Summary
Overview
Work History
Education
Skills
Certification
Technology and Tools
Timeline
Generic

ALBAN NOUMEDEM

Washington DC,DC

Summary

Experienced Cybersecurity Analyst with 5+ years of expertise in monitoring, investigating, and mitigating network, host, and email-based attacks. Proficient in analyzing phishing emails, incident response, data loss prevention, and optimizing security operation center processes with industry-leading enterprise solutions. Demonstrates both independent and collaborative teamwork capabilities. Utilizes a strategic blend of technological solutions and personnel training to fortify individuals and systems against malicious actors. US citizen.

Overview

6
6
years of professional experience
3
3

Certifications

Work History

Sr Security Analyst

Robert Half Technology
Washington, DC
06.2022 - 09.2024
  • Review alerts or incidents from third-party security.
  • Investigate findings within the enterprise environments.
  • Perform weekly email threat hunt.
  • investigate phishing campaigns.
  • Remediate Phishing campaigns by removing malicious IOC within the enterprise environment.
  • Investigate and remediate clicking events.
  • Perform risk analyses to identify appropriate security countermeasures.
  • Perform monitoring, research, assessment, and analysis on intrusion detection and prevention tools, as well as, anomaly detection systems, firewalls, antivirus systems, and proxy devices (Palo Alto Networks, etc.) which requires demonstrable security incident response experience.
  • Monitor ITSM for security events and incidents along with other common cybersecurity tools.
  • Provide accurate and thorough documentation of steps taken to resolve cyber threats or events.
  • Map ICS activity and threats using MITRE ATT&CK Framework.
  • Review Cyber Security threat information and assists with mitigating vulnerabilities identified.
  • Analyze network and host activity associated with intrusion attempts by advanced attackers.
  • Contribute to threat intelligence reports and briefings that provide situational awareness of cyber threats impacting the company's global network infrastructure, at every level of the organization.
  • Performs root-cause analysis to document findings, and participates in root-cause elimination activities as required.

SOC Analyst

Accenture Federal Services
Arlington, VA
11.2021 - 06.2022
  • Perform monitoring and security relevant events triage through the review of SIEM alerts, network traffic data collection, endpoint activity logs.
  • Identify and collect data associated with initial security investigation findings.
  • Work flexible hours across night, weekend and holiday shifts.
  • Document and track investigations to resolution, along with creating security alert notifications to customers.
  • Provide analysis on various security enforcement technologies including, but not limited to SIEM, anti-virus, content filtering/reporting, malware prevention, firewalls, intrusion detection systems, web application firewalls, vulnerability scanners etc.
  • Escalate to CIRT Analysts any investigations requiring advanced analysis of security alerts.
  • Overall handling communication and escalation of incidents that require highly technical analysis, such as network intrusions and sophisticated malware infections which have been alerted by the SEIM.
  • Recommend improvements in security systems and procedures
  • Improve overall user experience through support, training, troubleshooting, improvements and communication of system changes.
  • Review and update playbooks

Security Analyst

Pani Digital Services, LLC
Beltsville, MD
11.2018 - 10.2021
  • Monitor and respond to SIEM alerts from various sources and investigate to determine if true positive or false positive.
  • Maintains records of security events investigated and incident response activities utilizing case management and ticketing systems with the use of ServiceNow(SNOW)
  • Effectively work with end-users to assist in IT-related issues.
  • work independently with minimal supervision, and interact effectively with the Security team and leaders.
  • Support the Security Incident Response Team in evaluating security alerts, events, and incidents detected by automated logging and Security Incident and Event Management (SIEM).
  • Perform a Weekly review of logs for each IT system.
  • Identify newly discovered vulnerabilities and exploits with the use of Nessus.
  • Analyze Indicators of compromise, escalate findings, and create tickets for blocks.
  • Monitor Alerts/Alarms and Incident tickets for IT infrastructure on enterprise networks.
  • Perform Vulnerability scans using Nessus and provide reports including remediation procedures.
  • Interpret raw network traffic (packet capture) and determine whether the activity is legitimately using Wireshark.Conduct investigations and prepare comprehensive reports with timely escalations to Network or Security Engineer, for review.
  • Real-time triage and short team analysis of security alerts also prioritization and escalation of alerts and incidents that exceed the SOC threshold.
  • Investigate malicious phishing emails, using security tools, and Open-Source tools and recommend proper blocking based on analysis.

Education

High School Diploma -

Pilote High School
Douala, Cameroon

Some College (No Degree) - Information Technology

Hocking College
Nelsonville, OH

No Degree - Information Technology

Montgomery College
Rockville, MD

Skills

  • Dependable and Responsible
  • Implementing security programs
  • Self-Motivated
  • Host-Based malware analysis
  • PCAP and Emails Analysis
  • Azure Active Directory and Access Control
  • Critical thinking
  • Computer Skills and Technical support
  • Adaptability and fast learner
  • Communication Skills
  • Ability to Work Under Pressure
  • Effective Time Management
  • Ability to Multitask
  • Information Security
  • Teamwork and Collaboration
  • Data security

Certification

  • CompTIA Security+
  • CompTIA CySA+
  • Splunk Fundamentals
  • Tenable Nessus
  • Qualys vulnerability Assessment

Technology and Tools

  • Tenable Nessus
  • Oracle VM VirtualBox
  • Recorded Future
  • Elastic Search( ELK)
  • Abnormal Security
  • MxToolBox
  • VirusTotal
  • Hybrid Analysis
  • ProofPoint Suite(Threat Response, Email Security, TAP Dashboard)
  • Palo Alto NGFW
  • IBM X-force Exchange
  • Any.Run
  • Falcon Insight XDR
  • Wireshark
  • Agari Phishing Defense
  • Google Chronicles
  • Azure Active Directory
  • Microsoft 365 Defender
  • ServiceNow( SNOW)

Timeline

Sr Security Analyst

Robert Half Technology
06.2022 - 09.2024

SOC Analyst

Accenture Federal Services
11.2021 - 06.2022

Security Analyst

Pani Digital Services, LLC
11.2018 - 10.2021

High School Diploma -

Pilote High School

Some College (No Degree) - Information Technology

Hocking College

No Degree - Information Technology

Montgomery College
  • CompTIA Security+
  • CompTIA CySA+
  • Splunk Fundamentals
  • Tenable Nessus
  • Qualys vulnerability Assessment
ALBAN NOUMEDEM