Senior Systems, Network, Endpoint, and Security

Mission Statement: To aspire towards providing solutions to issues in the most secure manner that promotes the organization and to thrive in a culture that is centered around encrouagement to others, the pursuit of innovative thinking, and life long learning.

Goal: Protect that which is in my purview with mechanisms that prevent unauthorized access and disclosure of company assets or services and to achieve this through understanding of threats and tactics to reduce impacts in a security incident.

Led a team of coders for a managed interface that pulled data from an CI database. It was for tracking the Last Day Of Service, [LDOS] for devices. The purpose was to allocate funds within allocated businesses budgeting to replace the devices.

Coached a team to create and provide a dashboard for to location Applications as well as services installed on multiple load balancers. This provided quick retrieval of vital information for IP addresses, DNS names, and load balancer name where the configuration was installed. The reduction in trouble shooting time, plus architecture teams research time was dramatically reduced and the tool became a vital system that was put into a redundant platform.

Utilized Problem Management application for mitigation and fixes of incidents causing outages or degraded services.

Review of documents for making important changes to devices and applicaitons in production. Reviewed for correctness as well as prevention of outages during and after implementation.

Completed multiple firewall manual configurations as well as automated configuration updates to rule policies. Involved in trouble shooting of "INSPECT" engine issues with Rule hides during policy verifications. Responsible for decommission of firewalls and release of licensing. Many other functions related to firewall maintenance and configuration.

Facilitated SIEM daily meetings involving company critical systems involved in cybersecurity incidents and prevention of further impacts. Provided remediation techniques and followed up for validation of reduction of impacts. This includes Root Cause Analysis.

DevOps

Successfully adding DNS entries and alias for enterprise systems.

Proactive solutions bring value to business and secure environment improvements.
★★★★★

I have known Brenda Hoyt for many years now and we have shared many stories about our work situations. She has shown professionalism and ways to understand and move difficult and diverse individuals. She will find a way to obtain the company goal and complete major projects for implementation of new strategies and technologies. She has an understanding of what is needed today and what will be needed in five years. She is a value add to any company.

Brenda Looks out five years ahead unless for improvements. She always keeps the organizations objects in focus.

Brenda's expertise in cybersecurity is unmatched. Her dedication to finding solutions is truly admirable.

Always impressed by Brenda's strategic approach to cybersecurity. Highly recommend!