edge security digital platform to protect your organization from IT vulnerabilities.

Core Competencies and Skills include:

System Architecture Design

Configuration Management

Expert in Intrusion Prevention Systems

Expert in Intrusion Detection Systems

Expert in Monitoring, and Penetration Testing

Expert in Internet and Network Security Auditing

Network Security

Project Management

Linux Administration

Information Assurance

Cisco Administration

System Troubleshooting

Understanding of Ethical Hacking

Malware Analysis

Hardware Installation

Risk Management

Extensive knowledge in Digital Forensics

Forensic Expert

Vulnerability Evaluation

Technical Writing

EDUCATIONAL QUALIFICATIONS

UNIVERSITY OF MARYLAND, UNIVERSITY COLLEGE, Largo, MD

UNIVERSITY OF MARYLAND, UNIVERSITY COLLEGE, Largo, MD

PROFESSIONAL EXPERIENCE

CPCI, Bowie, MD 2012-2013

IT Security Specialist

Manages the company information system security architecture.

Designs, operational planning, installation, and plans the risk remediation activities across more than 19 systems / servers globally for various organizations and government clients to ensure that all systems are installed according to clients' schedules.

Conducts risk assessments on client's infrastructures and collaborate with clients in order to provide recommendations with reference to network security operations and critical infrastructure enhancements.

Develops DR (Disaster Recovery) and COOP (Continuity of Operations) operations

conduct evaluation of DR and COOP during yearly incident response training.

Assists in delivering on-site server maintenance and visits the troubleshooting sites monthly to address various technical problems. Performs system administration for Linux and Window-based operating and computer systems.

Enhances IA (information assurance) by transferring a secure data over the classified systems. Performs malware reverse engineering, ethical hacking, penetration testing, and C & A (Certification and Accreditation) within the SOC (Security Operations Center) environment.

Draft technical manuals, install progress updates, install manuals, and develops incident response plans to enhance effective system security documentation. Creating effective and required information requests, and system compliance reports.

Enforces IT application processes and structures to ensure consistent in compliance with SOX (Sarbanes Oxley), and Data Security Standards regulations.

Participates in system Accreditation & Certification and Information Security Management processes.

NORTHROP TECH, Wallingford, RI 2013-2014

Cyber Systems Administrator

Travels extensively across the United States as well as outside the United States to deliver the network field IT engineering technical assistance and complete technical inventories across field sites.

Delivers testing, configures rapid prototype and integration of upgraded and new IT hardware solutions to evaluate and enhance all systems.

Identifies system weaknesses and IT configurations while carrying out design modifications and system requirement analysis.

Provides repairs for troubleshooting, modifies and tests LAN (Local Area Network) and WAN (Wide Area Network) across the network systems.

Stuck Writing Your "Presence of Social Media at Linkedin" Creative Writing?



Updates and opens RFA (Request for Action) problems with the aid of Remedy database.

Created SAP requests to resolve and RFA actions.

Performs equipment relocations, installation, and maintenance of different equipment ranging from Unix base server to HP computer workstations as well as external hard drives, printers, associated equipment, scanners, audio equipment, monitors, video teleconferencing equipment, VoIP phones, cryptographic devices, and modems.

Delivers helpdesk supports and solves 100% technical issues.

TECHNICAL SKILLS

Cisco Secure Communications, Cisco Security Agent, Microsoft Office (Word, PowerPoint, Excel, Visio, Outlook), SecurID, Voice Mail Administration, ASA Firewall, RSA LogRhythm, Windows 8, 8.1,7, XP.

REASONS I AM UNIQUE AS A CYBER SECURITY SPECIALIST

In the contemporary IT environment, data are part of the organizational most valuable assets. With the rise of cloud computing, mobile technology, and digital information, keeping data secured is one of biggest challenges for many organizations. In essence, cyber security challenges can put your data at risks, which can cost your organization revenue, time, and resources. (Mateski, Trevino, Veitch, et al. 2012).

My educational qualifications and years of practical cyber security experience has made me an ideal specialist to assist your organization in protecting your most valuable data assets. I have developed skills to identify security issues and design effective challenge to counter a security risk that may put your sensitive data at risks. Over the years, I have developed skills to secure data as well as managing ESI (electronic store information) critical for your business. Moreover, I have ability to offer a cutting edge cyber security analysis as well as information risk assessment that can assist your organization to achieve benchmark security measure. I can also carry out a penetration testing to achieve a robust defense for your organization. I also have ability to deliver a scalable security solution to protect your data internal and external threats such as network vulnerabilities, inadequate security policies, and malicious insiders. (Ford, & Risler, 2010).

My proven track records have made me to be one of the best cyber security specialists with proven practical experience that has enable me to deal with cyber threats. I will also provide security intelligence service for your company. Intelligence specialists seeks to collect information and analyze the information to combat cyber threats. (ITU, 2005).

I am highly skilled in developing security platform for organizations and all levels of stakeholders. Trusted developers of information assurance for all aspects of businesses to achieve effective business requirements.

I am a high motivated, cyber security and IS (Information Security) professional with proven track records and fully understanding of information and cybersecurity platform. Over the years, I have developed a practical knowledge in Information Security, Cyber Security, and Information Assurance strategies to address the cyber challenges that business organizations face in the contemporary business and IT environment. Moreover, I have acquired a practical knowledge in deliver information assurance guidance and requirements for both public and private sectors in the United States and foreign countries.

Recognized for working with other cyber security specialist to develop new security strategies to enhance business sustainability. Highly skilled in delivering business outcomes and develop a cost effective security platforms for organizations. (InfoSec Institute, 2015).

Additional skills that I can contribute to the success of your organization include:

Proficient in 64 bit Microsoft Windows operating systems for deployment and development platform

Proficient in Linux operating systems for deployment and development platform

Proficient in the software configuration application management systems

Experience in IT secure development tools and techniques to produce secure systems.

Good understanding and knowledge of virtualization (Hyper-V and VMWare).

USA Government IT Security Cleared.

Good interpersonal relations and skills for customer liaison.

Desirable Skills

Excellent in oral and written communication skills.

Good organization, time management, and prioritization skills.

Experience and skilled in scripting languages such as Python, Perl, ruby

Ability to work with group and small team.

Experience of encryption techniques, and PKI

High degree of flexibility and initiative

Experience with distributed high performance information systems

Ability to perform and work under pressure.

Experience in Visualization and Big Data Analytics

Working knowledge in SCRUM / Agile / delivery model,

Key Behaviors

Willing to learn.

Can contribute ideas to promote innovation.

Willingness to travel

Feel free to contact me if interested in building challenging, interesting cyber and information security for your organization.

Reference

Ford, B. & Risler, J. (2010). Entry-level Cyber Cyber Security Analyst Skill

Development. Cisco.

Hughe, J. & Cybenko, G. (2013). Quantitative Metrics and Risk Assessment: The Three Tenets Model of Cybersecurity. USA.

Infosec Institute.....

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Presence Of Social Media At Linkedin" (2015, October 13) Retrieved May 4, 2024, from
https://www.aceyourpaper.com/essays/presence-social-media-linkedin-2156090

Latest MLA Format (8th edition)

Copy Reference
"Presence Of Social Media At Linkedin" 13 October 2015. Web.4 May. 2024. <
https://www.aceyourpaper.com/essays/presence-social-media-linkedin-2156090>

Latest Chicago Format (16th edition)

Copy Reference
"Presence Of Social Media At Linkedin", 13 October 2015, Accessed.4 May. 2024,
https://www.aceyourpaper.com/essays/presence-social-media-linkedin-2156090