SlideShare a Scribd company logo
1 of 2
Nick Harris
NicholasHarrisx91@gmail.com  (405) 863-3459  Oklahoma City, Oklahoma
https://www.linkedin.com/in/nick-harris-x91/
Professional Experience
Congressional Fellow: Office of the Chairman of the House Committee on Homeland Security –
Rep. Michael McCaul
2001 Rayburn House Office Building. Washington D.C. 20515 Jan. 2017 – May 2017
• Managed incoming communication including walk ups, calls, email, and formal communication written
• Maintained and enhanced public communications content file
• Ran data information requests, created charts and analyzed data to identify problems
• Responsible for accuracy and completeness of communication and content data
• Liaison between congressional staff and public
• Handled sensitive, classified and proprietary data for document control
• Resolved issues and worked with public to log and respond to all issues
• Reported daily activity to high level leaders
• Provided investigation and research on public issues
Professional Certification
COMP-TIA Security + [sy-501] May 2019
• Vendor Neutral Certification
• Demonstrated Skills: Access Control, Cryptography, Cyber Forensics, Data Security, Disaster Recovery
Planning, Firewall Configuration, Malware Identification, Mobile Device Security, Network Security, Security
Configuration, Security Policies, Threat Analysis, Threat Detection, Risk Management, Risk Mitigation,
Threat Management, Intrusion Detection
Education
BA International Security Studies May 2016
The University of Oklahoma – College of International Area Studies
AS Cybersecurity & Digital Forensics May 2019
Rose State College - National IA Education and Training Center of Excellence (Cybersecurity)
Additional Skills & Experiences
-Python scripting language
-TCP/IP protocol stack
-Asymmetric Cryptography/PKI
-Penetration Testing
-Vulnerability Testing
-Identity & Access Management
-Network Security/Administration
-Malware Analysis
-NIPS/NIDS management
-SIEM operations
-NIST/ISO standards
-Familiarity with Nmap, Nessus, Metasploit, and other Kali Linux network assessment/testing tools
Congressional Fellow Nick Harris Cybersecurity Resume

More Related Content

What's hot

Computer forensics and investigation module 1 topic 2
Computer forensics and investigation module 1 topic 2Computer forensics and investigation module 1 topic 2
Computer forensics and investigation module 1 topic 2Neha Raju k
 
Computer crime hacking
Computer crime   hackingComputer crime   hacking
Computer crime hackingtangytangling
 
Digi securitypres
Digi securitypresDigi securitypres
Digi securitypresFairSay
 
Homeland Security - strengthening the weakest link
Homeland Security - strengthening the weakest linkHomeland Security - strengthening the weakest link
Homeland Security - strengthening the weakest linkFlaskdata.io
 
Cv fabio ghezzi en ext
Cv fabio ghezzi en extCv fabio ghezzi en ext
Cv fabio ghezzi en extFabio Ghezzi
 
Identity - The Cornerstone of Information Security
Identity - The Cornerstone of Information SecurityIdentity - The Cornerstone of Information Security
Identity - The Cornerstone of Information SecurityBen Boyd
 
Leone ct#1 presentation 1
Leone ct#1 presentation 1Leone ct#1 presentation 1
Leone ct#1 presentation 1vincentleone
 
Introduction to hackers
Introduction to hackersIntroduction to hackers
Introduction to hackersHarsh Sharma
 
Refugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityRefugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityGianluca Varisco
 
Hacking Mobility: Lessons from 1-800-Flowers.com
Hacking Mobility: Lessons from 1-800-Flowers.comHacking Mobility: Lessons from 1-800-Flowers.com
Hacking Mobility: Lessons from 1-800-Flowers.comMediaPost
 
The art of deceiving humans a.k.a social engineering
The art of deceiving humans a.k.a social engineeringThe art of deceiving humans a.k.a social engineering
The art of deceiving humans a.k.a social engineeringSuraj Khetani
 
Introduction to the Internet of Things
Introduction to the Internet of ThingsIntroduction to the Internet of Things
Introduction to the Internet of ThingsIsmail Al Kamal
 

What's hot (20)

Hacking (1)
Hacking (1)Hacking (1)
Hacking (1)
 
Computer forensics and investigation module 1 topic 2
Computer forensics and investigation module 1 topic 2Computer forensics and investigation module 1 topic 2
Computer forensics and investigation module 1 topic 2
 
Hacking
HackingHacking
Hacking
 
Computer crime hacking
Computer crime   hackingComputer crime   hacking
Computer crime hacking
 
Digi securitypres
Digi securitypresDigi securitypres
Digi securitypres
 
Homeland Security - strengthening the weakest link
Homeland Security - strengthening the weakest linkHomeland Security - strengthening the weakest link
Homeland Security - strengthening the weakest link
 
Cv fabio ghezzi en ext
Cv fabio ghezzi en extCv fabio ghezzi en ext
Cv fabio ghezzi en ext
 
Cyber crime1 vaibhavi
Cyber crime1 vaibhaviCyber crime1 vaibhavi
Cyber crime1 vaibhavi
 
Identity - The Cornerstone of Information Security
Identity - The Cornerstone of Information SecurityIdentity - The Cornerstone of Information Security
Identity - The Cornerstone of Information Security
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Leone ct#1 presentation 1
Leone ct#1 presentation 1Leone ct#1 presentation 1
Leone ct#1 presentation 1
 
Introduction to hackers
Introduction to hackersIntroduction to hackers
Introduction to hackers
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Refugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityRefugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on Security
 
Hacking Mobility: Lessons from 1-800-Flowers.com
Hacking Mobility: Lessons from 1-800-Flowers.comHacking Mobility: Lessons from 1-800-Flowers.com
Hacking Mobility: Lessons from 1-800-Flowers.com
 
Cyber security
Cyber security Cyber security
Cyber security
 
The art of deceiving humans a.k.a social engineering
The art of deceiving humans a.k.a social engineeringThe art of deceiving humans a.k.a social engineering
The art of deceiving humans a.k.a social engineering
 
Introduction to the Internet of Things
Introduction to the Internet of ThingsIntroduction to the Internet of Things
Introduction to the Internet of Things
 
Cyber espionage
Cyber espionageCyber espionage
Cyber espionage
 
Hackers Cracker Network Intruder
Hackers Cracker Network IntruderHackers Cracker Network Intruder
Hackers Cracker Network Intruder
 

Similar to Congressional Fellow Nick Harris Cybersecurity Resume

01122017 Professional Resume Andrea Sturm
01122017 Professional Resume Andrea Sturm01122017 Professional Resume Andrea Sturm
01122017 Professional Resume Andrea SturmAndrea Sturm
 
Resume 2016 CCNA
Resume 2016 CCNAResume 2016 CCNA
Resume 2016 CCNAJose Natal
 
2016 Resume Angel Washington
2016 Resume Angel Washington2016 Resume Angel Washington
2016 Resume Angel WashingtonAngel Washington
 
Cybersecurity: Protection strategies from Cisco and Next Dimension
Cybersecurity: Protection strategies from Cisco and Next DimensionCybersecurity: Protection strategies from Cisco and Next Dimension
Cybersecurity: Protection strategies from Cisco and Next DimensionNext Dimension Inc.
 
KeithHendersonResume (1)
KeithHendersonResume (1)KeithHendersonResume (1)
KeithHendersonResume (1)Keith Henderson
 
Daniel resume 11-15-16
Daniel resume 11-15-16Daniel resume 11-15-16
Daniel resume 11-15-16Daniel Sparks
 
Jonathan Garcia resume Data Center Operations Management
Jonathan Garcia resume Data Center Operations ManagementJonathan Garcia resume Data Center Operations Management
Jonathan Garcia resume Data Center Operations ManagementJonathan Garcia
 
How To Eliminate Security Exposures in Office 365 Webinar
How To Eliminate Security Exposures in Office 365 WebinarHow To Eliminate Security Exposures in Office 365 Webinar
How To Eliminate Security Exposures in Office 365 WebinarConcept Searching, Inc
 
Resume of r. f. cashman upload
Resume of r. f. cashman uploadResume of r. f. cashman upload
Resume of r. f. cashman uploadguest5b3f8103
 
Trust in a Digital World
Trust in a Digital WorldTrust in a Digital World
Trust in a Digital Worlditnewsafrica
 
Raymond chie resume
Raymond chie resumeRaymond chie resume
Raymond chie resumeRaymond Chie
 
James pirrie resume 2019
James pirrie resume  2019 James pirrie resume  2019
James pirrie resume 2019 James Pirrie
 
Gregory landing pm ccna 2
Gregory landing pm ccna 2Gregory landing pm ccna 2
Gregory landing pm ccna 2Gregory Landing
 
JamesFWeaver122016
JamesFWeaver122016JamesFWeaver122016
JamesFWeaver122016Jim Weaver
 

Similar to Congressional Fellow Nick Harris Cybersecurity Resume (20)

01122017 Professional Resume Andrea Sturm
01122017 Professional Resume Andrea Sturm01122017 Professional Resume Andrea Sturm
01122017 Professional Resume Andrea Sturm
 
Resume 2016 CCNA
Resume 2016 CCNAResume 2016 CCNA
Resume 2016 CCNA
 
2016 Resume Angel Washington
2016 Resume Angel Washington2016 Resume Angel Washington
2016 Resume Angel Washington
 
JM_Resume
JM_ResumeJM_Resume
JM_Resume
 
Cybersecurity: Protection strategies from Cisco and Next Dimension
Cybersecurity: Protection strategies from Cisco and Next DimensionCybersecurity: Protection strategies from Cisco and Next Dimension
Cybersecurity: Protection strategies from Cisco and Next Dimension
 
KeithHendersonResume (1)
KeithHendersonResume (1)KeithHendersonResume (1)
KeithHendersonResume (1)
 
Daniel resume 11-15-16
Daniel resume 11-15-16Daniel resume 11-15-16
Daniel resume 11-15-16
 
Jonathan Garcia resume Data Center Operations Management
Jonathan Garcia resume Data Center Operations ManagementJonathan Garcia resume Data Center Operations Management
Jonathan Garcia resume Data Center Operations Management
 
How To Eliminate Security Exposures in Office 365 Webinar
How To Eliminate Security Exposures in Office 365 WebinarHow To Eliminate Security Exposures in Office 365 Webinar
How To Eliminate Security Exposures in Office 365 Webinar
 
Resume of r. f. cashman upload
Resume of r. f. cashman uploadResume of r. f. cashman upload
Resume of r. f. cashman upload
 
Trust in a Digital World
Trust in a Digital WorldTrust in a Digital World
Trust in a Digital World
 
DISCHEStevenCV
DISCHEStevenCVDISCHEStevenCV
DISCHEStevenCV
 
2017 skills resume
2017 skills resume2017 skills resume
2017 skills resume
 
Raymond chie resume
Raymond chie resumeRaymond chie resume
Raymond chie resume
 
James pirrie resume 2019
James pirrie resume  2019 James pirrie resume  2019
James pirrie resume 2019
 
Gabriel merigian 2018
Gabriel merigian 2018Gabriel merigian 2018
Gabriel merigian 2018
 
Its not ITs problem
Its not ITs problemIts not ITs problem
Its not ITs problem
 
Gregory landing pm ccna 2
Gregory landing pm ccna 2Gregory landing pm ccna 2
Gregory landing pm ccna 2
 
JamesFWeaver122016
JamesFWeaver122016JamesFWeaver122016
JamesFWeaver122016
 
Oct 2016 infographic resume
Oct 2016 infographic resumeOct 2016 infographic resume
Oct 2016 infographic resume
 

Recently uploaded

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 

Recently uploaded (20)

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

Congressional Fellow Nick Harris Cybersecurity Resume

  • 1. Nick Harris NicholasHarrisx91@gmail.com  (405) 863-3459  Oklahoma City, Oklahoma https://www.linkedin.com/in/nick-harris-x91/ Professional Experience Congressional Fellow: Office of the Chairman of the House Committee on Homeland Security – Rep. Michael McCaul 2001 Rayburn House Office Building. Washington D.C. 20515 Jan. 2017 – May 2017 • Managed incoming communication including walk ups, calls, email, and formal communication written • Maintained and enhanced public communications content file • Ran data information requests, created charts and analyzed data to identify problems • Responsible for accuracy and completeness of communication and content data • Liaison between congressional staff and public • Handled sensitive, classified and proprietary data for document control • Resolved issues and worked with public to log and respond to all issues • Reported daily activity to high level leaders • Provided investigation and research on public issues Professional Certification COMP-TIA Security + [sy-501] May 2019 • Vendor Neutral Certification • Demonstrated Skills: Access Control, Cryptography, Cyber Forensics, Data Security, Disaster Recovery Planning, Firewall Configuration, Malware Identification, Mobile Device Security, Network Security, Security Configuration, Security Policies, Threat Analysis, Threat Detection, Risk Management, Risk Mitigation, Threat Management, Intrusion Detection Education BA International Security Studies May 2016 The University of Oklahoma – College of International Area Studies AS Cybersecurity & Digital Forensics May 2019 Rose State College - National IA Education and Training Center of Excellence (Cybersecurity) Additional Skills & Experiences -Python scripting language -TCP/IP protocol stack -Asymmetric Cryptography/PKI -Penetration Testing -Vulnerability Testing -Identity & Access Management -Network Security/Administration -Malware Analysis -NIPS/NIDS management -SIEM operations -NIST/ISO standards -Familiarity with Nmap, Nessus, Metasploit, and other Kali Linux network assessment/testing tools