{"id":34752,"date":"2024-10-12T04:00:49","date_gmt":"2024-10-12T04:00:49","guid":{"rendered":"https:\/\/www.writemyessays.app\/blog\/questions\/an-essay-outlining-your-educational-and-career-goals-knowledge-and-interest-in-the-cybersecurity\/"},"modified":"2024-10-12T04:00:49","modified_gmt":"2024-10-12T04:00:49","slug":"an-essay-outlining-your-educational-and-career-goals-knowledge-and-interest-in-the-cybersecurity","status":"publish","type":"questions","link":"https:\/\/www.writemyessays.app\/blog\/questions\/an-essay-outlining-your-educational-and-career-goals-knowledge-and-interest-in-the-cybersecurity\/","title":{"rendered":"An essay outlining your educational and career goals, knowledge and interest in the cybersecurity"},"content":{"rendered":"<p>An essay outlining your educational and career goals, knowledge and interest in the cybersecurity discipline, your ability to identify and analyze problems to present appropriate solutions, and your ability to communicate and create a collaborative environment that supports the exchange of ideas (2 pages maximum). my name must show on every page<\/p>\n<div><\/p>\n<div>&nbsp;<\/div>\n<div>I have attached my resume to help you understand my work history and educational background.<\/div>\n<div><\/div>\n<div>&#8220;<b style=\"color: inherit; background-color: var(--color-6); font-variant-ligatures: inherit; font-variant-caps: inherit; cursor: auto;\"><span style=\"font-size: 12pt; line-height: 200%; cursor: auto; color: inherit;\">Work<br \/>\nExperience<\/span><\/b><\/div>\n<p style=\"cursor: auto; color: inherit;\"><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 12pt; line-height: 200%; cursor: auto; color: inherit;\">IT<br \/>\nSpecialist \/ Customer Support<\/span><\/b><\/p>\n<p style=\"cursor: auto; color: inherit;\"><b style=\"cursor: auto; color: inherit;\">Department of Veterans Affairs \u2013 10\/2023 to Present<\/b><\/p>\n<p style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">\u00a7<span style=\"font-size: 7pt; line-height: normal; cursor: auto; color: inherit;\">&nbsp;<br \/>\n<\/span><\/span><\/span>Verified security requests and granted access<br \/>\nbased on Department of Veterans Affairs guidelines to ensure secure data<br \/>\naccess.<\/p>\n<p style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">\u00a7<span style=\"font-size: 7pt; line-height: normal; cursor: auto; color: inherit;\">&nbsp;<br \/>\n<\/span><\/span><\/span>Updated Active Directory for users, servers, and<br \/>\ncomputers to maintain system integrity.<\/p>\n<p style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">\u00a7<span style=\"font-size: 7pt; line-height: normal; cursor: auto; color: inherit;\">&nbsp;<br \/>\n<\/span><\/span><\/span>Diagnosed and resolved technical incidents via<br \/>\nticketing system, improving system functionality and user satisfaction.<\/p>\n<p style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">\u00a7<span style=\"font-size: 7pt; line-height: normal; cursor: auto; color: inherit;\">&nbsp;<br \/>\n<\/span><\/span><\/span>Provided IT support services, ensuring<br \/>\ncompliance with security policies and operational efficiency.<\/p>\n<p style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">\u00a7<span style=\"font-size: 7pt; line-height: normal; cursor: auto; color: inherit;\">&nbsp;<br \/>\n<\/span><\/span><\/span>Submitted recommendations to enhance system<br \/>\nusage and handled special requests for system data.<\/p>\n<p style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">\u00a7<span style=\"font-size: 7pt; line-height: normal; cursor: auto; color: inherit;\">&nbsp;<br \/>\n<\/span><\/span><\/span>Maintained and updated system files to control<br \/>\naccess and safeguard system operations.<\/p>\n<p style=\"cursor: auto; color: inherit;\"><b style=\"cursor: auto; color: inherit;\">System Administrator<\/b><\/p>\n<p style=\"cursor: auto; color: inherit;\"><b style=\"cursor: auto; color: inherit;\">VA \/ Booz Allen Contract, Fargo, United States \u2013 12\/2020<br \/>\nto 09\/2023<\/b><\/p>\n<p style=\"cursor: auto; color: inherit;\">&nbsp;<\/p>\n<p style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">\u00a7<span style=\"font-size: 7pt; line-height: normal; cursor: auto; color: inherit;\">&nbsp;<br \/>\n<\/span><\/span><\/span>Managed server and network operations, ensuring<br \/>\noptimal performance and uptime during peak periods.<\/p>\n<p style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">\u00a7<span style=\"font-size: 7pt; line-height: normal; cursor: auto; color: inherit;\">&nbsp;<br \/>\n<\/span><\/span><\/span>Applied software patches and security updates to<br \/>\nprotect sensitive data and mitigate potential threats.<\/p>\n<p style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">\u00a7<span style=\"font-size: 7pt; line-height: normal; cursor: auto; color: inherit;\">&nbsp;<br \/>\n<\/span><\/span><\/span>Guided non-technical staff through<br \/>\ntroubleshooting procedures, improving their understanding of IT processes.<\/p>\n<p style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">\u00a7<span style=\"font-size: 7pt; line-height: normal; cursor: auto; color: inherit;\">&nbsp;<br \/>\n<\/span><\/span><\/span>Configured hardware, devices, and software,<br \/>\nensuring secure workstation setups.<\/p>\n<p style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">\u00a7<span style=\"font-size: 7pt; line-height: normal; cursor: auto; color: inherit;\">&nbsp;<br \/>\n<\/span><\/span><\/span>Implemented software updates and server patches<br \/>\nto maintain a secure network environment.<\/p>\n<p style=\"cursor: auto; color: inherit;\"><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 12pt; line-height: 200%; cursor: auto; color: inherit;\">Dispute<br \/>\nand Fraud Analyst<\/span><\/b><\/p>\n<p style=\"cursor: auto; color: inherit;\"><b style=\"cursor: auto; color: inherit;\">US Bank, Fargo, United States \u2013 06\/2018 to 11\/2020<\/b><\/p>\n<p style=\"cursor: auto; color: inherit;\">&nbsp;<\/p>\n<p style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">\u00a7<span style=\"font-size: 7pt; line-height: normal; cursor: auto; color: inherit;\">&nbsp;<br \/>\n<\/span><\/span><\/span>Conducted data analysis to detect fraud patterns<br \/>\nand anomalies, contributing to the bank\u2019s fraud prevention strategies.<\/p>\n<p style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">\u00a7<span style=\"font-size: 7pt; line-height: normal; cursor: auto; color: inherit;\">&nbsp;<br \/>\n<\/span><\/span><\/span>Performed forensic analysis of financial records<br \/>\nto identify and report fraudulent activities.<\/p>\n<p style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">\u00a7<span style=\"font-size: 7pt; line-height: normal; cursor: auto; color: inherit;\">&nbsp;<br \/>\n<\/span><\/span><\/span>Developed strategies to prevent fraud and<br \/>\nmonitored trends to strengthen security.<\/p>\n<p style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">\u00a7<span style=\"font-size: 7pt; line-height: normal; cursor: auto; color: inherit;\">&nbsp;<br \/>\n<\/span><\/span><\/span>Reconciled bank accounts and summarized account<br \/>\ndata in detailed reports, reducing financial discrepancies.<\/p>\n<p style=\"cursor: auto; color: inherit;\"><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 12pt; line-height: 200%; cursor: auto; color: inherit;\">Desk<br \/>\nSupport Analyst Level 2<\/span><\/b><\/p>\n<p style=\"cursor: auto; color: inherit;\"><b style=\"cursor: auto; color: inherit;\">Atos Global IT Solutions, Fargo, United States \u2013 01\/2016<br \/>\nto 05\/2018<\/b><\/p>\n<p style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">\u00a7<span style=\"font-size: 7pt; line-height: normal; cursor: auto; color: inherit;\">&nbsp;<br \/>\n<\/span><\/span><\/span>Provided Tier 1 IT support, troubleshooting<br \/>\ntechnical issues and providing desktop support for end-users.<\/p>\n<p style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">\u00a7<span style=\"font-size: 7pt; line-height: normal; cursor: auto; color: inherit;\">&nbsp;<br \/>\n<\/span><\/span><\/span>Managed ticketing systems to track, resolve, and<br \/>\nescalate support requests efficiently.<\/p>\n<p style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">\u00a7<span style=\"font-size: 7pt; line-height: normal; cursor: auto; color: inherit;\">&nbsp;<br \/>\n<\/span><\/span><\/span>Tested new software releases for compatibility<br \/>\nwith existing systems and supported software deployment.<\/p>\n<p style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">\u00a7<span style=\"font-size: 7pt; line-height: normal; cursor: auto; color: inherit;\">&nbsp;<br \/>\n<\/span><\/span><\/span>Installed and updated hardware and software on<br \/>\nboth Mac and PC devices, maintaining up-to-date systems.<\/p>\n<p style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">\u00a7<span style=\"font-size: 7pt; line-height: normal; cursor: auto; color: inherit;\">&nbsp;<br \/>\n<\/span><\/span><\/span>Collaborated with software development teams to<br \/>\nreport and resolve bugs, improving software performance.<\/p>\n<p style=\"cursor: auto; color: inherit;\"><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 12pt; line-height: 200%; cursor: auto; color: inherit;\">Education<\/span><\/b><\/p>\n<p style=\"cursor: auto; color: inherit;\"><b style=\"cursor: auto; color: inherit;\">Bachelor of Science: Project Management<\/b><\/p>\n<p style=\"cursor: auto; color: inherit;\">Minnesota State University Moorhead, Moorhead, MN<\/p>\n<p style=\"cursor: auto; color: inherit;\">&nbsp;<\/p>\n<p style=\"cursor: auto; color: inherit;\"><b style=\"cursor: auto; color: inherit;\">Associate of Science: Cyber Security<\/b><\/p>\n<p style=\"cursor: auto; color: inherit;\">Minnesota State Community and Technical College, Moorhead,<br \/>\nMN<\/p>\n<p style=\"cursor: auto; color: inherit;\">&nbsp;<\/p>\n<p style=\"cursor: auto; color: inherit;\"><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 12pt; line-height: 200%; cursor: auto; color: inherit;\">Certifications<\/span><\/b><\/p>\n<p style=\"cursor: auto; color: inherit;\">CompTIA Security+ \u2013 June 2023<\/p>\n<p style=\"cursor: auto; color: inherit;\">Microsoft Certified: Security Operations Analyst (SC200) \u2013<br \/>\n2023&#8243;<\/p>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>An essay outlining your educational and career goals, knowledge and interest in the cybersecurity discipline, your ability to identify and analyze problems to present appropriate solutions, and your ability to communicate and create a collaborative environment that supports the exchange of ideas (2 pages maximum). my name must show on every page &nbsp; I have [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","template":"","meta":[],"disciplines":[62],"paper_types":[],"tagged":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions\/34752"}],"collection":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions"}],"about":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/types\/questions"}],"author":[{"embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/comments?post=34752"}],"version-history":[{"count":0,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions\/34752\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/media?parent=34752"}],"wp:term":[{"taxonomy":"disciplines","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/disciplines?post=34752"},{"taxonomy":"paper_types","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/paper_types?post=34752"},{"taxonomy":"tagged","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/tagged?post=34752"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}