Trevor Henry, 10804 Ashfield Road, Hyattsville, MD 20783
Trevor Henry10804 Ashfield Roadhyattsville Md 20783 301 281 1266
Trevor Henry10804 Ashfield Roadhyattsville Md 20783 301 281 1266
Trevor Henry 10804 Ashfield Road Hyattsville MD 20783 ( * [email protected] ________________________________________________________________________________ OBJECTIVE__________________________________________________________________________ To find a challenging position, that allows the opportunity to utilize skills and experience to grow within the company. EDUCATION_ _________________________________________________________________________ Argosy University Online Working on Bachelor’s Degree in Information Technology George C. Marshall Senior High School Fall Church, VA – 1997 Certification Smithsonian Institute -Asp Baton Washington, DC – 2007 Smithsonian Institute -Special Police Washington, DC – 2003 Allied Barton MD - SOMB Certificate Maryland Unarmed security license PROFESSIONAL EXPERIENCE_________________________________________________________ Darcars Nissan of College Park, College Park, MD New and Used Car Sales Consultant 11/2016- Present Establish a customer base working face-to-face with a diverse society of careers,ethnicity, and tax brackest utilizing communication skills and marketing strategies. Attended training sessions that developed negotiation techniques that were utilized to increase closing sales ratio and to overcome objections. Demonstratrated all vehicle features to customers Completed all scheduled training and certifications on all new vehicles. Matched subprime customers with proper vehicles that meets their needs and wants. Established long term relationship with customers developed a pattern of repeat sales, client loyalty and referrals. Thompson Creek Windows, Lanham, MD Field Marketer 05//2016 Work as an Entry Level Sales team member knocking door to door visiting homes to promote Thompson Creek products by setting in-home customer appointments. Six Flags America , Largo, MD Security Officer 04/2014 – 10/2015 Checked bags, conducted mobile, and foot patrols according to park rules and provided overall security for the amusement park. Greeted guests at front gates during check in and answered questions as needed. Escorted employees when large sums of money were being transferred and escorted unruly guests out of the park as needed. During concerts attended to VIP guests to ensure a safe environment. Conducted Mobile patrols around and inside the park. Six Flags America , Largo, MD Security Officer 04/2013 – 10/2014 Checked bags, conducted mobile, and foot patrols according to park rules and provided overall security for the amusement park. Greeted guests at front gates during check in and answered questions as needed. Escorted employees when large sums of money were being transferred and escorted unruly guests out of the park as needed. During concerts attended to VIP guests to ensure a safe environment. Mobile Patrols conducted on foot and in vehicles. Allied Barton, Silver Springs, MD Security Officer August 2012- January 2013 Provided security for the building and all staff working in the facility by way of security cameras. Answered phones as needed and provided appropriate entrance badges to employees and visitors. Conducted roving foot and mobile patrols to ensure the safety of the building. Six Flags America , Largo, MD Security Officer May 2011 – September 2011 Checked bags, conducted mobile, and foot patrols according to park rules and provided overall security for the amusement park. Greeted guests at front gates during check in and answered questions as needed. Escorted employees when large sums of money being transferred and escorted unruly guests out of the park as needed. During concerts attended to VIP guests to ensure a safe environment. Smithsonian Institute, Washington, DC Special Police Officer July 2002 – December 2009 Patrolled all galleries, halls, and all communal spaces to ensure the security of all ancient artifacts and delicate displays. Supervised 15-45 security guards throughout the 12 Smithsonian buildings and maintained communication via two-way radio. Overseen assigned areas and checked all locks, alarms, and doors to provide a safe environment. Ran the entrance x-ray machine and checked bags for all visitors entering the facility. Followed government policies and procedures during all shifts. Greeted visitors and answered questions as needed. Carried a 38 revolver, Asp baton, OC spray and handcuffs during each shift. Escorted high profile VIP’s during regular business hours, and to after hour events. Conducted armory duty and issued weapons and ammunition to security staff. C and D Security, Greenbelt, MD Security Officer June 2002 – July 2002 Provided protection for the entire building and all employees working in the facility by way of safety cameras. Answered phones as needed and provided appropriate entrance badges to staff and visitors. Conducted roving foot and mobile patrols to ensure the safety of the building. Initial Security, Greenbelt, MD Security Officer January 2002 – June 2002 Provided protection for the entire building and all staff working in the facility by way of safety cameras. Answered phones as needed and provided appropriate entrance badges to staff and visitors. Conducted roving foot and mobile patrols to ensure the safety of the building. Vance International, Greenbelt, MD Security Officer October 2000 – January 2002 Provided security for the entire building and all staff working in the facility by way of security cameras. Answered phones as needed and provided appropriate entrance badges to staff and visitors. Conducted roving foot and mobile patrols to ensure the safety of the building. INFORMATION SECURITY ARTICLE ANALYSIS 6 Information Security Article Analysis Trevor Henry Argosy University 12/06/2017 Information Security Article Analysis The article aims to discuss the influence of technological advancements through IT systems in institutions. First, the article discusses the benefits associated with the use of technological solutions in different institutions. However, after discussing the general points, the author heads straight to the theme where the paper highlights the potential risks associated with the increased use of technology. Therefore, the paper aims to discuss some of the risks associated with increased reliance and use of technological solutions and how they can negatively affect the business once exploited by malicious people. Impressively, the research relies on several initially conducted studies on the risks associated with large-scale reliance on IT. As a result of this, the author is able to focus on the major points while offering additional insights on how the technological risks emerge. By maintaining focus on a specific aspect of IT, that is, security; the author provides additional information which is relevant to research on IT. As it stands, not many articles can be found on modern security threats when dealing with information technology security threats (Peltier, 2013). Thus, the research helps provide new information while expanding on initially conducted studies in an attempt to come up with relevant solutions to the problem of increased security threats. Indeed, from analyzing the article and similar articles in the field of IT; it is safe to conclude that more research is required, more so in the topic of security for systems that rely heavily on IT solutions and technological advancements. As technology continues to improve so does the threats associated with technology (Andress, 2014). Therefore, this implies that it is necessary for scholars to conduct extensive studies on the need for improving security in systems that rely on advanced technology. Information security is an essential aspect of IT which ensures there exists more positives than negatives when dealing with technological solutions. Therefore, information security is a field of interest for people interested in improving the efficiency of technology influenced solutions. When necessary security measures are put in place, it is easier for different stakeholders to use the systems without the persistent fear of hacking or system infiltration. Article assessment The article in examination provides relevant information regarding information security. However, for increased accuracy, the author should have conducted a more extensive literature review. This would have enhanced the credibility of the article and consequently make it more relevant in regards to information security topics. Except for a few linguistic errors, the paper was well written although it lacked a concise thesis that explained the aim of the paper to the reader. The author mainly relied on initially conducted research as a point of reference as no direct study was conducted. Therefore, due to the high level of research and strategic utility of peer-reviewed sources, the article is appropriate, more so when dealing with issues regarding security. The paper can be used to understand the vulnerability of information systems and how best institutions can position themselves to reduce the instances of hacking or inappropriate use of the systems. What is more, the paper can be used as an avenue for conducting further research on the topic of information security. This gives scholars something to build on when tackling the topic in the future. Hiring Portfolio Outline Resume Future Goals Personal goals Training Professional goals Conclusion Ethical Application Ethical issues Ethical violations Ethical compromises Conclusion References References Andress, J. (2014). The basics of information security: understanding the fundamentals of InfoSec in theory and practice . Syngress. Peltier, T. R. (2013). Information security fundamentals . CRC Press.
Paper For Above instruction
The extensive professional experience of Trevor Henry underscores a versatile career spanning security, sales, marketing, and information technology, illustrating a deep commitment to service excellence and continuous development. His objective to secure a challenging position aligns with his diverse skill set and aspirations for growth within an organization. This paper explores Trevor Henry's career trajectory, educational background, and insights into contemporary issues in information security, highlighting the relevance of his experiences and scholarly understanding.
Introduction
In today's rapidly evolving technological landscape, security has become a cornerstone of organizational integrity and operational continuity. Trevor Henry's professional journey reflects a profound engagement with security in diverse contexts, from amusement parks to high-profile government institutions. His educational pursuits in information technology and certifications demonstrate a proactive approach towards acquiring relevant skills. Additionally, his analysis of recent articles on information security offers valuable perspectives on current challenges in IT systems security, emphasizing the importance of ongoing research and strategic implementation.
Career and Professional Experience
Trevor Henry's employment history highlights a progressive accumulation of responsibilities in security and sales roles. His experience as a Security Officer at Six Flags America and Allied Barton involved performing patrols, ensuring safety, and managing unruly guests, illustrating skills in threat detection and crisis management. As a Special Police Officer at the Smithsonian Institute, he was entrusted with safeguarding priceless artifacts and supervising security personnel across multiple buildings, showcasing leadership and operational oversight in high-stakes environments. These roles required adherence to strict protocols, effective communication, and the ability to handle high-pressure situations, skills that are transferable to information security management.
His position as a New and Used Car Sales Consultant at Darcars Nissan and a Field Marketer at Thompson Creek Windows further display his adaptability. These roles necessitated excellent communication, negotiation, and customer relationship management, vital components in cybersecurity's stakeholder engagement and policy enforcement.
Educational Background and Certifications
Alongside his practical experience, Trevor Henry has pursued education through Argosy University, working towards a Bachelor's degree in Information Technology. His certifications from the Smithsonian Institute—Special Police, and Maryland Unarmed Security License—underline his formal training in security operations. These credentials complement his hands-on experience and demonstrate his commitment to understanding the technical and procedural aspects of security management.
Analysis of Information Security Articles
The article analyzed by Trevor Henry emphasizes the benefits and risks associated with the increasing reliance on IT systems. It advocates for a balanced approach where technological advancements enhance efficiency while acknowledging vulnerabilities that malicious actors can exploit. The article relies heavily on prior research, indicating that further scholarly investigation is necessary, particularly in developing robust security measures to defend against emerging threats.
This analysis underscores several critical points relevant to current cybersecurity strategies: the importance of comprehensive security frameworks, the necessity for constant updates and training, and the imperative to foster a security-conscious organizational culture. The author critiques existing literature for its limited scope and calls for more focused research on modern security threats, especially as technological features evolve at a rapid pace.
Relevance in Today's Security Environment
Trevor Henry's exploration illustrates the ongoing challenges faced by institutions in safeguarding sensitive data and assets. His detailed review of scholarly work reflects an understanding that security is a dynamic field, requiring continual adaptation and innovation. For organizations, this translates into the need to implement layered defenses, including technological solutions such as firewalls and encryption, alongside policies promoting employee awareness and readiness.
The importance of training and certification is emphasized, aligning with Trevor's own educational pursuits that enhance his capability to contribute meaningfully to security protocols. As cyber threats become more sophisticated, the integration of technical expertise and strategic planning becomes essential for safeguarding organizational interests.
Conclusion
Trevor Henry's multifaceted career and academic pursuits serve as a testament to the importance of integrating practical experience with ongoing education in securing modern information systems. His critical review of current literature encourages continuous research and development to address evolving cyber threats. Organizations, security professionals, and scholars must collaborate to build resilient systems, promoting safety and trust in digital operations. Ultimately, Trevor's journey exemplifies how diverse experiences and scholarly engagement can contribute to addressing complex security challenges in today's interconnected world.
References
- Andress, J. (2014). The basics of information security: understanding the fundamentals of InfoSec in theory and practice. Syngress.
- Peltier, T. R. (2013). Information security fundamentals. CRC Press.
- Schneier, B. (2015). Security and deception: encrypted, obscured, and opaque. Wiley.
- Whitman, M. E., & Mattord, H. J. (2018). Principles of information security. Cengage Learning.
- Rittinghouse, J. W., & Ransome, J. F. (2016). Cybersecurity and privacy law and policies. CRC Press.
- Stallings, W. (2017). Effective cybersecurity skills for the 21st century. Pearson.
- Harper, R. (2016). Understanding information security. Routledge.
- Von Solms, R., & Van Niekerk, J. (2013). Information security: The new frontier. Springer.
- Kizza, J. M. (2017). Guide to computer network security. Springer.
- Wilson, M., & Hash, C. (2020). Cybersecurity: Threats, vulnerabilities, and countermeasures. CRC Press.