Nt2580 Unit 3 Assignment 3 Cover Letter Sample

Decent Essays
I’m writing to you in response to your vacancy for the position of IT Security Specialist. I think that you’ll find that I am uniquely qualified with a broad set of skills.
In 2014, I joined Renaissance RX as a help desk technician, but my eagerness to learn pushed me into several projects alongside security engineers where I helped to evaluate Palo Alto firewalls, Carbon Black whitelisting, and Dell encryption. I was also assigned to a project to deploy BMC Footprints Asset Core within our environment. Since much of our outside sales team worked using SaaS software using iPads, I also became the subject matter expert on mobility management using VMWare Airwatch.
In 2015, much of my work was on a small research project, managing between two and three hundred Android tablets. The most valuable thing that my time at Ochsner exposed me to were the ideas and methodologies for standardizing and automating security across a massive, multi-site enterprise (around 30,000 endpoints). During my time there I also participated in LANDesk training, where I learned how Ochsner provisions and deploys to their endpoints.
…show more content…
Working alone, I immersed myself in this environment and worked toward removing inefficiencies, security oversights, and business continuity issues.
As I hope you’ll see, the high-security, HIPAA-compliant environments that I’ve worked in have exposed me to policies, products, and procedures that I can bring to your organization to help strengthen your information security program. Additionally, my expertise in securing iOS and Android mobile devices means that I can help mitigate threats to this increasingly significant portion of your computing

Related Documents

  • Decent Essays

    Nt1310 Unit 2 Assignment

    • 463 Words
    • 2 Pages

    During my job as a problem solver issues are brought to my attention that have to be actioned straight away where there is no time to ask questions. A problem was brought to my attention that we had reports of a product that had infestation problems, the product in question was Bird seed. I myself had to look into this straight away as it was a problem that would immediately impact Amazons customers. I first had to locate which product this was and would ask the associate who brought this to my attention to show me the location. After inspecting the product it was found that there were small black creatures crawling around inside the bags.…

    • 463 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Looking over everyone’s names and once again looks like old home week. Think I have had prior courses with almost everyone here. This is my eighth Cybersecurity master course and will complete my degree next year. I am currently working at Tinker AFB in Oklahoma for the DISA “Defense Information Systems Agency” as a Solaris system administrator. I have been doing this type of work for almost twenty years, even before retiring from twenty years active duty in the US Navy as a CTM1 “Cryptologic Technician Maintenance” first class petty officer.…

    • 199 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Developed in collaboration with healthcare and information security professionals, the Health Information Trust Alliance (HITRUST) Common Security Framework (CSF) is a security framework for protecting health information tailored for the U.S. healthcare industry. The CSF includes and integrates federal and state regulations, standards, and frameworks such as HIPAA (Health Insurance Portability and Accountability Act), NIST (National Institute of Standards and Technology), ISO (International Organization for Standardization), and COBIT (Control Objectives for Information and related Technology) to provide a healthcare organization with a broad and adaptable tool for assessing risk (Murphy, 2015). As described on the Health Information Trust…

    • 725 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    EDUCATION • Capella University: Bachelor of Science Degree: IT Information /MIS Technology • Philadelphia Wireless Technical Institute: Electronics Security Engineering • St. Joseph University Beginning studies for the MBA in Business Management • Cambridge University External Campus Certification. England (UK). PROFESSIONAL RSA ARCHER: RSA Archer trained and educated/Authentication Manager SIX SIGMA YELLOW BELT Project Management certified ISACA: Membership: (CISSP) CISSP trained and educated CHECKPOINT: (CCSA) Certified Checkpoint Security Administrator CISCO (CCNA)…

    • 292 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    The wording of contracts is very important because loopholes and misunderstandings can easily take place if terms are not clearly set. The article, In Contracts with Device Vendors, Mayo Clinic Emphasizes Security, is specifically about how contracts in healthcare between hospitals and vendors are very important for security. There needs to be a specific language used to protect the cyber security of a hospital from outside vendor’s technology. This article focuses on the Mayo Clinic in Rochester, MN and how they handle their contracts. This article was written as an interview of Kevin McDonald the clinical information security director at the Mayo Clinic.…

    • 339 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Michelle Bentley's background includes: building and managing Information Security Department of 12 individual contributors, 15+ years of Information Security experience, 7+ years in Compliance, 8+ years of Project Management, Internal Audit, creating Security Programs, developing policies and risk mitigation plans, and promoting Security Management Practices. Currently, Bentley is building a Global Privacy and is also a Certified Information Security Manager…

    • 61 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Healthcare Overview This industry is vulnerable in many different facets, the main one being private health information (PHI). This type of information is protected by the Health Insurance Portability and Accountability Act, more commonly known as HIPAA, which sets the national standard for how the information is handled. HIPAA makes it imperative for healthcare organizations to meet these aforementioned standards. PricewaterhouseCoopers (PwC) made cyber security as one of the key issues facing the healthcare industry in 2016.…

    • 899 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    MSIA Organization Case Study Proposal Submitted by: Jason R. Denny 1. Briefly describe your responsibilities at your employer, even if your employer is not your case study organization. I report directly to the VP of Privacy & Security Governance; my job function is to act as the Security Compliance Manager within our Security Governance team. The overall purpose of my position is to implement the appropriate processes and procedures for auditing and assessing, ensuring proper compliance throughout various information security standards and controls; up to and including tracking and managing any corrective actions that may derive from the various audits and assessments. I am an integral member of the team in regards to security program development, vulnerability management, physical security, and documentation development.…

    • 700 Words
    • 3 Pages
    Great Essays
  • Decent Essays

    In the digital age, a huge data security breach or a major power outage can cost a healthcare organization millions in damages. That’s why IT security experts suggest that companies should be up to date with their data security to prevent loss of valuable company data. Data theft and network security breaches are now becoming more prevalent, due to the advancement in technology that’s being used by cybercriminals. IBM Security recently sponsored a survey that revealed massive cyber attacks on the data systems of health organizations cost around $380 per file. It’s 2.5 times more expensive when compared to data breaches affecting other industries.…

    • 255 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Information security and patient privacy are vital in a successful healthcare organization. There are personal data in almost every medical equipment that is used by clinicians to collect, chart, and interpret the patient data. These devices must be accessed by only authorized people, but it sometimes can be accessed by other patients and unauthorized staff. As a result, these data can be used inappropriately that cause some personal problems to the patients, the staff, and the healthcare organization. Lack of privacy and security could make the patient to not want to disclose their health information with the organization, and patients will lose trust of the organization and its staff.…

    • 153 Words
    • 1 Pages
    Improved Essays
  • Decent Essays

    Data security continues to be one major financial issue in healthcare. Throughout, the year’s data breech has affected small and large entities. It has compromised patient’s confidential information and company’s financial records. As companies continue to upgrade old systems, they must invest on a reliable network infrastructure in order to comply with HIPPA regulations and this can be costly. As innovation continues to evolve, entities upgrade stand-alone or laptops with wireless smart technology to better serve patient’s needs.…

    • 185 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    1. Overview Edu Corp relies on its elite employee base to conduct company operations on a daily basis. With the growing concerns of privacy and security, Edu Corp has created a detailed, structured policy in order to preserve the security, integrity, and efficiency our employees, along with Edu Corp’s customers and digital assets. In select industries or businesses, the integrity and security awareness of a company’s employees are critical for safe, successful, and efficient operations (Prince, 2015). As a result, Edu Corp enforces a strict Employee Policy.…

    • 1386 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Iot In The Workplace

    • 1005 Words
    • 5 Pages

    One key way that healthcare organizations can enhance security is to address the openings, or access points, in the network of devices. In your organization’s context, this means working closely with vendors of medical devices to be fully knowledgeable on the device, particularly how it connects to the network. Understanding this connection and proactively securing the device will keep the hospital a step ahead of cyber criminals. Another key way that your organization can be sure to secure data is to evaluate and undergo security training for all employees of the hospital. While security may sometimes be overlooked due to the nature of your employee’s work, the ubiquity of phishing scams and other similar attacks means that security needs…

    • 1005 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    At Bechtel, I was on team of 6 individuals tasked with designing a $12 billion purchasing program and also managing supply chain projects of various kinds. The team was successful because of five factors: a. it was a real team, not a group of individuals or a department simulating a team; b. there was clear and engaging direction; c. there was an enabling structure that allowed the team to achieve its aims; d. there was a supportive organizational context; and e. there was supportive coaching. As the team leader, I defined the vision, identified solutions, provided structured and ad hoc guidance to team members, liaised with Bechtel, and took responsibility for the quality of the work product.…

    • 192 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    With new advances in technology, employees are now bringing and utilizing their own devices in the workplace. This can present a challenge because it is not guaranteed the employee may follow the policies and procedures for using his or her own device. PHI can also be accessed on unsecure networks. Wireless network access and monitoring is extremely important for healthcare entities because without a secure network, systems can be breached at any time resulting in negative effects on the patient as well thousands of dollars in fines for the individuals involved. Unfortunately the structural limitations of transforming older facilities to support wireless access can be an expensive…

    • 872 Words
    • 4 Pages
    Improved Essays