Resume
IMAGE
Ha Long Bay VIETNAM
Information Security Professional
Provide identity and access management support for the company
Provision, de-provision and reset credentials across platforms like RSA, VPN, Active Directory and databases via the command line and software interfaces
Communicate with specific departments to troubleshoot technical issues following escalation procedures
Execute manual corrective action due to a failed automated task
Utilize SailPoint and CyberArk technologies to verify identities
IMAGE
Tokyo JAPAN
Service Desk Technician
Diagnose and troubleshoot end-user desktop application issues and provides an appropriate solution
Support end-users in their use of applications such as Microsoft Office, VPN, Citrix, and MDM (mobile device management)
Performs account management and maintenance for various applications and systems (e.g., creates or modifies user accounts and permissions, and performs password resets).
Communicates with customers at all levels of technical and non-technical skills sets
IMAGE
Seoul SOUTH KOREA
Voting Systems Technician
Perform and document quality assurance tests for voting machines while maintaining accurate record keeping and chain of command in compliance with the laws of the state
Provide onsite technical support for polling places
Audit post-election results
IMAGE
New York UNITED STATES
Cyber Analyst Apprenticeship
DEFENSIVE SKILLS
Utilized virtual machines to practice utilization of Wireshark and tcpdump to monitor network traffic and perform packet analysis to identify and track anomalous activity
Find compromised Linux hosts by analyzing log files and packet capture files to discover the movements/pivots of a simulated attack and utilizing information to identify possible recommendations to remediate vulnerabilities and resecure systems to limit breach impact
Found registry changes created by malware on Windows machines with RegShot to understand its behavior. Performed an analysis of SQL injection log records to find attacker IPs and data stolen
OFFENSIVE SKILLS
Performed reconnaissance and found vulnerabilities on Windows and Linux machines using Nmap, Nessus and Spiderfoot
Ran command line exploits on Windows and Linux machines by using reverse shells and backdoors
Exploits conducted on Windows machines such as password list attacks, hashdumps and escalated privileges with Metasploit.
Performed SQL and command injection on insecure websites.