Summary
Overview
Work History
Education
Skills
Timeline
Generic
Rita Amos

Rita Amos

Columbia,MD

Summary

Rita Amos is a passionate, solution-driven SOC Analyst with over two years of experience providing real-time guidance on Network Configuration to clients. Highly experienced in networks, endpoints, phishing investigations, and attack mitigation, Monitor SIEMS, firewall Appliances, and Intrusion Detection/Prevention systems. Rita has a deep knowledge of identifying and analyzing suspicious events and utilizing various security tools to perform logs and packet analysis as well as malware analysis with the overall objective to ensure confidentiality, integrity, and security of the systems, networks, and data.

Overview

5
5
years of professional experience

Work History

SOC Analyst

Think-Tech Consulting
03.2021 - 08.2023
  • I act as a Subject Matter Expert in investigations for potential incidents identified by SOC Tier 1 analysts and provide details and recommendations
  • I Perform operational 'eyes on glass' real-time monitoring and analysis of security events from multiple sources including but not limited to events from SIEM monitoring tools, network, and host-based intrusion detection systems, firewall logs, and system logs (Unix & Windows)
  • Routinely Monitor and analyze network traffic, Intrusion Detection Systems (IDS), security events, and logs Prioritizing and differentiating between potential intrusion attempts and false alarms
  • Serve as lead investigator for all Incident Response activities, such as coordinating/ working with team members and stakeholders to perform forensic analysis and assist junior and senior level analysts with investigative security incidents, and logs Prioritizing and differentiating between potential intrusion attempts and false alarms
  • I regularly assist in the construction of signatures that can be implemented on cyber defense network tools in response to new or observed threats within the network environment
  • I respond to computer security incidents and conduct threat analysis and perform hunting for malicious activity across network and digital assets
  • I Collaborate with technical and threat intelligence analysts to provide indications and warnings and contribute to predictive analysis of malicious activity to continuously improve standard operating procedures used by the SOC
  • I analyze security event logs and alerts to determine validity, priority, and impact against both security threat best practices and corporate policies
  • I serve as the primary point of contact for clients, coordinating meetings, and preparing resolution reports on SOC activity case status
  • I conduct research, analysis, and correlation across a wide variety of all source data sets (indications and warnings)
  • I develop, maintain, and follow SOC SOPs
  • I identify, evaluate, recommend, and implement processes, monitoring of inbound and out bound network activity and responding to network alert
  • I routinely monitor security events, provide notifications to customers, and escalate security incidents to our internal team
  • I Investigate and respond to DLP alerts, endpoint watchlist alert and resolve them
  • I regularly analyze phishing and spam email, gathering related IOCs
  • Remain current on Cyber Security Trends and Intelligence with current countermeasures for Cyber Security vulnerabilities, exploits and other malicious activity to guide the security analysis and identification capability of the SOC Team
  • Wisetek solution

IT Helpdesk Support Associate

01.2019 - 01.2021
  • Provide technical support & solutions by diagnosing and resolving hardware and software issues
  • Respond to requests for technical assistance in person, via phone, and electronically, actively diagnose and resolve technical hardware and software issues
  • Remotely configure, troubleshoot, and diagnose desktop/laptop system hardware, mobile devices, and peripherals (printers, scanners, etc.)
  • Regularly provide Software support including upgrading or reinstalling applications, troubleshooting, diagnosing, and repairing software
  • Routinely Installed, configured, and troubleshot Windows and Mac OS devices, network issues, mobile devices, and applications
  • Frequently used Active Directory for password resets, creation, creating computer names, granting user permissions, unlocking user accounts & adding computers to the network
  • Regularly used Office 365/email support for creating folders, adding, and deleting access, password, and connectivity issues
  • Maintained records of trends & patterns in computer issues
  • Identified and escalate situations requiring urgent attention through collaboration with senior staff for active and inclusive resolutions of issues
  • Provide prompt and appropriate response to phone and e-ticket inquiries and requests for assistance with the associated computer systems; Perform initial problem analysis, triage, identify, troubleshoot customer issues, provide advice and assistance, and appropriately refer technical issues to the network team or subject matter experts when appropriate
  • Coordinate efforts with staff associates and subject matter experts to resolve problems; maintain liaison with network users and technical staff to communicate the status of problem resolution; assist with monitoring network management systems.

Education

Master of Science - cybersecurity technology

University of Maryland Global
10.2023

Bachelor of Science - Information Technology

Colorado technical university
01.2023

CompTIA Security+ Certification -

01.2023

Skills

  • TECHNICAL SKILL
  • Security Technologies: Security Technologies:
  • Splunk ES, Splunk Search and Reporting App, ThreatConnect, Cisco Firepower, Sentinel One, Cisco Secure Endpoint, Falcon CrowdStrike, Carbon Black Cloud, Microsoft Defender ATP, Azure Sentinel, Forcepoint DLP Manager, McAfee Web Poxy, Nmap, Wireshark, Anti-Virus Tools, Mimecast, Nessus
  • OSINT: VirusTotalcom, IBM X-Force Exchange and Palo Alto Networks URL filtering – Test A Site, urlscanio, Abuse IPDB, IP Void, Hybrid Analysis
  • Operating System: Windows (2000,2007,10), Mac OS, Linux/Unix
  • Networking: VPNs, Routers, Firewalls, TCP/IP
  • Security Frameworks: NIST SP 800 Series including NIST 800-37, NIST 800-53, NIST 800-171 NIST 800-172; ISO 27000 Series including ISO 27001, ISO 27002, Sarbanes-Oxley Act, Privacy Act of 1974, Gramm–Leach–Bliley Act (GLB), HITECH/HIPAA etc
  • Databases: MS Access, DBMS, Excel
  • Ticket Systems: Service now, JIRA, Demisto (SOAR)
  • Software: Microsoft Office, MS Project, Adobe, etc
  • Protecting Networks
  • Tenable Nessus
  • Encryption
  • Critical Thinking Skills
  • Reporting and Documentation
  • Risk Assessment
  • Data Encryption

Timeline

SOC Analyst

Think-Tech Consulting
03.2021 - 08.2023

IT Helpdesk Support Associate

01.2019 - 01.2021

Master of Science - cybersecurity technology

University of Maryland Global

Bachelor of Science - Information Technology

Colorado technical university

CompTIA Security+ Certification -

Rita Amos