Summary
Overview
Work History
Education
Skills
Websites
Certification
Timeline
Generic

Mongo Singbe

Cyber Security Analyst
Indianapolis,Indiana

Summary

Results-driven and highly motivated individual with a strong passion for cybersecurity and a solid foundation in information technology. Seeking to leverage my technical acumen, analytical skills, and determination to contribute effectively as a SOC Analyst. I am Dedicated and highly skilled Security Analyst with a proven track record of 5 years in the field of email security. Skilled in protecting organizations from email-based threats and ensuring the security, confidentiality, and accessibility of sensitive data. Expertise in designing, implementing, and managing robust email security solutions using industry-leading tools such as Proofpoint and Exchange Server. Demonstrated expertise in conducting in-depth email investigations to identify, analyze, and mitigate security incidents. Proficient in tracking email sources, analyzing email headers, and forensically examining email content. Expert in quickly identifying and alleviating email security threats, such as spear-phishing, ransomware, and data breaches, minimizing organizational disruption. Expertise in developing and implementing incident response plans to ensure timely and effective responses to security incidents, including email breaches and malware outbreaks. Serve as the point of contact for resolving Proofpoint Email Security operational tickets by providing whitelisting/blacklisting support for domains and email addresses, and troubleshooting issues related to email non-delivery. Eager to learn and support the security team in identifying and mitigating security threats, while horning expertise in monitoring, incident response, and security best practices. Committed to maintaining the confidentiality and integrity of organizational data in a fast-paced, dynamic environment. Results-oriented Analyst skillful in managing and breaking down large volumes of information. Proactive at heading off issues in operations, workflow and production by uncovering trends affecting business success. Rational Cyber Security with 5 years of experience enhancing operations for organizations through information systems solutions. Proven track record of transforming specific business goals related to growth and efficiency improvements into new system designs. Knowledgeable innovator known for recommending new technologies to enhance existing systems and introduce new systems.

Overview

6
6
years of professional experience
3
3
Certifications

Work History

Cyber Security Analyst - Email Security

Luxury Scents Utopia
05.2023 - Current


  • Optimizing Security Infrastructure: Expertise in configuring and managing F5 load balancers and Azure environments ensures high-performance, resilient email security solutions
  • Secure Communication Champion: Proven track record of implementing TLS, SPF, DKIM, and DMARC to strengthen email communication environments
  • Threat Intel Collaborator: Collaborate with the Threat Analysis Unit to deliver incisive reports on confirmed security incidents
  • Data Security Specialist: Proficient in data classification (M365 Azure Information Protection) and familiar with DLP, encryption, and email routing concepts
  • Proactive Phishing Fighter: Developed and maintained Phishing SOPs, wielding CMD commands and Regex-based analysis to swiftly identify and mitigate phishing attempts and malware
  • PKI Fortification Expert: Utilize profound PKI expertise to analyze emails with rigor, fortifying our organization's communication channels against sophisticated threats.
  • Performed system analysis, documentation, testing, implementation, and user support for platform transitions.
  • Validated results and performed quality assurance to assess accuracy of data.
  • Guided acquisition process to capture projected cost and revenue synergies and move combined organization forward.
  • Assessed data modeling and statistics to integrate high-level business processes with data rules.
  • Monitored compliance and filing requirements in conjunction with staff and management.
  • Identified and resolved problems through root cause analysis and research.
  • Recommended process improvements to continually identify, analyze and fix constraints and challenges.
  • Performed budget analysis to control expenditures and predict future budget needs.
  • Cultivated relationships with industry leaders and within company to share tips and information.
  • Performed audits of subsidiaries to protect shareholders and potential investors from fraudulent or unrepresentative financial claims.
  • Queried databases for information needed for report processing.
  • Researched and adopted new technologies to add value to existing offerings.
  • Enhanced interfaces to promote better functionality for users.
  • Identified clear connections between policies and business results to eliminate or reduce confusion and help employees achieve goals.
  • Conducted system analysis and implementation to maintain and improve computer systems.
  • Conducted workplace compliance training to reduce liability risks and operate effectively.
  • Optimized core processes to improve business performance and operational agility.
  • Installed system updates to address vulnerabilities and reduce security issues.
  • Evaluated customer needs and feedback to drive product and service improvements.
  • Provided reporting for forecast analysis and ad-hoc reporting in support of decision-making.
  • Collected, arranged, and input information into database system.
  • Educated staff on organizational mission and goals to help employees achieve success.
  • Observed packing operations to verify conformance to specifications.
  • Cultivated positive relationships with vendors to deliver timely and cost-effective supply of services and materials.
  • Frequently inspected production area to verify proper equipment operation.
  • Gathered, organized and input information into digital database.
  • Generated reports detailing findings and recommendations.
  • Conducted regular reviews of operations and identified areas for improvement.
  • Supported creation of detailed, technical financial models to value potential acquisition targets.
  • Maintained database systems to track and analyze operational data.
  • Devised and implemented processes and procedures to streamline operations.
  • Helped meet changing demands by recommending improvements to business systems or procedures.
  • Optimized customer experience by delivering superior services and effectively troubleshooting issues.
  • Evaluated staff performance and provided coaching to address inefficiencies.
  • Developed effective improvement plans in alignment with goals and specifications.
  • Maintained overall safe work environment with employee training programs and enforcement of safety procedures.

Cyber Security Specialist

Mongo Singbe - page 1CPS Cloud platform solution
08.2022 - 04.2023
  • Built and maintained a robust email security posture leveraging Microsoft Exchange Online Protection and Proofpoint technologies
  • Proactively identified and neutralized vulnerabilities through vigilant monitoring and swift response
  • Integrated cutting-edge email security solutions seamlessly with existing IT infrastructure, ensuring resilience
  • Developed and executed comprehensive malware analysis strategies, staying ahead of evolving threats
  • Leveraged DMARC, DKIM, SPF, TLS, and DNS expertise to strengthen email authentication and defenses
  • Cultivated a proactive security culture through familiarity with network security principles (firewalls, IDS/IPS, VPNs) and frameworks like MITRE ATT&CK and NIST CSF
  • Masterfully configured and updated email security gateways with advanced cybersecurity features and rules
  • Employed CMD commands to dissect email headers, trace routes, and investigate suspicious emails
  • Utilized Regex signatures to conduct thorough investigations, identifying and analyzing patterns indicative of potential threats
  • Applied PKI proficiency to implement cryptographic principles, validate digital signatures, and encrypt sensitive emails.
  • Managed anonymous online and phone-call tips, implementing uncovered information into investigation processes to solve cases.
  • Encrypted data and erected firewalls to protect confidential information.
  • Researched and developed new computer forensic tools.
  • Performed risk analyses to identify appropriate security countermeasures.
  • Developed plans to safeguard computer files against modification, destruction, or disclosure.
  • Monitored use of data files and regulated access to protect secure information.
  • Recommend improvements in security systems and procedures.
  • Engineered, maintained and repaired security systems and programmable logic controls.
  • Reviewed violations of computer security procedures and developed mitigation plans.
  • Monitored confidential company data and mitigated hacking through network systems updates.
  • Conducted security audits to identify vulnerabilities.

Email Security Analyst

AGKI
03.2018 - 09.2021
  • Actively investigated and mitigated phishing email attacks, including scrutinizing email headers for signs of spoofing and examining URLs and attachments in the body of the email for malicious payloads using static and dynamic analysis, following SOC playbook guidelines
  • Successfully blocked over 1,000 phishing emails by leveraging email header analysis, URL and attachment scanning, and SOC playbook adherence to prevent malicious payloads from reaching end users
  • Successfully taking down phishing domains and malicious infrastructure, reducing the effectiveness of ongoing campaigns, and protecting potential victims
  • Led the integration of sandboxing technology into email analysis, enabling the automated execution of suspicious attachments in a safe environment
  • Designing and implementing custom transport rules in Exchange Online Protection to identify and prevent the unauthorized transmission of sensitive data, aligning with regulatory requirements and bolstering data protection efforts
  • Used Proofpoint TAP to detect and stop email threats and deciphered its data to understand the attack and take action to protect the organization
  • Effectively mitigated several high-profile phishing attacks, including spear-phishing campaigns targeting C-level executives, resulting in zero data loss or compromise
  • These rapid responses significantly bolstered the organization's reputation for data protection
  • Conducted security awareness training for employees, emphasizing the importance of vigilance against phishing emails
  • This proactive approach led to a 25% decrease in employee susceptibility to phishing attempts
  • Maintained detailed records of phishing email incidents, investigations, and responses
  • Produced comprehensive incident reports for executive leadership, aiding in informed decision-making and resource allocation.
  • Provided safety reports and data analysis to building managers to inform security processes.
  • Developed plans to safeguard computer files against modification, destruction, or disclosure.
  • Outlined and maintained security patching schedule to efficiently address ongoing system issues.
  • Performed risk analyses to identify appropriate security countermeasures.
  • Completed vulnerability scans to identify at-risk systems and remediate issues.

Education

certification - Cyber/Computer Forensics and Counterterrorism

Coursera

Bachelor's degree -

Galen College of Nursing

Associate's degree - Computer Science

Ivy Tech Community College

Skills

Time Managementundefined

Certification

CompTIA CySA+ ce certificate - CompTIA

Timeline

Cyber Security Analyst - Email Security

Luxury Scents Utopia
05.2023 - Current

Cyber Security Specialist

Mongo Singbe - page 1CPS Cloud platform solution
08.2022 - 04.2023

Email Security Analyst

AGKI
03.2018 - 09.2021

certification - Cyber/Computer Forensics and Counterterrorism

Coursera

Bachelor's degree -

Galen College of Nursing

Associate's degree - Computer Science

Ivy Tech Community College
Mongo SingbeCyber Security Analyst