Cybersecurity professional with expertise in threat reporting and investigation, utilizing tools such as LogRhythmfor SIEM analysis and Tripwire for integrity monitoring. Successfully developed and implemented security policies to mitigate risks and enhance organizational security posture. Experience with Microsoft security solutions enables seamless integration and optimization of security measures across diverse environments for robust protection against evolving threats.
-Supervised and optimized LogRhythm SIEM to enhance threat detection and incident response through comprehensive reporting and analysis.
- Conducted thorough threat investigations using CrowdStrike to identify, analyze, and remediate security incidents, reporting findings to stakeholders and contributing to enhanced security strategies.
-Leveraged Microsoft security tools to ensure robust endpoint protection and vulnerability management strategies, including the development and enforcement of security policies across the organization.
-Monitored and maintained Fortinet firewalls to enforce network security policies, improving threat prevention and reducing unauthorized access incidents.
-Led user access and permissions through systematic user access management, ensuring compliance with security policies and minimizing unauthorized access risks.
- Generated detailed security report to provide insights on user activity and access patterns, informing management decisions and guiding policy adjustments.
- Utilized Tripwire for continuous monitoring and compliance reporting, ensuring the integrity of critical systems while creating policies to govern system changes.
-Enforced security policies for Brivo access control systems, integrating physical security measures with cybersecurity protocols for comprehensive protection.
-Managed email security solutions using Proofpoint, effectively filtering threats and enhancing user training and policy development.
-Utilized IBM Security Console for centralized management of security alerts, streamlining incident response workflows and creating incident response policies.
- Provided technical support and troubleshooting via ServiceDesk, ensuring timely resolution of cybersecurity-related issues and enhancing user satisfaction while documenting processes for future reference.
- Collaborated with Kyndryl for infrastructure security assessments, identifying and mitigating potential risks in hybrid cloud environments while establishing policies to maintain security compliance
Develop, implement, and enforce DLP policies that align with the organization's data protection requirements and industry regulations.
Monitor DLP alerts and incidents to identify potential data breaches, policy violations, or other security threats.
Investigate data security incidents and policy violations, determining the root cause and implementing remediation actions.
Configure and manage DLP tools and technologies to ensure they effectively prevent data loss across various channels (email, web, endpoints, etc.).
Develop and deliver training programs to educate employees on DLP policies, best practices, and the importance of data protection.
Maintain documentation of DLP policies, incident details, investigations, and remediation actions for future reference and analysis.
Collaborate with IT teams to enforce DLP policies across different platforms, networks, and storage systems.
Generate regular reports on DLP activities, incident trends, policy effectiveness, and compliance status. Provide insights and recommendations to management.