Experienced in alert management and incident response with over 3 years at Credit Suisse|UBS and 12 years in IT/Cyber with the United States Air Force. Proficient in SIEM, SOAR, and MDR technologies, with a strong focus on problem-solving and complex data analysis. Excellent communication skills, mentoring, and training abilities. Eager to contribute and leverage technical expertise with a proactive, team-oriented approach.
Overview
15
15
years of professional experience
2
2
Certifications
Work History
Threat Detection and Response Analyst
Credit Suisse | UBS
Raleigh, NC
10.2021 - Current
Managed scheduling, provided counseling, communicated performance objectives, and ensured team awareness of changes in responsibilities
Maintained team awareness of established procedures, workflows, and escalation path ensuring timely identification, handling, escalation, or resolution of security case
Performed deeper triage and analysis via Microsoft Defender for alerts in QRadar SOAR platform as an escalation point for associate analysts
Analyzed alerts in ServiceNOW and JIRA from SIEM, Recorded Future, CrowdStrike, ProofPoint, Azure, and tickets related to threat detection via client input and IT support
Investigated blocked processes, persistence methods, and defense evasion using CrowdStrike, including hash and host searches in the 'Investigate' module
Fine-tuned monitoring system alerts to reduce duplicate triggers and save time.
Collaborated with SMEs to train analysts on triaging Microsoft Azure Cloud alerts using 'out-of-the-box' playbooks
Facilitated training program and full-time integration of cyber-focused graduates into the workforce.
Analyzed alerts by executing queries in Splunk ES to gather relevant information.
Provided 24/7 support, assisting coverage with two other regions during evenings and weekends
Cyber Security Professional
United States Air Force (Active Duty)
San Antonio, TX
03.2017 - 12.2021
Provided direct operator knowledge to an accredited operational test and evaluation unit for onboarding new capabilities to an official Air Force monitoring platform
Monitored and reported events in ArcSight based on signatures and trending information from the intel community and common practice
Led 24 member team during incident investigation; drove large scale strike mission on 130 host systems and restoring integrity to the Air Force network
Responded to incidents using Splunk, EnCase, Tanium and specialty inhouse training provided by the Air Force's largest monitoring unit (Air Force Computer Emergency Response Team)
Utilized EnCase and Tanium to perform system parses and detailed remote artifact analysis
Perform vulnerability assessments with Nessus and cyber security threat engineering with specific focus on emulating Tactic Techniques and Procedures (TTPs) in closed environments using PowerShell, Metasploit, Linux, and Windows VMs
Provide technical engineering support and research in the area of advanced persistent threats (APT) and threat replication based on information from MITRE ATT&CK Framework, Palo Alto Unit 42 and other industry leaders
Client Systems Supervisor
United States Air Force (Active Duty)
Tucson, AZ
09.2014 - 03.2017
One of two members trained to handle all local registration authority and PKI duties for the installation and its 10,000+ personnel
Supervised the successful setup and tear down of a warm site consisting of 79 systems for an inspection team
Implemented mobile email encryption capabilities on iPhones to 200+ upper level leadership personnel
Resolved technical issues over the phone with customers as well as utilize remote assistance with SolarWinds Dameware
Established, inventoried, and maintained several Information Technology components ranging from mobile devices, tablets, desktop/laptops, and VoIP telephones valued at $15,000
Trained junior members of the IT support team regarding network security and troubleshooting of client systems
Client Systems Technician
United States Air Force (Active Duty)
Okinawa, Japan
08.2010 - 08.2014
Prepared 31 Information Technology systems for Operation Tomodachi enabling the reception of 20,000 evacuees after the tsunami
Ensured network, system and data availability and integrity through preventative maintenance and upgrades keeping a 99.6% uptime
Utilized Active Directory Users and Computers daily to add/change/remove computer and user accounts on the network
Upgraded 5,000 computer operating systems in accordance with management directives and network requirements to ensure 100% compliance
Education
Bachelor of Science - Information Technology Management
Trident University International
Associate of Applied Science - Cyber Security
Community College of the Air Force
Associate of Applied Science - Information Systems Technology
Associate Director – Consolidation and Reporting at Credit Suisse (UBS Group Company)Associate Director – Consolidation and Reporting at Credit Suisse (UBS Group Company)