Motivated IT professional, with over 5 years of experience in Cyber security; monitoring and system surveillance for suspicious events using IDS and SIEM tools.
Identify and ingest indicators of compromise (IOCs), e.g malicious IPs/URLs, e.t.c, into network tools/applications
Stay up to date with current vulnerabilities, attacks, and countermeasures with security blogs and internal news reporting’s from CISA, DHS, Akamai
Perform incident monitoring, response, triage and initiate investigations
Create and track incidents and request using ticketing tool: (ServiceNow)
Analyze security event data from the network (IDS, SIEM)
Perform investigations and evaluations of network traffics, read and interpret logs, sniffer packets, and PCAP analysis with RSA Security analytics and Wireshark
Escalate any security incident (the confidentiality, integrity or availability of any information or information asset that is negatively impacted) to the Incident Response (IR), Incident Management team (IMT), Forensic Management Analysis team (FMAT) as needed
Conduct analysis using Splung ES
Identify suspicious/malicious activities or codes
Perform domain and email analysis
Participate in phishing campaigns
Search firewall, email, web or DNS logs to identify and mitigate intrusion attempts
Investigate malicious phishing emails, domains and IPs using Open Source tools and recommend proper blocking based on analysis
Continuously monitoring and interpreting threats using the IDS and SIEM tools
Investigate all reported suspicious emails and determine whether the emails are malicious, non-malicious or legitimate and reply to the user who reported the suspicious email with a message reporting the findings and any recommendations
Perform shift handoff at the end of every shift to provide situational awareness to the incoming shift.
Junior SOC Analyst
ProSec Solution
City, STATE
04.2018 - 08.2020
Collaborate with technical and threat intelligence analysts to provide indications and warnings and contributes to predictive analysis of malicious activities
Create and track incidents and request remedy
Investigate all security alerts received by making use of all tools and log files possible to determine if the alert is a false positive, a security event, an actual attack, and/or a security incident
Monitor security events and logs such as proxy logs, IPS/IDS events, Firewall, Active Directory (user verification), Vulnerability scans, Anti-Malware events, Endpoints Security, Web Application Firewall, NetFlow, Packet Capture, Computer log files, to maintain situational awareness
Monitoring and analysis of security events to determine intrusion and malicious events using Fireeyes
Perform investigations and evaluations of network traffics, read and interpret logs, sniffer packets, and PCAP analysis using different tools
Perform investigations and evaluations of network traffics, read, and interpret logs, sniffer packets, and PCAP analysis with RSA Security analytics and Splung ES
Perform shift handoff at the end of every shift to provide situational awareness to the incoming shift.
System Technician/Network Tech
LGS Sky Chef Arlington
02.2016 - 03.2018
Administered day-to-day IT system operations, which includes handling service request, overseeing system functionality, administering system upgrades and data migration
Assist the Engineers in setting up and configuration of LAN/WAN/WLAN network devices
Escalate tickets to the appropriate group
Install different Access points in various locations according to blueprint
Involved in installation, maintenance, advance troubleshooting, and administration of existing network systems
Monitored system servers and desktop per acceptable use policy
Oversee all reports and documentation related to network equipment operations