Summary
Overview
Work History
Education
Skills
Certification
Timeline
Generic

David Closa

Cybersecurity Engineer

Summary

Cyber Security is a process that's designed to protect networks and devices from external threats. Businesses typically employ Cyber Security professionals to protect their confidential information, maintain employee productivity, and enhance customer confidence in products and services.

Overview

7
7
years of professional experience
7
7
years of post-secondary education
49
49
Certifications

Work History

Cyber Security Engineer

Esco
3 2022 - Current
  • Responding to all system and/or network security breaches through Monitoring/SIEM software
  • Manage and monitor for security vulnerabilities in the company hardware, system, website and software
  • Perform regular Penetration test and Vulnerability scanning for all system and software in the company
  • Fix/patch all vulnerabilities within reasonable timeframe including upgrading middleware, software used in the server (Windows and Linux)
  • Ensure compliance to security standards and recommend security implementations
  • Conduct security awareness training.
  • Sustained optimal sender score on two IPs, enhancing inbox delivery and corresponding metrics while improving delivery metrics from [Number]% to [Number]%

Network Security Engineer

Rivan IT Training Systems Corp.
02.2017 - 01.2023
  • Assists instructors in handling students troubleshooting their configurations if they are not able to complete the activity and explaining/clarifying their concerns
  • Implementation and Configuration of Cisco network devices to support network requirement of the client
  • Diagnose problems and solve issues under time constraints to meet the objectives of the training/boot camps also to ensure customer satisfaction
  • Performs system upgrade, installations of software and handles with the maintenance of hardware
  • Performs Moving, Adding and Changing the Client's Network as specified and requested by Management
  • Experience in configuring and deploying cisco devices (cisco 3560,3650,3750 and 3825, 1921, 1941, 2901, 2921)
  • Keeps job knowledge up to date by actively participating in educational opportunities, reading and practicing topics from professional publication.

Security Analyst

Trustwave
07.2021 - 03.2022
  • Use strong TCP/IP networking skills to perform network analysis and understand detected threats
  • Analyze and respond to security events from firewalls, IDS, IPS, SIEM, Web Application Firewall (WAF) and other security data sources within documented SLA
  • Respond within service level agreement (SLA) standards to customer tickets and threats requiring incident notification
  • Tune devices for blocking and reporting based on customer business need
  • Use effective written and verbal communication skills to interact with customers and internal resources in a polite, positive, and professional manner
  • Take responsibility for customer satisfaction and overall success of managed services
  • Respond to needs and questions of customers concerning their managed services, managed devices and detected threats
  • Adhere to policies, procedures, and security best practices
  • Resolve problems independently and understands the correct escalation procedures
  • Produce intelligence outputs to provide an accurate depiction of the current threat landscape and associated risk through the use of customer, community, and open source reporting
  • Produce actionable intelligence information for delivery to colleagues and customers in the form of technical reports, briefings, and data feeds
  • Participate in regular threat focus meetings
  • Perform detailed investigative works into all traffic anomalies against established, historical baselines of individual agencies
  • Review and profile the events of all monitored clients
  • Build rules and intelligence to detect threats and proliferate to all monitored networks
  • Implement and devise detection method of threats in security operations
  • Filter and fine-tune the security events flowing to databases
  • Prepare training programme for L1 Security Analyst
  • Conduct knowledge sharing sessions for L1 Security Analyst
  • Monitor real-time third party security feeds, forums, and mailing lists to gather information on vulnerabilities and exploits related to the client
  • Assess each event based on factual information and wider contextual information available
  • Attend customers' review meetings as-and-when needed.

Cyber Security Consultant

Work/ Information Technology Solutions
03.2020 - 01.2022
  • A cybersecurity consultant is a professional who helps organizations to assess and improve their defenses against cyber threats
  • This may involve conducting security assessments to identify vulnerabilities in the organization's systems and recommending measures to address them
  • It may also involve implementing security solutions such as firewalls, antivirus software, and intrusion detection systems
  • Cybersecurity consultants may also be involved in training employees to recognize and prevent cyber threats, and in developing and testing incident response plans to be used in the event of a security breach
  • They may work with a variety of clients, including businesses, government agencies, and non-profit organizations, and may specialize in a particular industry or type of technology.

Information Technology Supervisor

Cosmolink Global Solutions Inc.
10.2019 - 11.2021
  • Identifying, installing and maintaining upgrades to the network
  • Troubleshooting and repair
  • Overseeing user access to the network
  • Develop, implement, and maintain system security
  • Assist administrative, instructional and support personnel to plan and implement a wide range of technology-based projects
  • Oversee set-up, installation and maintenance of computers and servers used for programs and projects
  • Maintain LAN, WAN and Internet server software, and provide necessary maintenance and upgrades
  • Plan, organize, and negotiate with vendors to facilitate acquisition of necessary technology hardware and software
  • Evaluate interface among hardware, software, operational and performance requirements
  • Oversee hardware and software installations/updates, support, and maintenance through support personnel
  • Evaluate support staff
  • Troubleshoot and correct network system problems
  • Research and analyze technical issues relevant to TUSD technology and provide updates and recommendations to the Director of Technology and Data Systems, including but not limited to, the deployment of hardware, and software and network operations
  • Recommend, implement and administer network protective technology measures for the district network
  • These include, but are not limited to; Enterprise backup systems, Antivirus, Antispyware, SPAM protection, Intrusion Detection Systems, bandwidth utilization devices and monitoring systems
  • Keep accurate network documentation for the district network
  • Developing a backup/disaster recovery plan for a network emergency
  • Planning network infrastructure for new applications and services
  • Training network staff to provide support to end users
  • Purchasing and maintaining networking equipment and infrastructure
  • Integrating mobile devices into the organization's networks, either (or both of) organizational and personal devices (BYOD).

Education

Bachelor of Science in Computer Science -

Technological Institute of the Philippines - Manila
06.2005 - 05.2008

Secondary - undefined

Arellano University Jose Abad Santos Campus - Pasay City, Metro Manila
06.2001 - 05.2005

Primary - undefined

Manuel S. Enverga University Foundation - Lucena City
03.2001 - undefined

Skills

Network Security

Data Loss Prevention

Security Information and Event Management

Operating System Security

Firewall Management

Zero Trust Architecture

Security Architecture

Security policy development

Access Control

Web Application Security

Security Awareness Training

Identity Management

Patch management

Security Orchestration, Automation, and Response

Application security

Secure Coding

Wireless Security

Public Key Infrastructure

API Security

Network Security Management

Firewall Installation

SIEM Provider Management

Continuous Improvement

Problem-Solving

Multitasking Abilities

Risk Assessment

Team Collaboration

Secure Network Design

Cryptography

Two-Factor Authentication

Penetration Testing

Vulnerability Assessment

Incident Response

Endpoint Protection

Certification

Netskope Security Cloud, Netskope Security CloudCredential ID, Netskope, 04/01/23

Timeline

Security Analyst

Trustwave
07.2021 - 03.2022

Cyber Security Consultant

Work/ Information Technology Solutions
03.2020 - 01.2022

Information Technology Supervisor

Cosmolink Global Solutions Inc.
10.2019 - 11.2021

Network Security Engineer

Rivan IT Training Systems Corp.
02.2017 - 01.2023

Bachelor of Science in Computer Science -

Technological Institute of the Philippines - Manila
06.2005 - 05.2008

Secondary - undefined

Arellano University Jose Abad Santos Campus - Pasay City, Metro Manila
06.2001 - 05.2005

Primary - undefined

Manuel S. Enverga University Foundation - Lucena City
03.2001 - undefined

Cyber Security Engineer

Esco
3 2022 - Current
David ClosaCybersecurity Engineer