Summary
Overview
Work History
Education
Skills
Affiliations
Certification
Websites
Timeline
Generic

Brayden Prockish

Wichita,KS

Summary

Results-driven Infrastructure Analyst known for high productivity and efficient task completion. Possess in-depth knowledge in system administration, software development, support, and security. Excel at problem-solving, teamwork, and adaptability, ensuring seamless IT infrastructure operations and improvements. Wanting to apply my extensive education and hands-on lab experience to protect against threat actors and safeguard digital assets in a cybersecurity role.

Overview

5
5
years of professional experience
1
1
Certification

Work History

Infrastructure Analyst

Koch Industries
Wichita, KS
03.2024 - Current
  • Managed Active Directory users and groups across multiple domains within the organization's environment.
  • Helped provision and manage various infrastructure appliances to ensure high availability of our network and server uptime.
  • Extensive experience with AWS in cloud infrastructure management, security best practices, and cost optimization.
  • Incident response experience through our monitoring platform, which would send critical alerts through to our ticketing platform for us to triage.
  • Responsible for our monitoring effort of our infrastructure. Setting up alerts, fine-tuning alerts, and helping teammates triage alerts that come in.
  • Provided technical support to troubleshoot complex network problems related to routers, switches, firewalls and wireless networks.
  • Performed periodic maintenance activities such as security patching, OS upgrades, firmware updates.

Product Support Analyst

Koch Industries
Wichita, KS
09.2022 - 03.2024
  • Provided tier 1 customer support for applications, integration code issues, and conducted root cause analysis for permanent solutions
  • Served as a support owner ensuring critical business operations were monitored
  • Experience using various platforms such as Cyberark, Beyondtrust, Thycotic, Device42, and vCenter
  • Played a key role in onboarding over 200 assets into PRTG and Device42, and installed Tanium agents for endpoint management.
  • I was a product support owner, where I was the point of contact for anyone in the business who had issues related to the space I owned.
  • Identified root cause of customer issues and resolved them in a timely manner
  • Responded to critical events and participated in an on-call rotation.
  • Performed testing on products before release to ensure quality assurance.

Internship - Software Engineer

Aegis Processing Solutions
Topeka, KS
06.2019 - 06.2022
  • Gained remote work experience as a front-end developer, contributing to the development of imaging software for data capture
  • Developed a backend reporting program that automated data processing from the front end, saving my Director of IT 10 hours weekly previously spent on manual reporting.
  • Utilized SDLC for maintenance programming and responded to Jira tickets from production managers to address arising issues.
  • Assisted in backend programming for data that came from the front end application
  • Responsible for meeting customer data requirements, where I would program validation needs when necessary.

Education

M.S., Cyber Security -

Uni. Of Phoenix
Phoenix, AZ
04.2024

B.S., Management Information Systems & Data Analytics -

Newman University
Wichita, KS
05.2022

Skills

  • Proficient in log analysis
  • Experienced with digital forensic tools such as KAPE, FTK Imager, Autopsy, and Eric Zimmerman tool suite
  • Proficient in Windows, Linux, and macOS
  • Proficient in Python and Bash
  • Experienced with vulnerability assessment tools such as Nessus and Greenbone Security Assistant
  • Experienced with penetration testing tools such as Nmap, Kali, Metasploitable, Burp Suite, and OWASP ZAP
  • Security Frameworks Knowledge
  • Vulnerability Management
  • Threat Management
  • Threat Analysis
  • Risk Management
  • On-Call Support
  • Splunk Analysis
  • Experienced with malware analysis tools such as PEStudio, Ghidra, and VirusTotal
  • Proficient with Wireshark
  • Experience doing email analysis
  • Network Security Knowledge
  • System Security Knowledge
  • Email Security Knowledge
  • Cloud Security Knowledge

Affiliations

- Built a home Cyber Security lab with Oracle VirtualBox, including DC, DNS, DHCP, Active Directory, and Splunk servers.

- Set up a Kali Linux box for penetration testing, and Metasploitable to find exploitations on victim network

- Installed and configured a Splunk forwarder to export system logs for SIEM analysis which helped aid in my understanding of detection of malicious behavior such as host attacks, compromised accounts and network IoC

- Used nmap to fingerprint a victims network to identify open ports, OS, and service versions. Researched vulnerabilities for each open port and service to which helped determine the attack vector

- Conducted network attacks such as DoS, brute force, and SQL injection which highlighted the importance of firewall rules, IPS, and IDS in detecting and preventing these attacks.

- Performed host analysis post-attack and implemented security measures to prevent future breaches.

- Utilized SecOnion to monitor host performance during penetration tests and employed sandboxing techniques for malware analysis, including inspecting malicious .DLL files, process creation, file creation, and registry edits/creation

Certification

  • CompTIA CySA+

Timeline

Infrastructure Analyst

Koch Industries
03.2024 - Current

Product Support Analyst

Koch Industries
09.2022 - 03.2024

Internship - Software Engineer

Aegis Processing Solutions
06.2019 - 06.2022

M.S., Cyber Security -

Uni. Of Phoenix

B.S., Management Information Systems & Data Analytics -

Newman University
Brayden Prockish