Summary
Overview
Work History
Education
Skills
Certification
Training
References
Timeline
Generic

Gary L. Gibbs

Wilmington,Ohio

Summary

With a robust background in cybersecurity, including a pivotal role at Fidelity National Financial, I excel in triaging and mitigating cyber threats using tools like Splunk and McAfee. Renowned for my analytical prowess and effective communication, I've significantly enhanced security protocols and mentored teams, demonstrating a profound impact on operational security efficiency.

Overview

36
36
years of professional experience
1
1
Certification

Work History

Data Loss Prevention/ Insider Risk analyst Level 2

Fidelity National Financial
10.2023 - Current
  • Triage security alerts from multiple security tools.
  • Investigate escalated incidents from Level 1 analysts.
  • Train the junior analyst on security tools.
  • Escalate to the team lead when needed.
  • Create or update SOPs, playbooks, as needed.
  • Run QA reports on high-risk alerts.
  • Completed day-to-day duties accurately and efficiently.
  • Demonstrated strong problem-solving skills, resolving issues efficiently and effectively.
  • Worked effectively in team environments to make the workplace more productive.

Detection Engineer (Remote)

Kudelski Security
09.2021 - 07.2023
  • Level 2 analyst for a global client.
  • Responsible for triaging and resolving tickets escalated from level 1 analyst
  • Escalate to the client team lead when needed.
  • Triage reported a phishing email.
  • Triage security alerts from multiple security tools
  • Blocking/whitelisting: URLs, domains, and IP address
  • Provide USB exceptions for users
  • Manage the USB exception list and renewals.
  • Review and edit SOPs, playbooks.
  • Completed day-to-day duties accurately and efficiently.
  • Demonstrated strong problem-solving skills, resolving issues efficiently and effectively.
  • Worked with cross-functional teams to achieve goals.

Cyber security Analyst Contractor (Remote)

Kudelski Security (Miller Jones)
03.2021 - 09.2021
  • Level 2 analyst for a global organization.
  • Responsible for triaging and resolving tickets escalated from level 1 analysts.
  • Escalate to level 3 when needed.
  • Assist in automating security tools, and recommend processes for automation.
  • DLP Reports.
  • Blocking/whitelisting: URLs, domains, and IP addresses.
  • Provide USB exceptions for users.
  • Review and edit SOPs, playbooks.

Cyber security Analyst Contract (Remote)

Nationwide Insurance (TEKsystems)
11.2020 - 02.2021
  • SOC Analyst.
  • Detect, mitigate, and report cyber threats affecting networks of a large U.S.
  • Based organization.
  • Open-source tools include VirusTotal, Zscaler URL Risk Analyzer, and URLScan.
  • Use security tools used for monitoring the network: SIEM, antivirus endpoint monitoring, and email threat protection.
  • Learned about latest security threats from blogs and online publications.
  • Monitored user activities on the network for suspicious behavior or malicious activity.
  • Worked effectively in team environments to make the workplace more productive.
  • Completed day-to-day duties accurately and efficiently.

Hunt Team Analyst

Vigilant Technologies Solutions
06.2020 - 09.2020
  • Detect and report cyber threats affecting networks for over 200 clients.
  • Contact clients on actionable items.
  • Use Cyber DNA Security tools (proprietary).
  • Maintained positive working relationship with fellow staff and management.
  • Worked effectively in team environments to make the workplace more productive.
  • Demonstrated strong problem-solving skills, resolving issues efficiently and effectively.
  • Completed day-to-day duties accurately and efficiently.

Senior Security Analyst Consultant

Capgemini
Cincinnati, USA
03.2019 - 06.2020
  • Company Overview: Cincinnati, OH.
  • On-site SOC Analyst for a client located in the Cincinnati area.
  • Detect, mitigate, and report cyber threats affecting the networks of a large global organization.
  • Monitor and analyze Intrusion Detection Systems (IDS), endpoints, and Security Information and Event Management (SIEM) to identify security issues for remediation.
  • Use security tools used for monitoring the network: SIEM, antivirus endpoint monitoring, email threat protection, and other known security tools (open-source tools include VirusTotal, Zscaler URL risk analyzer, and URLScan).
  • Monitor and analyze emails for threats, including phishing and malware, and escalate as necessary.
  • Block malicious senders and URLs.
  • Participate in the investigation of security violations and breaches
  • Conduct the initial investigation and submit findings in a ticket.
  • Escalate to the Incident Response team, and assist if needed.
  • Work closely with other SOC members, as well as with other security team members
  • Review and update current SOPs
  • Create and maintain Play Books for the team
  • Train new team members on security tools
  • Mentor junior team members
  • Cincinnati, OH
  • Worked closely with fellow security personnel to remedy and alleviate technology issues.
  • Maintained current knowledge of emerging cyber threats through research papers, blogs, white papers .
  • Monitored networks for suspicious activity, unauthorized access attempts, and malicious code activity.
  • Completed day-to-day duties accurately and efficiently.
  • Provided excellent service and attention to customers when face-to-face or through phone conversations.
  • Demonstrated strong problem-solving skills, resolving issues efficiently and effectively.
  • Worked effectively in team environments to make the workplace more productive.

SOC Analyst

Las Vegas Sands Corporation
Las Vegas, NV
07.2016 - 11.2018
  • Company Overview: Las Vegas, NV.
  • Responsible for the detection, mitigation, and reporting of cyber threats affecting the networks of a large global organization.
  • Monitor and analyze Intrusion Detection Systems (IDS), endpoints, and Security Information and Event Management (SIEM) to identify security issues for remediation.
  • Security tools used for monitoring networks include SIEM, antivirus endpoint monitoring, disk encryption, network security manager (IDS/IPS) real-time monitoring, email threat protection, CMS (Central Management System), and open-source tools (VirusTotal, ThreatCrowd, IP-Void).
  • Monitor and analyze emails for threats, including phishing and malware, and escalate as necessary.
  • Submit blocks of malicious senders and URLs.
  • Participate in the investigation of security violations and breaches.
  • Conduct the initial investigation and submit findings in a ticket.
  • Escalate to IR if needed.
  • Work closely with other SOC members and other security team members.
  • Produce end-of-shift reports for documentation and knowledge transfer for subsequent analysis on duty.
  • The shift report includes: open and closed tickets of all analysts, any tickets that need to be addressed, and the status of security appliances.
  • Review and edit SOPs and Playbooks.
  • Assisted in training interns and new employees to use their security tools and follow the department's best practices.
  • Data Loss Prevention (DLP): 30 days of work experience.
  • Splunk Enterprise Security is used as a SIEM, with 30 days of work experience.

Senior IT Support Specialist

Ohio University
Athens, USA
05.2000 - 07.2016
  • Company Overview: Athens, OH.
  • Provide computer support for over 600 students, faculty, and staff of the university.
  • Utilize Microsoft System Center Configuration Manager (SCCM) for imaging computers and conducting remote access to customers' computers.
  • Use Microsoft Active Directory for group policies and access control.
  • Administer end-point solutions management console, remediate viruses, and spyware for 16,000 managed computers.
  • Support the Microsoft Exchange Series, and all applications involved with campus activities.
  • Advise constituents on hardware and software, accommodating needs.
  • Exhibit proficient customer service and communication skills in both written and verbal forms, which were the results of customer feedback on services performed.
  • Ensures functionality, as the onsite IT support person, for the Ohio University Board of Trustees' meetings.

Customer Engineer

BancTec Service Corporation
Irving, USA
07.1994 - 05.2000
  • Company Overview: Irving, TX.
  • Primary Polycom (formerly PictureTel) customer engineer for the Northeastern U.S.
  • Region
  • Installed new equipment, and made repairs and upgrades to existing equipment.
  • Provided a brief overview to users on the use of new equipment during a video conference call.
  • Handled emergency hardware system repairs, identifying defective components, replacing parts and assisting rebuilds.
  • Assisted customers with installation, configuration, and troubleshooting of hardware and software.
  • Delivered highest level of support, assistance and professionalism to each customer to uphold company commitment to service.
  • Assisted customers in setting up their computers, printers, scanners. as needed.
  • Conducted detailed diagnostics and troubleshooting on complex customer technical problems.
  • Trained users on how to use new hardware or software applications.
  • Educated customers by explaining technology issues in easy-to-understand terminology.

Tactical Satellite Microwave Systems Operator

U.S. Army
08.1988 - 08.1992
  • Honorable Discharge.

Education

Bachelor of Science Degree - Information Technology, Information Assurance and Security

Capella University
Minneapolis, Minnesota
01.2015

Core Supervisor Series Training -

Ohio University
Athens, Ohio
01.2007

Skills

  • CompTIA Security
  • CompTIA Network
  • CompTIA A
  • Force Point
  • Proofpoint
  • McAfee IDS/IPS
  • CrowdStrike
  • Symantec WSS
  • Symantec End Point
  • ServiceNow
  • FireEye Security Tools
  • McAfee Security Tools
  • Splunk
  • Recorded Future

Certification

  • CompTIA Network +, 2024
  • CompTIA Security +, 2024
  • ITIL v3 Foundations, 2010
  • CompTIA A+ (Certified for life), 1997

Training

  • AWS Practitioner Training, 2021
  • Industrial Control Systems Cyber Security (ICS3), 2018
  • Splunk Fundamentals -1 (online, Splunk.com), 2018
  • Splunk Fundamentals -2 (instructor lead, virtual), 2018
  • Splunk Enterprise Security (instructor lead, virtual), 2018
  • SANS SEC401: Security Essentials Bootcamp (GSEC), 2017
  • Core Supervisor Series Training, 2007, Ohio University, Athens, Ohio

References

References available upon request.

Timeline

Data Loss Prevention/ Insider Risk analyst Level 2

Fidelity National Financial
10.2023 - Current

Detection Engineer (Remote)

Kudelski Security
09.2021 - 07.2023

Cyber security Analyst Contractor (Remote)

Kudelski Security (Miller Jones)
03.2021 - 09.2021

Cyber security Analyst Contract (Remote)

Nationwide Insurance (TEKsystems)
11.2020 - 02.2021

Hunt Team Analyst

Vigilant Technologies Solutions
06.2020 - 09.2020

Senior Security Analyst Consultant

Capgemini
03.2019 - 06.2020

SOC Analyst

Las Vegas Sands Corporation
07.2016 - 11.2018

Senior IT Support Specialist

Ohio University
05.2000 - 07.2016

Customer Engineer

BancTec Service Corporation
07.1994 - 05.2000

Tactical Satellite Microwave Systems Operator

U.S. Army
08.1988 - 08.1992
  • CompTIA Network +, 2024
  • CompTIA Security +, 2024
  • ITIL v3 Foundations, 2010
  • CompTIA A+ (Certified for life), 1997

Bachelor of Science Degree - Information Technology, Information Assurance and Security

Capella University

Core Supervisor Series Training -

Ohio University
Gary L. Gibbs