Taylor Conder
Details
Cybersecurity; Cyber Operations
Utica University
2019 : 2021
Associate’s Degree
Computer Science
Metropolitan Community College
2008 : 2019
• Provide kick-off calls explaining in detail the assessments being performed, and communicate the requirements needed for a successful customer engagement.
• Verify in-scope and out of scope IP ranges, subnets, and systems.
• Interact with customer point of contact as needed throughout the engagement.
• Perform external vulnerability assessments. Tools utilized include NMAP and Nessus to check for vulnerabilities.
• Perform internal vulnerability assessments with a scanning device we provide.
• Conduct firewall reviews.
• Perform social engineering, including onsite, phone calls and phishing campaigns.
• Create assessment summary reports detailing the results of internal, external, and/or social engineering activities.
• Provide a close out call to present the report and discuss and any findings discovered during the assessments.
2022 : Present
10-D, Inc. Academy + Compliance + Info Security
Information Security Analyst
• Running patch updates on servers to maintain and keep current with security patches
• Running security on mail server, AD, and O365 portal
• Running checks on spam filter server to monitor any possible security risks
• Creating VDIs for end users within Citrix Studios
• Resolving VDI issues within VMware and within Citrix Studios
• Coordinating support issues with vendors as needed
• Creating and setting up servers within VMware
2021 : 2022
Crestwood Midstream Partners LP
Junior System Administrator
• Migrated client computers from legacy version of Windows to Windows 10
• Research and troubleshoot issues for end-users
• Upgrading anti-virus software on over 200 machines
• Respond to phish attacks and rapidly mitigate possible threats
• Supported users in remote sites across the country
2020 : 2021
Crestwood Midstream Partners LP
Service Desk Technician
• Responded to service desk tickets submitted by end users for various IT issues, escalating when appropriate
• Answered phone and creating tickets, identifying issues
• Troubleshot IT related issues (hardware, software, network, etc)
• Formatted and imaged computers for company use
• Created any groups needed within AD, and manage the appropriate users within groups
2019 : 2020
Spencer Fane LLP
Help Desk Representative
• Ran patch updates on servers to continue security
• Create and monitor phishing simulations for end users within KnowBe4, and push out necessary training
• Created any groups needed in AD, and manage the group with appropriate users needed within the groups
• Conducted online research, investigated processes, and resolved problems with hardware and software
• Formatted and imaged computers
• Created user accounts, and set up hardware and software for new employees
• Deprovisioned terminated users
• Troubleshoot IT related issues (hardware, software, network), via phone call, email, message, or ticket
• Reached out to vendors for assistance with fixing issues related to their products
2018 : 2019
McAnany Van Cleave & Phillips
IT Support Analyst
Skills
Adobe Acrobat, CompTia IT Fundamentals Certificate, Customer Service, Cybersecurity, Ethical Hacking, Information Security, Information Technology, Laptops, Microsoft Exchange, Microsoft Outlook, multi-tasking, Office 365, Onboarding, Organizational Effectiveness, OSINT, Problem Solving, Project Planning, Servers, Teamwork, Technical Support, Troubleshooting, Vulnerability Scanning, Windows, Windows 7, Windows 10
About
The world has changed. Especially since the pandemic. The threats used to be visible, someone trying to follow you into the office without a badge or casually overlooking your shoulder on a flight. But the world has changed. Business has changed.
The aforementioned threats, they’re still very real, make no mistake about it. But threats have multiplied. It takes a combination of sophisticated penetration testing and security operations to protect your employees, to protect your customers, to protect YOUR business.
The threat isn’t just on site anymore, it’s in the cloud, it’s in your homes Wi-Fi, it’s from anywhere and is everywhere . Because as Tony Stark has beautifully said as he pointed to the sky “that’s the end game”.