A highly passionate, detail-oriented and self-motivated Cyber Security Analyst with passion for aligning security architecture plans and processes with security standards and business goals. Extensive experience in security frameworks for cloud-based software. Possess an in-depth understanding of security control implementation and enforcement. Provide effective skills to proactively complete projects and assignments on time while working autonomously or in teams in a fast-paced environment. Goal-oriented IT professional with significant success in planning, analyzing and implementing of security plans and initiatives.
Mac Jason Consults
-
Information System Security AnalystMac Jason Consults Sep 2022 - PresentTexas, United States• Performed forensic investigations following incidents to identify root causes, assess damage, and recommend appropriate mitigations or improvements in processes or tools.• Deep understanding of SOX regulations and their applications to IT systems and processes.• Select and tailor appropriate controls that are applicable to the system.• Collaborated with IT teams to integrate security best practices into system development and operations.• Generate vulnerability reports from scans detailing critical, high, medium, and low vulnerabilities that are needed to be remediated and collaboratively worked with system administrators' team to ensure vulnerabilities are remediated• Develop System Security Plan (SSP) to provide overview of system security requirements and describe controls in place or planned by information system owners to meet those requirements• Evaluated emerging technologies and made recommendations for strategic investments in information security tools and resources.
-
Cyber Security AnalystMac Jason Consult Jun 2020 - Aug 2022Houston, Texas, United States• Identify potential threats and vulnerabilities within the system and applications by continuously monitoring security tools and analyzing logs and data.• Utilize advanced threat intelligence to stay ahead of emerging cyber threats and vulnerabilities.• Perform in-depth analysis of malicious activities, including malware, phishing, and intrusion attempts.• Lead incident response efforts, including the identification, containment, eradication, and recovery from security incidents.• Implement measures to prevent future attacks or mitigate their impact. This includes updating or patching systems, configuring security tools, and hardening network defenses.• Conducted regular reviews of company policies and procedures for alignment with regulatory requirements and industry best practices.• Developed and provided all documentation necessary for performing a Security Control Assessment• Contributed to the development of company-wide cybersecurity awareness campaigns, fostering a culture of vigilance among all employees.• Prepared documentation and records for upcoming audits and inspections.• Provide on-going evaluations and validation of IT control effectiveness and internal business processes as they relate to compliance activities within areas of responsibility.• Supported the implementation of a robust identity and access management system, enhancing overall security posture by limiting unauthorized access to critical systems and data.• Ensured compliance with industry regulations by performing comprehensive audits on existing security policies and procedures.
-
Compliance AnalystMac Jason Consult Apr 2019 - Jun 2020Houston, Texas, United States• Conducted regular reviews of company policies and procedures for alignment with regulatory requirements and industry best practices.• Managed controls post-authorization to ensure continuous compliance with the security requirements• Enhanced regulatory compliance by conducting thorough risk assessments and implementing effective control measures.• Reviewed contracts and agreements for adherence to legal requirements, reducing potential liability exposure for the company.• Assisted in the development of a comprehensive risk assessment framework for evaluating potential threats to organizational compliance systems.
Precious Brown Education Details
-
Business Administration, Management And Operations
Frequently Asked Questions about Precious Brown
What company does Precious Brown work for?
Precious Brown works for Mac Jason Consults
What is Precious Brown's role at the current company?
Precious Brown's current role is Cyber Security Analyst.
What schools did Precious Brown attend?
Precious Brown attended Imo State University.
Not the Precious Brown you were looking for?
-
Precious Brown
With Over 10 Years Of Analytical And Technical Work, I Am Organized, Efficient, Detail Oriented, And Conscientious.Arlington, Tx1theamyntagroup.com -
-
Precious Myers-Brown 💎
Washington, Dc -
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial