Paul Lin

Cybersecurity / Programmer

I’m a freelance designer who specializes in cybersecurity. I have been in the IT industry for 12+ years and love it every day. I love learning new technologies and testing new penetration tools. I’m currently working in the information security career field. To see a selection of my designs and custom web app take a look at my portfolio page or access to app DOT httpaul DOT com

Programming Skills

Visual Basic

80%
MySQL

90%
Django, Python

80%
HTML, CSS

85%
PHP

80%
Javascript

85%
Elastic, Kibana

80%
Swift

40%
React.js

40%

Cybersecurity Skills

RED TEAM

Reconnaissance

90%
Exploitation

75%
Custom Scripting

60%

BLUE TEAM

Incident Response

90%
System Maintenance

80%
Risk assessment

40%

Experience

Senior Cybersecurity Engineer

New York, USA

As a senior cybersecurity engineer, the responsible duties were developing and implementing security strategies and policies to protect the organization’s digital assets. Identifying potential security threats and vulnerabilities, assessing risks, and implementing appropriate mitigation measures. Designing robust security architectures for IT systems and networks to ensure data protection and regulatory compliance. Leading the response to security incidents, performing forensic analysis, and improving incident handling procedures. Deploying and managing advanced security technologies that were related to firewalls, intrusion detection/prevention systems, and encryption tools. In addition to working with IT teams to integrate security measures into all aspects of IT operations and providing training to staff on cybersecurity best practices.

Responsibilities:

  • Configure and set up vulnerability management system
  • Perform daily threat monitoring, and in-depth incident response analysis
  • Create customizable internal threat listfeed and investigation events filter
  • Provide configuration, tuning and maintenance of the systems

Experience:

  • Rapid7 – InsightVM
  • Tenable SC
  • Powershell
  • SIEM, IPS, Endpoint protection

Enterprise Resilience Consultant

New York, USA

As an enterprise cybersecurity consultant, my responsibilities were related to evaluating the organization’s security posture, identifying vulnerabilities, and assessing potential risks. Creating comprehensive security strategies and policies to protect against cyber threats.
Providing recommendations and deploying security technologies and solutions tailored to the organization’s needs. Ensuring that the organization complies with relevant laws, standards, and industry regulations. Developing and managing incident response plans to quickly address and mitigate security breaches.

Responsibilities:

  • Configure and set up vulnerability management system
  • Perform daily threat monitoring, and in-depth incident response analysis
  • Create customizable internal threat listfeed and investigation events filter
  • Provide configuration, tuning and maintenance of the systems

Experience:

  • Rapid7 – InsightVM
  • Tenable SC
  • Powershell
  • SIEM, IPS, Endpoint protection

Information Security Analyst

New York, USA

The Security Analyst is responsible for configuring and utilizing Security Information and Event Management tools, specifically to provide Compliance Reporting, Alerting and Incident Analysis. The Security Analyst is an architect / implementer of security solutions and works with other engineers and product focused personnel to provide the best possible solution for the client.

Responsibilities:

  • Configure and set up vulnerability management system
  • Perform daily threat monitoring, and in-depth incident response analysis
  • Create customizable internal threat listfeed and investigation events filter
  • Provide configuration, tuning and maintenance of the systems

Experience:

  • Rapid7 – InsightVM
  • Tenable SC
  • Powershell
  • SIEM, IPS, Endpoint protection

Cybersecurity Project Manager

Virginia, USA

The project manager is responsible for managing all program phases, from ideation, marketing, and proposal development through execution and program close-out. Daily activities include management and oversight of program technical, financial, and schedule performance.

Responsibilities:

  • Manage security-related projects that have definite outcomes and stay within time and budget
  • Design web application for requesting security resource for the team
  • Cybersecurity Incidence Response Team as a flight recorder to document any major outcome
  • Monitoring and reporting security event

Experience:

  • Python
  • Django
  • Cisco Sourcefire
  • Microsoft Advanced Threat Analytics

Education

timeline_pre_loader
Some of my degrees and certification

Bachelor's degree, Applied Internet Technologies 2015

Gain general understanding of Information Technology.

This was where I set my foundation in IT and learned about database to programming and from networking to cybersecurity.

Certified Associate in Project Management (CAPM), 2015

Project Management Institute associate certification.

I learned about general process of project management, identify project scope, stakeholders, and know how to write a project proposal.

ITIL Foundation v3, 2016

ITIL framework, best practices and guidelines in Information Technology.

SLA, Service Design, Service Transition, Operations and Improvement.

Master's degree, Cybersecurity 2017

Advance specialty knowledge in cybersecurity industry.

I learned about penetration testing, vulnerability assessment, and gain further knowledge in networking, database, and programming.

Cisco CCENT, 2019

Cisco, Certified Entry Networking Technician.

Entry-level network certification in cisco router and switch.

Cisco CCNA, February 2020

Cisco, Certified Network Associate Routing and Switching.

GIAC Certified Incident Handler (GCIH), June 2020

SANS Institute, Incident Response Handler.

Ability to detect, respond, and resolve computer security incidents with wide range of essential security skills such as understand common attack techniques and hacker’s tool.

CompTIA Cybersecurity Analyst (CySA+), October 2020

Validated self knowledge and skills required to configure and use threat detection tools, perform data analysis and interpret the results to identify vulnerabilities, threats and risks to an organization, with the end goal of securing and protecting applications and systems within an organization.
I'm still alive and learning