Summary
Overview
Work History
Education
Skills
Accomplishments
Certification
Additional Information
Work Availability
Quote
Timeline
Generic

James Banday

Ewa Beach,HI

Summary

Adept at mastering new technologies and concepts, with a comfort level in utilizing command-line interfaces. Track record of resolving intricate technical challenges and steering support-focused projects to success. Expert understanding of the MITRE ATT&CK framework, adept in analyzing Indicators of Compromise (IOCs), Indicators of Activity (IOAs), and leveraging Tools, Techniques, and Procedures (TTPs) for Advanced Persistent Threat (APT) hunting Profound involvement in Capture The Flag (CTF) development on HTB, showcasing deep comprehension of threat landscapes coupled with inventive problem-solving capabilities Accomplished in data analysis, utilizing sophisticated tools such as Jupyter Notebook Comprehensive understanding of security principles, with the capability to communicate complex security concepts to diverse audiences, both technical and non-technical Specialized in crafting Snort rules and intrusion detection signatures, playing a pivotal role in maintaining system security Experience of creating Elastic Dashboards and Elastic rule alerts Experienced in the construction of Elastic Dashboards and in the orchestration of rule alerts to enhance security responsiveness Over three years of enriched experience in threat detection and hunting, bringing depth and expertise to security roles Proficient in leveraging industry-leading tools such as Splunk, Elastic, Trellix ESM, and Zeek to enhance organizational cybersecurity Expertise in mitigating a wide spectrum of security events, responding effectively to incidents involving viruses, malware, and ransomware on Windows and Linux endpoints Highly skilled in detecting intrusions through host and network-based intrusion detection technologies, including Snort, ensuring robust security infrastructure Outstanding collaborative skills in high-pressure environments, effectively working in teams to address time-sensitive incidents Profound knowledge in network troubleshooting and security assessments through Wireshark, including protocol implementations and PCAP analysis, safeguarding network integrity Expert utilization of Tychon’s Rapid Query (Elastic) for detailed hash analyses, enhancing incident response through precise analysis Collaborative leadership in scheduling and testing HBSS upgrades and maintenance, ensuring system readiness and stability through meticulous coordination Cybersecurity Operation Analyst / CTR US USA RCC-P | Vectrus Systems | Fort Shafter, Hawaii | 09/2019 – 02/2021 Ability to write Snort Rules. Employ forensic analysis and digital evidence over a wide range of technologies (like networks, mobile devices, Windows and Linux). Capturing file system and memory changes of an operating (victim) host. Operated Nessus to test each port on computer, determining what service it is running and then test this service to make sure there are no vulnerabilities that could be used by a hacker to carry out malicious attack. Operated Wireshark for network troubleshooting, examine security problems and debug protocol implementations and PCAP analysis. Coordinate with all stakeholders to schedule and test HBSS upgrades and maintenance. Experience with Network intrusion detection system (NIDS) software such as SNORT. Experience with Army Cyber Security (CS) guidance and regulations. Knowledge of hacker tactics, techniques and procedures (TTP). Use attack signatures and tactics, techniques and procedures (TTPs) to aid in Zero-Day detection. Ability to conduct basic malware analysis. Comprehensive understanding of common Windows APIs. Experience working with DoD / Government Leaders at all levels. Enterprise Service Desk Level 2 / CTR US USA RCC-P | Apex Systems | Fort Shafter, Hawaii | 02/2017 – 09/2019 Assist with managing escalated customer issues and creation of updates to process and procedure documentation. Plan, coordinate, schedule, and monitor authorized and non-authorized system interruption events to ensure availability of systems, network, and data for maintenance cyber security operations. Ensure all users receive initial and annual IA awareness training, and are authorized on a need-to-know only basis before granting access to the command information systems. Proficient in setting up virtual machines in VMware. Proficient with troubleshooting all Windows Operating systems. Strong knowledge of TCP/IP protocols, ports, and services. Using Active Directory to unlock and reset passwords. Knowledge of network monitoring, analysis, troubleshooting and configuration control technologies. Ability to coordinate and respond to events on all monitored networks and the systems on those networks. Proficient knowledge and understanding of Microsoft Office software: Excel, Word, PowerPoint. Proficient in the utilization of operating systems and production of documents, spreadsheets, presentations, databases and web pages. Experienced with collecting, analyzing and interpreting qualitative and quantitative data from multiple sources for the purposes of documenting results and analyzing findings to provide meaningful products.

Overview

8
8
years of professional experience
1
1
Certification

Work History

Senior Cybersecurity Operation Analyst CTR

US USA RCC, P | Po’okela Solutions, LLC
02.2021 - 08.2023
  • Reviewed process failures and determined root causes.
  • Applied various analytical techniques to diverse situations.
  • Incorporated big data analysis techniques into Elastic, processing 100 terabytes of data to expose predictable trends and likely outcomes
  • Supported supervisor and associated team members to maintain system functionality
  • Worked with engineers and technical staff to recommend hardware and software adjustments and resolve design flaws

Human Intelligence Collector

U.S. Army, Military Intelligence Battalion
06.2010 - 06.2011
  • Leveraged online research tools to identify and navigate online forums, specialized Web sites, social media and traditional sources
  • Analyzed and prepared intelligence reports in Microsoft Excel, PowerPoint and Word
  • Conducted reviews of threats and vulnerabilities in network.
  • Created useful and timely intelligence products to support field operations
  • Briefed upper-level personnel on emerging threats
  • Produced multi-source intelligence reports and products for different agency customers
  • Assisted in development of intelligence strategies and policies to support operations

Unit Armorer

Small Arms, S. Army, Base Lewis
07.2007 - 05.2010

Utilized Standard Army Ammunition System (Cloud-based Computing) to manage and control ammunition supply operations

  • Tasked to provide centralized server and database that provided near real-time ammunition asset visibility across entire network architecture
  • Ensured security violations and incidents were reported to appropriate authorities and assisted with investigations.
  • Managed over $1,000,000 worth of weapons and equipment with zero losses
  • Handled daily, weekly and monthly repair and supply orders for equipment and materiel worth over $1,000,000
  • Accounted for weapons, munitions and associated equipment, creating inventories and replenishing
  • Managed physical security of weapons, munitions and keys, coordinating organization and inventory tracking to maintain consistency
  • Tested systems, noting issues and completing preventive maintenance

Education

DISA HBSS Advanced (301) ePO5.10 Course -

ITIL Foundation (v4) Certificate in IT Service Management - undefined

Qualys Certified Specialist – completed - undefined

Bachelor’s Degree - Information Security Assurance

ISA, University of Hawaii

completed 2/ - undefined

19.2023

DISA HBSS Admin (201) ePO5.10 Course – completed 2/19/ - undefined

2023

Cyber Threat Hunting – Level I – completed 10 -

4.2022

Army Endpoint Security System (AESS) certificate – completed 7/ - undefined

7.2021

Skills

  • TECHNICAL EXPERTISE
  • Systems:
  • Microsoft Windows 7, 81 and 10; Microsoft Windows Server 2012; Linux Kali; Ubuntu; Unix Solaris 11
  • Virtualization Technology: VMware Workstation 17 Pro
  • Hardware: Laptops, Workstations & Servers (Dell, Samsung); Network Cards, Memory, Printers, Scanners and other Peripherals
  • Technologies/Software: IDS, IPS, SIEM, AESS (McAfee), Trelix ESM, ACAS (Nessus), Wireshark; Snort, McAfee Antivirus, Active Directory, LDAP, Group Policies, PKI, Microsoft Office Suite (Word, Excel, Outlook, PowerPoint, Visio, OneNote), SharePoint, Adobe
  • Languages:
  • HTML 5, CSS, C# (Good), SAML 20 (Fair), Powershell (Fair), Python (Minor), Java (Minor), Splunk, Tychon, HackTheBox, Trelix Intelligent Sandbox
  • Service Management Tools: Remedy, SAAG, Active Directory and Remote Desktop
  • SKILLS & KNOWLEDGE
  • Information Assurance
  • Security Administration
  • Remedy Ticketing System
  • Vulnerability Analysis with Nessus
  • Active Directory
  • Basic ACAS Scan (Nessus)
  • Intrusion Detection System (IDS-Snort)
  • Threat Hunting (Advanced Persistent Threat)
  • Network Security
  • Host-Based Security System (HBSS)
  • Basic Packet Capture (PCAP) Analysis with Wireshark
  • Risk Mitigation & Analysis
  • Cyber Awareness Training
  • Intrusion Prevention System (IPS-Snort)
  • MITRE ATT&CK

Accomplishments

  • Supervised team of 8 staff members.
  • Collaborated with team of 2 in the development of RCCP-DCOD Dashboard in Elastic.

Certification

CompTIA Security+ ce (COMP001021048358) - completed 08/18/2016 Microsoft Certified Professional (MCP) – completed 10/27/2017 Certified Ethical Hacker (CEH) (ECC12958033594) - completed 11/21/2017 Certified Network Defense Architect (CNDA) (ECC54378588466) - completed 11/21/2017

Additional Information

  • Department of Defense Active Top Secret/SCI Clearance (Active)

Work Availability

monday
tuesday
wednesday
thursday
friday
saturday
sunday
morning
afternoon
evening
swipe to browse

Quote

Whether you think you can or whether you think you can’t, you’re right!
Henry Ford

Timeline

Senior Cybersecurity Operation Analyst CTR

US USA RCC, P | Po’okela Solutions, LLC
02.2021 - 08.2023

Human Intelligence Collector

U.S. Army, Military Intelligence Battalion
06.2010 - 06.2011

Unit Armorer

Small Arms, S. Army, Base Lewis
07.2007 - 05.2010

DISA HBSS Advanced (301) ePO5.10 Course -

ITIL Foundation (v4) Certificate in IT Service Management - undefined

Qualys Certified Specialist – completed - undefined

Bachelor’s Degree - Information Security Assurance

ISA, University of Hawaii

completed 2/ - undefined

DISA HBSS Admin (201) ePO5.10 Course – completed 2/19/ - undefined

Cyber Threat Hunting – Level I – completed 10 -

Army Endpoint Security System (AESS) certificate – completed 7/ - undefined

James Banday