Summary
Overview
Work History
Education
Skills
Certification
Timeline
Generic

Mehmood BATAVIA

Austin,Texas

Summary

Cybersecurity Professional with 3 years of experience. Motivated and results-driven Security Analyst with the ability and knowledge to utilize security controls to mitigate vulnerabilities, achieve confidentiality, integrity, and availability of organizational information, and information systems. Skilled with investigating suspicious activity, ability to read and analyze events using various security toolsets. Strong work ethics, detail-oriented team player with excellent interpersonal communication and presentation skills.

Overview

3
3
years of professional experience
1
1
Certification

Work History

Junior SOC Analyst

Saic (Science Applications Int.)
04.2018 - 12.2019
  • Monitor, analyze and respond to security events from a variety of SEIM data sources.
  • Triage security alerts from a variety of sources including network devices, servers, end users, threat intelligence services.
  • Analyze and investigate cyber events using various logs including email, firewall, endpoint, IDS/IPS, and other network devices in an enterprise security information and event management (SIEM).
  • Validate intrusion detection system (IDS) alerts against network traffic using packet analysis tools.
  • Work with end users or system administrators and various vendors to mitigate security incidents.
  • Staying up to date with current vulnerabilities, attacks, and countermeasures.
  • Escalated open ticket to Tier II or Tier III after eliminating false positives.
  • Utilized various security tools such as Wireshark, spunk, Cyberchef, Tanium, FireEye, Virus Total, PassiveTotal and other OSINT to perform analysis and investigations.
  • Document all activities during an incident and provide leadership with status updates during the life cycle of the incident.
  • Perform other duties as assigned.

Information Security Analyst (ISSO)

Primepay
01.2019 - 07.2020
  • Developed, reviewed and evaluated Security Plan based on NIST Special Publications 800-58.
  • Assessed System Security Controls using SP 800-53A
  • Prepared Security Assessment and Authorization (SA&A) packages to ascertain that management, operational and technical security controls adhere to NIST SP 800-53 standards.
  • Assessed program and security controls using Organization IT Security Policy Handbook and NIST Special Publications to provide information necessary to determine their overall effectiveness.
  • Performed Contingency Plan Test and Training to ensure systems recoverability as defined in IT systems security requirements.
  • Created and updated the following Security Assessment and Authorization (SA&A) artifacts; FIPS 199, Security Test and Evaluations (ST&Es), Risk Assessments (RAs), Privacy Threshold Analysis (PTA), Privacy Impact Analysis (PIA), E-Authentication, Contingency Plan, Plan of Action and Milestones (POAMs).
  • Reviewed network traffic logs to identify signs of unauthorized access and underlying network vulnerabilities, explaining breaches and surrounding conditions to client.
  • Analyzed security procedure violations and developed plans to prevent recurrence.
  • Developed and updated System Security Plans (SSP), Contingency Plans, Disaster Recovery Plan, Incident Response Plans, and Configuration Management.

IT Systems Administrator

Hilltrust Global
01.2017 - 11.2018
  • Provided desktop support to end-users by responding to requests for technical assistance.
  • Performed preventive maintenance and upgraded systems to improve network, system and data availability and integrity.
  • Diagnosed and resolved technical hardware and software issues.
  • Installed computer peripherals for end users.
  • Updated virus protection systems based on computer virus reports.
  • Managed user identities, credentials, and privileges on local servers
  • Configured systems in accordance with system security policy.
  • Conducted record searches and coordinated with other units on procedural problems involving complex cases.
  • Monitored and maintained client computers and network infrastructure to ensure optimal performance, reliability, and security
  • Generated reports using statistical software in response to user requests.
  • Performed other duties as assigned.

Education

Security Plus 701 Still in Progress

Comp TIA
United States

Tax Examination Technician Certification From IRS
Internal Revenue Service

Cyber Security Cerification From Coursera
Coursera, Google
03.2024

Human Biology

Phlebotomy
Austin, United States
05.2010

Bachelor of Science - Business Communications

UKPK
Karachi, Pakistan
05.1989

Skills

Skills/Core Competencies

SECURITY & COMPUTER FORENSICS TOOL

  • Tanium, Carbon Black, Splunk, Cylance, FirePower, Carbon Black
  • Reporting and Documentation
  • Anti-Virus Tools; (Norton, Symantec)

Vulnerability Tools: Tenable Nessus, Qualys

Systems: Windows PC/Server, iOS, Linux, Active Directory (AD), etc

Networking: Various network communication (eg, LAN, WAN, MAN, WLAN, WWAN), VPN, Router, Firewall, TCP/IP,

Software: Cisco VPN, ServiceNow, Remedy, SharePoint, MS Office suites, etc

CORE COMPETENCIES:

  • Vulnerability management
  • Investigation and Incident Response
  • Incident Event Management
  • log morning monitoring and gathering
  • PCAP analysis
  • Monitoring Computer Viruses
  • Knowledge of threats, vulnerabilities, risks, attacks and the process of mitigating risks
  • Understanding of how to read inbound and outbound traffic
  • Risk Assessment and Analysis
  • Risk Management Framework (RMF)
  • NIST Special Publications/ FIPS 199/200/ CSAM, eMass, SSP, FedRamp, POAMs, ATO Packages, Security Controls, SharePoint FISMA
  • Data Encryption
  • Network Security
  • Penetration Testing
  • Virtualization Security
  • Social Engineering Prevention
  • Two-Factor Authentication
  • Security Operations Center
  • System Hardening
  • DDoS prevention
  • Incident Response
  • Intrusion Test Oversight
  • Cryptanalysis
  • Access Control
  • Software Deployment
  • Database Security
  • Incident Response Management
  • Endpoint Protection
  • Phishing Detection
  • Wireless Security
  • Patch management
  • Threat Intelligence
  • Secure Network Design
  • Disaster Recovery
  • Zero-Day Exploit Prevention
  • Identity Management
  • Intrusion Detection
  • DDoS Mitigation
  • Log Analysis
  • IoT Security
  • Web Application Security
  • Compliance Monitoring
  • Encryption Algorithms
  • Digital Forensics
  • Security Architecture
  • Security Auditing
  • Secure Coding
  • Mobile Security
  • IDS Integration
  • User Awareness Training
  • Biometric security
  • Security policy development
  • Application security
  • Problem-solving abilities
  • Team Collaboration
  • Team building
  • Problem-solving aptitude
  • Attention to Detail
  • Multitasking
  • Time Management
  • Teamwork and Collaboration
  • Adaptability and Flexibility
  • Active Listening
  • Excellent Communication
  • Wireshark software
  • Analytical Thinking
  • Multitasking Abilities
  • Reliability
  • Erecting firewalls
  • Interpersonal Skills
  • Decision-Making
  • Analytical Skills
  • Professional Demeanor
  • Information Protection
  • Risk Assessment
  • Relationship Building
  • Written Communication
  • Goal Setting
  • Developing security plans
  • Security assurance
  • Problem-Solving
  • Task Prioritization
  • Interpersonal Communication
  • Continuous Improvement
  • Professionalism
  • Security metrics
  • Telecommunications Systems
  • Resource Allocation
  • Time management abilities
  • Self Motivation
  • Symantec Endpoint Protection
  • Procedure Documentation
  • Data Security
  • Organizational Skills
  • Effective Communication
  • Information Governance
  • Adaptability
  • Security Planning
  • Security Needs Assessment
  • SIEM management
  • Vulnerability Assessment
  • Firewall Administration
  • Data protection
  • Audit Support
  • Security Awareness Training
  • Critical Thinking Skills
  • Compliance Management
  • Privacy regulations
  • Risk Mitigation
  • Encryption Technologies
  • Regulatory Compliance
  • Best Practices Implementation
  • Information Auditing
  • Deductive reasoning skills
  • Infrastructure Assessment
  • Business Continuity
  • Cybersecurity Expertise

Certification

  • CompTIA Security+
  • AWS Certified Solution Architect Associate - In progress

Timeline

Information Security Analyst (ISSO)

Primepay
01.2019 - 07.2020

Junior SOC Analyst

Saic (Science Applications Int.)
04.2018 - 12.2019

IT Systems Administrator

Hilltrust Global
01.2017 - 11.2018

Security Plus 701 Still in Progress

Comp TIA

Tax Examination Technician Certification From IRS

Cyber Security Cerification From Coursera

Human Biology

Phlebotomy

Bachelor of Science - Business Communications

UKPK
Mehmood BATAVIA