Julia Turkevich
Details
Cyber/Computer Forensics and Counterterrorism
University of Maryland Global Campus
2021 : 2024
Introduction to Cybersecurity course
Cybersecurity
Loyola University New Orleans
2020 : 2020
Bachelor of Arts (B.A.)
Political Science (International Relations concentration) and International Development
Tulane University
2011 : 2015
Sustainability and Politics
DIS : Danish Institute for Study Abroad
2013 : 2013
High School Diploma
Sycamore High School
2008 : 2011
2022 : Present
U.S. Department of Homeland Security
Information Security Specialist
2022 : 2022
Boys Town
SOC Analyst
Research : compiles, organizes and updates open source intelligence information on donors in CRM database; analyzes their giving history/behavior to identify patterns that suggest their motivation to support our organization; uses that predictive analysis to tailor communications, cultivate relationships and solicit donations
Data Analysis : Analyzes revenue trends to identify gaps in funding; assesses prospective opportunities and assigns probability of funding; briefs findings to senior staff and Board of Directors and makes recommendations on strategy to close fundraising gaps
Communications : Prepares year-long communications strategy to donor base of 400 constituents; collaborates with national marketing team to prepare tailored web and print materials to specific audiences; performs A/B testing and reviews outcomes to evaluate effectiveness of messaging and materials
2020 : 2022
Boys Town
Development Coordinator
2017 : 2020
Boys Town
Donor Relations Specialist
Research : used VAN software data to identify patterns of low voter propensity; developed goals to increase voter turnout in the geographic target area over 10-week campaign;
Management : Recruited, trained and managed 15 field and phone canvassers, which included setting work priorities, establishing timelines, writing scripts, mapping out canvassing turf, and adjusting workflow; communicated campaign progress and data collection adjustments to canvassers
Data Analysis : Recorded canvassing data into VAN to measure the projected number of residents who planned to vote; analyzed data collection gaps, summarized findings in maps and graphs, and briefed senior staff and funder weekly with recommendations for campaign improvement
2016 : 2016
Women With A Vision, Inc. (WWAV)
Office Manager & Get Out The Vote Assistant
Skills
Adobe Creative Suite, Basic HTML, Bitlocker, CEH, Communication, Critical Thinking, CRM Databases, Customer Relationship Management (CRM), CVE, Cybersecurity, Data Analysis, Database Management System (DBMS), Fundraising, Government, Grant Writing, Incident Response, Interpersonal Skills, Leadership, Leadership Development, Microsoft Office, MySQL, Problem Solving, Prospect Research, Public Speaking, Python (Programming Language), Qualitative Research, Qualtrics, Quantitative Data, Quantitative Research, RDBMS, Relationship Building, Research, Sentinel One, ServiceNow, SharePoint, Snort, Social Media, Social Media Marketing, Splunk, Stewardship, Teamwork, Threat Analysis, Threat Assessment, VAN, Volunteer Management, Vulnerability Management, Wireshark
About
Cybersecurity professional offering valuable research, analysis, and database management skills to future intelligence and cybersecurity roles. Possesses strong intellectual curiosity in national security, counterterrorism, and international relations. Strengths include resourcefulness, communications, problem-solving, and leadership skills. Currently works full-time while pursuing my Master’s degree part-time, demonstrating time management, initiative, and commitment to advancing my career, as well as my ability to multi-task in a fast-paced environment.
Technical: Linux, Windows, security fundamentals, network security architecture, network security assessments, IT policy and procedure development, conducting vulnerability scans and assessments, monitoring and analyzing network traffic (e.g., log files), intrusion detection systems, identifying risks, analyzing threats, mitigation strategies, policy recommendations, authentication best practices, access control policies
Tools: Python, Wireshark, Snort, MySQL Workbench, Nmap, CrypTool2, Kleopatra, BitLocker, OpenStego, OurSecret, Social-Engineer Toolkit, Ettercap, Greenbone Security Assistant, Microsoft Office Suite, Adobe Creative Suite
Writing: Vulnerability Assessments, Security and Risk Assessment Reports, After Action Reports, Joint Briefs, Test Plans, Presentations, Quantitative and Qualitative Research