Summary
Overview
Work History
Skills
Certification
Timeline

Kingsley Oriaku

North Hollywood,CA

Summary

CompTIA Security+ certified Cybersecurity Analyst with work experience. Specialized in incident response, malware analysis, endpoint security, and phishing analysis. Experience in hands-on projects in monitoring and analysis of potential and active threats using security tools and processes.

  • 2 years of experience in cyber security implementations.
  • Responsible for SOC operations in 24x7 environment.
  • Real-time log monitoring in the Security Operations Center from different devices such as firewalls, IDS, IPS, operating systems like Windows, Linux, Windows Servers, System Application, Databases, Web Servers, and Networking Devices .
  • Excellent working knowledge on IBM Resilient and Jira ticketing tools.
  • Ensures the integrity and protection of networks , systems, and applications by technical enforcement of organizational security policies, through the performance of formal risk assessments, and internal threat analysis regarding SOC environment with the use of SIEM tools .
  • Good understanding of developing the complex Use Cases on the IBM QRadar and Splunk Enterprise SIEM Solutions.
  • Responsible for monitoring security system and diagnoses malware events to ensure no interruption of service. Identifying potential threat , phishing attacks , anomalies, and infections.
  • Hands on experience in using various tools like Autopsy, ZAP Proxy, NMap, Hydra, Tenable Nessus, SOC Radar and Kali Linux.
  • Monitoring network traffic for security events and perform triage analysis through EDR solutions such as SentinelOne and CrowdStrike Falcon to identify the timeline of the incident and affected hosts.
  • Analyze threat patterns on various security devices and validation of False/True positive security incidents.
  • Responding to cyber security incidents by collecting, analyzing, providing detailed evidence (network log files) and ensure that incidents are recorded and tracked in accordance with its guideline and requirements.
  • Implement processes and manage Nessus to identify vulnerabilities and track their remediation with the system owner.

Overview

6
6
years of professional experience
1
1
Certification

Work History

Security Operations Center Analyst

BioReference Laboratories
03.2022 - Current

Conduct log analysis on Splunk Enterprise and IBM QRadar SIEM solutions and provide recommendations to the technical teams via IBM Resilient and Jira ticketing system

  • Monitor and analyze SIEM alerts through Splunk Enterprise and IBM QRadar and identify security anomalies for investigation and remediation
  • Conduct analysis to determine the legitimacy of files, domains and emails using OSINT tools such as VirusTotal, IBM X-Force, Entral Ops, Abuse IP, URL Scan, Hybrid Analysis, Any Run, Joe Sandbox, Whois Lookup, PhishTank and MX Toolbox.
  • Familiarity with fundamentals of information security including network technologies and tools, identity and access management, network security, implementing secure systems and risk management.
  • Analyze PCAP files , narrow down anomaly traffic with Wireshark, examine the details of the infected hosts and write IOC on executive summary reports
  • Experience in using various tools like NMap, Hydra, Tenable Nessus, SOC Radar, Kali Linux
  • Review existing policies and guidance to ensure compliance with National Institutes of Technology (NIST) Risk Framework.

IT Consultant

OKINYX
01.2018 - 03.2022

· Provide desktop, laptop, and tablet computer technical support to a team of 2000+ remote and in-office users

· Configure/Troubleshoot computer systems and applications on Windows 10 systems including Office 365 issues.

· Coordinate/Design testing plans for the new company websites.

· Monitor and respond quickly and effectively to requests received through the IT Helpdesk Tier I staff via phone, e-mail, or the ITSM (IT Service Management) software. This includes but isn't limited to modifying local and network configurations, utilities, software, hardware for PC's and laptops.

· Configure laptops with Check Point full disk encryption. Assisted users in lock outs, password resets, and account creation.

· Execute analysis of email-based threats to include understanding of email communications, headers, transactions, identification of malicious tactics, and techniques.

· Troubleshoot Active Directory issues from an end user perspective.

· Deploy, manage, and assist in the maintenance and/or repair of IT devices including phones, laptops, desktops, tablets, handhelds, and printers.

· Create and modify Distribution Groups by adding and removing users.

· Use Active Directory to grant user permission, reset passwords, and enable/disable accounts.

· Use Active Directory to give/ remove access to roles and groups.

· Create high quality procedure documentation for end users during deployments. Work with Tier 2 to make documentation as clear and concise as possible.

· Map appropriate printer and shared drives to employee computers.

Cybersecurity Training

Crest Consulting Group
08.2021 - 11.2021

80 Hours Cybersecurity Training (Government & Commercial)

  • Worked on Risk Management Framework, NIST 800-53, Plan of Action & Milestone (POA&M)
  • Hands on lab: Nessus, Splunk, Snort, Kali Linux, Windows, Linux, and SQL.
  • Experience with Penetration testing and searching for vulnerabilities in databases
  • Course specializing in Security Operations Center (SOC) Process and Tools
  • Vulnerability Scanning and Tools
  • IT Security Fundamentals

Skills

Security Tools

  • Splunk Enterprise
  • Wazuh EDR
  • Soc Radar
  • SentinelOne
  • CrowdStrike Falcon
  • Nessus
  • Nmap
  • Wireshark
  • Kali Linux
  • VirtualBox
  • Linux Command Line Tools
  • ZAP Proxy
  • Phishing Analysis
  • ProofPoint
  • Kibana
  • Redline

Networking

  • Wireshark Packet Analysis
  • DNS
  • Whois
  • Web Application Firewall WAF
  • Next Generation Firewall
  • Data Loss Prevention (DLP)
  • TCP/IP
  • DS / IPS

Interpersonal Skills

  • Time Management
  • Fast Learning
  • Problem Solving
  • Multitasking
  • Organization Skills
  • Detail Oriented
  • Trend forecasting

Certification

  • CompTIA Security+
  • ITIL Certification
  • CompTIA Network+
  • EC-Council Certified Encryption Specialist
  • CySA+ (In Progress)

Timeline

Security Operations Center Analyst - BioReference Laboratories
03.2022 - Current
Cybersecurity Training - Crest Consulting Group
08.2021 - 11.2021
IT Consultant - OKINYX
01.2018 - 03.2022
Kingsley Oriaku