An information security professional with more than 4 years of experience in the prevention and detection of security risks for several organizations. He can develop, measure, test, and implement security and compliance solutions/best practices on an entity’s multi-cloud and/or hybrid infrastructure, as well as the assets residing in it to increase the robustness and resiliency security posture, whilst mitigating risk, preventing cyber-attacks and security breach following a set of cybersecurity frameworks and standards.
Overview
9
9
years of professional experience
Work History
Info Sec Engineer II
Treliant LLC
01.2022 - Current
Manage threats by analyzing security alerts from SIEM tools and resolve if it is a false positive and escalate if it is a true positive
Actively monitors alerts and threats from on-site and cloud infrastructure and remediates as required within job functions and responsibilities
Assisting with provisioning new employees, adjusting access control list of promoted employees and the de- provisioning of the ones who left the organization
Conduct a scheduled threat, vulnerability, and patch management of critical infrastructure assets (servers & end-point operating systems) according to NIST, NERC cybersecurity framework, and company policy
Assisting in the execution of the strategic, roadmap and delivery plans for organizations identity and access management systems
Monitor, respond and investigate security alerts/incidents generated in various security tools like SIEM, EDR, DLP, or reported by internal and external users
Perform scheduled operational technology cybersecurity assessment using industry accepted standards
Conducts assessments of threats and vulnerabilities; determines deviations from acceptable configurations and policies; assesses the level of risk; and develops and/or recommends appropriate mitigation countermeasures
Work with the team that troubleshoots Active Directory, and Azure Active Directory issues concerning users and group accounts in On-Prem and Hybrid Environment
Administered security of the system(s) and user IDs which included account creation, deletion, modification, reset, or extension
Analyzed escalated email events including phishing and malware and escalated, as necessary.
Identity & Access Management Analyst
Followspot Comm. Consulting Ltd.
10.2015 - 10.2019
Responded to assistance requests from individuals through basic troubleshooting tasks
Explained technology-related details in easy-to-understand terms to individuals from different backgrounds and in various job positions
Consulted via telephone to understand user problems, run through testing scripts, and ask probing questions to locate root causes
Oversaw troubleshooting of owned assets to shorten remediation times
Work with vendors and developers to eliminate complex technical issues and recurrent faults
Instructed personnel on new systems and software via presentation and training materials
Replied to customer queries via email, messaging systems, and support ticket platforms
Support comes via remote desktop software, diagnosing customer issues over private and public networks
Drafted documentation on tutorials and FAQs to eliminate unnecessary service calls and avoidable user errors
Completed in-person service calls for internal and external support requests, maintaining exceptional customer satisfaction and resolution figures
Installed software updates and vulnerability patches on servers to prevent possible threats from penetrating networks
Advised customers and users on required maintenance practices for diverse software systems to support OEM warranty requirements and industry best practices
Advocated for end-users, performing tests and problem analysis for server, desktop, and IT infrastructure work
Developed a robust online knowledge base for support staff to reference when responding to requests for assistance.
Education
Ph.D. - Media
Louisiana State Univesity
Baton Rouge, United States
12.2023
Skills
Security/Network Tools: Wireshark, Nmap, Nessus, Kali Linux, Network-Based/Host-Based Firewalls (Palo-Alto), SIEM (Splunk & Exabeam), EDR/XDR (CrowdStrike Falcon, Cortex XDR), Rapid7, NetWitness, Cloud Security Analytics, Microsoft Sentinel, Web Application Security