Verified Document

Presence Of Social Media At Linkedin Creative Writing

Social Media Presence at LinkedIn Professional Picture Here

Ibrahim Swaray

Cyber Security Graduate/Cyber Security Officer at University of Maryland

Ridgewood Area, Baltimore, Maryland -- Information and Cyber Security

Current: University of Maryland University of College

Previous: Northrop Tech, CPCI,

Education: University of Maryland

Send Ibrahim InMail

Connect

us.linkedin.com/pub/ibrahim-swaray/35/ab7/537 Contact Info

Innovative cyber security graduate seeking position as an IT and Cyber Security Analyst to provide cyber, technical and information security advice for your organizations to protect your information assets.

A broad knowledge of cyber and information security with a good understanding of practical application of various security technologies and their theoretical frameworks.

My Values and Experience

I am a graduate from University of Maryland University College with Bachelor of Science and Master Degree in Cyber Security. My university education and practical knowledge during my industrial experience have assisted me to gain practical knowledge in cyber security that enhanced my greater understanding on the method to shape market as well as delivering the cyber security services to your organization. My practical experiences have enhanced my expertise on the technique to design effective security platforms as well as implementing the troubleshooting network security and infrastructures.

Proven record and skills in evaluating system vulnerability, identify potential security threats and recommend proven security improvement to improve security efficiency that will be aligned to business process coupled with network infrastructure. Having superior capacity in order to solve wide varieties of complex problems that involve a variety of information systems problems. Ability to work under pressure within a fast pace information system environment.

Moreover, my accumulated practical experience will enable me to assist your organization in securing the information assets and combat increasing level of cybercrimes. (Hughe, & Cybenko, 2013).

I can also assist in incident analysis to respond to security-related incidents by using the state-of-art technology and tools to monitor behaviors of hackers and threat actors, which will assist in effectively protect your businesses. More importantly, I have gained accumulated research experience in my Master's degree program that will assist me to design and implement a cutting edge security digital platform to protect your organization from IT vulnerabilities.

Core Competencies and Skills include:

System Architecture Design

Configuration Management

Expert in Intrusion Prevention Systems

Expert in Intrusion Detection Systems

Expert in Monitoring, and Penetration Testing

Expert in Internet and Network Security Auditing

Network Security

Project Management

Linux Administration

Information Assurance

Cisco Administration

System Troubleshooting

Understanding of Ethical Hacking

Malware Analysis

Hardware Installation

Risk Management

Extensive knowledge in Digital Forensics

Forensic Expert

Vulnerability Evaluation

Technical Writing

EDUCATIONAL QUALIFICATIONS

UNIVERSITY OF MARYLAND, UNIVERSITY COLLEGE, Largo, MD

UNIVERSITY OF MARYLAND, UNIVERSITY COLLEGE, Largo, MD

PROFESSIONAL EXPERIENCE

CPCI, Bowie, MD 2012-2013

IT Security Specialist

Manages the company information system security architecture.

Designs, operational planning, installation, and plans the risk remediation activities across more than 19 systems / servers globally for various organizations and government clients to ensure that all systems are installed according to clients' schedules.

Conducts risk assessments on client's infrastructures and collaborate with clients in order to provide recommendations with reference to network security operations and critical infrastructure enhancements.

Develops DR (Disaster Recovery) and COOP (Continuity of Operations) operations

conduct evaluation of DR and COOP during yearly incident response training.

Assists in delivering on-site server maintenance and visits the troubleshooting sites monthly to address various technical problems. Performs system administration for Linux and Window-based operating and computer systems.

Enhances IA (information assurance) by transferring a secure data over the classified systems. Performs malware reverse engineering, ethical hacking, penetration testing, and C & A (Certification and Accreditation) within the SOC (Security Operations Center) environment.

Draft technical manuals, install progress updates, install manuals, and develops incident response plans to enhance effective system security documentation. Creating effective and required information requests, and system compliance reports.

Enforces IT application processes and structures to ensure consistent in compliance with SOX (Sarbanes Oxley), and Data Security Standards regulations.

Participates in system Accreditation & Certification and Information Security Management processes.

NORTHROP TECH, Wallingford, RI 2013-2014

Cyber Systems Administrator

Travels extensively across the United States as well as outside the United States to deliver the network field IT engineering technical assistance and complete technical inventories across field sites.

Delivers testing, configures rapid prototype and integration of upgraded and new IT hardware solutions to evaluate and enhance all systems.

Identifies system weaknesses and IT configurations while carrying out design modifications...

With the rise of cloud computing, mobile technology, and digital information, keeping data secured is one of biggest challenges for many organizations. In essence, cyber security challenges can put your data at risks, which can cost your organization revenue, time, and resources. (Mateski, Trevino, Veitch, et al. 2012).
My educational qualifications and years of practical cyber security experience has made me an ideal specialist to assist your organization in protecting your most valuable data assets. I have developed skills to identify security issues and design effective challenge to counter a security risk that may put your sensitive data at risks. Over the years, I have developed skills to secure data as well as managing ESI (electronic store information) critical for your business. Moreover, I have ability to offer a cutting edge cyber security analysis as well as information risk assessment that can assist your organization to achieve benchmark security measure. I can also carry out a penetration testing to achieve a robust defense for your organization. I also have ability to deliver a scalable security solution to protect your data internal and external threats such as network vulnerabilities, inadequate security policies, and malicious insiders. (Ford, & Risler, 2010).

My proven track records have made me to be one of the best cyber security specialists with proven practical experience that has enable me to deal with cyber threats. I will also provide security intelligence service for your company. Intelligence specialists seeks to collect information and analyze the information to combat cyber threats. (ITU, 2005).

I am highly skilled in developing security platform for organizations and all levels of stakeholders. Trusted developers of information assurance for all aspects of businesses to achieve effective business requirements.

I am a high motivated, cyber security and IS (Information Security) professional with proven track records and fully understanding of information and cybersecurity platform. Over the years, I have developed a practical knowledge in Information Security, Cyber Security, and Information Assurance strategies to address the cyber challenges that business organizations face in the contemporary business and IT environment. Moreover, I have acquired a practical knowledge in deliver information assurance guidance and requirements for both public and private sectors in the United States and foreign countries.

Recognized for working with other cyber security specialist to develop new security strategies to enhance business sustainability. Highly skilled in delivering business outcomes and develop a cost effective security platforms for organizations. (InfoSec Institute, 2015).

Additional skills that I can contribute to the success of your organization include:

Proficient in 64 bit Microsoft Windows operating systems for deployment and development platform

Proficient in Linux operating systems for deployment and development platform

Proficient in the software configuration application management systems

Experience in IT secure development tools and techniques to produce secure systems.

Good understanding and knowledge of virtualization (Hyper-V and VMWare).

USA Government IT Security Cleared.

Good interpersonal relations and skills for customer liaison.

Desirable Skills

Excellent in oral and written communication skills.

Good organization, time management, and prioritization skills.

Experience and skilled in scripting languages such as Python, Perl, ruby

Ability to work with group and small team.

Experience of encryption techniques, and PKI

High degree of flexibility and initiative

Experience with distributed high performance information systems

Ability to perform and work under pressure.

Experience in Visualization and Big Data Analytics

Working knowledge in SCRUM / Agile / delivery model,

Key Behaviors

Willing to learn.

Can contribute ideas to promote innovation.

Willingness to travel

Feel free to contact me if interested in building challenging, interesting cyber and information security for your organization.

Reference

Ford, B. & Risler, J. (2010). Entry-level Cyber Cyber Security Analyst Skill

Development. Cisco.

Hughe, J. & Cybenko, G. (2013). Quantitative Metrics and Risk Assessment: The Three Tenets Model of Cybersecurity. USA.

Infosec Institute (2015). Cyber Threat Analysis. USA.

Mateski, M., Trevino, C., Veitch, C. et al. (2012). Cyber Threat Metrics. Western Governor University.

ITU (2005). A Comparative Analysis of Cybersecurity Initiatives Worldwide. International Telecommunication Union. USA.

Sources used in this document:
Reference

Ford, B. & Risler, J. (2010). Entry-level Cyber Cyber Security Analyst Skill

Development. Cisco.

Hughe, J. & Cybenko, G. (2013). Quantitative Metrics and Risk Assessment: The Three Tenets Model of Cybersecurity. USA.

Infosec Institute (2015). Cyber Threat Analysis. USA.
Cite this Document:
Copy Bibliography Citation

Related Documents

Social Media New Trends in Technology- Social
Words: 2461 Length: 8 Document Type: Research Paper

Social Media New Trends in Technology- Social Media Shaping Modern Society The social media has certainly changed throughout history. Early on in history, social news was spread via word of mouth and through telling stories (Qualman, 2009). At one time, the radio and the newspaper were popular formats for social media. People would listen to the radio and read the newspaper to get insight to what was happening throughout society. Over the

Social Media Your Purchase. With the Advent
Words: 4093 Length: 15 Document Type: Essay

Social Media your purchase. With the advent of social media websites, many business administrators struggle to implement a workable and feasible approach of implementing social networking sites into their business models. Managers and consultants must work collaboratively to identify sound means of incorporating computerized technologies that support and foster profitable utilization of social networking sites such as Facebook, Twitter, and YouTube. Yet, despite the widespread and pervasive consumption of social media,

Social Media As a Potential Tool in Conflict Resolution a Facebook...
Words: 10855 Length: 25 Document Type: Thesis

Social Media as a Potential Tool in Conflict Resolution: A Facebook Perspective Humans are social animals, and will usually dwell together in communities, based on their beliefs, resources, preferences, needs, risks, and a number of other conditions which may be present and common, affecting the identity of the participants and their degree of cohesiveness. Community In sociology the word community is often used to refer to a group that is organized around common

Social Media Essay
Words: 4044 Length: Document Type: Essays

Social media is a big boom when it comes to business, entertainment, and media. It has crossed over from something the youth use to something everyone uses. Many people do not understand how much of an impact social media has on people from their employability to how the public views them. This example essay will show social media’s influence and how it has come to be what it is today. Titles Social

Social Media and How It Goes on
Words: 2736 Length: 8 Document Type: Essay

Social Media and how it goes on to affects people. The advantages and the risks of social media are discussed. Furthermore, it goes on to talk about appropriate and inappropriate content. Use of social media in the professional world is also discussed. Social Media is basically the modes of interaction among persons in which they produce, exchange, and share information in varied virtual communities and network. (Ahlqvist et al., 2008)

Social Media Strategy for Marketing
Words: 1762 Length: 5 Document Type: Essay

Social Media Strategy Executive Summary This document outlines the social media strategy to promote an e-book as part of an inbound marketing campaign for a B2B software company. The company has some data on its target audience and their social media usage, and this information is helping to drive this strategy. The strategy will be focused on lead generation and ROI objectives. There will be a mix of unpaid social media posting,

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now