Resume

IMAGE

Ha Long Bay VIETNAM

Information Security Professional

  • Provide identity and access management support for the company

  • Provision, de-provision and reset credentials across platforms like RSA, VPN, Active Directory and databases via the command line and software interfaces

  • Communicate with specific departments to troubleshoot technical issues following escalation procedures

  • Execute manual corrective action due to a failed automated task

  • Utilize SailPoint and CyberArk technologies to verify identities

IMAGE

Tokyo JAPAN

Service Desk Technician

  • Diagnose and troubleshoot end-user desktop application issues and provides an appropriate solution

  • Support end-users in their use of applications such as Microsoft Office, VPN, Citrix, and MDM (mobile device management)

  • Performs account management and maintenance for various applications and systems (e.g., creates or modifies user accounts and permissions, and performs password resets).

  • Communicates with customers at all levels of technical and non-technical skills sets

IMAGE

Seoul SOUTH KOREA

Voting Systems Technician

  • Perform and document quality assurance tests for voting machines while maintaining accurate record keeping and chain of command in compliance with the laws of the state

  • Provide onsite technical support for polling places

  • Audit post-election results

IMAGE

New York UNITED STATES

Cyber Analyst Apprenticeship

DEFENSIVE SKILLS

  • Utilized virtual machines to practice utilization of Wireshark and tcpdump to monitor network traffic and perform packet analysis to identify and track anomalous activity

  • Find compromised Linux hosts by analyzing log files and packet capture files to discover the movements/pivots of a simulated attack and utilizing information to identify possible recommendations to remediate vulnerabilities and resecure systems to limit breach impact

  • Found registry changes created by malware on Windows machines with RegShot to understand its behavior. Performed an analysis of SQL injection log records to find attacker IPs and data stolen

OFFENSIVE SKILLS

  • Performed reconnaissance and found vulnerabilities on Windows and Linux machines using Nmap, Nessus and Spiderfoot

  • Ran command line exploits on Windows and Linux machines by using reverse shells and backdoors

  • Exploits conducted on Windows machines such as password list attacks, hashdumps and escalated privileges with Metasploit.

  • Performed SQL and command injection on insecure websites.