Summary
Overview
Work History
Education
Skills
Certification
Timeline
Technology and Tools
Generic

ALBAN NOUMEDEM

Washington,DC

Summary

Dynamic Cybersecurity Analyst with over 5 years of comprehensive experience in monitoring and mitigating network, host, and email-based threats. Expertise in incident response, phishing analysis, and data loss prevention drives the optimization of security operations and enhances organizational resilience. A strategic thinker, adept at implementing robust security programs while fostering a collaborative environment. Committed to leveraging advanced technologies and personnel training to safeguard systems against evolving cyber threats. Proven ability to thrive under pressure and manage multiple tasks effectively, ensuring a proactive stance in cybersecurity defense.

Overview

6
6
years of professional experience
2
2

Certifications

Work History

Sr Security Operation Center Analyst

Robert Half Technology
06.2022 - 11.2024
  • Review alerts or incidents from MSSP security.
  • Investigate findings within enterprise environments.
  • Perform weekly email threat hunt.
  • Analyzed and Investigate phishing campaigns.
  • Remediate Phishing campaigns by removing malicious IOC within enterprise environment.
  • Investigate and remediate clicking events.
  • Perform monitoring, research, assessment, and analysis on intrusion detection and prevention tools, as well as, anomaly detection systems, firewalls, antivirus systems, and proxy devices (Palo Alto Networks, etc.) which requires demonstrable security incident response experience.
  • Provide accurate and thorough documentation of steps taken to resolve cyber threats or events.
  • Analyze network and host activity associated with intrusion attempts by advanced attackers.
  • Performs root-cause analysis to document findings, and participates in root-cause elimination activities as required.
  • Self-motivated, with a strong sense of personal responsibility
  • Used critical thinking to break down problems, evaluate solutions and make decisions
  • Collaborated with cross-functional teams to identify opportunities for process improvement and increased efficiency.
  • Enhanced team collaboration by providing clear communication of complex findings through visualizations and reports.

SOC Analyst

Accenture Federal Services
11.2021 - 06.2022
  • Perform monitoring and security relevant events triage through the review of SIEM alerts, network traffic data collection, endpoint activity logs.
  • Identify and collect data associated with initial security investigation findings.
  • Work flexible hours across night, weekend and holiday shifts.
  • Document and track investigations to resolution, along with creating security alert notifications to customers.
  • Provide analysis on various security enforcement technologies including, but not limited to SIEM, anti-virus, content filtering/reporting, malware prevention, firewalls, intrusion detection systems, web application firewalls, vulnerability scanners etc.
  • Escalate to CIRT Analysts any investigations requiring advanced analysis of security alerts.
  • Overall handling communication and escalation of incidents that require highly technical analysis, such as network intrusions and sophisticated malware infections which have been alerted by the SEIM.
  • Recommend improvements in security systems and procedures
  • Improve overall user experience through support, training, troubleshooting, improvements and communication of system changes.
  • Review and update playbooks

Security Analyst

Pani Digital Services, LLC
11.2018 - 10.2021
  • Monitor and respond to SIEM alerts from various sources and investigate to determine if true positive or false positive.
  • Maintains records of security events investigated and incident response activities utilizing case management and ticketing systems with use of ServiceNow(SNOW)
  • Effectively work with end-users to assist in IT-related issues.
  • work independently with minimal supervision, and interact effectively with Security team and leaders.
  • Support Security Incident Response Team in evaluating security alerts, events, and incidents detected by automated logging and Security Incident and Event Management (SIEM).
  • Perform Weekly review of logs for each IT system.
  • Identify newly discovered vulnerabilities and exploits with use of Nessus.
  • Analyze Indicators of compromise, escalate findings, and create tickets for blocks.
  • Monitor Alerts/Alarms and Incident tickets for IT infrastructure on enterprise networks.
  • Perform Vulnerability scans using Nessus and provide reports including remediation procedures.
  • Interpret raw network traffic (packet capture) and determine whether activity is legitimately using Wireshark.Conduct investigations and prepare comprehensive reports with timely escalations to Network or Security Engineer, for review.
  • Real-time triage and short team analysis of security alerts also prioritization and escalation of alerts and incidents that exceed SOC threshold.
  • Investigate malicious phishing emails, using security tools, and Open-Source tools and recommend proper blocking based on analysis.

Education

High School Diploma -

Pilote High School
Douala, Cameroon

Some College (No Degree) - Information Technology

Hocking College
Nelsonville, OH

No Degree - Information Technology

Montgomery College
Rockville, MD

Some College (No Degree) - Cybersecurity - Network Forensics

The SANS Technology Institute
Bethesda, MD

Skills

  • Analytical problem-solving skills
  • Strong written and verbal communication skills
  • Independent remote work
  • Proficient in engaging both technical and non-technical teams
  • Analytical decision-making
  • Problem-solving analysis
  • Workflow refinement
  • Team collaboration and leadership
  • Data log analysis

Certification

  • CompTIA Security+
  • CompTIA CySA+
  • Splunk Fundamentals
  • Tenable Nessus
  • Qualys vulnerability Assessment
  • GFNA in Progress

Timeline

Sr Security Operation Center Analyst

Robert Half Technology
06.2022 - 11.2024

SOC Analyst

Accenture Federal Services
11.2021 - 06.2022

Security Analyst

Pani Digital Services, LLC
11.2018 - 10.2021

High School Diploma -

Pilote High School

Some College (No Degree) - Information Technology

Hocking College

No Degree - Information Technology

Montgomery College

Some College (No Degree) - Cybersecurity - Network Forensics

The SANS Technology Institute

Technology and Tools


  • Kibana (ELK)
  • Splunk ES
  • Splunk SOAR
  • ProofPoint ( Enterprise, TAP, Threat and Response)
  • Any.Run Sandbox
  • Crowdstrike EDR
  • Agari Email Security
  • Google Chronicles
  • Azure AD
  • Microsoft Defender (MDI and MDE)
  • ServiceNow( Snow)
  • Abnormal Security
  • Jira

.

ALBAN NOUMEDEM