Kelly Nicholson. Summary



Similar documents
University of Central Florida Class Specification Administrative and Professional. Information Security Officer

Please contact Cyber and Technology Training at for registration and pricing information.

Online Computer Science Degree Programs. Bachelor s and Associate s Degree Programs for Computer Science

National Initiative for Cybersecurity Education

How To Become A Cybersecurity Consultant

INFORMATION TECHNOLOGY

Click to edit Master title style. How To Choose The Right MSSP

Italy. EY s Global Information Security Survey 2013

Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM

Creating places for people to share activities, data and documents within and between energy companies.

Information Technology Division

Bachelor of Science Degree Cyber Security Advancing the nation s workforce one graduate at a time

Information Systems and Tech (IST)

Demonstrate an ability to utilize generally accepted accounting principles and managerial/cost accounting practices.

CyberSkills Management Support Initiative

Cyber security tackling the risks with new solutions and co-operation Miikka Pönniö

Connecting PTE to Careers in Idaho

Allegany College of Maryland. 239 Cisco Networking 2 * Offered Fall semester and

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.

Director, IT Security District Office Kern Community College District JOB DESCRIPTION

Case Study: Hiring a licensed Security Provider

Software Development

EMBA DELIVERED IN PARTNERSHIP WITH UIBE

Pi Epsilon-at-Large Chapter Sigma Theta Tau International Honor Society of Nursing

North American Electric Reliability Corporation (NERC) Cyber Security Standard

Network Management and Defense Telos offers a full range of managed services for:

3rd Party Assurance & Information Governance outlook IIA Ireland Annual Conference Straightforward Security and Compliance

Governance, Risk, and Compliance (GRC) White Paper

Corporate Overview. MindPoint Group, LLC 8078 Edinburgh Drive, Springfield, VA Office: Fax:

Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform

Apply today: strayer.edu/apply SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY MASTER OF SCIENCE IN INFORMATION SYSTEMS RECOGNIZED MARKETABLE FLEXIBLE

Risk Calculation and Predictive Analytics: Optimizing Governance, Risk and Compliance.

LYNN ROY THACKERAY 615 South 680 East Payson, UT 84651

Vendor Risk Management Financial Organizations

Report on CAP Cybersecurity November 5, 2015

IT Risk & Security Specialist Position Description

smith EMBA just like you steady driven Determined Motivated confident Ambitious

The Benefits of Managed Services at

Caretower s SIEM Managed Security Services

Police Organization and Administration. CJ 3600 Professor James J. Drylie Week 6

Joshua Tuscan. Summary. Experience. Creative Technologist and UI Developer at KNI

defense through discovery

1. Software Engineer (I, II, and III)

Information Technology 2015 Programmes

THE NATIONAL CYBERSECURITY WORKFORCE FRAMEWORK. USER GUIDE Employers

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)

CLASSIFICATION SPECIFICATION FORM

Auditing emerging cyber threats and IT controls

How To Become A Computer Scientist

OVERVIEW DEGREES & CERTIFICATES

William E. Ayen, Ph.D. Department of Information Systems College of Business and Administration University of Colorado at Colorado Springs

MAQ Software is a digital marketing and technology company that helps customers reach markets effectively on time and on budget.

Bellevue University Cybersecurity Programs & Courses

TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series

Job description. Job title: Server Infrastructure Analyst 1

Continuous Network Monitoring

NERC Cyber Security. Compliance Consulting. Services. HCL Governance, Risk & Compliance Practice

Middle Class Economics: Cybersecurity Updated August 7, 2015

Graduate Business Programs

SIEM 2.0: AN IANS INTERACTIVE PHONE CONFERENCE INTEGRATING FIVE KEY REQUIREMENTS MISSING IN 1ST GEN SOLUTIONS SUMMARY OF FINDINGS

Kiefer Consulting, Inc Job Opportunities

We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review

Associate s Degree Program

Required Software Product List

Professional Services Overview

Online Master of Business Administration (MBA)

CONTENT. King Hussein Faculty of Computing Sciences

08/10/2013. Data protection and compliance. Agenda. Data protection life cycle and goals. Introduction. Data protection overview

Testimony of Dan Nutkis CEO of HITRUST Alliance. Before the Oversight and Government Reform Committee, Subcommittee on Information Technology

Resume and cover letter writing are part of STEP #5: Pre-Employment/Job-Hunting of the Career Development process.

As an added value, you ll be able to take advantage of our reasonable NYS tuition rates.

IBM Rational AppScan: Application security and risk management

The Department of the Army Public Affairs Intern Program

Computer Information Technology

Online Master of Business Administration (MBA)

Required Software Product List

The Emergence of Security Business Intelligence: Risk

Jibran Ilyas DIRECTOR

Systems Programmer/Analyst (12203) ( )

Closure - participate in post-project debrief sessions and provide knowledge transfer as appropriate.

IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach.

MySQL Web Development PHP. System Administration XML APIs. Large Scale Systems Implementation. Amazon Web Services (AWS) Shell Scripting

Executive Management of Information Security

Transcription:

Kelly Nicholson knichol5@ycp.edu Summary Kelly Nicholson is a diligent and motivated professional with over six years of experience in the Security field. She prides herself on her communication and technical skills as well as her analytical ability. With her military background, it comes as no surprise that she found her passion and calling in Cybersecurity. With a proficient attention to detail, Kelly excels at mastering and configuring new software to suit corporate needs while meeting compliance standards. She enjoys researching and discovering security vulnerabilities and recommending best practice methods for remediation. Projects PCI Risk Assessment September 2014 to Present Conduct a risk assessment using the Octave Allegro Risk Assessment Methodology and Practical Threat Analysis software Define assets, threats, and vulnerabilities within cardholder environment Determine appropriate mitigating countermeasures Assess inherent and residual risk before/after countermeasures Recommend and justify mitigation strategy Website Development: Samples of site development expertise, project management & witing abilities 2012 to Present I created this website during my senior year of college to fulfill dual functions for two college courses: Project Management and Integrated Business Concepts. The site was built using JavaScript, Shockwave Flash Objects, CSS, and HTML, all constructed using Adobe Dreamweaver software. Contents within the site include Gantt charts created with Microsoft Projects, as well as various samples of my writing in report format. Project Management Website & Coursework Management Information Systems Website & Coursework Experience July 2014 - Present (7 months) ISSO at Textron Systems Page1

2014-2014 (less than a year) Security Analyst I at Parsons Brinckerhoff 2013-2014 (1 year) Information Security Intern at nsylvania 2012-2013 (1 year) Security Forces Specialist at United States Air Force Security Forces 2008-2012 (4 years) Languages Spanish Skills & Expertise Security System Administration Leadership Management Information Assurance Reporting & Analysis Threat & Vulnerability Management Active Directory SIEM Vulnerability Management Security Policy Incident Response Network Administration Project Management Information Technology Troubleshooting Disaster Recovery Microsoft Office Education University of Maryland University College Bachelor of Science (B.S.), Cybersecurity, Business Administration, 2009-2015 Activities and Societies: Upsilon Pi Upsilon International Honor Society EnCase OnDemand Training EnCase Enterprise, Forensic Examiner, 2014-2014 SEI Training - Carnegie Mellon University Octave Allegro Risk Assessment Methodology, 2014-2014 Page2

Computer Information Systems, 2012-2013 Activities and Societies: Information Security Intern 2 recommendations available upon request Courses Bachelor of Science (B.S.), Cybersecurity, Business Administration University of Maryland University College Foundations of Cybersecurity CSIA 301 Foundations of Information System Security CSIA 303 Network Security CMIT 320 Relationship Database Concepts & Applications CMIS 285 Computer Systems Architecture CMIS 310 Computer Information Systems Management Information Systems IFS 305 Network Server Design IFS 335 Business Analytics: Data Mining IFS 465 Project Management IFS 435 Business Strategy BUS 495 Integrated Business Experience BUS 494 Honors and Awards Article Published for Politics Interview Louis A. Arana-Barradas July 2008 Interviewed for Vote of Confidence article within United States Air Force Airman Magazine; http:// www.rs.af.mil/recruiteronline/story.asp?id=123105414 Received over 9 military challenge coins for outstanding individual achievements Air Force ranks O6 and higher July 2009 Military units and organizations utilize military challenge coins as a method to recognize outstanding individual achievements or show appreciation. Military coins are powerful symbols that promote pride, build cohesion, and increase morale within an organization. Selected to perform 63rd Air Force Anniversary "Cutting of the Cake" Ceremony Lieutenant General Jeffrey Remington and Chief Master Sergeant Stephen Ludwig December 2010 Page3

Personally selected to represent and perform Osan Air Base's 63rd Anniversary"Cutting of the Cake" Ceremony at the Air Force Ball with Lt Gen. Remington, 7th Air Force commander, and 7th Air Force Command CMSgt Ludwig Airman of the Quarter 51st Security Forces Squadron April 2010 Recognized and awarded title for superior leadership, job performance, community involvement, and personal achievements. Basic Military Training Honor Graduate USAF April 2008 Air Force Achievement Medal Colonel Roland K. Van Deveenter March 2010 Organizations ISACA January 2012 to Present IEEE May 2011 to Present Honors and Awards Dean's List Page4

Kelly Nicholson knichol5@ycp.edu 2 people have recommended Kelly "Kelly and I engaged in a mentor relationship in Fall 2012 and it's quickly evolved into an entrepreneurial advisory role based on her unique skill set and goals. Kelly demonstrates highly developed time-management skills that compliment her IT security & policy writing experience perfectly. Kelly is a strong communicator and a mature professional for this early stage in her career. I heartily recommend Kelly and hope to continue working on new ideas and projects." Patti Stirk, President & CEO, Star Systems Engineering, Inc., advised Kelly at "Kelly is an intelligent, dynamic, and highly motivated young woman. She helped set the bar for academic performance in the classroom. Her questions were always thoughtful and relevant to the classroom discussion. If my students were a pool of job applicants, I would hire Kelly over 99% of the others." Eric Hostler, Assistant Professor of Information Systems, nsylvania, taught Kelly at Contact Kelly on LinkedIn Page5