Summary
Overview
Work History
Education
Skills
Work Preference
Work Availability
Timeline
Generic

Francis Sam

The Bronx,NY

Summary

Solution-driven and proactive professional with over 6 years of experience as a SOC Analyst and overall, 5 years as a Cybersecurity Analyst with an excellent work ethic. High level of expertise in threat analysis, monitoring, detection, and migration procedures. Participate in Incidence Response and Cyber Defense Team initiative with experience in responding to security events and incidents. Proficient in online security research, planning, and execution to ensure the integrity, security, and resiliency of critical operations. Experienced with a wide range of technologies with expertise in risk management, managing SIEM tools, threat intelligence, and vulnerability management of systems with the ability to learn quickly and adapt to a new environment. Well-versed in static and dynamic malware analysis with strong critical thinking, communications, and people skills. Experience in creating SOPs and Playbooks, and transfer of knowledge and applying Cyber Kill Chain, MITRE ATT&CK Framework, and Diamond Intrusion Framework in analyses.

Overview

7
7
years of professional experience

Work History

Security Operation Center Analyst

BNP PARIBAS – ASSET MANAGEMENT
05.2018 - Current
  • Prioritize and differentiate between potential intrusion attempts and false alarms
  • Monitor and analyze logs and alerts from a variety of different technologies across multiple platforms to identify security incidents affecting the organization
  • Assess the security impact of security alerts and traffic anomalies to identify malicious acorns and escalate up to senior members of the team
  • Leverage fundamental understanding of Operating Systems: Windows
  • Unix/Linux, and OSX Operating Systems in support of identifying security incidents to have a proper overview of risk profile
  • Execute analysis of email-based threats to include understanding of email communications, platforms, headers, transactions, and identification of malicious traces, techniques, and procedures
  • Utilize and adhere to a defined workflow using Threat Connect and processes driving the
  • Analyze potential cyber threats from a variety of intakes, taking appropriate response acorns to include threat containment and/or escalation
  • Follow escalation and handoff procedures to team members and leadership based on defined threat and priority determination
  • Utilize a variety of security tools and technologies to analyze potential threats to determine impact, scope, and recovery
  • Leverage network security tools and capabilities to support Cyber Threat
  • Monitoring activities
  • Document results of cyber threat analysis effectively and prepares comprehensive handoff and/or escalation for IR/Intelligence Functional teams
  • Validated results and performed quality assurance to assess accuracy of data
  • Performed system analysis, documentation, testing, implementation, and user support for platform transitions
  • Identified and resolved problems through root cause analysis and research
  • Enhanced interfaces to promote better functionality for users

Incident Response/SOC Analyst

PIMAJOYTECH
11.2017 - 04.2018
  • Analyzed and resolve DLP alerts from McAfee DLP Manager and Splunk
  • Enterprise
  • Security (Splunk ES) and escalate cyber privacy incidents to the Privacy Team
  • Performed hunting for malicious activity across the network and digital assets
  • Responded to computer security incidents and conduct threat analysis
  • Conducted analysis using a variety of tools and data sets to identify indicators of malicious activity on the network
  • Performed detailed investigations and response to potential security incidents
  • Provided accurate and priority-driven analysis of cyber activity/threats
  • Performed payload analysis of packets
  • Recommended implementation of countermeasures or controls
  • Ensured all pertinent information is obtained to allow for the identification, containment, eradication, and recovery actions to occur in a me-sensitive environment
  • Collaborated with technical and threat intelligence analysts to provide indications and warnings and contributes to predictive analysis of malicious activity
  • Assist with creating and continuously improving standard operating procedures used by the SOC
  • Resolved or coordinated the resolution of cyber security events
  • Monitored incoming event queues for potential security incidents
  • Created, managed, and dispatched incident tickets
  • Monitored external event sources for security intelligence and actionable incidents
  • Maintained incident logs with relevant activity
  • Documented investigation results, ensuring relevant details are passed to
  • SOC Lead
  • Incident Management team and stakeholders
  • Participated in root cause analysis or lessons learned sessions
  • Established and maintained excellent working relationships/partnerships with the cyber security and infrastructure support teams throughout the
  • Information Technology organization, as well as business units
  • Part of Managed Detection and Response (MDR) team to effectively prepare, detect, and respond to incidents
  • Performed analysis of log files from a variety of sources (e.g., network traffic logs, firewall logs, and intrusion detection system [IDS] logs) to identify possible threats to network security .

Technical Support Professional

RENNERBROWN STAFFING INC
11.2016 - 10.2017
  • Ensured optimal utilization and continuing operation of technology; troubleshoots network, server, phone, desktop, and printer problems
  • Coordinated hardware maintenance and repair activities and performs routine desktop set-up and maintenance
  • Investigated, tested, installed, and upgraded new hardware/soware products for desktops and servers
  • Troubleshoot desktop applications and install computer peripherals
  • Troubleshoot and provided accurate, creative solutions to technical problems on servers and desktops while ensuring minimum downtime and user satisfaction
  • Encouraged employees to use local area network best practices and designs and conducts formal training classes as necessary
  • Periodic compliance checks as necessary
  • Assisted management with an assessment of hardware and software needs
  • Research new developments to determine impact and forward recommendations for implementation of future IT requirements
  • Maintained user accounts, passwords, etc
  • In MS Exchange and Active Directory
  • Administered back-up and restored procedures managing off-site and on- site tape storage
  • Created and maintained a rigid disaster recovery plan
  • Maintained professional knowledge of technology changes, issues, trends, and advances by attending courses/meetings/site visits/conferences/reading magazines, newsletters, etc
  • Protected systems against virus/spam attacks by regularly updating and scanning for antivirus/spam
  • Maintained software licenses and ensured the company is utilizing non- pirated software at all locations
  • Performed hunting for malicious activity across the network and digital assets
  • Responded to computer security incidents and conducted threat analysis
  • Identified and acted on malicious or anomalous activity.

Education

Bachelor of Science - Electronics Technology

Institute of Technology - Accra Technician Institute of Technology

Certificate: Certified Telecommunication Technician - undefined

And Guilds Institute

UK Certificate: Internet Security Certificate - undefined

Affiliations CompTIA CYSA+ Cybersecurity Certification Salesforce Certified Marketing Cloud Email Specialist Salesforce Certified Administrator AWS Technical Professional – Online CRM – SAP Business ByDesign Customer Relationship Management NDG Linux Essential Licensed Insurance Producer - New York State Certifications Certified Cybersecurity Analyst CompTIA CYSA+ Salesforce Certification - Marketing Cloud Email Specialist Salesforce Certified Administrator AWS Technical Professional CRM - SAP Business ByDesign Customer Relationship Management NDG Linux Essential - undefined

University of Potsdam

Skills

  • Skills/Programming Languages
  • SQL, HTML, AMPScript
  • Software:
  • Microsoft Office, Visio, MS Project, Adobe, SAP, Salesforce
  • Security Technologies: FireEye (EX, NX, HX), Cisco Firepower, Cisco Umbrella, Splunk
  • Forcepoint DLP Manager, Web Poxy, Nmap, Wireshark, Log Management, Threat
  • Connect, An-Virus Tools, Mimecast, Proofpoint TAP, Proofpoint TRAP, Falcon
  • CrowdStrike, Carbon Black, Microsoft Defender for Endpoint, Cisco Secure Endpoint
  • Sentinel One
  • Operating System: Windows (2000,2007,10), Mac OS, Linux/Unix
  • Networking: LANs, WANs, VPNs, Routers, Firewalls, TCP/IP
  • Security Frameworks: NIST SP 800-61 Series including NIST 800-37, NIST 800-53, NIST
  • 800-171 NIST 800-172; ISO 27000 Series including ISO 27001, ISO 27002, Sarbanes-Oxley
  • Act, SAS-70/SSAE 16, ITIL, ISO 27001, Privacy Act of 1974, HIPAA
  • OSINT: Virus Total, Abuse IPDB, IP Void, Hybrid Analysis, IBM X-Force Exchange, and Palo
  • Alto Networks URL filtering – Test A Site
  • Ticketing System: ServiceNow, Jira, Demisto (SOAR)

Work Preference

Work Type

Full Time

Work Location

Remote

Important To Me

Company CultureWork-life balanceCareer advancementPaid sick leaveHealthcare benefits401k matchPaid time offTeam Building / Company RetreatsFlexible work hoursWork from home optionStock Options / Equity / Profit SharingPersonal development programs4-day work week

Work Availability

monday
tuesday
wednesday
thursday
friday
saturday
sunday
morning
afternoon
evening
swipe to browse

Timeline

Security Operation Center Analyst

BNP PARIBAS – ASSET MANAGEMENT
05.2018 - Current

Incident Response/SOC Analyst

PIMAJOYTECH
11.2017 - 04.2018

Technical Support Professional

RENNERBROWN STAFFING INC
11.2016 - 10.2017

Bachelor of Science - Electronics Technology

Institute of Technology - Accra Technician Institute of Technology

Certificate: Certified Telecommunication Technician - undefined

And Guilds Institute

UK Certificate: Internet Security Certificate - undefined

Affiliations CompTIA CYSA+ Cybersecurity Certification Salesforce Certified Marketing Cloud Email Specialist Salesforce Certified Administrator AWS Technical Professional – Online CRM – SAP Business ByDesign Customer Relationship Management NDG Linux Essential Licensed Insurance Producer - New York State Certifications Certified Cybersecurity Analyst CompTIA CYSA+ Salesforce Certification - Marketing Cloud Email Specialist Salesforce Certified Administrator AWS Technical Professional CRM - SAP Business ByDesign Customer Relationship Management NDG Linux Essential - undefined

University of Potsdam
Francis Sam