Summary
Overview
Work History
Education
Skills
Certification
Languages
Timeline
Published Articles
Generic

Jacinta I

Springfield

Summary

Detail-oriented Cybersecurity Analyst with hands-on experience in penetration testing, vulnerability management, SOC monitoring, AI-powered security automation, IAM reviews, and digital forensics. Strong ability to apply NIST, CIS, and DoD security controls to real-world environments in both financial and healthcare settings. Experienced in performing security assessments, detecting cyber threats, analyzing attack vectors, executing web application attacks, developing enterprise-grade policies, and using AI techniques for predictive analysis. Passionate about helping organizations strengthen cyber defense through both offensive and defensive security skills.

Overview

5
5
years of professional experience
1
1
Certification

Work History

Information Security Analyst Intern

Hope Clinical Care
06.2024 - 09.2025
  • Assisted in reviewing system vulnerabilities, access controls, and endpoint security to ensure security standards across healthcare systems.
  • Participated in internal audits aligned with HIPAA security requirements, and documented gaps for remediation.
  • Helped develop and update security policies, procedures, and incident response documentation for the organization.
  • Performed basic risk assessment and supported IAM tasks, such as user access verification and MFA enforcement.
  • Supported the analysis of phishing attempts, staff security awareness issues, and endpoint monitoring alerts.

SOC Analyst

Zenith Bank PLC
01.2021 - 12.2023
  • Monitored real-time security events and alerts across critical banking systems using SIEM tools, helping to identify suspicious activity early.
  • Analyzed logs from firewalls, servers, and authentication systems to detect unauthorized access attempts and policy violations.
  • Escalated high-risk alerts to a senior analyst, and contributed to incident documentation and preliminary investigation steps.
  • Collaborated with IT teams to verify false positives, reduce noise, and improve alert accuracy for core banking systems.
  • Supported vulnerability reviews and assisted in ensuring that security controls aligned with internal governance standards.

Education

Master of Science - CyberSecurity Management

University of Illinois At Springfield
Springfield, IL
12-2025

Skills

  • Cybersecurity and pen testing: Nmap Burp Suite OWASP ZAP SQL Injection XSS DVWA OpenVAS CVSS Scoring Metasploit
  • AI & Data Tools: Python TensorFlow/Keras Pandas/Numpy Artificial Neural Networks Predictive Modeling
  • Security Operations: SIEM Log Analysis Firewalls IDS/IPS Threat Hunting MITRE ATT&CK
  • Policy & Government: NIST SP 800-53 CIS Controls Dod Compliance Incident Response Vulnerability Management Risk assessment
  • Digital Forensic: Autopsy FTK Imager Hashing & Evidence Preservation
  • Cloud Security & IAM: AWS Security IAM Policies MFA Least-Privilege Access Identity Governance Concepts (SailPoint)
  • Systems & Tools: Linux/Kali VirtualBox/VMWare GitHub Security Policy Documentation

Certification

  • Digital Forensic Certification (University of Illinois Springfield, Dec, 2025)
  • Cybersecurity Policy Implementation Certification (University of Illinois Springfield, Dec, 2025
  • Cybersecurity Administration Certification (University of Illinois Springfield, Dec, 2025)
  • Business Application on Artificial Intelligence Certification (University of Illinois Springfield, Dec, 2025)

Languages

English
Native or Bilingual

Timeline

Information Security Analyst Intern

Hope Clinical Care
06.2024 - 09.2025

SOC Analyst

Zenith Bank PLC
01.2021 - 12.2023

Master of Science - CyberSecurity Management

University of Illinois At Springfield

Published Articles

  • Cybersecurity Threats in the Financial sector: Analyzing attack types, Vulnerabilities and Response Mechanisms across geopolitical contexts. Link: https://www.researchgate.net/publication/393778873_Cybersecurity_threats_in_the_financial_sector_Analyzing_attack_types_Vulnerabilities_and_response_mechanisms_across_geopolitical_contexts_2015-2024
  • Assessing the Impact of Cybersecurity Incidents on Financial Losses and User Exposure in the Global Financial Sector. Link: https://www.researchgate.net/publication/393779230_Assessing_the_impact_of_cybersecurity_incidents_on_financial_losses_and_user_exposure_in_the_global_financial_sector_2015-2024
  • Predicting Regulatory Violations in the Public Drinking Water Systems. Link: https://www.researchgate.net/publication/395837412_Predicting_regulatory_violations_in_public_drinking_water_systems_A_data-driven_approach
Jacinta I