I am an insightful IT Cyber security Analyst professional with 5 years of experience in a broad range of cyber security and information technology environment.
Experience in analyzing security incidents, network monitoring, information security & network security functions.
Experience with industry recognized SIEM (security information and event management) solutions such as Alien Vault,slunk,etc...
Experience in protecting large enterprise data ad network systems.
Assertive implementation of compliance verification,assurance controls, risk assessment and vulnerability assessment with strict enforcement of FISMA and NIST guideline.
Experience in identifying , assessing and providing recommendations to mitigate organizational risk using cyber security frameworks and controls such as ISO 27001/2, and NIST SP 800-37,SP 800-53 Rev.4, SP 800-18 Rev.1, SP 800-60.
Skillful in preparing authorization package - SSP, SAR and POA&M.
Used Remote Desktop Management to access and perform required tasks on devices that aren’t accessible physically.
Used Lansweeper to gather information about users and devices.
Used Security Center to spot and report critical and high-Level vulnerabilities over the network.
Assigned, documents, and maintains computer login codes, passwords, and access profiles for software applications and network access.
Performed regular risk analyses to identify system and network vulnerabilities and formulate appropriate mitigation strategies.
Assisted in Incident Response (IR) and Data Loss Prevention (DLP) in the event of a breach, intrusion or theft.
Coordinated the systems audits, system certification and accreditation, and validation of access profiles.
Communicated standards for the use, operations, and security of the Franklin County Data Network.
Responded to inquiries regarding data and computer security, policies, and procedures (Security Incident and Event Management).
Coordinated, documents, and reports on internal investigations of possible security violations.
Performed Security Tools Administration role for one or more of the following: Patch Management, Antivirus Update, Network Scanning, Account Management, Web Filtering, and Intrusion Prevention System monitoring with the capability to learn additional tool sets as the security program evolves.
Provided daily security operation reports.
Managed security events during non-traditional hours.
Managed large-scale virus attacks and denial of service.
Assigned users groups and permissions according to their scope of work
Monitored controls post authorization to ensure continuous compliance with the security requirement.
Monitored systems, logs and network traffic for any anomalies, attempted unauthorized access or other intrusions while maintaining latest patches and updates.
Used Nessus to pinpoint vulnerability and reduce time-consuming tasks.
Performed vulnerability assessment report findings to reduce false positives
conducted vulnerability assessments for network, applications and operating systems
Assessed the system environment to reduce false negatives Conducted network security audits and scanning on a predetermined basis.
Performed network scans to identify critical flaws in applications and systems that cyber attackers could exploit.
Compiled and tracked vulnerabilities for metrics purposes.
Escalated and communicated any attempted unauthorized access or other intrusions to management immediate.
Proficient in using Carbon Black purposely to analyze, track, stop, allow and manage various threats (large and small scale), applications and programs.
Efficient and knowledgeable on using NESSUS, NMAP, Wireshark, Purple Rain (Kibana), Splunk, SecureWorks, FireEye, Carbon Black, Cylance, Snowflake, Ivanti, Lansweeper, Infoblox, Pulse, Cisco Firepower, Barracuda, Proofpoint, Windows AD users and computers, Iprism, Remote Desktop Management, Change Auditor, OpsInsight , AWS Account Management, Microsoft word, Excel, PowerPoint and Outlook
Efficient on using Nessus to pinpoint vulnerability and reduce time-consuming tasks
Efficient on identifying critical flaws in applications and systems that cyber attackers could exploit
Efficient on Compiling and tracking vulnerabilities for metrics purposes
Experienced working with AWS (Security Investigation)
À Network security: Firewalls (Cisco ASA firewall), Ethernet, Internet, HTTP, HTTPS, NIS, DNS, FTP, NFS, TCP/IP, SSH, SMTP
Efficient on understanding the environment to reduce false negatives
Efficient on conducting vulnerability assessments for network, applications and operating systems
Good communication and writing skills
Efficient on conducting network security audits and scanning on a predetermined basis
Experienced using security information and event management (SIEM) to manage adherence to corporate policy, track system changes and log user access
Familiar with VMware version 55 and 6, Oracle virtual Box, Packet tracer and other Virtual Machine Applications
Platforms: Windows server 2008 and 2012
Microsoft Office (Word, Excel, PowerPoint, Outlook)
Knowledgeable on Switches and routers configuration
Efficient in Network troubleshooting
Implement cabling over a small network
Manage organization unit in an access control list
Bilingual (English and French)
Good Customer Service Kills
Comptia advanced security practitioner(CASP+)
Comptia security+certified certification
Comptia Network+
Comptia A+.