Cyber Security Analyst Intern - Information Technology Resume Search
Cyber Security Analyst Intern - Information Technology Resume Search
My Spider Scam Awareness Contacting Us F. A. Q.
 
Job Seekers
Search Jobs
Browse Jobs
Post a Resume
Job Alerts
 
Employers
Search Resumes
Browse Resumes
Post a Job

Cyber Security Analyst Intern Resume


Desired Industry: Information Technology SpiderID: 82543
Desired Job Location: Ashburn, Virginia Date Posted: 4/14/2020
Type of Position: Internship Availability Date: immediately
Desired Wage: 40000
U.S. Work Authorization: Yes
Job Level: New Grad/Entry Level Willing to Travel: Yes, 25-50%
Highest Degree Attained: Bachelors Willing to Relocate: No


Objective:
Highly motivated, performance-focused, and multifaceted professional, interested in

pursuing a challenging position in the information technology field to fully enhance

knowledge and skills honed from strong educational background; complemented with knowledge

of systems development life cycle. Well-versed with fundamental concepts of system

security assessment, weakness and vulnerability identification, and mitigation plan

development. Armed with outstanding dedication to completing tasks and responsibilities in

high-pressure environments while maintaining quality, efficiency, and timeliness Equipped

with articulate communication and interpersonal skills essential in establishing long-term

working relationships with professionals at all levels. Bilingual in English and Telugu.


Experience:
Trillion Technology Solutions Reston, VA
Intern 2018


Education:
Bachelor of Science in Information Technology with Concentration in Cyber Security
George Mason University | Fairfax, VA
Academic Project: Network Defense Project

Certification
Security+ | Computing Technology Industry Association (CompTIA)


Skills:
-Familiarity with different types of security including physical security, computer

security, and network security as well as common threats and attacks against information

systems such as accidental damage, identity theft, malicious software, spam, and defensive

measures
-Strong background in information security concepts and organizational policy in

identifying required services that include confidentiality, authentication, integrity,

nonrepudiation, access control, availability, and mechanisms
-Capability to develop relational database and construct complex SQL queries in obtaining

data from database
-Effectiveness in designing virtual machines for SmoothWall Express, Workstations, Kali

Linux, osCommerce, and War FTP as well as virtual network with firewall, DMZ, and internal

network
-Efficiency in utilizing MD5Summer utility in generating hash of the SmoothWall express

file to determine integrity
-Proficiency in using Snort IDS in defending network against vulnerability


Additional Information:
Operating Systems: Windows 10, Ubuntu, and Kali Linux
Programming Languages Java, JavaScript, Python, PHP, HTML, CSS, SQL, jQuery, and XML
Microsoft Application: Word, Excel, PowerPoint, Project, Visio, and Access
Intrusion detection system: Snort and Firewall (SmoothWall Express)
Networking Mapping: Nmap and Zenmap
Network Visual Simulation Tool: Packet Tracer
Vulnerability Scanner: Nessus and OWASP ZAP
Security information and event management: Splunk
Packet Analyzer: Wireshark
Adobe Creative Suite: Dreamweaver, Photoshop, and Animate
File Transfer Applications: FileZilla and PUTTY


Candidate Contact Information:
JobSpider.com has chosen not to make contact information available on this page.
Click "Contact Candidate" to send this candidate a response.


    





© 2021 Job Spider
Privacy Policy | CC Marketing Sites | Site Map | Links