Anna Gustova Email and Phone Number
Experienced Cyber Security Specialist with a strong background in Linux and Windows system administration. Skilled in identifying, troubleshooting, and resolving complex security issues. Known for a detail-oriented approach and adept problem-solving abilities, I excel in enhancing organizational security measures and protocols.
Fcci Insurance Group
View- Website:
- fcci-group.com
- Employees:
- 1120
-
Security AdministratorFcci Insurance GroupSarasota, Fl, Us -
Associate Security AdministratorFcci Insurance Group Jul 2023 - PresentSarasota, Florida, Us• Security Implementation: Leading the deployment of security measures to safeguard network and system resources, utilizing advanced tools and methodologies.• Monitoring and Response: Vigilant monitoring of request and ticket queues to manage network resource provisioning and access modifications efficiently.• Threat Intelligence: Actively performing threat analysis and monitoring using current security tools. Responsible for the installation, maintenance, and effective use of security-focused systems.• Liaison Work: Serving as a crucial link between IT and business units to foster support for and adoption of security policies, vulnerability remediation, and best practices.• Security Improvement: Implementing, testing, and monitoring IT security enhancements. -
Cyber Security EngineerByte Federal, Inc Aug 2021 - Jul 2023Venice, Fl, Us• System Security Design: Develop comprehensive plans and specifications for enhancing existing systems and implementing new security solutions.• Policy Development & Risk Assessment: Formulate and write security policies, protocols, and procedures, focusing on risk assessment and incident response strategies.• Linux Server Management: Administer Linux servers including setup, hardening, user management, and webhook creation. Automate security tools using Python scripts.• Security Monitoring: Vigilantly monitor systems for signs of intrusion or unusual activity, ensuring rapid response to potential threats.• Training & Awareness: Conduct both technical and non-technical security meetings and training sessions to promote security awareness across the organization.• Troubleshooting & Software Configuration: Troubleshoot security issues and configure software to align with stringent security requirements.• Physical Security Management: Oversee the physical security of company assets, implementing hardware authentication devices for enhanced access control.• PGP Encryption Implementation: Set up end-to-end PGP encryption for all employees, enhancing the security of email communications and data integrity.• IT Infrastructure Monitoring: Install and configure open-source tools for monitoring IT infrastructure, ensuring comprehensive oversight of networks, servers, and cloud services.• Incident Response & Prevention: Lead investigations into security incidents, delivering actionable recommendations to prevent future occurrences.• Penetration Testing: Conduct regular penetration tests to identify and address vulnerabilities.• Reporting & Compliance: Generate detailed reports and provide essential support during audits to ensure compliance with security standards. -
Cyber Security StudentFlatiron School Jun 2021 - Sep 2021New York, New York, Us• Cybersecurity Practices: Engaging in the practice of protecting systems, networks, and programs from digital attacks, applying theoretical knowledge to practical scenarios.• Tool Proficiency: Gaining hands-on experience with a variety of cybersecurity tools, including nmap, Metasploit, Wireshark, and Burp Suite, to secure systems effectively.• Operating Systems Management: Demonstrating proficiency in both Windows and Linux operating systems, applying security measures and understanding system vulnerabilities.• Network Protocol Knowledge: Developing a strong understanding of network protocols such as TCP/IP, SSH, DNS, HTTP/HTTPS, and their implications on cybersecurity.• Threat Intelligence and Log Analysis: Studying threat intelligence and conducting log analysis to identify potential security breaches and understand attack vectors.• Hunt Analysis & SIEM: Delving into hunt analysis and gaining insights into Security Information and Event Management (SIEM) systems to detect and respond to threats.• Virtualization Techniques: Utilizing VirtualBox for virtualization projects, creating simulated environments for testing and learning.• Programming -
Treatment Plan CoordinatorCozy Dental Jul 2018 - May 2021• Patient Consultations: Conduct initial consultations with patients to discuss their dental health and treatment goals, ensuring a clear understanding of their needs.• Treatment Planning: Collaborate with dentists to develop and present comprehensive treatment plans, outlining procedures, timelines, and expected outcomes.• Financial Coordination: Navigate patients through financial options, including insurance benefits, payment plans, and alternative financing solutions.• Scheduling Management: Coordinate and optimize appointment schedules to ensure efficient treatment progress while accommodating patient availability.• Follow-up and Communication: Maintain regular communication with patients regarding their treatment plans, including follow-up appointments and adjustments to care plans as needed.• Education and Advocacy: Educate patients about oral health, the importance of treatment adherence, and preventive care practices.• Administrative Support: Manage patient records and documentation, ensuring accuracy and confidentiality in accordance with healthcare regulations. -
Law StudentKazan State University Sep 2014 - May 2018Kazan, Tatarstan, Ru• Legal Research and Analysis: Conducting extensive legal research using various resources, including law libraries and digital databases, to support course assignments and projects.• Case Study and Review: Engaging in case studies, analyzing court decisions, and interpreting legal texts to develop a comprehensive understanding of various legal principles.• Legal Writing: Developing proficiency in legal writing, drafting memos, briefs, and reports as part of academic coursework.• Class Participation and Discussions: Actively participating in classes, seminars, and discussions, contributing thoughtful and well-researched viewpoints on legal topics.
Anna Gustova Education Details
-
Flatiron SchoolCyber Security Analyst -
Kazan State UniversityLaw
Frequently Asked Questions about Anna Gustova
What company does Anna Gustova work for?
Anna Gustova works for Fcci Insurance Group
What is Anna Gustova's role at the current company?
Anna Gustova's current role is Security Administrator.
What schools did Anna Gustova attend?
Anna Gustova attended Flatiron School, Kazan State University.
Who are Anna Gustova's colleagues?
Anna Gustova's colleagues are Ryan Bode, Popm, Aic-M, Aic, Api, Ains, Bill Simon Mba Au, Connie Cook, Dan Sibley, Manny Sardina, Jose Ventura Molina, Marcos Rodriguez.
Free Chrome Extension
Find emails, phones & company data instantly
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial