Summary
Overview
Work History
Education
Skills
Certification
Languages
Timeline
Generic

ISAAC KWESI AKOTO

Stafford,VA

Summary

Dedicated SOC Analyst with over 4 years of experience in keeping organizations secure. Skilled at detecting and responding to security incidents, analyzing threats, and ensuring compliance. Proficient with security tools like Splunk and QRadar, and experienced in vulnerability management and network security. Strong problem-solver and effective communicator, able to work well with teams to improve security posture.

Overview

4
4
years of professional experience
1
1
Certification

Work History

SOC Analyst

Digital Global Hub
Annandale, VA
12.2022 - Current
  • Identified security threats, vulnerabilities and potential malicious activities through log analysis.
  • Developed and implemented strategies to detect emerging cyber threats.
  • Monitored network traffic for suspicious activity using SIEM tools such as Splunk and LogRhythm.
  • Performed incident response and root cause analysis on security incidents.
  • Installed firewalls, intrusion detection systems, anti-virus software and other security measures to protect networks from outside attacks.
  • Conducted vulnerability assessments of IT systems and applications.
  • Analyzed logs from various sources including web servers, application servers, databases, IDS and IPS systems. for possible security breaches.
  • Created detailed reports outlining the findings of investigations into security events or incidents.
  • Provided technical guidance in developing secure architecture designs for new projects or initiatives.
  • Implemented processes to ensure compliance with industry regulations such as PCI DSS, GDPR, HIPAA.
  • Collaborated with internal teams to improve system performance and enhance overall security posture of the organization's infrastructure.
  • Maintained up-to-date knowledge of cyber threat landscape by researching latest attack trends and techniques used by attackers.
  • Assisted in designing effective risk mitigation plans based on identified risks.
  • Evaluated current policies to identify gaps in existing controls.
  • Responded promptly to any reported issues or alerts related to system or network security.
  • Investigated advanced persistent threats in order to understand their behavior patterns.
  • Developed scripts and automation tools for efficient log management operations.
  • Conducted regular penetration tests to assess the effectiveness of existing controls against known vulnerabilities.
  • Ensured that all security protocols are being followed within an organization's environment.
  • Provided ongoing support during incident resolution process ensuring successful containment and eradication of malware infections.
  • Investigated information security breaches to identify vulnerabilities and evaluate damage.
  • Learned about latest security threats from blogs and online publications.
  • Analyzed system risk to identify and implement appropriate security countermeasures.
  • Coordinated security updates to avoid outages and downtime.
  • Made recommendations to improve security procedures and systems.
  • Audited networks and security systems to identify vulnerabilities.
  • Educated individuals on complex computer terms using easy-to-understand wording.
  • Worked closely with fellow security personnel to remedy and alleviate technology issues.
  • Used penetration testing tools to identify weaknesses in security systems.
  • Researched and designed advanced computer forensic tools.
  • Mentored junior employees in departmental activities and procedures.
  • Analyzed security procedure violations and developed plans to prevent recurrence.
  • Designed and implemented plans to secure computer files against breach, destruction or accidental modification.
  • Conducted record searches and coordinated with other units on procedural problems involving complex cases.
  • Built firewalls and encrypted data to secure confidential information.
  • Collaborated with stakeholders to implement and update disaster recovery plans.
  • Promoted security awareness among employees and clients to alleviate risks and breaches.
  • Designed, implemented and maintained security systems and controls.
  • Updated computer security policies and procedures upon learning of new risks.
  • Reviewed security bulletins and vulnerability patch releases.

SOC Analyst

McKesson
Irving, TX
10.2021 - 11.2024
  • Conducted market research to identify trends and customer needs.
  • Developed financial models to analyze data and identify potential risks.
  • Performed cost-benefit analysis to evaluate project feasibility.
  • Created reports, presentations, and other documentation for stakeholders.
  • Provided recommendations based on data analysis results.
  • Analyzed large datasets using statistical methods and software programs.
  • Identified opportunities for process improvements across the organization.
  • Developed strategies to optimize operational efficiency and reduce costs.
  • Prepared forecasts of future performance based on historical trends.
  • Monitored industry news to stay informed of new developments in the field.
  • Gathered requirements from stakeholders to inform system design decisions.
  • Designed test plans to ensure quality assurance standards were met.
  • Collaborated with cross-functional teams on projects related to analytics initiatives.
  • Maintained accurate records of all data collected during analysis processes.
  • Documented procedures for performing tasks such as data collection and manipulation.
  • Assisted in developing a comprehensive database management system.
  • Implemented strategies for automating manual processes within the organization.
  • Utilized visualization tools such as Tableau or Power BI to present findings.
  • Researched best practices used by competitors in the marketplace.
  • Assisted in training staff on how to use analytical tools effectively.
  • Reviewed existing systems and processes for accuracy and compliance with regulations.
  • Advised senior leaders on ways that analytics could improve decision making processes.
  • Participated in regular meetings with management to assess and address issues and identify and implement improvements.
  • Performed quality assurance to assess data and validate results.
  • Developed actionable roadmaps for improving workflows and processes.
  • Delivered analytic support to identify high-priority opportunities and prospective clients to build pipelines.
  • Utilized formulas to extract data from queries into Excel spreadsheets.
  • Maintained user confidence and protected operations by keeping information confidential.
  • Conducted detailed analysis on key trends and findings to summarize findings for leadership.
  • Conducted workplace compliance training to reduce liability risks.
  • Synthesized multiple sources of data and large data sets to develop reports, tools and metrics.
  • Reported on common sources of technical issues or questions and made recommendations to product team.
  • Interpreted and interrelated research data to develop integrated business analysis and projections.
  • Developed dashboards to track productivity and expedite remediation of issues.
  • Determined operational objectives by studying business functions and evaluating output requirements and formats.
  • Validated resource requirements to develop cost estimate models.
  • Identified opportunities to enhance data integrity through database structure modifications.

SOC Analyst

Ai Technology Professionals
Richmond, VA
10.2020 - 10.2021
  • Identified and tracked game animals using binoculars, scopes, and other tracking devices.
  • Maintained firearms, ammunition, and hunting equipment in safe working order.
  • Set up decoys to attract waterfowl for hunting purposes.
  • Located potential hunting spots by researching maps, land use regulations, and wildlife population data.
  • Developed strategies to successfully hunt various types of game animals under varying conditions.
  • Called ducks and geese using specialized calls or recorded sounds.
  • Assisted with the placement of blinds for duck and goose hunts.
  • Evaluated habitats to determine the best methods for harvesting wild game animals.
  • Checked traps daily to ensure proper functioning and humane treatment of trapped animals.
  • Used boats to access remote areas when necessary for hunting activities.
  • Performed reconnaissance on target systems and networks to gather information about the environment.
  • Developed test plans, identified risks and reported findings to stakeholders.
  • Conducted manual and automated vulnerability assessments using industry standard tools such as Nessus, Metasploit, Nmap, Burp Suite.
  • Identified security flaws in web applications through manual testing techniques like Cross-site Scripting, SQL Injection.
  • Analyzed application source code for potential vulnerabilities by utilizing static code analysis tools such as Fortify SCA.
  • Reviewed system logs to detect suspicious activity or unauthorized access attempts.
  • Compiled detailed reports of results including remediation recommendations and risk mitigation strategies.
  • Provided technical guidance to development teams during the software development life cycle.
  • Evaluated existing network infrastructure for weaknesses and developed countermeasures to protect against malicious attacks.
  • Conducted record searches and coordinated with other units on procedural problems involving complex cases.
  • Designed, implemented and maintained security systems and controls.
  • Reviewed security bulletins and vulnerability patch releases.

Education

Bachelor of Science - Information Resources Management

University College Of Management Studies
WINNEBA
08-2020

Skills

  • Incident Response
  • Reverse engineering
  • Access Control
  • Firewall configuration
  • Compliance standards
  • Web Security
  • Penetration Testing
  • Python Programming
  • Application security
  • Intrusion Detection
  • Scripting Languages
  • Software Deployment
  • Compliance Monitoring
  • Cybersecurity frameworks
  • Business Continuity
  • Network Security
  • Disaster Recovery
  • Patch management
  • Data Encryption
  • Software licenses and patches
  • Security Needs Assessment
  • Interpersonal Skills
  • Managing security breaches
  • Data Security
  • Analytical Skills
  • Multitasking
  • Problem-Solving
  • Relationship Building
  • Self Motivation
  • Team building
  • Organizational Skills
  • Information Protection
  • Effective Communication
  • Telecommunications Systems
  • Adaptability and Flexibility

Certification

  • COMPTIA +

Languages

English
Full Professional

Timeline

SOC Analyst

Digital Global Hub
12.2022 - Current

SOC Analyst

McKesson
10.2021 - 11.2024

SOC Analyst

Ai Technology Professionals
10.2020 - 10.2021

Bachelor of Science - Information Resources Management

University College Of Management Studies
ISAAC KWESI AKOTO