Cybersecurity Engineer | Network Engineer | Developer | A/V 
 Founder of CyberSeidon
            Tenacious cyber security professional with over 5 years experience in various areas of tech. Ascertained a diverse set of skills expanded across all security domains, 
              in preparation to align with the global wave of incoming cyber security threats.
              
              
              
              
              
              
              
              
              
              
              
              
              
              
              
              
              
              
              
              
              
              
              
  
            EC-Council |  Certified Ethical Hacker (CEH) |
             PDF
            
            Adam Kim | IOT (FILL IN LATER) |
            About
        
  
            ▪ Configured Palo Alto's Prisma Access, Zero-Trust Archtecture
            
            ▪ Developed and Tuned DLP policies to protect sensitive data
            
            ▪ Lead and conducted Red Team Physical Security assessments
            
            ▪ Administered Purple Team engagements to improve security posture.
            
            ▪ Automated security tasks with PowerShell and powershell.
            
            ▪ including all duties from Cybersecurity Engineer I.
            
          
  
            Google | IT Automation & Python |
             PDF
            
            Adam Kim | Threat Hunter's Collection PS Script |
            About
        
  
  
            ▪ Secured 3 billion in assets, 200,000+ members, and 600+ employees.
            
            ▪ Acted as the project lead to execute a SIEM deployment (Arctic Wolf).
            
            ▪ Investigated security alerts to respond, triage, and report adverse events.
            
            ▪ Continuously tuned the SIEM, EDR, NAC, and DLP to reduce noise and discern false positivess.
            
            ▪ Performed incident response/handling against external and internal threats.
            
            ▪ Queried and manipulated data in a variety of platforms & formats to threat hunt for malicious activity.
            
            ▪ Coordinated across teams to deliver business objectives and drive improvements to processes/policies.
            
            ▪ Drafted documentation which articulate the analysis of vulnerabilities, impact, and remediation techniques.
            
            ▪ Presented vulnerability management progress to the board & C level executives.
            
            ▪ Evaluated security vendors to ensure alignment with company strategic, tactical, and operational plans.
            
            ▪ Responded to security audits to reduce company risk and liabilities. 
            
            ▪ Authorized cybersecurity training to ensure the training material met the company’s security culture.
            
            ▪ including all duties from Cybersecurity Analyst.
            
          
  
  
            ▪ Secured cyber activity of 3 billion in assets, 200,000 members, and 450+ employees.
            
            ▪ Monitored, Triage, and Incident Response (SIEM, EDR, DLP, IDS/IPS, Proxies, etc.).
            
            ▪ Project lead on deploying the Arctic Wolf SIEM, CISCO ISE (802.1x)
            
            ▪ Created comprehensive security write-ups which articulate security issues, analysis and remediation techniques.
            
            ▪ Conducted pentests and vulnerability remediation for the company and for up and coming audits.
            
            ▪ Provided company wide security awareness training and phishing simulations.
            
    
          
                Providing Pro bono services conducting risk and vulnerability assessments, review the organization’s policies, make recommendations, and implement best security practices.
     
                          ▪ Responded to immediate threats and emergencies for victim businesses of cybercrime. 
                          
       
                          ▪ Recovered business critical operations to meet recovery time objectives and maximum tolerable downtime.
                          
                          ▪ Focused on containment and eradication to stop the kill chain. 
                          
       
                          ▪ Investigated root cause analysis, traffic logs, configuration changes, and persistent footholds.
                          
       
                          ▪ Deployed monitoring solutions: EDR/MDR, Sysmon, NXLog, AppLocker, & enabled command line auditing.
                          
       
                          ▪ Increased security posture by reconfiguring firewalls, hardening systems, and mitigating vulnerabilities.
                          
       
                          ▪ Presented before business owners for security assessments and critical updates throughout the IR cycle.
                        
                
                480 hours in Cyber Security Training:
                          
                          Threat and Vulnerability Management
                          
                          Software and Systems Security
                          
                          Compliance and Assessment
                          
                          Security Operations and Monitoring
                          
                          Incident Response
                          
                          Security Frameworks
                
                          ▪ Managed 25+ desktop PCs not limited to building, upgrading, troubleshooting, and hardening.
                          
                          ▪ Monitored endpoint management for anomalous behavior, unauthorized apps, and deploying patches.
                          
                          ▪ Redesigned the physical & logical network infrastructure including segmenting and maintaining private NAS's,
                          CRM, VoIP, and printers.
                          ▪ Prioritizing network availability, practicing zero-trust, and strengthening security posture.
                          
                          ▪ Threat hunting possible IoC & insider threat via event log, RMM, and manual review.
                          
                          ▪ Strengthened WAPS securely for employees and limited access to visitors.▪
                          
                          ▪ Authored the 23 CRR-NY-500(e) cyber security policy
                          to completion for an associate office, approved by
                          the Department of Financial Services.
                        
                480 hours in Java Developer Training:
                          
                          Exploration of full stack web development with 
                          
                          Java, Spring MVC, hibernate, and OracleDB.
                          
                          Simuluted Agile-Scrum methodologies to ensure
                          
                          deliverables were on met to stake holders with
                          
                          sprint management using Jira/Trello.
                          
                          Exposure to SpringMVC, OOP, multi-threading, JDBC,
                          collections, basic I/O, Concurrency , and JSP serverlets.
                Team lead on multiple A/V projects for HSBC NYC Headquarters and neighboring branches across the tri-state. Accountable for A/V engineering for international conferences of up to 50 participants at one time, room surveys for Cisco telepresence system integrations, logistics, deploying, configuring, and decommissioning of systems.
                Expert in NY & NJ PIP / No-Fault procedures. Responsible for over 450 cases in various stages of litigation on the Supreme and Civil Court calendar in all 5 boroughs. Maintained persistent client relations, office administration, legal support for IME, EBT, 50H, and discovery/response.
                    
B.A. Media Studies
                        
                        Academic focus:
                        
                        Media & Guerrilla Marketing strategies
                        
                        Videography, Live Broadcasting, & screen writing, 
                        
                        Awards:
                        
                        Lincoln Hall Scholarship
Dean's List