I am a passionate and competent Cybersecurity and Information Security professional, currently interested in Physical Security and Red Team Operations, Adversarial Emulation, Physical and Electronic PenTesting.I deliberately anonymize my LinkedIn profile, but all of my information is present within my Cover Letter and Résumé that I will send towards opportunities I am interested in, or as per request from an interested party that may reflect a strong mutual fit.I have experience in critical infrastructure protection, penetration testing, compliance management, vendor management, business leadership, vulnerability analysis, threat modeling, risk analysis, data privacy law, data loss prevention, identity access management, IDS, EDR, network monitoring, hardware repair, systems hardening, and many other IT and InfoSec related skill sets.Hands on experience with Tenable.SC, Tenable.IO, Nessus, Splunk, ServiceNow, Wireshark, Portswigger BurpSuite, Metasploit/Meterpreter, Shodan, nmap, zenmap, nikto and many other integrated cybersecurity and pentesting tools.In depth experience with Unix Systems Administration, Kali Linux, Ubuntu Linux, Debian Linux, Red Hat Enterprise Linux, macOS, Windows, Office 365 and many others.If I have applied to your organization, thank you for your consideration.
Freelance
-
Information Technology And Information Security ConsultantFreelance Aug 2023 - Present• Technical Writing (Policy and Procedure, Incident Response and Disaster Recovery Playbooks, Stakeholder Reporting, Rules of Engagement, SLAs, Personnel Training / Instruction Manuals, Social Engineering Training).• O!er Freelance Solutions for Small, Medium and Enterprise Level Businesses in regard to IT and Cybersecurity related problems.• Data Loss Prevention, Network Design, Installation, Segmentation, Monitoring, Firewall Design, Intrusion Detection.• RAID Set Con"iguration, Server Build and Backup Planning• Software Solutions and Vendor Management.• Compliance Frameworks / GRC (PCI DSS, SOX, NIST CSF, ISO 27001, GLBA).• Endpoint Detection Response (Rapid7, Splunk, Azure, AWS)• Threat Modeling (Mitre ATT&CK) against Advanced Persistent Threats, Adversarial Simulation, Blackbox Testing / Penetration Testing.• Basic Task Automation (Powershell, Python3, Bash)• Hardware Con"iguration and Repairs (Extensive Hands-On Experience).• Cryptographic Algorithm Evaluation / Advice (AES, RSA, TLS, CBC, etc.)
-
Cyber Security AnalystPrefer Not To Share Jul 2023 - Present
-
Cyber Security AnalystIntentionally Witheld Oct 2023 - Nov 2024RemoteStay abreast of emerging Advanced Persistent Threats and groups, Vulnerability Analysis and Mitigation, Threat Modeling, Security Operations Center reporting, Critical Infrastructure Security, Auditing against Security Framework and SOP, Compliance Testing
R A Education Details
-
Cybersecurity -
Cybersecurity -
Cybersecurity
Frequently Asked Questions about R A
What company does R A work for?
R A works for Freelance
What is R A's role at the current company?
R A's current role is Cybersecurity Consultant, Technical Writer, Information Technology Professional.
What schools did R A attend?
R A attended Liberty University, Massachusetts Institute Of Technology, Massachusetts Institute Of Technology.
Not the R A you were looking for?
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial