Highly skilled and dedicated cybersecurity analyst with 5+ years of experience in protecting organizations against evolving cyber threats. My expertise lies in proactive monitoring, incident response, vulnerability management, and security controls implementation.
Throughout my career, I have honed my skills in detecting and mitigating security incidents, ensuring the confidentiality, integrity, and availability of critical systems and data. I possess a deep understanding of SIEM tools such as Splunk and ArcSight, leveraging log and packet analysis to swiftly identify and respond to potential threats.
• Perform proactive monitoring, investigation, and mitigation of security incidents. • Analyze network security event data from IDS and SIEM tools. • Conduct static analysis of malware on isolated virtual servers. • Identify and analyze potential intrusion attempts and compromises, reviewing event details and summaries. • Enforce organizational security policies and protect networks, systems, and applications through technical measures. • Investigate phishing emails, domains, and IPs using Open-Source tools and recommend appropriate blocking actions. • Research emerging threats and vulnerabilities that may impact the monitored environment. • Analyze logs using Splunk for security incident detection and analysis. • Identify suspicious or malicious activities and codes. • Monitor and analyze security events to identify intrusion attempts and malicious events. • Search logs for firewall, email, web, or DNS to detect and mitigate intrusion attempts. • Implemented Cofense PhishMe Report Phishing button in Outlook and responded to phishing attacks. • Automated phishing reports using Rules and Recipes in the Cofense PhishMe portal. • Conducted analysis of files, domains, and emails using tools like Wireshark and online resources. • Used Bluecoat and EOP to identify suspicious web and email traffic. • Monitored Intrusion Detection Systems and ArcSight channels for threats and vulnerabilities. • Assess incident severity and escalate as necessary. • Conducted malware and forensic analysis of security incidents. • Monitor and analyze logs from security and industrial appliances like ArcSight Logger. • Identify and remediate threats and vulnerabilities in collaboration with incident response (IR) team. • Work closely with IR team in cases of account compromises.
• Assisted in designing and implementing information security controls in computing systems, applications, and network software/hardware. • Assisted in deploying and maintaining various network security systems such as firewalls, intrusion detection systems, virtual private networks, antivirus, antispam, and web filters. • Collaborated in the architectural design and implementation of the enterprise network infrastructure. • Conducted internal network security audits using standard tools and processes. • Managed system and network documentation, addressing, diagrams, and account information. • Contributed to capacity planning and proactive identification of network needs. • Coordinated with IT vendors for product evaluations and quotations. • Supported the design, implementation, testing, and maintenance of disaster recovery solutions. • Provided monitoring, support, and maintenance for production applications and databases. • Conducted network monitoring, server administration, performance tuning, and troubleshooting. • Ensured timely application of critical security patches and service packs on servers and network components. • Participated in policy and standard development in areas such as network security, business continuity, data backup, access control, and daily administration. • Assessed Internet-wide security threats and their impact on local systems. • Planned and implemented infrastructure additions, upgrades, and modifications in coordination with corporate leadership. • Consulted with stakeholders to evaluate, recommend, and implement system, network, and procedural improvements aligned with industry technologies. • Undertook other assigned duties as required.
Improved company systems setup by implementing automated server generation routines, optimizing system performance, applying upgrades/patches, implementing system monitoring, and maintaining security protocols. • Ensured that all server hardware, operating systems, software, and procedures aligned with organizational standards and strategic business plan. • Upgraded NetBackup schedule and Oracle servers, resulting in improved system availability and scalability to support business growth. • Enhanced team productivity by automating repetitive tasks using batch files, PowerShell, VBScript, and WMI. • Served as the escalation point for troubleshooting complex network and systems issues, consistently achieving 100% issue-resolution scores through exceptional customer service. • Conducted training for employees from various departments on network operations, including log-in procedures, network management software, permissions, printing issues, security, and software usage.
Erecting firewalls
undefinedI like exploring new places, socializing, playing sports and working out