Support incident processing and reporting across multiple platforms and security technologies, including Windows, Linux and macOS.
Provide in depth analysis from escalated requests originating from Security Analyst 1.
Validate suspicious events by performing investigations using SIEM and SOAR technologies, leveraging proprietary tooling, intelligence and OSINT, TTPs and IOCs.
Identify gaps in customer environments, data ingested or configuration errors which reduce telemetry quality.
Strong written and verbal communication skills including the ability to write well-written reports and analysis that’s thorough, accurate and complete.
Achievements/Tasks
Sr. Security Analyst
Pondurance
11.2022 - 05.2023
Mentored, guided, and acted as an escalation point contact for Security Analysts (Tier 1&2).
Proactive threat hunting processes to seek out undetected threats and malicious behaviors.
Supported the internal Vulnerability Management Program.
Created, updated, and participated in crafting playbook responses and other standard operating procedures.
Identify and confirm attack vectors, threat tactics, and attacker techniques.