Summary
Overview
Work History
Education
Skills
Certification
Timeline
Generic

KINGSLY FONDAM MBAH

Dallas,United States

Summary

Passionate SOC/IR Analyst with 6+ years of experience in investigating and preventing network, host, and email-based attacks. Proficient in phishing investigating, malware analysis, incident response, data loss prevention and improving SOC processes by utilizing top industry security solutions. Effortlessly adapt to various environments and workplaces. Operates well while working independently as well with team members. I am motivated, goal driven, and focused with excellent communication skills. Prioritize and manage multiple tasks concurrently. Troubleshoot and resolve complex issues in a demanding work environment quickly and efficiently. Deep understanding of email security, log analysis, DLP/data exfiltration, Firewalls, insider controls, Incident response and improving SOC processes by utilizing top industry security solutions.

Overview

8
8
years of professional experience
1
1
Certification

Work History

SOC Analyst Level 2

Inspire Consulting LLC
Washington, DC
12.2021 - Current
  • Triaged and investigated incoming alerts generated from Splunk ES to determine the severity and impact of the event or incidents
  • Experience in Threat Hunting on networks to detect threats and provide solutions
  • Identify vulnerabilities within our systems, particularly focusing on CorVel systems
  • Leverage an email security platform to investigate, identify and mitigate against email related threats
  • Knowledge of Enterprise Networks & Security infrastructure, Communication and internet security systems, Firewalls, Intrusion Protection Systems, Remote Access VPN, Proxy, Wireless Security and others
  • Possess comprehensive knowledge of the MITRE ATT&CK framework and map client use cases to specific tactics and techniques
  • Strong understanding of network security operations and technology, with attention to detail
  • Assist in building SOPs as needed or directed to facilitate SOC operations and processes
  • Support information security department with SharePoint, WebEx, M365, and other tools
  • Mid knowledge of Scripting or Programming in Python
  • Performed Root Cause Analysis (RCA) and make preventative recommendations for incidents and events
  • Ability to think creatively, identifying and reducing risk in a complex environment
  • Recognized potential, successful, and unsuccessful intrusion attempts and compromises through reviews and analysis of security tools
  • Conduct security investigations, analyze security incidents, and implement effective response strategies
  • Analyze and dissect network packets, validating threat signatures
  • Participated in daily security meetings with team members and customer teams
  • Acting as an escalation point for the internal shift and supporting all customers
  • Analyze Data Loss Prevention (DLP) events to detect data exfiltration through covert channels

SOC Analyst Level 1

PITCH TECHNOLOGIES
Dallas, TX
10.2018 - 11.2021
  • Perform remediation actions on Endpoints (laptop/desktop/server) related to cyber security
  • Incident response case management and automation (SOAR)
  • Incident Response toolsets and specifically phishing group mailbox support
  • SIEM technologies and utilization within a cyber security environment
  • Cyber Kill Chain/MITRE ATT&CK frameworks and application within a cyber security command center
  • Creative problem-solving abilities and willingness to take on responsibility
  • Logging/monitoring solutions and implementations
  • Agile methodology, sprint planning and daily scrum meetings
  • Apply comprehensive knowledge and a thorough understanding of concepts, principles, and technical capabilities to perform varied tasks and projects related to incident response
  • Works on complex projects of large scope domestically and internationally
  • Develop technical solutions to a wide range of difficult problems
  • Solutions are innovative and consistent with organizational goals
  • Completes work independently; receives general guidance on new projects and tasks
  • Act as a mentor to less experienced colleagues
  • Provide an organized and risk-based approach to remediation of sensitive assets in the enterprise
  • Present data findings and influence organizational partners at multiple levels in the organization
  • Establish strong reporting metrics to support the program and influence behaviors
  • Act as liaison with solution owners and IT groups to ensure alignment of our strategy

IT/Network Administrator

Telecom, Inc.
, UNITED STATES
05.2017 - 09.2018
  • Planned and recommended network hardware, systems management software and architecture
  • Installed/Reimaged, configured and maintained staff computers, file servers, ethernet networks and networks cabling
  • Monitored network performance to determine if adjustments were required
  • Established and developed procedures for proper utilization of IT technology
  • Developed strategies and direction for network systems solutions
  • Implemented and maintain security strategies for internal network
  • Ensured maximum system uptime by performing routine/preventative maintenance tasks
  • Recommended modifications of basic IT systems to improve and simplify business systems and reduce operating costs
  • Had responsibility for network planning, design, security, and optimization
  • Tested new software for bugs before deployment/provisioning

Education

Bachelor of Science - Information Technology Management

University Of Buea
Cameroon
12.2013

Skills

  • Threat Detection and Analysis
  • SIEM (Security Information and Event Management)
  • Network Security Protocols TCP/IP
  • Malware Analysis / Endpoint Security
  • Endpoint Detection and Response (EDR)
  • DLP / IDP / DNS
  • Incident Response / Cyber Threat Intelligence
  • Splunk
  • Chronicles
  • Nessus
  • Wireshark
  • CrowdStrike
  • Carbon Black
  • Firepower
  • Palo Alto
  • Cisco IronPort
  • Linux
  • Windows
  • MacOS
  • Communication and Reporting
  • Knowledge of Emerging Threats
  • Collaboration and Teamwork
  • ServiceNow
  • Confluence
  • Microsoft Office 365 Suite
  • Sentinel
  • Virus Total
  • Domain Tools
  • IP/URL void
  • Any Run Sandbox
  • Threat Grid
  • Runbook
  • Playbook
  • Develop SOPs
  • SQL
  • Active Directory
  • McAfee
  • Basic Scripting Experience - Python
  • PowerShell
  • CompTIA Security

Certification

CompTIA Security

Timeline

SOC Analyst Level 2

Inspire Consulting LLC
12.2021 - Current

SOC Analyst Level 1

PITCH TECHNOLOGIES
10.2018 - 11.2021

IT/Network Administrator

Telecom, Inc.
05.2017 - 09.2018

Bachelor of Science - Information Technology Management

University Of Buea
KINGSLY FONDAM MBAH