Experienced cybersecurity specialist with expertise in SOC operations, threat intelligence, and incident response. Skilled in utilizing SIEM platforms, managing network vulnerabilities, and adhering to industry frameworks like NIST and MITRE ATT&CK. Demonstrated ability to reduce incident response times, enhance security postures, and lead cross-functional cybersecurity initiatives. Seeking a challenging role to proactively implement security measures and safeguard organizational assets.
ELK Stack
Recorded Future
Suricata IPS
Windows Administration
Linux Administration
IT Troubleshooting
Wi-Fi
VPN
DHCP
port forwarding
IDS
Firewall
Point-to-Point Protocol
Incident response
Endpoint security
Log analysis
Vulnerability assessment
Intrusion detection
Threat intelligence
TCP and IP protocols
Nmap scanning
Wireshark usage
Operating system security
Forensic investigation
Wireless security
Packet analysis
DNS management
Network monitoring
Reverse engineering
Security analysis
Firewall configuration
Network security
Analytical thinking
Problem-solving
DDoS prevention
Security protocols
Security monitoring
Threat hunting
Threat modeling
Excellent communication
Teamwork and collaboration
Information protection
Time management
Problem-solving abilities
Analytical skills
Team collaboration
Multitasking Abilities
Problem-solving aptitude
Interpersonal skills
Effective communication