Tecnology Analyst/Security Forensics Analyst
- SIEM Alert Monitoring and Analysis: Proficient in monitoring and analyzing SIEM alerts using Splunk and IBM QRadar, identifying and responding to incidents, threats, and vulnerabilities.
- Endpoint Security and Threat Analysis: Skilled in endpoint monitoring using CrowdStrike and ServiceNow conducting thorough threat analysis, and efficiently remediating security issues.
- Security Tools Expertise: Experienced in utilizing a diverse range of security tools, including CrowdStrike, SentinelNow, Nmap, and Wireshark, to enhance the overall cybersecurity posture
- OSINT Analysis: Capable of conducting OSINT analysis using specialized tools like Virus Total, urlscan.io, and AnyRun to assess the legitimacy of files, domains, IP addresses, and emails
- Phishing Email Investigation: Proficient in investigating phishing emails, analyzing attachments and headers, and implementing necessary actions to mitigate risks effectively.
- Malware Family Recognition: Knowledgeable in recognizing different malware families through internal threat intelligence reports and the MITRE ATT&CK framework.
- NIST Risk Framework Compliance: Familiar with the NIST Risk Framework, ensuring adherence to cybersecurity policies and guidelines to maintain a secure environment.
- Forensic Examinations and Incident Response: Hands-on experience in performing forensic examinations on computer systems and mobile devices using tools like FTK and Exterro. Worked effectively in a 24x7 SOC environment, managing incidents and tasks using the Jira ticketing system and Box Office.