As a cybersecurity enthusiast, I bring a robust understanding of Cyber Defense Frameworks coupled with hands-on expertise across a spectrum of security domains. My practical skills encompass threat intelligence, network monitoring, endpoint security, SIEM analysis, and penetration testing. Leveraging industry-standard tools, I proficiently detect and mitigate cyber threats, enhancing the security posture of networks and systems. Notably, my dedication to continuous learning and practical application has led to my ranking in the top 1% on TryHackMe, underscoring my commitment to excellence in cybersecurity
Overview
3
3
years of professional experience
1
1
Certification
Work History
Cyber Security Analyst (3 Year's)
Innovative Business Solutions
07.2019 - 06.2022
Skilled in implementing robust defense mechanisms to safeguard computer networks from malicious activities, including viruses and cyber attacks.
Proficient in filtering network traffic and preventing unauthorized access to ensure the integrity of computer systems.
Collaborates effectively within distributed teams to detect and resolve information security incidents promptly, utilizing analytical and critical thinking skills while adhering to the incident management lifecycle.
Experienced in identifying security threats, vulnerabilities, and system anomalies through the utilization of Splunk Enterprise.
Provides round-the-clock cybersecurity support in a 24x7 Cyber Security Operation Centre (SOC), encompassing detection, response, threat hunting, and support roles.
Proficient in monitoring and conducting log analysis using Security Information and Event Management (SIEM) tools like Splunk Enterprise, adept at identifying and investigating security anomalies for timely remediation.
Improved incident management workflows through streamlined communication between SOC Analysts, IT departments, and other relevant parties.
Identified root causes of security breaches through thorough investigation and analysis of log data.
Analyzed network traffic and system logs to detect malicious activities.
Provided technical support during high-priority incidents, ensuring timely resolution with minimal impact on business operations.
Proficient in system analysis, documentation, testing, implementation, and user support for platform transitions, ensuring accuracy and quality assurance of data.
Enhanced cybersecurity within network infrastructure by applying advanced network automation techniques. Leveraged Ansible, Git, and Python scripting to streamline processes and strengthen security protocols
Generates detailed reports outlining findings and recommendations for stakeholders.
Integrated PowerShell for Windows environments and utilized SQL for effective database management, ensuring robust protection against cyber threats
Education
Master of Science - Computer Science
Southern Arkansas University
12.2023
Skills
Proficient in Cyber Defense Frameworks such as Cyber Kill Chain, Unified Kill Chain, and MITRE ATT&CK Framework
Threat intelligence tools including openCTI and MISP
Strong understanding of Network Security, OSI & TCP/IP Models, DNS, and protocols such as TCP/IP, routing, HTTP, and web technologies for effective security vulnerability identification
Proficient in utilizing a range of cybersecurity tools including Snort and Suricata for Intrusion Detection and Prevention (IDS/IPS), Palo Alto and Fortinet firewalls for network security, and Wireshark for packet analysis
Proficient in Security Information and Event Management (SIEM) using Splunk Enterprise Security
Endpoint Security Monitoring, with proficiency in Windows event logs, Sysmon, and XDR tools like Wazuh, and EDR tools like Crowdstrike, Cisco AMP
Familiar with Digital Forensics and Incident Response (DFIR) tools such as Autopsy, Redline, and Volatility for conducting digital forensic investigations and incident response activities on Windows and Linux operating systems
Proficient in Penetration Testing methodologies, including information gathering, vulnerability assessment, and exploitation using tools such as Metasploit, Nmap, Burp Suite, and SQLmap
Personal Projects
Established a comprehensive home lab environment to simulate real-world cybersecurity scenarios.
Deployed and configured Snort and Suricata intrusion detection systems (IDS) within the lab environment.
Crafted customized alert signatures to detect a variety of simulated attacks targeting a machine within the network.
Integrated Snort and Suricata with Splunk, a leading security information and event management (SIEM) platform, for centralized log management and analysis.
Implemented log aggregation and correlation techniques to monitor network traffic and system events effectively.
Expanded the scope of monitoring by integrating Windows event logs alongside Snort and Suricata logs within the Splunk environment.
Conducted thorough analysis of detected security events to identify potential threats and vulnerabilities.
Developed dashboards and reports within Splunk to visualize and communicate security findings effectively.
Utilized advanced querying and search capabilities in Splunk to perform forensic investigations and incident response activities.
Certification
SOC 1, TryHackMe
Junior Penetration Tester (eJPT), INE Security (FKA eLearnSecurity).