Kelby Chambers
Details
BS: Cybersecurity, Information Technology
Grade: Summa Cum Laude 3.945
Activities and societies: National Society of Leadership & Success (Sigma Alpha Pi) Executive Member
• Developed solid understanding of managing, operating, and protecting critical computer systems, information, infrastructures, and communications networks from cybercrime, cyber fraud, and cyber espionage.
• Acquired strong skills in planning, implementing, upgrading, and monitoring security measures to protect computer networks and information.
• Learned process of assessing system vulnerabilities for security risks and implementing risk mitigation strategies, while ensuring appropriate security controls to safeguard digital files and vital electronic infrastructure.
• Gained knowledge of ethics for cybersecurity digital information protection, cyber workforce development, cyber terrorism, application & information security, digital forensics, and strategic force operation application situations.• Developed solid understanding of managing, operating, and protecting critical computer systems, information, infrastructures, and communications networks from cybercrime, cyber fraud, and cyber espionage. • Acquired strong skills in planning, implementing, upgrading, and monitoring security measures to protect computer networks and information. • Learned process of assessing system vulnerabilities for security risks and implementing risk mitigation strategies, while ensuring appropriate security controls to safeguard digital files and vital electronic infrastructure. • Gained knowledge of ethics for cybersecurity digital information protection, cyber workforce development, cyber terrorism, application & information security, digital forensics, and strategic force operation application situations.
Skills: RFP Generation · Information Security · Security Information and Event Management (SIEM) · Information Technology · Leadership Development · Organizational Leadership · Cyberlaw · Cyber Warfare · Cyber Threat Hunting (CTH) · Cyber Operations · Cyber Threat Intelligence (CTI) · Cyber Defense · Cybersecurity · Leadership · Team Leadership
Full-time · 3 yrs 1 mo
Cyber Security Analyst
As a Cybersecurity Analyst, I am responsible for supporting the implementation and maintenance of the admin rights revocation program.
It is my duty to promptly respond to software requests and conduct thorough evaluations of new software to ensure their alignment with rigorous security standards, thus safeguarding our digital environment from potential vulnerabilities.
I have excelled at leading an in-house team to execute the seamless acquisition and integration of comprehensive vulnerability and patch management initiatives.
Furthermore, I analyze security incidents and provide well-informed recommendations for mitigation and prevention strategies to ensure timely and effective responses to potential threats.
Key Contributions:
• Initiated and managed two RFP projects to acquire new vulnerability management/MDX tools and establish internal programs.
• Decreased phishing failure rate from 25% to 1.7% by developing and implementing robust initiatives
• Handled a substantial volume of actionable alerts.
• Implemented tools and processes to facilitate a Median Time to Acknowledge of 7 minutes and a Median Time to Remediate of 1hr across all alerts and threats.
• Participated in performing security audits and assessments to enhance overall security posture.
• Identified and addressed potential threats by monitoring and analyzing security incidents using SIEM and IDS/IPS tools.
• Conducted vulnerability assessments and assessed penetration testing results to identify security vulnerabilities.
• Established and implemented security policies/protocols to maintain alignment with prevailing security regulations.As a Cybersecurity Analyst, I am responsible for supporting the implementation and maintenance of the admin rights revocation program. It is my duty to promptly respond to software requests and conduct thorough evaluations of new software to ensure their alignment with rigorous security standards, thus safeguarding our digital environment from potential vulnerabilities. I have excelled at leading an in-house team to execute the seamless acquisition and integration of comprehensive vulnerability and patch management initiatives. Furthermore, I analyze security incidents and provide well-informed recommendations for mitigation and prevention strategies to ensure timely and effective responses to potential threats. Key Contributions: • Initiated and managed two RFP projects to acquire new vulnerability management/MDX tools and establish internal programs. • Decreased phishing failure rate from 25% to 1.7% by developing and implementing robust initiatives • Handled a substantial volume of actionable alerts. • Implemented tools and processes to facilitate a Median Time to Acknowledge of 7 minutes and a Median Time to Remediate of 1hr across all alerts and threats. • Participated in performing security audits and assessments to enhance overall security posture. • Identified and addressed potential threats by monitoring and analyzing security incidents using SIEM and IDS/IPS tools. • Conducted vulnerability assessments and assessed penetration testing results to identify security vulnerabilities. • Established and implemented security policies/protocols to maintain alignment with prevailing security regulations.
Skills: RFP Generation · Network Security · XDR · MDR · Software as a Service (SaaS) · Information Security · Security Information and Event Management (SIEM) · Information Technology · IT Security Operations · Security Incident Response · Help Desk Support · Cyber Threat Intelligence (CTI) · Cyber Defense · Cybersecurity
Skills
Microsoft Office 365 | Microsoft Defender | Rapid7 IVM | Red Canary | Visio | Azure AD | Cisco Umbrella
Skills: RFP Generation · Network Security · XDR · MDR · Software as a Service (SaaS) · Information Security · Security Information and Event Management (SIEM) · Information Technology · IT Security Operations · Security Incident Response · Help Desk Support · Cyber Threat Intelligence (CTI) · Cyber Defense · Cybersecurity
About
My innermost drive is rooted in a profound desire to assist others, and I always find purpose and clarity in doing so. This same drive propels me to secure the digital safety of individuals and organizations in today's interconnected world.
Holding a bachelor’s degree in Cybersecurity, I have refined my expertise in areas such as cybersecurity analysis, risk assessment, and workforce development. My dedication lies in leveraging this academic foundation to assist businesses and end-users, making sure they navigate the challenges of our digital era safely and securely.
A standout in my field, I excel in implementing and maintaining automated technical security controls as directed by regulatory compliance frameworks. My knack for collaboration with front-line IT and Security teams ensures strict adherence to security standards.
Technical Proficiencies:
Microsoft Office 365 | Microsoft Defender | Rapid7 IVM | Red Canary | Visio | Azure AD | Cisco Umbrella