Information Security Specialist with passion for aligning security architecture plans and processes with security standards and business goals. Extensive experience developing and testing security framework for cloud-based software. Versed in robust network defense strategies. · Cyber Security Analyst with 3 years of experience also proficient and thorough experience and a good understanding of information technology. Specialized in proactive network monitoring of SIEM (Splunk). Have a deep knowledge in identifying and analyzing suspicious event. Versatile, Bilingual professional and ability to manage sensitive materials. Able to use various security tools to perform logs and packet analysis. Finally, can perform malware analysis with the overall objective to ensure confidentiality, integrity and availability of the systems, networks, and data.
Overview
5
5
years of professional experience
1
1
Certification
Work History
SOC Analyst
BGNH
Manassas, VA
06.2020 - Current
Developed plans to safeguard computer files against modification, destruction or disclosure.
Investigate analyze and process phishing emails..
Used Microsoft Word and other software tools to create documents and other communications.
Monitored computer virus reports to determine when to update virus protection systems.
Monitored use of data files and regulated access to protect secure information.
Performed risk analyses to identify appropriate security countermeasures.
Investigate All Suspicious Activities
Maintain Secure Monitoring Tools
Liaise With And Delegate To The Rest Of The SOC Team
Review And Report On All Cybersecurity Processes
Keep All Security Programs And Resources Up To Date
Update the company’s security systems regularly to avoid any cyberattack
Monitor the security access and report probable cyberattacks to a superior employee in the company
Create reports that will allow experts to make changes in the security policies as per the needs of the organization
Monitor user activity, network events and signals from security tools to identify events. Tier 1 SOC Analyst is responsible for determining which alerts and other abnormal activity represent real threats.
Remediate attacks and collect data for more analysis,
Evaluate the attacks, identify the root of the attack, implement required security actions to counter the attack, and restore system operations.
Responsible for investigating and generating reports on information security issues.
Identified issues, analyzed information and provided solutions to problems.
Participated in team-building activities to enhance working relationships.
Worked within applicable standards, policies and regulatory guidelines to promote safe working environment.
Developed and maintained courteous and effective working relationships.
Developed team communications and information for meetings.
Worked flexible hours across night, weekend and holiday shifts.
Adhered to social distancing protocols and wore mask or face shield.
Collaborated with team members to achieve target results.
Recommend improvements in security systems and procedures.
Encrypted data and erected firewalls to protect confidential information.
Conducted security audits to identify vulnerabilities.
Reviewed violations of computer security procedures and developed mitigation plans.
Cybersecurity Specialist
Consulate Health Care
Woodbridge, VA
06.2020 - 07.2022
Participated in creation of device hardening techniques and protocols.
Author security incident reports, highlighting breaches, vulnerabilities and remedial measures.
Monitored use of data files and regulated access to protect secure information.
Protects company hardware, software, and networks from cyber criminals.
Understand company IT infrastructure in detail, monitor it at all times, and evaluate threats that could potentially breach the network.
Continuously looks for ways to enhance company network security and protect its sensitive information.
Configuring Tools: comes in the form of virus software, password protectors, and vulnerability management software. They will evaluate what the company needs and use these tools to protect its information.
Reporting: The analyst will detail what is currently going on in the network and evaluate its strengths. One of the skills needed is learning to read these reports. They will show what is well-protected and indicate if there is any unusual activity in the network.
Evaluate Weaknesses: No network is fully secure, but the goal is to make it as secure as possible. Part of the job is to continuously test all company networks and find weaknesses before bad actors or external threats can compromise them.
Managed relationships with third-party intrusion detection system providers.
Authored security incident reports, highlighting breaches, vulnerabilities and remedial measures.
Encrypted data and erected firewalls to protect confidential information.
Monitored computer virus reports to determine when to update virus protection systems.
Recommend improvements in security systems and procedures.
Performed risk analyses to identify appropriate security countermeasures.
Developed plans to safeguard computer files against modification, destruction or disclosure.
Conducted security audits to identify vulnerabilities.
Reviewed violations of computer security procedures and developed mitigation plans.
Directed in-house cyber security auditing program to detect flaws and weaknesses in [Software].
Created cybersecurity best practice communications to educate staff against known threats and potential vectors of attack.
Developed and maintained incident response protocols to mitigate damage and liability during security breaches.
Network Administrator
Asset Management Technologies
Nokesville, VA
12.2019 - 06.2020
Cross-sold wide range of services and products to increase new business and expand existing customer relationships.
Adhered to established security procedures and reported potential fraud or safety violations to management for immediate recourse.
Opened new accounts and made changes to existing accounts.
Remedied gaps in financial planning based on client needs and suitability.
Managing Customer Expectations
Conducting Consumer Education
Identifying New Markets
Recording Business Transactions
Deposit Mobilisation
Help the bank implement strategies to ensure that customers are served quickly
Focused on keeping the company's customers happy and satisfied
Studies the market to identify the needs and expectations of customers.
Liaise between the customer and the financial institution, building and maintaining that relationship
Offering advice on everything from personal and business accounts to investments, loans and trust management services
have broad knowledge of the products and services offered by the bank as well as the needs and financial goals of your clients, helping them optimize and manage their accounts.
As the main point of contact for my clients at the branch location, i bring superior written and verbal communication skills to the table each and every day.
along with a strong grasp of numbers and finance, a passion for customer service and a professional, friendly demeanor.
Installed, configured and supported local area network (LAN), wide area network (WAN) and Internet system.
Configured networks for smooth, reliable operation to meet business processes and objectives.
Performed day-to-day LAN and WAN administration, maintenance and support.
Managed computer operation scheduling, backup, storage and retrieval functions.
Monitored system performance and responded to alerts.
Identified and immediately resolved issues with network devices.
Introduced management tools to create and manage virtual server computing environment.
Implemented network security measures to minimize data loss.
Backed up company data to distributed storage centers to avoid massive data loss.
Supported project planning team to promptly address hardware and software problems and network emergencies.
Verified continuity of computer and telephone system services for users..
Maintained network hardware and software and monitored network to support network availability to end users.
Assisted IT staff on troubleshooting issues and closing calls.
Maintained applications to keep software current with necessary software updates and upgrades.
Education
Information Technology
Slamm Technology LLC -
Manassas, VA
06.2020
Cybersecurity
Slamm Technology LLC
Manassas, VA
09.2022
Bachelor of Science - Computer Science
Western Governors University
Salt Lake City, UT
06.2020
Skills
Splunk, Splunk Enterprise, Splunk Phantom
Crowd Strike
Wireshark Analysis
Data security
Organizational and Time Management
MicroSoft Azure
FireEye NX, EX, ETP, HX
Cisco Firepower, Snort, IronPort, Umbrella
McAfee DLP Manager, Google DLP
IDS, ISP Log Management
AntiVirus Tools (Norton, Symantec)
Kniwledge of MITTRE ATTACK Framework and attack trends
Web Gate Way Proxy
NMap, Nessus
Tanium
ProofPoint
Open Source Intelligent Tools: VirusTotal IPvoid, AbuseIP, URLscan, CiscoTalos, URLvoid