Olga l. botero

CISSP

Email

OLga.botero@gmail.com

Phone

+1-772-607-1952

Website

 

olgalbotero.COM

Objective

Title: Line graphic

Assisting organizations to achieve the best security position possible to mitigate or eliminate vulnerabilities

Skills

Title: Line graphic

Vulnerability scanning and penetration testing, security auditing, transaction correlation using SIEM, firewall configuration to name a few

cyber security experience

Network Systems Security Administrator

5/2011 to Present

Southwest Florida Water Management District

·       Vulnerability scanning and penetration testing

·       End Point Protection, for servers and workstations, malware analysis

·       Wireless Network architecture for security resilience

·       CISCO ASA and Checkpoint Gaia firewalls

·       Identity and Access Management

·       Radius and TACACS

·       Windows Patch Management Distribution software.

·       Linux deployment and maintenance

·       Security reviews for new IT products

·       Log & Event Management audit and correlation reports

Installation, configuration and maintenance of all the above products

Education

Master of Science in Management of Information Security Colorado Technical University, Colorado Springs, CO - 2011

Bachelor of Science in Computer Science

Florida International University, Miami, FL - 1980

 

certifications

CISSP Certified Information Systems Security Professional        2018

Certified Cisco Network Associate – CCNA -                         2017

Certified Ethical Hacker – CEH V9        -                                 2016

Certified Checkpoint Security Expert CCSE R77                      2013

 

 

Other IT Experience:    Technical Support Manager, Pueblo International

                                    Mainframe Systems consulting OPSYS

                                    Technical Support Manager, Citizens Bank

 

Summary of activities

 

Analysis of security requirements and review of security policies and procedures in accordance with a security architecture that will accomplish physical and logical separation of applications, functions and roles to minimize risks.

 

Conducting security audits, penetration testing and vulnerability assessments to recommend, implement and support security measures that will assure that “Due Care” and “Due Diligence” are being applied to all aspects of security. This will demonstrate legal responsibility and compliance in the event of a hacking incident.

 

Monitoring incoming and outgoing transactions for suspicious activity using tools to create alerts that make the security professional more proactive, delivering a continued risk assessment operation.

 

Administration of discretionary access controls using firewalls and other network tools to segregate networks for security compliance applying the “Need to Know” and the “Least Privilege” security principles to safeguard different levels of data security to assure Confidentiality, Integrity and Availability of information.

 

The first line of protection against intruders is the security awareness of the end-user of your systems. They can be internal employees or external contractors, partner companies and clients. Security awareness is an ongoing training activity and we, as security professional need to review the training procedures to update according to the growing social engineering threats against the security landscape.