Melvin Drake

About Me


Cybersecurity Engineer - Azure Security ArchitectI'm a Cybersecurity Engineer specializing in Azure Security Architecture. I design, implement, and maintain secure Azure infrastructures, focusing on threat modeling, risk assessment, and implementing robust security controls.My expertise includes:Azure Security Architecture & Design: Designing, implementing, and maintaining secure Azure infrastructure, including virtual networks, storage, and databases.Threat Modeling & Risk Assessment: Identifying, analyzing, and mitigating potential security threats and vulnerabilities within Azure environments.Identity & Access Management (IAM): Implementing and managing Azure Entra, Entra B2C, and other IAM solutions to ensure secure access control.Data Security: Protecting sensitive data in Azure through encryption, data loss prevention, and secure data handling practices.Compliance & Regulations: Ensuring compliance with industry standards such as ISO 27001, SOC 2, and GDPR.


Certifications


CCNA

Earners of Cisco CCNA - Implementing and Administering Cisco Solutions (CCNA) have demonstrated knowledge and skills related to network fundamentals, network access, IP connectivity, IP services, security fundamentals, and automation and programmability.

CCNA CyberOps

Cisco Certified CyberOps Associate certification program validates the day-to-day, tactical knowledge and skills that Security Operations Center (SOC) teams need to detect and respond to cybersecurity threats.The CyberOps Associate exam and training cover knowledge and skills related to security concepts, security monitoring, hostbased analysis, network intrusion analysis, and security policies and procedures.

Azure Administrator

Earning Azure Administrator Associate certification validates the skills and knowledge to implement, manage, and monitor an organization’s Microsoft Azure environment. Candidates have a deep understanding of each implementing, managing, and monitoring identity, governance, storage, compute, and virtual networks in a cloud environment, plus provision, size, monitor, and adjust resources, when needed.

CySA

Earners of the CompTIA CySA+ certification have the skills, knowledge, and ability to address security analytics, intrusion detection and response in order to identify attacks and defend networks. CompTIA CySA+ analysts have demonstrated the ability to perform data analysis and interpret the results to identify vulnerabilities, threats and risks to an organization and the skills to secure and protect the systems.

Security+

Earners of the CompTIA Security+ certification have the knowledge and skills necessary to perform core security functions required of any cybersecurity role. CompTIA Security+ professionals know how to identify and address potential threats, attacks and vulnerabilities and they have established techniques in risk management, risk mitigation, threat management and intrusion detection.

Network+

Earners of the CompTIA Network+ certification have the skills needed to troubleshoot, configure, and manage wired and wireless networks found in companies around the world. CompTIA Network+ professionals have demonstrated the ability to design and implement functional networks, configure, manage, and maintain essential network devices, implement network security, and troubleshoot network problems.

A+

Earners of the CompTIA A+ certification are proven problem solvers who are able to perform critical IT support tasks including device configuration, data backup and recovery, and operating system configuration. CompTIA A+ certified professionals have demonstrated baseline security skills for IT support roles and are able to detect and remove malware, address privacy concerns, and troubleshoot core service challenges.Earners of the CompTIA A+ certification are prove


Azure Security Engineer

As an Azure Security Engineer (AZ-500 certified), I'm responsible for implementing, managing, and monitoring the security of resources across Azure, multi-cloud, and hybrid environments. I focus on protecting identity, data, applications, and networks by managing security posture, identifying vulnerabilities, performing threat modeling, and implementing threat protection. I collaborate closely with teams to ensure security and compliance requirements are met

Technology


Download My Resume

Contact Me


©Copyright All Reserve | Design By Nazmul