John Mercure, Jr,
Details
Springboard
2021 : 2022
Master's degree
Cybersecurity
Grand Canyon University
2019 : 2020
Bachelor of Arts - BA
Information Systems
California State University, Fullerton
security, identity and access management, application security, network scanning, packet capture
analysis, and vulnerability assessment. Includes the use of tools such as Wireshark, Splunk, Kali
Linux, and Nmap. I Participated in weekly live 1 : 1 mentoring sessions with an industry experienced cybersecurity professional, and successfully completed a final capstone project,
Artemis Penetration Test that was reviewed by an independent industry
• Gathered documents and security requirements to support enterprise security initiatives.
• Worked with IPS, vulnerability scanning/management, system hardening, security standards, data loss prevention solution, and endpoint detection and response.
• Ensured information security assets are maintained and inventoried.
• Worked with IPS, vulnerability scanning/management, system hardening, security standards, Data Loss Prevention (DLP), Microsoft Office, Word, Excel, Powerpoint, and endpoint detection and response.
Other Completed Projects :
System Hardening
Desktop Virtualization
Small Lab Design
Zero-Trust Presentation
Technical Security Assessment
Software Test
Security Assessment
SOC Strategy Presentation
Computer Forensic Lab
Python for Cybersecurity
AWS PCI DSS
PowerShell for Cybersecurity
Social Engineering
The Software Development Lifecycle
Web Application Vulnerability Remediation
Topics Covered :
Network scanning tools
Packet capture and log analysis
SIEM technology
IDS and IPS administration
Threat intelligence
Vulnerability assessments
Incident response
Digital Forensics
Kali Linux
IT Project Management
Host-Based Security
Network Security
Identity and Access Management
Security Assessment and Testing
Security Operations
2021 : Present
Springboard
Cybersecurity Fellow - Risk Assessment
• Monitored hardware, and responded to tickets, rebooting servers, firewalls, and Cisco extenders.
• Updated status of incident records and work orders, utilizing tracking software for change management records and hardware repair.
• Troubleshooted hardware such as firewalls, switches, servers, gateways, racks, extenders, and mainframe computers.
• Processed tapes and analyzed data accuracy in the database of creation dates, retention dates, and the number of records to facilitate the destruction of tapes, increasing response time by 25% per day.
• Created Excel spreadsheets with data including dates, serial numbers, asset tags, tracking numbers and hardware make, utilizing CG4 software and HPAM database, resulting in faster retrieval of information.
2004 : 2020
Fiserv
Information Technology Specialist
Skills
Active Directory, Amazon Web Services (AWS), Android, Authentication, CLI, Cloud Computing, Cloud Security, Computer Networking, Cybersecurity, Ethical Hacking, Firewalls, Identity & Access Management (IAM), Information Security, Information Security Management, Information Technology Planning, Internet of Things (IoT), iOS, Kali Linux, Linux, Microsoft Azure, Network Administration, Network Architecture, Network Security, Nmap, OAuth, OpenID Connect, Penetration Testing, Real Estate, Secure Sockets Layer (SSL), Security Audits, Security Awareness, Security Management, Security Testing, Server Administration, System Administration, Technical Support, Tenable Nessus, Threat & Vulnerability Management, Threat Detection, Threat Management, Threat Modeling, Unix, Virtualization, Web Application Security, Web Application Security Assessment, Windows 10, Windows Security, Windows Server, Windows System Administration, Wireshark
About
I am looking for a position as a Cybersecurity Analyst, Cybersecurity Specialist, or anything else related to cybersecurity. I love working in cybersecurity because of the solutions to combat hackers. It is good to prevent somebody from creating a blue screen, or a disruption of service. The following is what I did for my Capstone project:
Completed a full-scale Cyber Security vulnerability assessment for a local business. Assessed network, systems, antiviruses, malware, cloud security, and other tests to determine vulnerabilities. Tools: Threat Analysis, Penetration Testing, Vulnerability Scanning, IAM, and other tools.
The following is my skills:
Programming: SQL, Python, MySQL, Perl, Java, HTML5, CSS. Systems: Windows, Linux, Unix. Security: Incident response, risk mitigation, data encryption, key management, malware, intrusion detection, ID/IPS, DLP, SIEM, vulnerability scanning, web gateway, proxy appliances, antivirus tools, CASB, Saas, MITRE ATT&CK, penetration testing. Software Applications: Excel, Access, Word, Wireshark, Edraw VM Box, Virtual Box, Microsoft Office Other: Change Management, JCL, NMAP, TCP/IP, TCP.