Gurjit S.
About Gurjit S.
Gurjit S. is a Cyber Security Analyst at Zyston LLC in Dallas, Texas, where he provides real-time guidance on attack mitigation and monitors security events. He holds a Bachelor's degree in Cyber Security from The University of Texas at San Antonio and previously worked as an IT Specialist at Verizon.
Work at Zyston
Gurjit S. has been employed at Zyston LLC as a Cyber Security Analyst since 2021. In this role, he provides real-time guidance to clients on attack mitigation methodologies. His responsibilities include monitoring and analyzing security events to identify potential intrusions and malicious activities. Gurjit ensures the integrity and protection of networks, systems, and applications by enforcing organizational security policies. He also recommends improvements in security systems and procedures, contributing to the overall security posture of the organization.
Education and Expertise
Gurjit S. earned a Bachelor's degree in Cyber Security from The University of Texas at San Antonio, where he studied from 2018 to 2020. His academic background provides him with a solid foundation in cybersecurity principles and practices. This education complements his professional experience, allowing him to effectively perform ongoing information risk assessments and audits to ensure compliance with regulatory requirements.
Background
Before joining Zyston, Gurjit S. worked as an IT Specialist at Verizon from 2014 to 2017 in Houston, Texas. During his tenure at Verizon, he gained valuable experience in information technology, which laid the groundwork for his transition into the cybersecurity field. His background in IT has equipped him with the skills necessary to monitor security events and analyze potential threats effectively.
Achievements
In his current role, Gurjit S. has made significant contributions to the security operations at Zyston LLC. He performs ongoing information risk assessments and audits, ensuring that the organization meets regulatory compliance standards. His ability to provide real-time guidance on attack mitigation methodologies has been instrumental in enhancing client security measures.