Summary
Overview
Work History
Education
Skills
Certification
Timeline
Generic

Simon Samaniego III

Longs,South Carolina

Summary

An enterprising and intelligent professional with over 6 years of experience in performing research, analysis, and testing of network, systems, and industrial controls to mitigate risk to the infrastructure as well as apply metrics of operation of security controls, apparent attacks, breaches, and other pertinent data. Prominent in developing, analyzing, and evaluating new and innovative security concepts, approaches, methodologies, techniques, services, guidance, training, and policies which constructively and proactively transform the information security posture of all departments. Efficient in managing information security projects or security-related aspects of other IT projects to ensure the completion of milestones in appropriate order, according to schedule and prepare justifications for budget requests. Skilled in facilitating project meetings, educating project stakeholders about security concepts, and creating supporting methodologies and templates to meet security requirements & controls.

Professional cybersecurity specialist skilled in threat analysis, network security, and incident response. Strong focus on team collaboration and achieving results, adapting to changing needs seamlessly. Known for robust problem-solving abilities, strategic thinking, and effective communication. Expertise includes risk management, vulnerability assessments, and regulatory compliance.

Knowledgeable Threat Hunter with strong foundation in cybersecurity threat analysis and risk mitigation. Successfully identified and resolved vulnerabilities in complex systems, ensuring highest standards of data protection. Demonstrated expertise in network security and incident response, consistently maintaining secure environments.

Overview

10
10
years of professional experience
1
1
Certification

Work History

Cyber Security Analyst

Non-Disclosure Agreement
05.2016 - 05.2023
  • Administer business role management, access request, data access, access certification management and implement Data Loss Prevention strategy to protect confidential information from exposure to potential perpetrators
  • Determine proficiency of data handling solutions and triage mitigation protocols as well as safeguard compliance with previously outlined solutions by including servers and users to network security files
  • Facilitate Microsoft Active Directory Content Pack and Elastic Stack for visualizing data and detecting anomalies and sort through logs
  • Offer IT Security Consulting and employ Alien Vault dashboard and Carbon Black for leading data breach progress in organization legacy networks to mitigate ransomware
  • Engage in Network Intrusion Detection Systems (NIDS) and Intrusion Prevention Systems (IPSs) software and perform supervision through Windows Event Log integration
  • Approaches Used: NIST SP 800-37, Rev 1.0, NIST SP 800-53 Rev 4, NIST SP 800-137 and FedRAMP, Splunk forwarder, indexer, and search head; Palo Alto Networks Unit 42, IaaS: AWS, Microsoft Azure
  • Analyzed security incidents post-resolution, identifying areas for improvement in both technical controls and incident response processes.
  • Improved incident response times by developing and maintaining cybersecurity playbooks for common attack scenarios.
  • Performed regular reviews of user access rights, minimizing the risk posed by insider threats or compromised accounts.
  • Optimized security monitoring processes by implementing automated tools for real-time threat detection and analysis.
  • Reduced false positive alerts in security monitoring systems by fine-tuning detection parameters, enhancing operational efficiency.
  • Led cybersecurity awareness training sessions, increasing staff vigilance against phishing and social engineering attacks.

Chief Information Security Officer

Cybersecurity Capstone University Of Maryland University College
01.2016 - 04.2016
  • Involved in the assessing of breaches and mitigation strategies for cyber infrastructure of the assigned companies among federal agencies and private sector enterprises by leading team of six classmates
  • Recognized perpetrators with the Evidence Cache Folder by utilizing EnCase techniques to perform cyber investigation of the federal agencies
  • Suggested effectual responses and identification of security breaches by verifying federal and private sector security architecture policies and procedures with two classmates
  • Ensured the security policies and programs were in compliance with federal agencies' relevant laws, regulations, and policies to minimize and eliminate risk, and audit findings with entire team of six classmates
  • Created and managed information security and risk management awareness training programs for all employees, contractors and approved system users at the assigned federal agencies and private sector organizations
  • Directed security services and safety functions to align key processes with goals and objectives of assigned companies for regulatory compliance with NIST Cybersecurity Framework

Digital Forensics Investigator/Cyber Incident Analyst

University Of Maryland University College Cyber Security Curriculum
01.2015 - 12.2015
  • Chronicled breach viruses, command and controlled metastasis through proprietary networks by superintending private sector enterprises with VPN class assignments
  • Employed Cisco Virtual Private Network and UNIX architecture for scrutinizing computer operating systems vulnerabilities and replace breach scenarios with effectual responses
  • Performed assessment of risks presented by the activity and conducted investigation by applying the appropriate investigative techniques
  • Partnered with Internal Investigations, Legal and line management to offer recommendations for employment decisions based on the results of the investigation
  • Analyzed and tracked process to support development of processes for the identification, refinement, and prioritization methodology of Cyber requirements
  • Case Studies included: LAN/WAN Networking, Windows Forensic Investigations, Firewalls and Database Servers, Web and Mail Servers, General Systems Design of Cyber Infrastructure Networks for mobile device forensics for two classes

Cyber Crime Investigator

University Of Maryland University College Cyber Security Curriculum
08.2013 - 12.2014
  • Generated practical malware analysis, digital crime scene investigations, and cyber power & national security case studies of nation states such as China, Russia, and Iran in two classes
  • Attained computer incident response case studies from mobile devices, personal computers to servers and proprietary networks used in private enterprise and state governments for two classes
  • Designed, developed, and improved technical products used to facilitate cyber-crime investigations; managed multiple research projects while effectively prioritizing time based on team priorities class assignments
  • Provided technical onsite support to incident response and evidence seizure activities, maintained chain-of-custody for digital evidence on forensic capabilities for operational security concerns, and analyzed malware as class assignments

Education

Master of Science - Cyber Security, Digital Forensics and Cyber Investigation

University of Maryland University College
Adelphi, Maryland
04.2016

Master of Public Administration - Personnel and Budgeting

California State University, East Bay
Hayward, California
06.1991

Bachelor of Arts - Psychology

San Francisco State University
San Francisco, California
12.1983

Skills

  • IT Security Consulting
  • Business Role Management
  • Access Request
  • Access Certification Management
  • Windows Event Log Integration
  • Data Loss Prevention (DLP) Strategy
  • Ransomware Mitigation
  • Data Handling Solutions
  • Triage Mitigation Protocols
  • Network Intrusion Detection Systems (NIDS)
  • NIST SP 800-37
  • NIST SP 800-53 Rev 4
  • NIST SP 800-137
  • Fed RAMP Approaches
  • UNIX Architecture
  • Windows Forensic Investigations
  • LAN/WAN Networking
  • Carbon Black Endpoint Security
  • EnCase 7
  • Cisco Virtual Private Network
  • MFA
  • Risk assessment
  • Incident response
  • Digital forensics
  • Network security

Certification

EC-Council Certified Ethical Hacker Certification Courseware, 02/01/23, 03/17/24

Timeline

Cyber Security Analyst

Non-Disclosure Agreement
05.2016 - 05.2023

Chief Information Security Officer

Cybersecurity Capstone University Of Maryland University College
01.2016 - 04.2016

Digital Forensics Investigator/Cyber Incident Analyst

University Of Maryland University College Cyber Security Curriculum
01.2015 - 12.2015

Cyber Crime Investigator

University Of Maryland University College Cyber Security Curriculum
08.2013 - 12.2014
EC-Council Certified Ethical Hacker Certification Courseware, 02/01/23, 03/17/24

Master of Science - Cyber Security, Digital Forensics and Cyber Investigation

University of Maryland University College

Master of Public Administration - Personnel and Budgeting

California State University, East Bay

Bachelor of Arts - Psychology

San Francisco State University
Simon Samaniego III