Summary
Overview
Work History
Education
Skills
Certification
Timeline
Generic
Dawn Kelleher

Dawn Kelleher

Cybersecurity Analyst
Woodbridge,VA

Summary

Information Security Specialist with passion for aligning security architecture plans and processes with security standards and business goals. Extensive experience developing and testing security framework for cloud-based software. Versed in robust network defense strategies. · Cyber Security Analyst with 3 years of experience also proficient and thorough experience and a good understanding of information technology. Specialized in proactive network monitoring of SIEM (Splunk). Have a deep knowledge in identifying and analyzing suspicious event. Versatile, Bilingual professional and ability to manage sensitive materials. Able to use various security tools to perform logs and packet analysis. Finally, can perform malware analysis with the overall objective to ensure confidentiality, integrity and availability of the systems, networks, and data.

Overview

5
5
years of professional experience
1
1
Certification

Work History

SOC Analyst

BGNH
Manassas, VA
06.2020 - Current
  • Developed plans to safeguard computer files against modification, destruction or disclosure.
  • Investigate analyze and process phishing emails..
  • Used Microsoft Word and other software tools to create documents and other communications.
  • Monitored computer virus reports to determine when to update virus protection systems.
  • Monitored use of data files and regulated access to protect secure information.
  • Performed risk analyses to identify appropriate security countermeasures.
  • Investigate All Suspicious Activities
  • Maintain Secure Monitoring Tools
  • Liaise With And Delegate To The Rest Of The SOC Team
  • Review And Report On All Cybersecurity Processes
  • Keep All Security Programs And Resources Up To Date
  • Update the company’s security systems regularly to avoid any cyberattack
  • Monitor the security access and report probable cyberattacks to a superior employee in the company
  • Create reports that will allow experts to make changes in the security policies as per the needs of the organization
  • Monitor user activity, network events and signals from security tools to identify events. Tier 1 SOC Analyst is responsible for determining which alerts and other abnormal activity represent real threats.
  • Remediate attacks and collect data for more analysis,
  • Evaluate the attacks, identify the root of the attack, implement required security actions to counter the attack, and restore system operations.
  • Responsible for investigating and generating reports on information security issues.
  • Identified issues, analyzed information and provided solutions to problems.
  • Participated in team-building activities to enhance working relationships.
  • Worked within applicable standards, policies and regulatory guidelines to promote safe working environment.
  • Developed and maintained courteous and effective working relationships.
  • Developed team communications and information for meetings.
  • Worked flexible hours across night, weekend and holiday shifts.
  • Adhered to social distancing protocols and wore mask or face shield.
  • Collaborated with team members to achieve target results.
  • Recommend improvements in security systems and procedures.
  • Encrypted data and erected firewalls to protect confidential information.
  • Conducted security audits to identify vulnerabilities.
  • Reviewed violations of computer security procedures and developed mitigation plans.

Cybersecurity Specialist

Consulate Health Care
Woodbridge, VA
06.2020 - 07.2022
  • Participated in creation of device hardening techniques and protocols.
  • Author security incident reports, highlighting breaches, vulnerabilities and remedial measures.
  • Monitored use of data files and regulated access to protect secure information.
  • Protects company hardware, software, and networks from cyber criminals.
  • Understand company IT infrastructure in detail, monitor it at all times, and evaluate threats that could potentially breach the network.
  • Continuously looks for ways to enhance company network security and protect its sensitive information.
  • Configuring Tools: comes in the form of virus software, password protectors, and vulnerability management software. They will evaluate what the company needs and use these tools to protect its information.
  • Reporting: The analyst will detail what is currently going on in the network and evaluate its strengths. One of the skills needed is learning to read these reports. They will show what is well-protected and indicate if there is any unusual activity in the network.
  • Evaluate Weaknesses: No network is fully secure, but the goal is to make it as secure as possible. Part of the job is to continuously test all company networks and find weaknesses before bad actors or external threats can compromise them.
  • Managed relationships with third-party intrusion detection system providers.
  • Authored security incident reports, highlighting breaches, vulnerabilities and remedial measures.
  • Encrypted data and erected firewalls to protect confidential information.
  • Monitored computer virus reports to determine when to update virus protection systems.
  • Recommend improvements in security systems and procedures.
  • Performed risk analyses to identify appropriate security countermeasures.
  • Developed plans to safeguard computer files against modification, destruction or disclosure.
  • Conducted security audits to identify vulnerabilities.
  • Reviewed violations of computer security procedures and developed mitigation plans.
  • Directed in-house cyber security auditing program to detect flaws and weaknesses in [Software].
  • Created cybersecurity best practice communications to educate staff against known threats and potential vectors of attack.
  • Developed and maintained incident response protocols to mitigate damage and liability during security breaches.

Network Administrator

Asset Management Technologies
Nokesville, VA
12.2019 - 06.2020
  • Cross-sold wide range of services and products to increase new business and expand existing customer relationships.
  • Adhered to established security procedures and reported potential fraud or safety violations to management for immediate recourse.
  • Opened new accounts and made changes to existing accounts.
  • Remedied gaps in financial planning based on client needs and suitability.
  • Managing Customer Expectations
  • Conducting Consumer Education
  • Identifying New Markets
  • Recording Business Transactions
  • Deposit Mobilisation
  • Help the bank implement strategies to ensure that customers are served quickly
  • Focused on keeping the company's customers happy and satisfied
  • Studies the market to identify the needs and expectations of customers.
  • Liaise between the customer and the financial institution, building and maintaining that relationship
  • Offering advice on everything from personal and business accounts to investments, loans and trust management services
  • have broad knowledge of the products and services offered by the bank as well as the needs and financial goals of your clients, helping them optimize and manage their accounts.
  • As the main point of contact for my clients at the branch location, i bring superior written and verbal communication skills to the table each and every day.
  • along with a strong grasp of numbers and finance, a passion for customer service and a professional, friendly demeanor.
  • Installed, configured and supported local area network (LAN), wide area network (WAN) and Internet system.
  • Configured networks for smooth, reliable operation to meet business processes and objectives.
  • Performed day-to-day LAN and WAN administration, maintenance and support.
  • Managed computer operation scheduling, backup, storage and retrieval functions.
  • Monitored system performance and responded to alerts.
  • Identified and immediately resolved issues with network devices.
  • Introduced management tools to create and manage virtual server computing environment.
  • Implemented network security measures to minimize data loss.
  • Backed up company data to distributed storage centers to avoid massive data loss.
  • Supported project planning team to promptly address hardware and software problems and network emergencies.
  • Verified continuity of computer and telephone system services for users..
  • Maintained network hardware and software and monitored network to support network availability to end users.
  • Assisted IT staff on troubleshooting issues and closing calls.
  • Maintained applications to keep software current with necessary software updates and upgrades.

Education

Information Technology

Slamm Technology LLC -
Manassas, VA
06.2020

Cybersecurity

Slamm Technology LLC
Manassas, VA
09.2022

Bachelor of Science - Computer Science

Western Governors University
Salt Lake City, UT
06.2020

Skills

  • Splunk, Splunk Enterprise, Splunk Phantom
  • Crowd Strike
  • Wireshark Analysis
  • Data security
  • Organizational and Time Management
  • MicroSoft Azure
  • FireEye NX, EX, ETP, HX
  • Cisco Firepower, Snort, IronPort, Umbrella
  • McAfee DLP Manager, Google DLP
  • IDS, ISP Log Management
  • AntiVirus Tools (Norton, Symantec)
  • Kniwledge of MITTRE ATTACK Framework and attack trends
  • Web Gate Way Proxy
  • NMap, Nessus
  • Tanium
  • ProofPoint
  • Open Source Intelligent Tools: VirusTotal IPvoid, AbuseIP, URLscan, CiscoTalos, URLvoid
  • Cyber Intrusion Key Chain
  • Operating Systems: Windows, Solaris/Linus
  • cuckoo
  • Browserling
  • Cofense Triage
  • Threat Intelligence
  • Log Analysis
  • Network Monitoring/Network Traffic Analysis (NTA)
  • Cryptography
  • Network Security Analysis

Certification

  • CompTIA SY0-601
  • Splunk

Timeline

SOC Analyst

BGNH
06.2020 - Current

Cybersecurity Specialist

Consulate Health Care
06.2020 - 07.2022

Network Administrator

Asset Management Technologies
12.2019 - 06.2020

Information Technology

Slamm Technology LLC -

Cybersecurity

Slamm Technology LLC

Bachelor of Science - Computer Science

Western Governors University
Dawn KelleherCybersecurity Analyst