David Chiwele MSc-Cyber Security - Information Systems
Cyber Security Senior Compliance Professional at TennCare- Claim this Profile
Click to upgrade to our gold package
for the full feature experience.
-
African Languages -
Topline Score
Bio
Credentials
-
Comptia Security +
CompTIA Security+ Network+ A+ Server+ HIT+ TrainerJan, 2004- Nov, 2024 -
Comptia IT
CompTIA -
Comptia A+
CompTIA -
Comptia security +
CompTIA
Experience
-
TennCare
-
United States
-
Government Administration
-
300 - 400 Employee
-
Cyber Security Senior Compliance Professional
-
Jan 2019 - Present
• MONITORING AWS and Azure Environments– Detect and respond to emerging threats such as APT and other forms of targeted attacks. Participate in threat hunting activities to proactively search for threats in the enterprise environment. Correlates actionable security events from various sources including Security Information Management System (SIEMS) data and develops unique correlation techniques. Develop indicators of compromise (IOCs) from detected threats. • INCIDENT RESPONSE – Perform detailed forensic analysis of assets. Reconstruct events of a compromise by creating a timeline via correlation of forensic artifacts. Ensure that all forensic investigations are recorded and tracked to meet audit and legal requirements. • MALWARE ANALYSIS AND REVERSE ENGINEERING – Perform static and dynamic analysis of malware using a variety of proprietary and open source applications and tools to determine malware functionality. Generation of indicators of compromise for use in detecting anomalous activities. • SECURITY ASSESSMENT- Perform network penetration, web and mobile application testing, source code reviews, threat analysis, wireless network assessments, and social-engineering assessments. Recognize and safely utilize attacker tools, tactics, and procedures. • VULNERABILITY MANAGEMENT – Provide vulnerability management services to other business units to maintain a safe computing environment. Services include identification, vulnerability scanning, reporting, and remediation. • THREAT INTELLIGENCE - Provide situational awareness on the current threat landscape and the techniques, tactics and procedures associated with specific threats. • MENTORING – Mentor and train more junior analysts in intrusion, cyber threat intelligence. • REPORTING & COMMUNICATION – Develop reports and communicate Information Security team results with representatives of business units, technology specialists, an Show less
-
-
-
-
Information Technology Cyber Security Analyst
-
May 2017 - Present
-
-
-
Internal Revenue Service
-
United States
-
Government Administration
-
700 & Above Employee
-
Cyber Security Analyst
-
Jan 2015 - Present
-
-
-
Edgenuity Inc. (now Imagine Learning)
-
United States
-
E-Learning Providers
-
200 - 300 Employee
-
NOC: Network Operations Center Security Engineer
-
Oct 2015 - Dec 2016
Use cutting edge technology, equipment, and monitoring tools such as Qradar, Splunk,PRTG,NewRelic to proactively monitor critical computing systems and the network infrastructure for the campus network and external networks. Perform information security analysis on all distributed systems using latest Security information and event management (SIEM) 21st century/ Next-Generation Firewalls technologies. In addition to monitoring services, the NOC also provides the following services in relation to the systems and networks we monitor: Problem Management/Incident Management Problem management is the process of identifying and resolving system and network problems. The NOC has both proactive and reactive methods of identifying events affecting the performance of the systems and networks we monitor. The goal of problem management is to maintain the highest standard of reliability and availability possible to Edgenuity computing systems and networks. Notification It is the policy of the NOC to provide the timeliest and most informative system and network availability notification texts to our users and customers. It is the goal of the NOC to send/post notification regarding system and network outages within fifteen minutes of the outage or problem. This also stands true for final notification that the resource is again available, after problem resolution. Change Management The goal of Change Management is to ensure standardized methods and procedures are used for efficient and prompt handling of all changes. This minimizes the impact of change-related incidents upon service quality, and consequently improves the day-to-day operations of the organization. Reporting & Documentation It is the policy of the NOC to provide informative weekly network availability reports which give an overview of the weekly activity in the NOC. These reports are used as a primary tool for quality assurance purposes. The NOC also documents inventory for all systems Show less
-
-
-
-
Issues Resolver/Analyst
-
Jan 2003 - May 2015
Resolving all distributed systems issues regarding online prescription orders such as payments, Information Security, insurance , delivery, Quality assurance,Online Fraud detection/Forensics ,online accounts management and all related customer service issues.
-
-
Exceptions Analyst
-
Feb 2005 - Jun 2010
Ensuring accurate data entry and processing online and telephone prescription orders
-
-
-
Enhanced technologies Ltd
-
Lusaka
-
Managing Partner
-
Jan 1995 - Sep 2002
Served as one of the founding partner for a very successful IT networking company and installed LAN/WAN infrastructures for NGOs such as UNICEF, USAID , CCF, UNDP etc Served as one of the founding partner for a very successful IT networking company and installed LAN/WAN infrastructures for NGOs such as UNICEF, USAID , CCF, UNDP etc
-
-
-
-
Aeronautics Technologist
-
Feb 1988 - Aug 1998
My responsibilities included maintenance of Defense Computers/Air force/Army and Microprocessor/Aeronautical Systems operational duties to ensure smooth execution of various day to day strategic defense objectives. Worked as a Technical Adjutant in providing detailed assistance in documentations and procedures for Aeronautical Engineering Operational duties such as Jet / Aircraft/Radar/Missile maintenance schedules and Armament logistical support and other defense strategic solutions.Traced logic, schematic, test flow, and wiring diagrams. Used self-test and software functions, computer and manually operated avionics test equipment, SE, and test measurement and diagnostic equipment to determine the scope of repair and adjustment required. Inspected, maintained, programmed, and calibrated avionics equipment, SE, and aircraft components. Removed and replaced assembly components using hand tools, soldering devices, and electronic instruments. Repaired systems and pods, sensor systems and components, wiring harnesses and interconnecting cables. Serviced, replaced, and cleaned filtration and cooling components, and performed maintenance on test stations and avionics SE. Repaired amplifier and logic circuits; microwave equipment; servomechanisms; radio frequency circuits; video displays; and power supply circuits. Loads computer programs. Aligned, calibrated, and modified avionics test equipment, SE, and aircraft components Show less
-
-
Education
-
Colorado Technical University
MSCS- Masters- Computer Science-Cybersecurity and Information Systems Security, Computer Science and Information security -
Colorado Technical University
Bachelors -Computer Science, Computer and Information Systems Security/Information Assurance -
Copperbelt University
Industrial Electronics Engineering, Industrial Electronic and Power Electronics -
Zambia Airforce Academy
Aeronautical/Aerospace Engineering-Radar/Missile Systems,Defense Computers, Communications, -
Mufulira High school