Summary
Overview
Work History
Education
Skills
Certification
Timeline
Generic

Dymond Mattison

Baltimore,MD

Summary

Performance-driven and results-oriented Information Security Professional with over five years' experience and expertise in IT security, infrastructure, network integration, vulnerability management and server management. Turnaround specialist with a solutions-oriented mindset who bridges the gap between technology and corporate objectives with bottom-line success in initiating, tracking, reporting, and closing projects while creating value and driving operational excellence.

Overview

5
5
years of professional experience
1
1
Certification

Work History

IT SECURITY ANALYST

VXI Global Solutions
05.2023 - Current
  • Enhanced network traffic visibility and threat detection in Rapid7 IDR by 60% through unified API log source integration importing Mimecast, and Sentinel One.
  • Perform host-based and network-based security monitoring, identifying and analyzing anomalous activities using Rapid7 IDR, Defender for Endpoint/o365, and AWS Firewall.
  • Streamlined vulnerability management through effective patch management strategies utilizing Rapid7 Nexpose resulting in a 70% reduction in exploitable critical and high vulnerabilities.
  • Utilized PowerShell scripts to automate routine security tasks, including vulnerability scanning, log analysis, and system monitoring, resulting in a 30% reduction in manual effort and improved incident response times.
  • Enhanced team knowledge and operational consistency through comprehensive SOPs outlining how to conduct quarterly firewall reviews, quarterly phishing exercises and investigating incidents in Defender for Endpoint/o365.
  • Boosted system scalability in Rapid7 IDR through continuous log source performance monitoring.
  • Leverage JIRA ticketing system to maintain records of security monitoring.
  • Utilized PowerShell scripting to extract and organize data from Active Directory, specifically targeting Sysadmins, and created comprehensive Excel spreadsheets for detailed documentation and reporting purposes.
  • Utilized AWS EC2 APIs to inventory all running instances and cross-referenced them with SentinelOne and Rapid7 IDR to verify endpoint visibility and determine operational status across cloud infrastructure.

JR. CYBER SECURITY ENGINEER

SBTG
03.2022 - 05.2023
  • Perform host-based and network-based security monitoring, identifying and analyzing anomalous activities using Security Tool suite consisted of Azure Sentinel, Defender for Endpoint/o365 and Palo Alto NGFW.
  • Develop rules, filters, views, signatures, countermeasures, and scripts to support analysis and detection efforts within SIEM Azure Sentinel, and McAfee NSM IPS.
  • Revamp vulnerability management process leveraging Rapid7 Nexpose & Qualys resulting in the improvement of process and 20% reduction in critical vulnerabilities.
  • Assist with building automation within Azure Sentinel to detect and respond to tactics by leveraging PowerShell scripts.
  • Maintain records of security monitoring and incident response activities, utilizing ServiceNow ticketing system.
  • Responsible for the management of Palo Alto NGFW access control list.
  • Fully investigate incidents reported by security tool suite according to the incident response lifecycle.
  • Utilized Crowdstrike's powerful EDR platform to analyze security incidents, mitigate threats and fortify defenses to ensure proactive cybersecurity posture

JR. SOC ANALYST

Department of Treasury | SecureForce
02.2020 - 03.2022
  • Monitored and triaged security alerts in Splunk, reducing false positives by 35% and improving incident response times by 20% through refined correlation searches and alert tuning.
  • Employed Splunk for in-depth log file review, data correlation, and incident investigation.
  • Investigated and responded to phishing incidents by analyzing email headers, URLs, and user reports, leading to the identification and remediation of 15+ phishing attempts per month and improving user reporting accuracy through targeted awareness feedback.
  • Enhanced security measures by configuring and maintaining Palo Alto NGFW and Symantec solutions.
  • Developed and implemented advanced data correlation strategies in Splunk by creating custom queries, dashboards, and alerts, which improved incident detection accuracy and reduced investigation time by 30%.

Education

DIPLOMA -

Paul Laurence Dunbar Senior High School
Washington, DC

Skills

  • Wireshark
  • AWS CloudTrail
  • AWS Firewall Manager
  • JIRA
  • Rapid7 Nexpose
  • Rapid7 InsightIDR
  • Slack
  • OKTA
  • Microsoft Defender o365/Endpoint
  • SentinelOne
  • Palo Alto NGFW
  • Splunk
  • Vulnerability Management
  • Malware Analysis
  • Yara
  • EncaseFTK
  • Python
  • Pulse Secure Remote Access
  • Microsoft Bitlocker Administration Manager
  • Windows Server 2016/2019
  • Duo Mobile
  • CarbonBlack
  • Cisco ASA
  • McAfee NSM
  • Vendor Management
  • Incident Response
  • Snort
  • PowerShell
  • Counteract Forescout
  • Share Point Server 2010/2013/2016
  • Google Cloud Platform (GCP)
  • Chronicle/Cyderes
  • Tenableio
  • Nessus
  • Cortex XDR
  • Mimecast
  • Azure Sentinel

Certification

  • CompTIA Security+
  • CompTIA CySA+
  • Tenable Certificate of Proficiency
  • ITIL Fundamentals

Timeline

IT SECURITY ANALYST

VXI Global Solutions
05.2023 - Current

JR. CYBER SECURITY ENGINEER

SBTG
03.2022 - 05.2023

JR. SOC ANALYST

Department of Treasury | SecureForce
02.2020 - 03.2022

DIPLOMA -

Paul Laurence Dunbar Senior High School
Dymond Mattison