Summary
Overview
Work History
Education
Skills
Certification
Timeline
Generic

KOSSI MIDJRATO

Dallas,TX

Summary

Dynamic SOC Analyst with a proven track record at Global New Tech LLC, adept in SIEM and incident response. Leveraged expertise in threat intelligence and malware analysis to enhance network security. Excelled in fostering collaboration, significantly improving system defenses and incident management protocols. Formerly bolstered IT support at Boeing, showcasing exceptional communication skills and technical acumen.

Overview

9
9
years of professional experience
8
8
Certification
2
2
Languages

Work History

SOC Analyst

Global New Tech LLC
01.2021 - Current
  • Responsible for correlation and initial triage of security events and indicators generated by SIEM tools to determining scope, urgency, and potential impact
  • Develop and maintain correlation searches, alerts, and reports to detect and respond to security incidents in real-time.
  • Analyze different data types from various sources and draw conclusions regarding past and potential current security incidents.
  • Create and modify SIEM dashboards to clearly identify scope of findings or monitor activity.
  • Perform incident response functions including but not limited to - host-based analysis functions through investigating Windows, Linux, and Mac OS X systems to identify suspicious and malicious activities.
  • Regularly review and update incident response procedures to ensure effectiveness.
  • Perform threat hunting exercises to proactively and iteratively discover current or historical threats that evade existing security mechanisms and use that information to improve cyber resilience.
  • Provide after-hours (on-call/weekend rotational) support as required to address critical incidents and maintain continuous coverage.
  • Document incidents from initial detection through final resolution.
  • Create detailed reports on security issues and findings for management review.
  • Collaborate with cross-functional teams and relevant Stakeholders to implement and maintain security measures.
  • Stay up to date on information technology trends and security standards to enhance job knowledge
  • Provide security awareness training to employees and promote security-conscious culture.

SOC Analyst

OpenPath LLC
05.2019 - 12.2020
  • Worked in 24x7 security Operation Center.
  • Monitored security alerts and events to identify and analyze potential security threats.
  • Utilized Splunk SIEM tool for log analysis, correlation, and investigation of security incidents.
  • Perform log analysis and forensic investigations to understand scope and impact of security incidents.
  • Analyze malware, phishing emails, emerging threats, and risks.
  • Collaborate with cross-functional teams to identify and remediate security vulnerabilities and misconfigurations.
  • Conduct threat hunting exercises using Splunk to proactively identify advanced threats and malicious activities.
  • Create custom dashboards and visualizations to provide insights into security posture of organizations.
  • Assist in development and implementation of security policies, procedures, and standards.
  • Provide technical expertise and guidance to junior analysts and SOC personnel.
  • Participate in incident response activities and contribute to improvement of incident response procedures.

IT Technical Support Specialist

Boeing
01.2017 - 04.2019
  • Supported for Boeing employees and contractors via phone and email
  • Utilized remote desktop tools to configure user settings and troubleshoot technical issues
  • Assisted end-users with following: password reset, email encryption, VPN connectivity issues, secure badge diagnostics, pin reset, mobile phone, desk phone and management software
  • Supported of workstation, network printers, Network hub, switches, routers, and circuit
  • Diagnosed and resolve range of software (Microsoft Office 2013 to 2019) Citrix workspace, velocity, hardware, and connectivity issues while delivering technical training on hardware and software to end-users
  • Collaborated with internal teams to develop effective solutions for business needs
  • Monitored performance of IT systems to ensure optimal functionality
  • Monitored systems and network devices patching cadence to ensure security patches are up to date and patchable vulnerabilities are mitigated
  • Resolved complex technical problems through research, consultation, and analysis of data
  • Assisted users in use of new software programs by providing training and instructions
  • Created detailed documentation of all help desk tickets for future reference
  • Prioritized tasks based on urgency and importance levels when responding to customer requests
  • Handled customer complaints and escalated issues according to procedures.

Help Desk Technician

Home Dynamix
04.2015 - 12.2016
  • Provided first-line technical support to end-users
  • Diagnosed and resolved hardware and software issues
  • Installed, configured, and troubleshot desktops, laptops, and peripherals
  • Collaborated with other IT teams to escalate and resolve complex technical problems
  • Administered and maintained user accounts, passwords, and access permissions
  • Assisted in development and implementation of IT policies and procedures
  • Conducted user training sessions on software and system usage
  • Managed and prioritized help desk tickets using ticketing system.

Education

Certification - Information security

MyComputerCareer.com
Raleigh, NC
11.2019

Masters - Logistics and management

Institut Supérieur De Management Et Du Développement (ISMAD)
Lome, Togo
05.2013

Skills

  • SIEM
  • IDS/IPS
  • Proxy Servers
  • Firewalls
  • EDR
  • XDR
  • Information Security
  • Linux
  • Widows OS
  • MAC OS
  • Dashboard
  • Visualization
  • Data Loss Prevention
  • Incident Response
  • Threat Intelligence
  • Security Policies and Procedures
  • Malware Analysis
  • Email Investigation
  • MITRE Att&ck
  • Kill Chain
  • NIST
  • Splunk
  • Elasticsearch
  • Microsoft Defender
  • Log management
  • Incident management
  • Communication and Collaboration
  • Web Security
  • TCP and IP Protocols
  • Wireshark Usage
  • Vulnerability Assessment
  • Cloud Security
  • Forensic Investigation
  • Log Analysis
  • Application Security
  • Bash Scripting
  • Security Awareness Training
  • Packet Analysis
  • Endpoint Security
  • Access Control
  • Identity Management
  • Critical Thinking Skills
  • Risk Mitigation
  • Network Security
  • Information Auditing
  • Information Protection
  • Data Encryption
  • Procedure Documentation
  • SIEM management
  • Intrusion Detection
  • Operating System Security
  • Python Programming
  • Penetration Testing
  • Application security
  • Security Policies
  • PowerShell Scripting
  • Social Engineering
  • Regular expressions
  • Encryption Techniques
  • Audit Support
  • Wireshark software
  • Data Security
  • Regulatory Compliance
  • Best Practices Implementation
  • Risk Assessment
  • Encryption Techniques
  • Audit Support
  • Data Security
  • Regulatory Compliance
  • Best Practices Implementation
  • Risk Assessment
  • Information Auditing
  • Information Protection
  • Data Encryption
  • Procedure Documentation
  • SIEM management
  • Intrusion Detection
  • Nmap Scanning
  • Operating System Security
  • Python Programming
  • Penetration Testing
  • Application security
  • Security Policies
  • PowerShell Scripting
  • Social Engineering
  • Regular expressions
  • Encryption Techniques
  • Audit Support
  • Wireshark software
  • Data Security
  • Regulatory Compliance
  • Best Practices Implementation
  • Risk Assessment
  • Encryption Techniques
  • Audit Support
  • Wireshark
  • Nessus
  • Qualys
  • Data Security
  • Regulatory Compliance
  • Best Practices Implementation
  • Risk Assessment
  • Information Auditing
  • Information Protection
  • Data Encryption
  • Procedure Documentation
  • SIEM management
  • Intrusion Detection
  • Nmap Scanning
  • Operating System Security
  • Python Programming
  • Penetration Testing
  • Application security
  • Security Policies
  • PowerShell Scripting
  • Social Engineering
  • Regular expressions
  • Encryption Techniques
  • Audit Support
  • Data Security
  • Regulatory Compliance
  • Best Practices Implementation
  • Risk Assessment

Certification

  • Security+
  • Network+
  • Server+
  • Splunk Core Certified Power User
  • Splunk Core Certified User
  • Splunk Certified Admin
  • Splunk Enterprise Securityt


Timeline

SOC Analyst

Global New Tech LLC
01.2021 - Current

SOC Analyst

OpenPath LLC
05.2019 - 12.2020

IT Technical Support Specialist

Boeing
01.2017 - 04.2019

Help Desk Technician

Home Dynamix
04.2015 - 12.2016

Certification - Information security

MyComputerCareer.com

Masters - Logistics and management

Institut Supérieur De Management Et Du Développement (ISMAD)
  • Security+
  • Network+
  • Server+
  • Splunk Core Certified Power User
  • Splunk Core Certified User
  • Splunk Certified Admin
  • Splunk Enterprise Securityt


KOSSI MIDJRATO