JAN KUSTER
Cybersecurity Engineer
Address: Postal Code, City, Country Full Working Rights
Email: jan.kuster@gmail.com Full UK Driving license
Contact: +44 12345678 LinkedIn | Git Hub
Summary:
Enthusiastic and detail-oriented cybersecurity professional with a strong foundation in securing network infrastructures, troubleshooting security issues, and implementing effective security measures. Proficient in various security tools, risk analysis, and security protocols. Eager to apply my knowledge in cybersecurity to contribute to a forward-thinking organization’s cybersecurity needs. Dedicated to staying updated on emerging security threats and technologies.
Skills:
- Cybersecurity Fundamentals: Knowledge of firewalls, intrusion detection systems, and security information and event management (SIEM).
- Network Security: Experience in securing both physical and virtual network infrastructures.
- Risk Management: Conducting vulnerability assessments and identifying potential threats.
- Compliance and Standards: Familiarity with GDPR, ISO 27001, and NIST Cybersecurity Framework.
- Incident Response: Responding to and mitigating cybersecurity incidents.
- Security Software: Proficient with tools such as Wireshark, Kali Linux, Splunk, and Metasploit.
- Operating Systems: Skilled in Windows, Linux, and macOS security configurations.
- Cloud Security: Basic understanding of securing cloud environments (AWS, Azure).
- Programming & Scripting: Python, Bash, and PowerShell for security automation.
- Communication: Ability to explain technical concepts clearly to non-technical stakeholders.
Certifications:
- CompTIA Security+ | [Month/Year]
- Certified Ethical Hacker (CEH) | [Month/Year] (if applicable)
- Cisco Certified CyberOps Associate | [Month/Year] (if applicable)
- AWS Certified Security – Specialty | [Month/Year] (if applicable)
Experience:
Junior Cybersecurity Engineer (Trainee) – Fortray Global Services, UK Mon Year – Present
- Performed regular vulnerability assessments and penetration tests on internal systems to identify potential weaknesses and ensure compliance with industry security standards.
- Monitored security information and event management (SIEM) tools, responding to real-time security alerts, and escalating high-priority issues to senior team members.
- Utilized threat intelligence tools to identify and analyze suspicious network traffic, contributing to the development of threat-hunting techniques to proactively combat cyber threats.
- Assisted in investigating security incidents, documenting findings, and implementing solutions to prevent similar occurrences in the future.
- Helped create and maintain detailed incident response procedures to ensure quick action when a potential security incident occurred.
- Configured and maintained enterprise-level firewalls, ensuring proper rule sets were applied and network traffic was filtered according to security policies.
- Assisted in the timely deployment of security patches and software updates across all devices and systems to prevent exploitation of vulnerabilities.
- Supported the creation of materials for internal security awareness programs, educating staff on cybersecurity best practices and safe use of company networks.
Education:
Master of Business Administration – University of XYZ, Country xxxx-xxxx
Bachelor in Business Administration – University of XYZ, Country xxxx-xxxx