Profiles search
Olivia Keohane
Cybersecurity System Analyst at Con Edison
New York, NY, United States
Details
Experience:
2023 : Present
Con Edison
Cybersecurity System Analyst
2021 :
Con Edison
Management Associate
2015 : 2020
Manhattan College
Student
Provided assistance to paralegals and attorneys in a real estate and development law firm.
Printed and organized closing and purchase packages for attorneys.
Scanned and sent completed paperwork to the corresponding lenders.
Scanned and accordingly stored old files into an online database.
Made calls to clients to confirm and ensure preparedness for their closings/purchases.
2019 : 2019
Topkins & Bevans
Summer Intern
Wait staff and host position responsible for focus to all customer, staff and management needs. Accountable for accurate accounting for all receipts. Oversight of customer deliveries, pick-ups and restaurant operations.
2017 : 2018
Bella Notte Pizzeria
Food Service Worker
Con Edison
Cybersecurity System Analyst
2021 :
Con Edison
Management Associate
2015 : 2020
Manhattan College
Student
Provided assistance to paralegals and attorneys in a real estate and development law firm.
Printed and organized closing and purchase packages for attorneys.
Scanned and sent completed paperwork to the corresponding lenders.
Scanned and accordingly stored old files into an online database.
Made calls to clients to confirm and ensure preparedness for their closings/purchases.
2019 : 2019
Topkins & Bevans
Summer Intern
Wait staff and host position responsible for focus to all customer, staff and management needs. Accountable for accurate accounting for all receipts. Oversight of customer deliveries, pick-ups and restaurant operations.
2017 : 2018
Bella Notte Pizzeria
Food Service Worker
Company:
Con Edison
About
I am a System Analyst in Con Edison’s Cybersecurity Operations. I’m a member of the Threat and Vulnerability Management Team where we are responsible for strengthening Con Edison’s security posture. This is achieved through vulnerability management governance, threat hunting, attack surface reduction, and the use of threat intelligence.