Social Media Presence at LinkedIn
Professional Picture Here
Ibrahim Swaray
Cyber Security Graduate/Cyber Security Officer at University of Maryland
Ridgewood Area, Baltimore, Maryland -- Information and Cyber Security
Current: University of Maryland University of College
Previous: Northrop Tech, CPCI,
Education: University of Maryland
Send Ibrahim InMail
Connect
us.linkedin.com/pub/ibrahim-swaray/35/ab7/537 Contact Info
Innovative cyber security graduate seeking position as an IT and Cyber Security Analyst to provide cyber, technical and information security advice for your organizations to protect your information assets.
A broad knowledge of cyber and information security with a good understanding of practical application of various security technologies and their theoretical frameworks.
My Values and Experience
I am a graduate from University of Maryland University College with Bachelor of Science and Master Degree in Cyber Security. My university education and practical knowledge during my industrial experience have assisted me to gain practical knowledge in cyber security that enhanced my greater understanding on the method to shape market as well as delivering the cyber security services to your organization. My practical experiences have enhanced my expertise on the technique to design effective security platforms as well as implementing the troubleshooting network security and infrastructures.
Proven record and skills in evaluating system vulnerability, identify potential security threats and recommend proven security improvement to improve security efficiency that will be aligned to business process coupled with network infrastructure. Having superior capacity in order to solve wide varieties of complex problems that involve a variety of information systems problems. Ability to work under pressure within a fast pace information system environment.
Moreover, my accumulated practical experience will enable me to assist your organization in securing the information assets and combat increasing level of cybercrimes. (Hughe, & Cybenko, 2013).
I can also assist in incident analysis to respond to security-related incidents by using the state-of-art technology and tools to monitor behaviors of hackers and threat actors, which will assist in effectively protect your businesses. More importantly, I have gained accumulated research experience in my Master's degree program that will assist me to design and implement a cutting edge security digital platform to protect your organization from IT vulnerabilities.
Core Competencies and Skills include:
System Architecture Design
Configuration Management
Expert in Intrusion Prevention Systems
Expert in Intrusion Detection Systems
Expert in Monitoring, and Penetration Testing
Expert in Internet and Network Security Auditing
Network Security
Project Management
Linux Administration
Information Assurance
Cisco Administration
System Troubleshooting
Understanding of Ethical Hacking
Malware Analysis
Hardware Installation
Risk Management
Extensive knowledge in Digital Forensics
Forensic Expert
Vulnerability Evaluation
Technical Writing
EDUCATIONAL QUALIFICATIONS
UNIVERSITY OF MARYLAND, UNIVERSITY COLLEGE, Largo, MD
UNIVERSITY OF MARYLAND, UNIVERSITY COLLEGE, Largo, MD
PROFESSIONAL EXPERIENCE
CPCI, Bowie, MD 2012-2013
IT Security Specialist
Manages the company information system security architecture.
Designs, operational planning, installation, and plans the risk remediation activities across more than 19 systems / servers globally for various organizations and government clients to ensure that all systems are installed according to clients' schedules.
Conducts risk assessments on client's infrastructures and collaborate with clients in order to provide recommendations with reference to network security operations and critical infrastructure enhancements.
Develops DR (Disaster Recovery) and COOP (Continuity of Operations) operations
conduct evaluation of DR and COOP during yearly incident response training.
Assists in delivering on-site server maintenance and visits the troubleshooting sites monthly to address various technical problems. Performs system administration for Linux and Window-based operating and computer systems.
Enhances IA (information assurance) by transferring a secure data over the classified systems. Performs malware reverse engineering, ethical hacking, penetration testing, and C & A (Certification and Accreditation) within the SOC (Security Operations Center) environment.
Draft technical manuals, install progress updates, install manuals, and develops incident response plans to enhance effective system security documentation. Creating effective and required information requests, and system compliance reports.
Enforces IT application processes and structures to ensure consistent in compliance with SOX (Sarbanes Oxley), and Data Security Standards regulations.
Participates in system Accreditation & Certification and Information Security Management processes.
NORTHROP TECH, Wallingford, RI 2013-2014
Cyber Systems Administrator
Travels extensively across the United States as well as outside the United States to deliver the network field IT engineering technical assistance and complete technical inventories across field sites.
Delivers testing, configures rapid prototype and integration of upgraded and new IT hardware solutions to evaluate and enhance all systems.
Identifies system weaknesses and IT configurations while carrying out design modifications...
Social Media New Trends in Technology- Social Media Shaping Modern Society The social media has certainly changed throughout history. Early on in history, social news was spread via word of mouth and through telling stories (Qualman, 2009). At one time, the radio and the newspaper were popular formats for social media. People would listen to the radio and read the newspaper to get insight to what was happening throughout society. Over the
Social Media your purchase. With the advent of social media websites, many business administrators struggle to implement a workable and feasible approach of implementing social networking sites into their business models. Managers and consultants must work collaboratively to identify sound means of incorporating computerized technologies that support and foster profitable utilization of social networking sites such as Facebook, Twitter, and YouTube. Yet, despite the widespread and pervasive consumption of social media,
Social Media as a Potential Tool in Conflict Resolution: A Facebook Perspective Humans are social animals, and will usually dwell together in communities, based on their beliefs, resources, preferences, needs, risks, and a number of other conditions which may be present and common, affecting the identity of the participants and their degree of cohesiveness. Community In sociology the word community is often used to refer to a group that is organized around common
Social media is a big boom when it comes to business, entertainment, and media. It has crossed over from something the youth use to something everyone uses. Many people do not understand how much of an impact social media has on people from their employability to how the public views them. This example essay will show social media’s influence and how it has come to be what it is today. Titles Social
Social Media and how it goes on to affects people. The advantages and the risks of social media are discussed. Furthermore, it goes on to talk about appropriate and inappropriate content. Use of social media in the professional world is also discussed. Social Media is basically the modes of interaction among persons in which they produce, exchange, and share information in varied virtual communities and network. (Ahlqvist et al., 2008)
Social Media Strategy Executive Summary This document outlines the social media strategy to promote an e-book as part of an inbound marketing campaign for a B2B software company. The company has some data on its target audience and their social media usage, and this information is helping to drive this strategy. The strategy will be focused on lead generation and ROI objectives. There will be a mix of unpaid social media posting,
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now