👔Marlon Johnson, M.Sc., Certified Security Pro.

Computer Security Specialist at MAGNUS Management Group LLC
  • Claim this Profile
Contact Information
us****@****om
(386) 825-5501
Location
Lake Worth, Florida, United States, US

Topline Score

Topline score feature will be out soon.

Bio

Generated by
Topline AI

You need to have a working account to view this content.
You need to have a working account to view this content.

Experience

    • United States
    • Information Technology & Services
    • 1 - 100 Employee
    • Computer Security Specialist
      • Jan 2021 - Present

      Florida, United States Supporting the company across various projects evaluating risks and developing security standards, procedures, and controls to manage that risk, with a mindset of continuous process improvement. Supported consultations for preestablished patterns and assists with the more complex engagements. Assisted other team members in threat modelling, risk identification and mitigation strategies, control documentation, evaluation of control design, evaluation of control operation, reporting of control… Show more Supporting the company across various projects evaluating risks and developing security standards, procedures, and controls to manage that risk, with a mindset of continuous process improvement. Supported consultations for preestablished patterns and assists with the more complex engagements. Assisted other team members in threat modelling, risk identification and mitigation strategies, control documentation, evaluation of control design, evaluation of control operation, reporting of control deficiencies, and remediation strategies. Reviewing and documenting processes, designs and documents controls and testing procedures. •Assist in the development and implementation of security policies, procedures. •Coordinate along with the client lead and the Program of Record (PoR) PM assigned Authority to Operate (ATO) efforts and make recommendations to improve the processes. •Support security testing and analysis of Information Management/Information Technology (IM/IT) capability requests (applications, systems, networking devices) being introduced to the enterprise •Analyze general Cybersecurity-related technical problems and provides basic engineering and technical support in solving these problems. •Ensure that all information systems are functional and secure. •Serves as Alternate Information Systems Security Officer (ISSO) with responsibility for assisting the client ISSO in the execution of the duties and responsibilities ISSO. •Monitor and assess (using automated Security Incident and Event Management (SIEM), Security Orchestration, Automation, and Response (SOAR), and Endpoint Detection and Response (EDR) tools) effectiveness. •Responsible for collecting and maintaining data needed for cyber reporting on vulnerability and compliance reporting to the ISSO. •Provide high-level, weekly/monthly vulnerability management briefings and dashboards across multiple platforms and cloud environments for review by senior management.

    • Operations Manager
      • Jan 2021 - Aug 2023

      Lake Worth, Florida, United States MAGNUS Management Group, LLC is a certified Woman Owned Small Business (WOSB) committed to providing business solutions with a comprehensive overarching vision. We emphasize quality, service and intellect while employing cutting edge technologies to keep our clients ahead of the curve. Our strong business values and tested best practices coupled with a creative technological edge ensure that MAGNUS is able to deliver expert consulting services in the areas of Information Technology… Show more MAGNUS Management Group, LLC is a certified Woman Owned Small Business (WOSB) committed to providing business solutions with a comprehensive overarching vision. We emphasize quality, service and intellect while employing cutting edge technologies to keep our clients ahead of the curve. Our strong business values and tested best practices coupled with a creative technological edge ensure that MAGNUS is able to deliver expert consulting services in the areas of Information Technology, Cyber Security, Program Support, Data Science, Program Management and Operation Management.

    • United States
    • IT Services and IT Consulting
    • 1 - 100 Employee
    • Cybersecurity Specialist
      • Jan 2021 - Aug 2023

      Fairfax, Virginia, United States

    • Egypt
    • Human Resources
    • 1 - 100 Employee
    • SOC Analysts
      • Mar 2017 - Dec 2020

      Florida, United States Consulting and Post graduate work projects: ●Knowledge on Wireshark and TCPDump packet analysis tools for network analysis ●Working knowledge of network protocols such as DNS, LDAP, DHCP, NFS, Kerberos, TCP/IP, etc ●Hardened Desktop (Windows) and server (Linux & Windows) to reduce the attack surface ●Good understanding and proven skills in security assessment using ethical hacking techniques ●Knowledge on using Google Hacking DB techniques (AKA) Google DORK for advanced search… Show more Consulting and Post graduate work projects: ●Knowledge on Wireshark and TCPDump packet analysis tools for network analysis ●Working knowledge of network protocols such as DNS, LDAP, DHCP, NFS, Kerberos, TCP/IP, etc ●Hardened Desktop (Windows) and server (Linux & Windows) to reduce the attack surface ●Good understanding and proven skills in security assessment using ethical hacking techniques ●Knowledge on using Google Hacking DB techniques (AKA) Google DORK for advanced search strings ●Design and implementation of a secure network including firewall and IDS ●Proven Skills in log retrieval and analysis ●Configuration and monitoring of firewall Watchguard- T35 ●Configuration and monitoring of snort IDS ●Configuration and monitoring of branch to branch, branch to mobile VPN services ●Monitoring of servers, routers, firewalls and switches health status on Nagios NMS system ●Escalation of suspicious events to the incident handling team ●Configuration and deployment of digital certificates on staging servers of the clients ●Configuration, deployment and revocation of digital certificates on clients application servers ●Analysis and correlation of malware signatures with heuristic databases such as virustotal ●Knowledge on threat intelligence platform and analysis of IOC and IOA, able to take appropriate actions and remediate. ●Strong knowledge and understanding of CVE and CWE using MITRE and exploitDB Show less

    • United States
    • Higher Education
    • 700 & Above Employee
    • Video Conferencing Technician
      • Mar 2017 - Dec 2019

      Miami/Fort Lauderdale Area My tasks entail setting up and operating the video, audio, and lighting equipment used to enhance live events. I also assemble microphones, mix sound boards, coordinate graphics, operate spotlights, manage video recordings, and provide technical support for university and corporate events.

    • Digital Forensic Analyst
      • Apr 2010 - Mar 2017

      Kingston, Jamaica Provides communication and digital forensic assistance to the investigative process by providing digital and communication evidence and in-depth forensic analysis to investigators. ●Utilized with great effect, digital forensic tools including, Encase, Forensic Tool Kit (FTK), P2 Commander to execute digital investigations and perform incident response activities ●Solved and mitigated network anomalies through analysis of network packets and protocols using tools like Wireshark, Snort… Show more Provides communication and digital forensic assistance to the investigative process by providing digital and communication evidence and in-depth forensic analysis to investigators. ●Utilized with great effect, digital forensic tools including, Encase, Forensic Tool Kit (FTK), P2 Commander to execute digital investigations and perform incident response activities ●Solved and mitigated network anomalies through analysis of network packets and protocols using tools like Wireshark, Snort, and Sourcefire. ●Respond to alerts from various monitoring systems and platforms, determining the cause of the security incident and preserving evidence for potential legal action ●Performed analysis using a variety of tools and data sets to identify indicators of malicious activity on the company network ●Conduct data forensic investigations for enterprise computer security incidents including incidents of Child Porn, Computer Exploits, Computer Abuse, Insider Threats and Intellectual Property ●Worked with cross-functional teams to drive improvements to policies and processes within the law enforcement response team ●Strong knowledge of policies and procedures regarding chain of custody practices ●Knowledge of existing and emerging legal framework regarding information security ●Worked with stakeholders to perform risk management and ongoing assessments, and then selected, mitigated and corrected controls based on Pareto analysis ●Independently led computer incident investigations, determining the cause of the security incident and preserving evidence for potential legal action. ●Proven technical leadership in guiding on security monitoring platform for detections and response procedures ●Configuration of Cloud flare Web Application Firewall (WAF) rules and signatures to mitigate threats and implement security best practices ●Conducts research of emerging security threats Show less

    • United States
    • Non-profit Organizations
    • 200 - 300 Employee
    • Ex: Education Cordinator
      • Sep 2005 - Aug 2008

      Kingston, Jamaica

Education

  • Beulah Heights University
    Doctor of Philosophy - PhD, Organizational Leadership
    2023 - 2028
  • Nova Southeastern University
    Master's degree, Information Assurance and Cyber Security
    2017 - 2019
  • The University of the West Indies
    Bachelor's degree, International Relation & Philosophy
    2001 - 2005

Community

You need to have a working account to view this content. Click here to join now