ISACA-SIGMA YOW BELT Project Management

Decent Essays
EDUCATION
• Capella University: Bachelor of Science Degree: IT Information /MIS Technology
• Philadelphia Wireless Technical Institute: Electronics Security Engineering
• St. Joseph University Beginning studies for the MBA in Business Management
• Cambridge University External Campus Certification. England (UK).

PROFESSIONAL
RSA ARCHER: RSA Archer trained and educated/Authentication Manager
SIX SIGMA YELLOW BELT Project Management certified
ISACA: Membership: (CISSP) CISSP trained and educated
CHECKPOINT: (CCSA) Certified Checkpoint Security Administrator
CISCO (CCNA) Cisco Certified Network Administrator /IT Security/Audits

Related Documents

  • Decent Essays

    Dual Admission Essay

    • 441 Words
    • 2 Pages

    Ever since I was a little boy, I have had dreams about insane technological advancement that I never thought were possible. However, I’ve seen most of it come true and I am only 17 years old. Now as I progress my life, I would like to be a part of the community that is on the frontline of new cutting edge technology. Whether that be helping to develop it or be the one to keep it protected with the expanding field of cybersecurity. Even though my parents have not totally endorsed my love for technology, which has helped me in other areas of my life, I have always been able to influence them enough so I can learn and teach myself about the new tech that is being developed in the world and how to use it with all its implications.…

    • 441 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    The business requirements of the access control must be established and documented. Access control rules and rights for each user or group of users should be clearly stated in a policy statement about access All employees, contractors and third party users of information systems and services should be required to record and report any allegations or findings of security weaknesses in the system or the services. This aims to ensure that information security events and weaknesses detection of information security can be dealt with in a timely and…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Nt1310 Unit 3

    • 115 Words
    • 1 Pages

    Network security specialists detect, prevent and resolve security threats to computer networks. Security is an important aspect in businesses operating various Networking systems. Securing your company’s network consists of identifying all devices and connections on the network; setting boundaries between your company’s systems, enforcing controls to ensure that unauthorized access can be prevented, and contained. Network should be separated from the public Internet by strong user authentication mechanisms and policy enforcement systems such as firewalls. Another important factor is that Wireless Local Area Network should be separate from your company main network so that traffic from the public network cannot navigate through the internal…

    • 115 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    I’m writing to you in response to your vacancy for the position of IT Security Specialist. I think that you’ll find that I am uniquely qualified with a broad set of skills. In 2014, I joined Renaissance RX as a help desk technician, but my eagerness to learn pushed me into several projects alongside security engineers where I helped to evaluate Palo Alto firewalls, Carbon Black whitelisting, and Dell encryption. I was also assigned to a project to deploy BMC Footprints Asset Core within our environment.…

    • 320 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    The vulnerabilities identified in part 1 assignment was mitigated by recommending the right solutions. In part2, the network security analyst identified and proposed solutions for the right network devices to protect the accounting firm's network from intruders and external cyber threats. In this final assignment section, the network security analyst of the accounting firm will propose the application/end-user security recommendation to protect the company’s sensitive information. The analyst will also ensure that the proper procedure and policies are in place to take care of network security and employees should be trained and aware of those policies from possible threats including cyber-attacks.…

    • 730 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Cyber Ark Case

    • 725 Words
    • 3 Pages

    Cyber Ark is an enterprise application cyber security company based in Israel with offices worldwide. The United States headquarters is in Newton, MA. with regional sales offices in Ft. Lauderdale, Houston, Las Angles and Chicago. The company is well known in the IT Security Company with a quality product designed to secure data in the enterprise as well as the cloud.…

    • 725 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    On October 13th I attended Professor Ezekiel's class to sit in on a guest speaker. The speaker, Dr. Laurent Njilla is a Research Electronic Engineer at the Air Force Research Laboratory in Rome, NY. Dr. Njilla did not speak much of his professor as he had another objective in mind, speak about cyber security and the opportunities it presents. With only an hour to speak he quickly jumped into his PowerPoint with great enthusiasm for the topic at hand. The title of this summary was the theme of his presentation and this summary will report a few of the things he covered in the time frame he was given to speak.…

    • 505 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    A thorough analysis was made on the VeriSign Certification Practice Statement (CPS) document to identify the type of security services addressed and if the document enforces and support the FISMA security controls. The CPS presentation of the capabilities demonstrated on the security services were equated to the security controls and how the security services can reduce risk impact. The CPS details the authentication and identification, access controls and the audit VeriSign’s certificate policies mainly on the endurance of digital certificates and key management enforcing the CIA. The details of the findings that meets the standard of FISMA according to the NIST are: Identification and Authentication for Rekey Requests: this security service addresses the IA-4 Identifier Management security control whereby it ensures user identifier to the intended party by distinctively verifying and identifying each user. The organization is enabled to manage these functionalities and in addition disabling users and enable decline to…

    • 647 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Michelle Bentley's background includes: building and managing Information Security Department of 12 individual contributors, 15+ years of Information Security experience, 7+ years in Compliance, 8+ years of Project Management, Internal Audit, creating Security Programs, developing policies and risk mitigation plans, and promoting Security Management Practices. Currently, Bentley is building a Global Privacy and is also a Certified Information Security Manager…

    • 61 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    First, I earned my A plus certification. Then, after I got my A plus certification I got my Network plus certification. Both certifications are from CompTIA and have to be renewed every 3 years. Lastly, I attempted to get a windows 7 certification, but didn’t pass. Balancing school, working full time and trying to have a social life was extremely hard for me at the time.…

    • 739 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    2.8 Plan and Timeline Phase I research will require only the resources supplied by UMBC and RLM Communications. Additional resources will be required in Phase II and those will need to be secured ahead of our Phase II timeline. In Phase I, the following timeline will be required to secure the stated resources: 3 The Innovation (1-3 Pages) 3.1 Description A detailed description of our innovation is provided in the Technical Discussion and R&D Plan.…

    • 898 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Table of Contents Objective Scope Policy Information Security Steering Committee ALLOCATION OF INFORMATION SECURITY RESPONSIBILIES Chief Information Security Officer (CISO)…

    • 357 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    I became interested with an Information Security Analyst because my father is one. Every take your child to work day I would wake up early with my dad and run to his car excited to go to his office for the day. The building is a plain, brown brick building, but every time I saw it, I instantly got excited. Walking into the office everyone knew my name, I would always wave at everyone I saw. The secretary always gave me a lollipop and called me her “Little bundle of sunlight”.…

    • 1514 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    I’m just now scratching the surface of this great world of technology, but I am taking steps in the right direction. I am currently in college for Network Systems administration, and after I graduate from this 2 year degree I plan to get an entry level job and then go back to school for another 4 years and obtain my degree in cyber security. Now I’ve set it in my head that I’m not going to find a security job right away so I plan to start taking certification tests as soon as I possibly can, and I plan to get as many that relate to my field that I possibly can. It’s going to take a long time, but I plan to stick with it and follow it to wherever it takes…

    • 754 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Not even the interview and the expectations of my job role, would have prepared me for the strange task I was faced with on my first day on a new job. I had just completed my eight week training as a Cisco Certified Network Administrator, (CCNA), and had been wondering how I would…

    • 693 Words
    • 3 Pages
    Improved Essays