Dynamic Cybersecurity Analyst with over 5 years of comprehensive experience in monitoring and mitigating network, host, and email-based threats. Expertise in incident response, phishing analysis, and data loss prevention drives the optimization of security operations and enhances organizational resilience. A strategic thinker, adept at implementing robust security programs while fostering a collaborative environment. Committed to leveraging advanced technologies and personnel training to safeguard systems against evolving cyber threats. Proven ability to thrive under pressure and manage multiple tasks effectively, ensuring a proactive stance in cybersecurity defense.
Overview
6
6
years of professional experience
2
2
Certifications
Work History
Sr Security Operation Center Analyst
Robert Half Technology
06.2022 - 11.2024
Review alerts or incidents from MSSP security.
Investigate findings within enterprise environments.
Perform weekly email threat hunt.
Analyzed and Investigate phishing campaigns.
Remediate Phishing campaigns by removing malicious IOC within enterprise environment.
Investigate and remediate clicking events.
Perform monitoring, research, assessment, and analysis on intrusion detection and prevention tools, as well as, anomaly detection systems, firewalls, antivirus systems, and proxy devices (Palo Alto Networks, etc.) which requires demonstrable security incident response experience.
Provide accurate and thorough documentation of steps taken to resolve cyber threats or events.
Analyze network and host activity associated with intrusion attempts by advanced attackers.
Performs root-cause analysis to document findings, and participates in root-cause elimination activities as required.
Self-motivated, with a strong sense of personal responsibility
Used critical thinking to break down problems, evaluate solutions and make decisions
Collaborated with cross-functional teams to identify opportunities for process improvement and increased efficiency.
Enhanced team collaboration by providing clear communication of complex findings through visualizations and reports.
SOC Analyst
Accenture Federal Services
11.2021 - 06.2022
Perform monitoring and security relevant events triage through the review of SIEM alerts, network traffic data collection, endpoint activity logs.
Identify and collect data associated with initial security investigation findings.
Work flexible hours across night, weekend and holiday shifts.
Document and track investigations to resolution, along with creating security alert notifications to customers.
Provide analysis on various security enforcement technologies including, but not limited to SIEM, anti-virus, content filtering/reporting, malware prevention, firewalls, intrusion detection systems, web application firewalls, vulnerability scanners etc.
Escalate to CIRT Analysts any investigations requiring advanced analysis of security alerts.
Overall handling communication and escalation of incidents that require highly technical analysis, such as network intrusions and sophisticated malware infections which have been alerted by the SEIM.
Recommend improvements in security systems and procedures
Improve overall user experience through support, training, troubleshooting, improvements and communication of system changes.
Review and update playbooks
Security Analyst
Pani Digital Services, LLC
11.2018 - 10.2021
Monitor and respond to SIEM alerts from various sources and investigate to determine if true positive or false positive.
Maintains records of security events investigated and incident response activities utilizing case management and ticketing systems with use of ServiceNow(SNOW)
Effectively work with end-users to assist in IT-related issues.
work independently with minimal supervision, and interact effectively with Security team and leaders.
Support Security Incident Response Team in evaluating security alerts, events, and incidents detected by automated logging and Security Incident and Event Management (SIEM).
Perform Weekly review of logs for each IT system.
Identify newly discovered vulnerabilities and exploits with use of Nessus.
Analyze Indicators of compromise, escalate findings, and create tickets for blocks.
Monitor Alerts/Alarms and Incident tickets for IT infrastructure on enterprise networks.
Perform Vulnerability scans using Nessus and provide reports including remediation procedures.
Interpret raw network traffic (packet capture) and determine whether activity is legitimately using Wireshark.Conduct investigations and prepare comprehensive reports with timely escalations to Network or Security Engineer, for review.
Real-time triage and short team analysis of security alerts also prioritization and escalation of alerts and incidents that exceed SOC threshold.
Investigate malicious phishing emails, using security tools, and Open-Source tools and recommend proper blocking based on analysis.
Education
High School Diploma -
Pilote High School
Douala, Cameroon
Some College (No Degree) - Information Technology
Hocking College
Nelsonville, OH
No Degree - Information Technology
Montgomery College
Rockville, MD
Some College (No Degree) - Cybersecurity - Network Forensics
The SANS Technology Institute
Bethesda, MD
Skills
Analytical problem-solving skills
Strong written and verbal communication skills
Independent remote work
Proficient in engaging both technical and non-technical teams
Analytical decision-making
Problem-solving analysis
Workflow refinement
Team collaboration and leadership
Data log analysis
Certification
CompTIA Security+
CompTIA CySA+
Splunk Fundamentals
Tenable Nessus
Qualys vulnerability Assessment
GFNA in Progress
Timeline
Sr Security Operation Center Analyst
Robert Half Technology
06.2022 - 11.2024
SOC Analyst
Accenture Federal Services
11.2021 - 06.2022
Security Analyst
Pani Digital Services, LLC
11.2018 - 10.2021
High School Diploma -
Pilote High School
Some College (No Degree) - Information Technology
Hocking College
No Degree - Information Technology
Montgomery College
Some College (No Degree) - Cybersecurity - Network Forensics
The SANS Technology Institute
Technology and Tools
Kibana (ELK)
Splunk ES
Splunk SOAR
ProofPoint ( Enterprise, TAP, Threat and Response)