Greg the IT Guy

IT Systems Specialist – Cybersecurity

About

Problem Solver. Strategic Planner.
Team Coordinator.

Dynamic IT professional with over 6 years of diverse experience in corporate, construction, and manufacturing environments, specializing in cybersecurity-focused IT systems management and network security.

Demonstrated success in proactively identifying and mitigating security threats, coupled with hands-on experience in incident response, risk management, and safeguarding critical infrastructure. As an IT Systems Specialist, I have been entrusted with the security of complex IT environments, consistently reducing vulnerabilities and ensuring seamless operations.

Core Competencies

  • Network & Endpoint Security

  • Risk Assessment & Management

  • Vulnerability Assessment & Mitigation

  • Threat Detection & Analysis

  • Security Monitoring

  • Familiar With Security Information and Event Management (SIEM) Experience

  • Hands On Incident Response Experience

  • Identify Detect & Protect

As a seasoned IT professional with a passion for innovation and operational efficiency, I am eager to bring my strategic expertise to your organization. Eager to transition into a SOC Analyst role, where I can leverage my cybersecurity knowledge and technical acumen to detect, analyze, and defend against emerging threats, while strengthening your organization’s security posture.

Professional Overview

IT Specialist/Project Coordinator | Agilitec | Reno, NV
  • Monitored and analyzed 446 users & 228 endpoints network traffic for suspicious activities, using WatchGuard firewalls and ThreatLocker, to identify and mitigate potential security threats.
  • Led the implementation of advanced security measures, including endpoint detection and response (EDR) solutions such as Huntress Labs and AutoElevate, significantly reducing the risk of cyber incidents.
  • Assisted thorough incident response activities, including identifying root causes, containing breaches, and implementing recovery measures to restore normal system and network operations.
  • Collaborated with IT teams to design and deploy security policies that align with industry best practices, enhancing overall security posture and compliance across diverse network environments.
  • Experienced with SIEM tools like Security Onion to collect, analyze, and correlate security events, enabling rapid identification of threats and appropriate response.
  • Maintained comprehensive security documentation, including change logs (LionGard), exposure analysis (Microsoft Defender), and security policies, to ensure ongoing protection and preparedness.
IT Specialist/Co-Owner | BDM Inc  | Reno, NV

  • Followed robust cybersecurity frameworks, ensuring the protection of company and customer data against a wide range of cyber threats.
  • Monitored network and system logs for signs of potential breaches, swiftly taking action to investigate and contain threats as needed.
  • Conducted on-the-spot security awareness training for employees, fostering a culture of cybersecurity vigilance and reducing the likelihood of human error-related incidents.
  • Facilitated disaster recovery and business continuity planning, ensuring critical systems were secure and recoverable in the event of a cyber attack.
  • Stayed up-to-date with the latest security threats and implemented proactive measures to safeguard against emerging risks and threats.
Project Manager/Co-Owner | LOA Solutions  | Reno, NV
  • Identified and deployed secure communication systems using VLAN Network Segmentation and Virtual VPNs, ensuring data confidentiality and integrity across all company networks.
  • Led network security initiatives, including the deployment of firewalls and access management, to protect against unauthorized access and cyber threats.
  • Conducted regular security assessments, network monitoring, and risk analyses to identify potential vulnerabilities and implement corrective measures.
  • Collaborated with clients to tailor cybersecurity solutions that met their unique needs, providing ongoing support, privilege escalation, and security monitoring.

Network Admin/Assistant Manager | BOC  | Reno, NV

  • Managed, monitored, and secured complex network infrastructures, including routers, switches, and firewalls, to ensure the integrity and availability of critical business operations.
  • Implemented advanced network security protocols, monitoring for unusual network traffic and responding to potential threats in real-time.
  • Provided rapid response to data integrity and network security incidents, minimizing downtime and maintaining business continuity.

Skills

IT Specialist Skills

Troubleshooting
I am committed to providing excellent customer service and resolving issues as quickly and efficiently as possible.
TCP/IP
I have a deep understanding of the TCP/IP protocol suite and its components.
Linux and SQL
I am able to troubleshoot and resolve Linux and SQL-related issues.
Python
I am able to use Python to analyze and visualize data.
Networking
I am able to troubleshoot and resolve network issues.
Data Analysis
I am able to extract insights from complex data sets to identify trends and patterns.
Tech Support
I am able to provide clear and concise instructions to users to help them resolve technical issues.
Help Desk
I am able to troubleshoot and resolve complex technical problems.
System Admin
I am able to troubleshoot and resolve system administration problems.

Cybersecurity Skills

Cybersecurity
I have a deep understanding of cybersecurity concepts, tools, and technologies.
Historical Attacks
I am able to develop and implement security controls to mitigate the risks posed by known historical attacks.
Network Security
I am able to troubleshoot and resolve network security incidents.
NIST Cybersecurity Framework (CSF)
I am able to apply NIST frameworks and standards to improve the security posture of organizations.
Identify Threats
I am able to quickly and accurately triage and prioritize threats based on their risk and impact.
Security Frameworks
I am able to use security frameworks to guide incident response and threat hunting activities.
Respond to Threats
I have a deep understanding of the latest threat intelligence and best practices for incident response.
SIEM Tools
I am able to use SIEM tools to collect, analyze, and monitor security data from across the organization.

Management Skills

Communication
I am a clear and concise communicator, able to effectively communicate complex technical concepts to both technical and non-technical audiences.
Managing
I build and motivate high-performing teams by creating a positive and supportive work environment.
Adaptibility
I am able to remain calm and collected under pressure and adapt my approach accordingly.
Team Work
I am able to delegate tasks and empower team members to succeed.
Training
I am able to provide clear and concise instructions, and I am able to answer questions in a way that is easy to understand.
Self Starter
I am able to work under pressure and meet deadlines, even when faced with challenges.
Negotiation
I am able to build rapport and trust with others, which is essential for successful negotiations.
Leadership
I am a visionary leader who is able to inspire and motivate others to achieve their goals.
0
Users
0
Endpoints

Proficient In:

Certifications

CompTIA A+ Certified

Earners of the CompTIA A+ certification are proven problem solvers who are able to perform critical IT support tasks including device configuration, data backup and recovery, and operating system configuration. CompTIA A+ certified professionals have demonstrated baseline security skills for IT support roles and are able to detect and remove malware, address privacy concerns, and troubleshoot core service challenges.

CompTIA IT Fundamentals (ITF+) Certified

Earners of the CompTIA ITF+ certification have the knowledge and skills required to identify and explain the basics of computing, IT infrastructure, application and software, software development, database fundamentals, and security. These IT candidates have demonstrated the ability to install software, establish basic network connectivity, and identify and prevent basic security risks.

Google Technical Support Fundamentals

I learned about the different facets of Information Technology, like computer hardware, the Internet, computer software, troubleshooting, and customer service. This course covers a wide variety of topics in IT.
● understand how the binary system works ● assemble a computer from scratch ● choose and install an operating system on a computer ● understand what the Internet is, how it works, and the impact it has in the modern world ● learn how applications are created and how they work under the hood of a computer ● utilize common problem-solving methodologies and soft skills in an Information Technology setting

Social

See What I Am Currently Up To

Contact

LET’S TALK.

Let me help you take your business to the next level. Contact me today.

Greg Wilson

Your IT Guy