As a Certified Ethical Hacker and highly trained IT professional, I specialize in delivering valuable insights and solutions through my expertise on Windows, Linux, network configurations, multi-user systems, and network security protocols. Additionally, I have experience in cloud infrastructure testing and deployments, open-source cybersecurity platforms, and tools of the trade. With a strong foundation in troubleshooting techniques and procedures, I am a quick learner with the ability to master technical concepts. Furthermore, I possess basic Python, C++ and Java programming skills for code analysis, as well as fluency in both English and French.
from multiple sources including both host and network telemetry.
data from SIEMs, SOARs, Devo, SwimLane, ServiceNow, ELK Stack, Security Onion
etc…
anomalous behavior using the cyber kill chain, cyber intelligence, and
investigative techniques.
across a wide variety of all source data sets (indications and warnings).
defense-in-multiple places, layered defenses, security robustness).
aggregating, and correlating data.
methodologies.
Ability to build desktop computers and servers from scratch using the requisite parts.
files, configuration files) contain relevant information and where to find
those system files.
phishing emails campaign, malware infections, network intrusion attempts logs,
web application tools
applications and application servers using the Imperva Tools suite, McAfee IPS
& NSM console logs.
end-users traffic/activities and IT infrastructure assets activities using
Splunk and the related indexes & source-types.
related to privileged credentials/entitlement and activities performed using
ExaBeam.
vulnerabilities.
processes, and contributed to the security of the IT network.
or ServiceNow using enrichment platforms such as TruStar or other open-source
platforms such as Cisco Talos, AlienVault-OTX, Security Trails to name a few.
using available tools and logs.
infrastructure using tools like FireEye HX and Tanium tools suite.
duties as assigned.
investigative tasks in an efficient and timely manner.
above-mentioned tools and authorized security tools to detect potential cyber-attacks.
implementation, and testing of new security technologies.
vulnerabilities.
and contributed to the security of the IT network.
hardening
updates deployment.
duties as assigned.
Access Control
Certified Ethical Hacker
Google Cybersecurity Professional - GCP
Certified Ethical Hacker