SlideShare a Scribd company logo
Nick Harris
NicholasHarrisx91@gmail.com  (405) 863-3459  Oklahoma City, Oklahoma
Professional Experience
Congressional Fellow Jan. 2017 – May 2017
Office of the Chairman of the House Committee on Homeland Security – Rep. Michael McCaul.
2001 Rayburn House Office Building. WashingtonD.C. 20515.
• Managed incoming communication (walk ups, calls, email, formal communication written)
• Maintained and enhanced public communications content file
• Ran data information requests, created charts and analyzed data to identify problems
• Responsible for accuracy and completeness of communication and content data
• Liaison between congressional staff and public
• Handled sensitive, classified and proprietary data for document control
• Resolved issues and worked with public to log and respond to all issues
• Reported daily activity to high level leaders
• Provided investigation and research on public issues
Professional Certification
COMP-TIA Security + [sy-501] May 2019
• Vendor Neutral Certification
• Demonstrated Skills: Access Control, Cryptography, Cyber Forensics, Data Security, Disaster Recovery
Planning, Firewall Configuration, Malware Identification, Mobile Device Security, Network Security, Security
Configuration, Security Policies, Threat Analysis, Threat Detection, Risk Management, Risk Mitigation, Threat
Management, Intrusion Detection.
EDUCATION
AS Cybersecurity & Digital Forensics May 2019
Rose State College - National IA Education and Training Center of Excellence (Cybersecurity)
BA International Security Studies May 2016
The University of Oklahoma – College of International Area Studies
Additional Skills & Experiences
-Intermediate Russian Language Comprehension
-Study Abroad Experience (St. Petersburg, Russia)
-Python scripting language
-TCP/IP protocol stack
-Asymmetric Cryptography/PKI
-Penetration Testing
-Vulnerability Testing
-Familiarity with Nmap, Nessus, Metasploit, (& other Kali Linux network assessment/testing tools)
Further references available upon request

More Related Content

What's hot

ISACA UAE - Importance of Human-Centric Approaches to Cyber Security
ISACA UAE - Importance of Human-Centric Approaches to Cyber SecurityISACA UAE - Importance of Human-Centric Approaches to Cyber Security
ISACA UAE - Importance of Human-Centric Approaches to Cyber Security
Dr. Lydia Kostopoulos
 
Computer forensics and Investigation
Computer forensics and InvestigationComputer forensics and Investigation
Computer forensics and Investigation
Neha Raju k
 
UMUC GovConnects Roundtable Cybersecurity Workforce Ed 22Nov13
UMUC  GovConnects Roundtable Cybersecurity Workforce Ed 22Nov13 UMUC  GovConnects Roundtable Cybersecurity Workforce Ed 22Nov13
UMUC GovConnects Roundtable Cybersecurity Workforce Ed 22Nov13
GovConnects
 
Computer forensics and investigation module 1 topic 2
Computer forensics and investigation module 1 topic 2Computer forensics and investigation module 1 topic 2
Computer forensics and investigation module 1 topic 2
Neha Raju k
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
silambarasansam
 
Cyber Security in 2018
Cyber Security in 2018Cyber Security in 2018
Cyber Security in 2018
Chiranjit Adhikary
 
Cyber crime1 vaibhavi
Cyber crime1 vaibhaviCyber crime1 vaibhavi
Cyber crime1 vaibhavi
Vaibhavikhurana
 
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of ThingsChristopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
Katedra Informatologii. Wydział Dziennikarstwa, Informacji i Bibliologii, Uniwersytet Warszawski
 
[Viventis Search Asia APS] About Veritas
[Viventis Search Asia APS] About Veritas[Viventis Search Asia APS] About Veritas
[Viventis Search Asia APS] About Veritas
Mia Mendoza
 
Cyber espionage
Cyber espionageCyber espionage
Cyber espionage
harshitakhandelwal26
 
introduction to information security
introduction to information security introduction to information security
introduction to information security
ahmed sami
 
Computer crime hacking
Computer crime   hackingComputer crime   hacking
Computer crime hackingtangytangling
 
Cybercrime
CybercrimeCybercrime
Cybercrime
JazAphrodite
 
Cv fabio ghezzi en ext
Cv fabio ghezzi en extCv fabio ghezzi en ext
Cv fabio ghezzi en ext
Fabio Ghezzi
 
Introduction to hackers
Introduction to hackersIntroduction to hackers
Introduction to hackers
Harsh Sharma
 
The art of deceiving humans a.k.a social engineering
The art of deceiving humans a.k.a social engineeringThe art of deceiving humans a.k.a social engineering
The art of deceiving humans a.k.a social engineering
Suraj Khetani
 
Hackers Don't Matter
Hackers Don't MatterHackers Don't Matter
Hackers Don't Matter
Walter Vannini
 
Rosario B. Casas ( www.vramericas.com): If data will be all over the space, w...
Rosario B. Casas ( www.vramericas.com): If data will be all over the space, w...Rosario B. Casas ( www.vramericas.com): If data will be all over the space, w...
Rosario B. Casas ( www.vramericas.com): If data will be all over the space, w...
AugmentedWorldExpo
 
Identity - The Cornerstone of Information Security
Identity - The Cornerstone of Information SecurityIdentity - The Cornerstone of Information Security
Identity - The Cornerstone of Information Security
Ben Boyd
 

What's hot (20)

ISACA UAE - Importance of Human-Centric Approaches to Cyber Security
ISACA UAE - Importance of Human-Centric Approaches to Cyber SecurityISACA UAE - Importance of Human-Centric Approaches to Cyber Security
ISACA UAE - Importance of Human-Centric Approaches to Cyber Security
 
Computer forensics and Investigation
Computer forensics and InvestigationComputer forensics and Investigation
Computer forensics and Investigation
 
UMUC GovConnects Roundtable Cybersecurity Workforce Ed 22Nov13
UMUC  GovConnects Roundtable Cybersecurity Workforce Ed 22Nov13 UMUC  GovConnects Roundtable Cybersecurity Workforce Ed 22Nov13
UMUC GovConnects Roundtable Cybersecurity Workforce Ed 22Nov13
 
Computer forensics and investigation module 1 topic 2
Computer forensics and investigation module 1 topic 2Computer forensics and investigation module 1 topic 2
Computer forensics and investigation module 1 topic 2
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Cyber Security in 2018
Cyber Security in 2018Cyber Security in 2018
Cyber Security in 2018
 
Cyber crime1 vaibhavi
Cyber crime1 vaibhaviCyber crime1 vaibhavi
Cyber crime1 vaibhavi
 
Isys20261 lecture 01
Isys20261 lecture 01Isys20261 lecture 01
Isys20261 lecture 01
 
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of ThingsChristopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
 
[Viventis Search Asia APS] About Veritas
[Viventis Search Asia APS] About Veritas[Viventis Search Asia APS] About Veritas
[Viventis Search Asia APS] About Veritas
 
Cyber espionage
Cyber espionageCyber espionage
Cyber espionage
 
introduction to information security
introduction to information security introduction to information security
introduction to information security
 
Computer crime hacking
Computer crime   hackingComputer crime   hacking
Computer crime hacking
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cv fabio ghezzi en ext
Cv fabio ghezzi en extCv fabio ghezzi en ext
Cv fabio ghezzi en ext
 
Introduction to hackers
Introduction to hackersIntroduction to hackers
Introduction to hackers
 
The art of deceiving humans a.k.a social engineering
The art of deceiving humans a.k.a social engineeringThe art of deceiving humans a.k.a social engineering
The art of deceiving humans a.k.a social engineering
 
Hackers Don't Matter
Hackers Don't MatterHackers Don't Matter
Hackers Don't Matter
 
Rosario B. Casas ( www.vramericas.com): If data will be all over the space, w...
Rosario B. Casas ( www.vramericas.com): If data will be all over the space, w...Rosario B. Casas ( www.vramericas.com): If data will be all over the space, w...
Rosario B. Casas ( www.vramericas.com): If data will be all over the space, w...
 
Identity - The Cornerstone of Information Security
Identity - The Cornerstone of Information SecurityIdentity - The Cornerstone of Information Security
Identity - The Cornerstone of Information Security
 

Similar to Resume harris 19x

Cybersecurity: Protection strategies from Cisco and Next Dimension
Cybersecurity: Protection strategies from Cisco and Next DimensionCybersecurity: Protection strategies from Cisco and Next Dimension
Cybersecurity: Protection strategies from Cisco and Next Dimension
Next Dimension Inc.
 
KeithHendersonResume (1)
KeithHendersonResume (1)KeithHendersonResume (1)
KeithHendersonResume (1)Keith Henderson
 
Raymond chie resume
Raymond chie resumeRaymond chie resume
Raymond chie resume
Raymond Chie
 
James pirrie resume 2019
James pirrie resume  2019 James pirrie resume  2019
James pirrie resume 2019
James Pirrie
 
Resume 2016 CCNA
Resume 2016 CCNAResume 2016 CCNA
Resume 2016 CCNAJose Natal
 
Information is Power! Using Defensive Solutions in Cybersecurity
Information is Power! Using Defensive Solutions in CybersecurityInformation is Power! Using Defensive Solutions in Cybersecurity
Information is Power! Using Defensive Solutions in Cybersecurity
Career Communications Group
 
01122017 Professional Resume Andrea Sturm
01122017 Professional Resume Andrea Sturm01122017 Professional Resume Andrea Sturm
01122017 Professional Resume Andrea SturmAndrea Sturm
 
Reynolds_Craig_Resume_Jan2017
Reynolds_Craig_Resume_Jan2017Reynolds_Craig_Resume_Jan2017
Reynolds_Craig_Resume_Jan2017Craig Reynolds
 

Similar to Resume harris 19x (10)

Cybersecurity: Protection strategies from Cisco and Next Dimension
Cybersecurity: Protection strategies from Cisco and Next DimensionCybersecurity: Protection strategies from Cisco and Next Dimension
Cybersecurity: Protection strategies from Cisco and Next Dimension
 
KeithHendersonResume (1)
KeithHendersonResume (1)KeithHendersonResume (1)
KeithHendersonResume (1)
 
Raymond chie resume
Raymond chie resumeRaymond chie resume
Raymond chie resume
 
James pirrie resume 2019
James pirrie resume  2019 James pirrie resume  2019
James pirrie resume 2019
 
Resume 2016 CCNA
Resume 2016 CCNAResume 2016 CCNA
Resume 2016 CCNA
 
Asdourian, Jon
Asdourian, Jon Asdourian, Jon
Asdourian, Jon
 
Information is Power! Using Defensive Solutions in Cybersecurity
Information is Power! Using Defensive Solutions in CybersecurityInformation is Power! Using Defensive Solutions in Cybersecurity
Information is Power! Using Defensive Solutions in Cybersecurity
 
01122017 Professional Resume Andrea Sturm
01122017 Professional Resume Andrea Sturm01122017 Professional Resume Andrea Sturm
01122017 Professional Resume Andrea Sturm
 
Reynolds_Craig_Resume_Jan2017
Reynolds_Craig_Resume_Jan2017Reynolds_Craig_Resume_Jan2017
Reynolds_Craig_Resume_Jan2017
 
DISCHEStevenCV
DISCHEStevenCVDISCHEStevenCV
DISCHEStevenCV
 

Recently uploaded

一比一原版(UVic毕业证)维多利亚大学毕业证如何办理
一比一原版(UVic毕业证)维多利亚大学毕业证如何办理一比一原版(UVic毕业证)维多利亚大学毕业证如何办理
一比一原版(UVic毕业证)维多利亚大学毕业证如何办理
pxyhy
 
一比一原版(TMU毕业证)多伦多都会大学毕业证如何办理
一比一原版(TMU毕业证)多伦多都会大学毕业证如何办理一比一原版(TMU毕业证)多伦多都会大学毕业证如何办理
一比一原版(TMU毕业证)多伦多都会大学毕业证如何办理
yuhofha
 
Personal Brand Exploration Comedy Jxnelle.
Personal Brand Exploration Comedy Jxnelle.Personal Brand Exploration Comedy Jxnelle.
Personal Brand Exploration Comedy Jxnelle.
alexthomas971
 
Full Sail_Morales_Michael_SMM_2024-05.pptx
Full Sail_Morales_Michael_SMM_2024-05.pptxFull Sail_Morales_Michael_SMM_2024-05.pptx
Full Sail_Morales_Michael_SMM_2024-05.pptx
mmorales2173
 
New Explore Careers and College Majors 2024
New Explore Careers and College Majors 2024New Explore Careers and College Majors 2024
New Explore Careers and College Majors 2024
Dr. Mary Askew
 
Exploring Career Paths in Cybersecurity for Technical Communicators
Exploring Career Paths in Cybersecurity for Technical CommunicatorsExploring Career Paths in Cybersecurity for Technical Communicators
Exploring Career Paths in Cybersecurity for Technical Communicators
Ben Woelk, CISSP, CPTC
 
'Guidance and counselling- role of Psychologist in Guidance and Counselling.
'Guidance and counselling- role of Psychologist in Guidance and Counselling.'Guidance and counselling- role of Psychologist in Guidance and Counselling.
'Guidance and counselling- role of Psychologist in Guidance and Counselling.
PaviBangera
 
DOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdf
DOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdfDOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdf
DOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdf
Pushpendra Kumar
 
一比一原版(QU毕业证)皇后大学毕业证如何办理
一比一原版(QU毕业证)皇后大学毕业证如何办理一比一原版(QU毕业证)皇后大学毕业证如何办理
一比一原版(QU毕业证)皇后大学毕业证如何办理
yuhofha
 
Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...
Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...
Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...
dsnow9802
 
原版制作(RMIT毕业证书)墨尔本皇家理工大学毕业证在读证明一模一样
原版制作(RMIT毕业证书)墨尔本皇家理工大学毕业证在读证明一模一样原版制作(RMIT毕业证书)墨尔本皇家理工大学毕业证在读证明一模一样
原版制作(RMIT毕业证书)墨尔本皇家理工大学毕业证在读证明一模一样
atwvhyhm
 
一比一原版(U-Barcelona毕业证)巴塞罗那大学毕业证成绩单如何办理
一比一原版(U-Barcelona毕业证)巴塞罗那大学毕业证成绩单如何办理一比一原版(U-Barcelona毕业证)巴塞罗那大学毕业证成绩单如何办理
一比一原版(U-Barcelona毕业证)巴塞罗那大学毕业证成绩单如何办理
taqyed
 
labb123456789123456789123456789123456789
labb123456789123456789123456789123456789labb123456789123456789123456789123456789
labb123456789123456789123456789123456789
Ghh
 
0624.speakingengagementsandteaching-01.pdf
0624.speakingengagementsandteaching-01.pdf0624.speakingengagementsandteaching-01.pdf
0624.speakingengagementsandteaching-01.pdf
Thomas GIRARD BDes
 
Digital Marketing Training In Bangalore
Digital  Marketing Training In BangaloreDigital  Marketing Training In Bangalore
Digital Marketing Training In Bangalore
nidm599
 
Brand Identity For A Sportscaster Project and Portfolio I
Brand Identity For A Sportscaster Project and Portfolio IBrand Identity For A Sportscaster Project and Portfolio I
Brand Identity For A Sportscaster Project and Portfolio I
thomasaolson2000
 
一比一原版(YU毕业证)约克大学毕业证如何办理
一比一原版(YU毕业证)约克大学毕业证如何办理一比一原版(YU毕业证)约克大学毕业证如何办理
一比一原版(YU毕业证)约克大学毕业证如何办理
yuhofha
 
Resumes, Cover Letters, and Applying Online
Resumes, Cover Letters, and Applying OnlineResumes, Cover Letters, and Applying Online
Resumes, Cover Letters, and Applying Online
Bruce Bennett
 
How to Master LinkedIn for Career and Business
How to Master LinkedIn for Career and BusinessHow to Master LinkedIn for Career and Business
How to Master LinkedIn for Career and Business
ideatoipo
 
lab.123456789123456789123456789123456789
lab.123456789123456789123456789123456789lab.123456789123456789123456789123456789
lab.123456789123456789123456789123456789
Ghh
 

Recently uploaded (20)

一比一原版(UVic毕业证)维多利亚大学毕业证如何办理
一比一原版(UVic毕业证)维多利亚大学毕业证如何办理一比一原版(UVic毕业证)维多利亚大学毕业证如何办理
一比一原版(UVic毕业证)维多利亚大学毕业证如何办理
 
一比一原版(TMU毕业证)多伦多都会大学毕业证如何办理
一比一原版(TMU毕业证)多伦多都会大学毕业证如何办理一比一原版(TMU毕业证)多伦多都会大学毕业证如何办理
一比一原版(TMU毕业证)多伦多都会大学毕业证如何办理
 
Personal Brand Exploration Comedy Jxnelle.
Personal Brand Exploration Comedy Jxnelle.Personal Brand Exploration Comedy Jxnelle.
Personal Brand Exploration Comedy Jxnelle.
 
Full Sail_Morales_Michael_SMM_2024-05.pptx
Full Sail_Morales_Michael_SMM_2024-05.pptxFull Sail_Morales_Michael_SMM_2024-05.pptx
Full Sail_Morales_Michael_SMM_2024-05.pptx
 
New Explore Careers and College Majors 2024
New Explore Careers and College Majors 2024New Explore Careers and College Majors 2024
New Explore Careers and College Majors 2024
 
Exploring Career Paths in Cybersecurity for Technical Communicators
Exploring Career Paths in Cybersecurity for Technical CommunicatorsExploring Career Paths in Cybersecurity for Technical Communicators
Exploring Career Paths in Cybersecurity for Technical Communicators
 
'Guidance and counselling- role of Psychologist in Guidance and Counselling.
'Guidance and counselling- role of Psychologist in Guidance and Counselling.'Guidance and counselling- role of Psychologist in Guidance and Counselling.
'Guidance and counselling- role of Psychologist in Guidance and Counselling.
 
DOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdf
DOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdfDOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdf
DOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdf
 
一比一原版(QU毕业证)皇后大学毕业证如何办理
一比一原版(QU毕业证)皇后大学毕业证如何办理一比一原版(QU毕业证)皇后大学毕业证如何办理
一比一原版(QU毕业证)皇后大学毕业证如何办理
 
Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...
Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...
Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...
 
原版制作(RMIT毕业证书)墨尔本皇家理工大学毕业证在读证明一模一样
原版制作(RMIT毕业证书)墨尔本皇家理工大学毕业证在读证明一模一样原版制作(RMIT毕业证书)墨尔本皇家理工大学毕业证在读证明一模一样
原版制作(RMIT毕业证书)墨尔本皇家理工大学毕业证在读证明一模一样
 
一比一原版(U-Barcelona毕业证)巴塞罗那大学毕业证成绩单如何办理
一比一原版(U-Barcelona毕业证)巴塞罗那大学毕业证成绩单如何办理一比一原版(U-Barcelona毕业证)巴塞罗那大学毕业证成绩单如何办理
一比一原版(U-Barcelona毕业证)巴塞罗那大学毕业证成绩单如何办理
 
labb123456789123456789123456789123456789
labb123456789123456789123456789123456789labb123456789123456789123456789123456789
labb123456789123456789123456789123456789
 
0624.speakingengagementsandteaching-01.pdf
0624.speakingengagementsandteaching-01.pdf0624.speakingengagementsandteaching-01.pdf
0624.speakingengagementsandteaching-01.pdf
 
Digital Marketing Training In Bangalore
Digital  Marketing Training In BangaloreDigital  Marketing Training In Bangalore
Digital Marketing Training In Bangalore
 
Brand Identity For A Sportscaster Project and Portfolio I
Brand Identity For A Sportscaster Project and Portfolio IBrand Identity For A Sportscaster Project and Portfolio I
Brand Identity For A Sportscaster Project and Portfolio I
 
一比一原版(YU毕业证)约克大学毕业证如何办理
一比一原版(YU毕业证)约克大学毕业证如何办理一比一原版(YU毕业证)约克大学毕业证如何办理
一比一原版(YU毕业证)约克大学毕业证如何办理
 
Resumes, Cover Letters, and Applying Online
Resumes, Cover Letters, and Applying OnlineResumes, Cover Letters, and Applying Online
Resumes, Cover Letters, and Applying Online
 
How to Master LinkedIn for Career and Business
How to Master LinkedIn for Career and BusinessHow to Master LinkedIn for Career and Business
How to Master LinkedIn for Career and Business
 
lab.123456789123456789123456789123456789
lab.123456789123456789123456789123456789lab.123456789123456789123456789123456789
lab.123456789123456789123456789123456789
 

Resume harris 19x

  • 1. Nick Harris NicholasHarrisx91@gmail.com  (405) 863-3459  Oklahoma City, Oklahoma Professional Experience Congressional Fellow Jan. 2017 – May 2017 Office of the Chairman of the House Committee on Homeland Security – Rep. Michael McCaul. 2001 Rayburn House Office Building. WashingtonD.C. 20515. • Managed incoming communication (walk ups, calls, email, formal communication written) • Maintained and enhanced public communications content file • Ran data information requests, created charts and analyzed data to identify problems • Responsible for accuracy and completeness of communication and content data • Liaison between congressional staff and public • Handled sensitive, classified and proprietary data for document control • Resolved issues and worked with public to log and respond to all issues • Reported daily activity to high level leaders • Provided investigation and research on public issues Professional Certification COMP-TIA Security + [sy-501] May 2019 • Vendor Neutral Certification • Demonstrated Skills: Access Control, Cryptography, Cyber Forensics, Data Security, Disaster Recovery Planning, Firewall Configuration, Malware Identification, Mobile Device Security, Network Security, Security Configuration, Security Policies, Threat Analysis, Threat Detection, Risk Management, Risk Mitigation, Threat Management, Intrusion Detection. EDUCATION AS Cybersecurity & Digital Forensics May 2019 Rose State College - National IA Education and Training Center of Excellence (Cybersecurity) BA International Security Studies May 2016 The University of Oklahoma – College of International Area Studies Additional Skills & Experiences -Intermediate Russian Language Comprehension -Study Abroad Experience (St. Petersburg, Russia) -Python scripting language -TCP/IP protocol stack -Asymmetric Cryptography/PKI -Penetration Testing -Vulnerability Testing -Familiarity with Nmap, Nessus, Metasploit, (& other Kali Linux network assessment/testing tools) Further references available upon request