Grace Kareyo

2277 Bathgate Ave, Apt 3GTel (C): 917-699-1786

Bronx,

Objective: To obtain cybersecurity related position in order to contribute my knowledge and abilities, while gaining valuable experiences and skills to fight cyber crimes.

Summary of Qualifications

  • Hands-on experience in Network+, Security+, C|EH, and CISSP principles through coursework and self-study.
  • Study of security policy analysis and implementation of various security tools, such as firewall, information systems, network architectures and security best practices. NIST SP 800 security series such as SP 800-53, Risk Management Framework, etc.
  • Study of security technologies, evaluation of emergent technologies, forensics and protecting critical cyber infrastructure and assets.
  • Study of theory and practice of digital forensics; monitoring, auditing, and intrusion detection/prevention systems (IDS/IPS).
  • Study of human aspects in cybersecurity: ethics, legal issues, and psychology.
  • Composing PowerPoint presentations for class team/individual work and presenting it.
  • Providing customer services.

Education

Master of Science in CybersecurityTechnology, GPA 3.6/4.0

University of Maryland University CollegeGraduated, May 2016

Bachelor of Science - Major in Cyber Security, Minor Healthcare Administration,

GPA 3.7/4.0
University of Maryland University CollegeGraduated, May 2014

Short Coursesand Technical Trainings

Cyber-Warfare: Securing our Nation's DefenseAugust 16, 2016

Center for Excellence in Public Leadership - The George Washington University

The discussion focused on the highlights of how agencies are taking a holistic approach to cyber-defense by incorporating technical, human and physical factors for the detection, prevention, and correction of cybersecurity vulnerabilities.

FireEye Cyber Defense Virtual SummitApril 7-8, 2016

A 2-day online event to create awareness of real cyber threats, risks and solutions.

M-Trends: The State of Cyber AttacksMarch 10, 2016

Training focused on the key findings from the Mandiant investigations across 30 industries. Trends and data that support how advanced threat actors have evolved over the last year. Campaigns to steal personally identifiable information, and attacks on enterprise networking devices—routers, switches and firewalls.

Continuous Diagnostic and Mitigation program (CDM):

Securing the Data, Not Just the PerimeterOctober 8, 2015

The training focused on addressingDHS’s CDM Phase II program requirements concerning user activities, access and securing data-at-rest throughout the enterprise. That can enable an enterprise wide approach to data security whether that data is in the cloud, data center, or autonomous servers. Provide monitoring and auditing of user actions with data-at-rest, including the ability to block access and deliver intelligence on attempts to access. And support organizational initiatives (big data, hybrid cloud) where critical data could be breached.

Creating a Culture of Cybersecurity at Work - TrainingOct. 7, 2015

National Association of Counties (NACo), offered an online training to bring awareness to cybersecurity and individual cyber hygiene. NACo provided resources and education on ways for businesses and employees to enhance their cybersecurity practices. Resources such as the DHS Critical Infrastructure Cyber Community (C3) Voluntary Program helps provide assistance for businesses to learn how to improve cyber risk management processes

The Cyber Playbook 2013, Washington, DC- ConferenceNov. 21, 2013

Topics: Cyber War - The New Battleground; Protecting Government Systems, CDM - Monitoring Government Systems; Incident Response; Threat Assessment and Cyber Remediation Readiness.

The CyberMaryland Conference 2013October 8-9, 2013

This conference was an event that brought together various stakeholders in the nation’s cyber security innovation and education system. I met and interacted with other cyber-professionals and fellow students, and had the opportunity to attend an array of sessions and showcases on current cyber security technologies.

Regional Chapter ConferenceJune 5, 2013

Topic: The Cyber Threat Landscape and the MANDIANT Report. This meeting was a Joint InfraGard Maryland and National Capital Region Chapters that looks at the current cyber threat landscape our nation faces. Mandiant released a report wherein they stated the cyber threat known as Advanced Persistent Threat 1 (APT1)is likely government-sponsored and one of the most significant of the China cyber threat actors. They released over 3000indicators in an effort to help government and private industry strengthen its cyber defense.

Internship Experiences

Harford County Circuit Court, Bel Air, MD Nov2013 - Feb. 2014

Intern

Conducted research and analyzed available information for trials. Prior to the trial, I reviewed cases, and helped evaluate sensitive information that would be used; while protecting and maintaining the security of the information. I also acted as an observer during mediation and settlement conference sessions.

St. Joseph Medical Center, Towson, MD Aug. 2011- Aug. 2012

Clinical Nurse Intern

Participated in the nursing process in delivering care to patients and their families. My duties and responsibilities included direct patient care for the assigned unit. In accordance with Health Insurance Portability and Accountability Act (HIPAA) laws and hospital regulations, I ensured the confidentiality, integrity, and availability of all electronic patient health information (e-PHI), and personal identifiable information (PII) that was created, received, maintained or transmitted on the assigned unit against any anticipated impermissible uses or disclosures of patient information and in compliance with the stated regulations.

Membership

Upsilon Pi Epsilon (UPE) - International Honor society for the Computing and Information Disciplines Fall 2015

Volunteer Services

TechBrick STEM Program- Robotic First Lego League (FLL),

Aberdeen Proving Ground, MDFall 2013 - 2016

Volunteered as FLL team mentor, and helped at tournament events.