Resume.odt - LibreOffice Writer

JOHN CYBERSEC SMITH

johnsmith@securemail.com 555-123-4567 linkedin.com/in/johncybersec github.com/cybersmith

PROFESSIONAL SUMMARY

Dedicated and certified cybersecurity professional with over 8 years of experience in systems administration, network security, penetration testing, and incident response. Expert in Linux environments with a focus on securing critical infrastructure and implementing defensive countermeasures. Proven track record of securing enterprise networks against sophisticated threats and educating teams on security best practices.

PROFESSIONAL EXPERIENCE

Senior Security Engineer | SecureNet Inc. | 2020 - Present

  • Lead security operations for an enterprise environment with 5,000+ endpoints, implementing zero-trust architecture that reduced security incidents by 72%
  • Designed and deployed comprehensive IDS/IPS solutions using Suricata and custom rulesets, detecting an average of 17 potential breaches per month
  • Automated security response procedures using Python and Bash scripting, reducing incident response time from 2 hours to 15 minutes
  • Conducted regular penetration testing using Kali Linux and Parrot OS tools, identifying and remediating critical vulnerabilities before exploitation

Systems Administrator | DataCorp Technologies | 2017 - 2020

  • Managed a heterogeneous network environment of Linux (Ubuntu, CentOS) and Windows servers for a mid-sized enterprise
  • Implemented hardened Linux configurations reducing system vulnerabilities by 85% as measured by vulnerability scanners
  • Deployed and maintained SELinux in enforcing mode across all production Linux servers, preventing multiple attempted exploits
  • Created comprehensive disaster recovery plan reducing potential downtime from 24 hours to 4 hours

Network Security Analyst | CyberDefense Solutions | 2015 - 2017

  • Monitored network traffic for anomalies using Wireshark, Snort IDS, and ELK stack for analysis
  • Performed vulnerability assessments using OpenVAS and Nessus on client networks, providing detailed remediation plans
  • Implemented security controls in accordance with NIST SP 800-53 guidelines
  • Responded to security incidents and performed forensic analysis using Volatility Framework and Autopsy

CERTIFICATIONS

  • Certified Information Systems Security Professional (CISSP)
  • Offensive Security Certified Professional (OSCP)
  • Certified Ethical Hacker (CEH)
  • CompTIA Security+, Network+, Linux+
  • GIAC Security Essentials (GSEC)
  • Red Hat Certified Engineer (RHCE)

TECHNICAL SKILLS

  • Operating Systems: Linux (Debian, Ubuntu, CentOS, Parrot OS, Kali), Windows Server
  • Network Security: Firewalls, VPNs, IDS/IPS, SIEM, Network Protocol Analysis
  • Security Tools: Metasploit, Burp Suite, Wireshark, Nmap, OpenVAS, Snort, Suricata
  • Programming/Scripting: Python, Bash, PowerShell, Ruby
  • Containerization: Docker, Kubernetes, Container Security
  • Cloud Security: AWS, Azure, GCP security configurations

EDUCATION

Bachelor of Science in Computer Science

University of Technology, 2015

Minor in Information Security

Page 1/1
100%
English (USA)
INSERT