IT Documentation and Operations Analyst / Technical Writer
Equifax
12.2014 - 12.2021
Collaborated with Global Security teams to create comprehensive documentation and playbooks using Confluence, Jira, and SharePoint, improving process efficiency
Managed version control and access rights, reducing documentation errors by 20% and enhancing compliance across teams by 25%
Streamlined processes and workflows for Incident Response, SOC, and IT Security, leveraging Google Workspace and Microsoft Office Suite for real-time collaborative editing, resulting in a 15% improvement in knowledge sharing and compliance across 5 teams
Established and implemented an operational playbook with over 30 Standard Operating Procedures (SOPs) for a multi-tiered Security Operations Center (SOC), enhancing incident response efficiency for phishing attacks, malware infections, and data loss prevention by 34%
Developed and led over 20 training sessions on protocols and workflows, serving as the primary liaison for updates, inquiries, and document management.
E-Discovery Specialist
Equifax
01.2020 - 11.2021
Executed forensic collections and comprehensive analysis on over 250 company assets across MacOS, Windows, Unix/Linux, iOS, and Android platforms, utilizing EnCase and FTK, leading to a 91% success rate in accurate data retrieval and preservation
Managed a time-sensitive eDiscovery project to preserve data from Android and iPhone devices for over 160 personnel on legal hold, utilizing FTK and Cellebrite for data collection
Coordinated notifications, scheduling, collection, and return of devices ahead of a critical software rollout, achieving a 95% compliance rate within 45 days while ensuring data integrity and adherence to legal and operational deadlines
Engineered and implemented over 10 eDiscovery data collection protocols using EnCase, Relativity, and FTK, optimizing workflows to reduce data retrieval time by 17% and enhancing data preservation accuracy by 26% while ensuring strict legal and regulatory compliance
Partnered with legal counsel to develop and implement legal hold and data preservation strategies, leveraging digital forensics and data collection techniques to mitigate risks and ensure adherence to regulatory requirements.
Cyber Security Operations
Equifax
01.2015 - 01.2020
Equifax powers the financial future of individuals and organizations around the world
Using the combined strength of unique trusted data, technology and innovative analytics, Equifax has grown from a consumer credit company into a leading provider of insights and knowledge that helps its customers make informed decisions
The company organizes, assimilates and analyzes data on more than 820 million consumers and more than 91 million businesses worldwide, and its database includes employee data contributed from more than 5,000 employers.
Incident Response / Cyber Security Analyst
Equifax
12.2014 - 01.2019
Proactively identified and mitigated initial indicators of compromise (IOCs) during the Equifax breach (2017), utilizing Splunk and QRadar to monitor over 40 compromised systems, effectively preventing further data loss and minimizing the impact of the breach
Coordinated with 7 cross-functional teams to develop and implement an incident response strategy, integrating threat analysis, rapid containment, and recovery protocols, significantly reducing the breach impact
Standardized reporting templates and communication strategies for cybersecurity incidents, reducing time to acknowledge and respond by 18% and ensuring clear and concise communication to both technical teams and executive leadership during high-pressure situations
Built, implemented, and maintained a comprehensive reporting framework that delivered daily, weekly, and monthly security metrics, including incident response times, vulnerability remediation rates, and threat detection trends, enabling data-driven decision-making and continuous improvement of security operations
Developed and deployed automated scripts using Tanium, McAfee ePolicy Orchestrator (ePO), and FireEye HX, reducing incident detection and response times by 40%, which significantly boosted the efficiency and responsiveness of the Security Operations Center (SOC)
Achieved 98% endpoint compliance within 48 hours by using Tanium to rapidly deploy security patches and configuration changes across 10,000+ devices
Reduced false positives by 35% through fine-tuning rules and alerts in FireEye, Splunk, enhancing the accuracy of threat detection and response
Utilized Symantec, McAfee, and Forcepoint DLP to reduce unauthorized data transfers by 22% and enhance insider threat detection, resulting in a 31% increase in the identification of potential data exfiltration attempts through customized policies
Mitigated and contained over 150 security incidents annually using Splunk, IronPort, IBM QRadar, and Carbon Black, preventing escalation in 85% of cases, significantly reducing potential data breaches and enhancing incident response effectiveness.
Cyber Network Analyst /Security Operations
Broadcom
01.2014 - 01.2015
Respond and maintain Global FireEye Web and Mail (IDS) systems including patching, upgrades and alert response to closure
Led vulnerability and patch management program, utilizing Nexpose and other identification tools, to drive down the time to patch from quarterly to monthly based on risk analysis
Technical lead for Bash, Poodle and Heart Bleed 0 day threat remediation
Implement Intel Cyber Threat Feeds from DHS and DSIE into security controls and alerting mechanisms
Responsible for the analysis of the Phishing Email program which included basic reverse engineering of malware attachments and links utilizing Blue Coat/Norman G2
Implemented detective and preventive controls for identified malware and links in systems including Email, DNS, Email Gateways, (Ironport), Splunk, Websense, Bit9 and other security and incident response tools
Spearheaded 3rd party Penetration Testing program remediation
Reviewed all findings for validity and risk and developed a database to track and correlate over time insecure systems while expediting remediation
Point of Contact for all RSA, VPN Cisco Any Connect issues and security alerts
Led the migration from hard to soft tokens globally
Investigate Bit9 (IPS) alerts for potential adversarial activities
Detection, monitoring, analysis, resolution of security incidents; participate in providing containment recommendations
Respond to SIEM (Splunk) alerting and correlations to drive down time to identify and contain
Participate in the security incident handling efforts in response to a detected incident
Developed and Maintained clear and concise technical manuals, standard operating procedures, user guides, and system documentation for various security tools and software
Maintain awareness of trends in security regulatory, technology, and operational requirements.
Support Service Technician
Broadcom
01.2004 - 01.2014
Senior Help Desk technician, provided 1st level phone support worldwide to Broadcom employees in a fast-paced, high-volume corporate environment
Provided 2nd level desk-side support and remote administration of PCs using Remote Desktop, Remote Access, and Carbon Copy
Tracked email request via Remedy ticketing system
Active Directory maintenance of domain user accounts, groups, and workstation accounts
Assisted in configuring Citrix MetaFrame accounts and client sessions
Provided RSA SecurID token administration
Worked closely with Server administrators to implement Citrix, RSA SecurID token, and Exchange solutions
Assisted in setup and configuration of iPhone and Android devices.
Information Management Officer/ Network Administrator
U.S. Army
01.2001 - 01.2004
Systems Administrator/ Technical Support Specialist
U.S. Army
01.1998 - 01.2001
Signal Support System Specialist
U.S. Army
01.1997 - 01.2001
Education
H.S. Diploma -
Lakewood High School
01.1996
Skills
Endpoint Protection & Response
Tanium
FireEye Endpoint Security (HX)
FireEye Endpoint Detection and Response
CrowdStrike Falcon
Carbon Black
Symantec Endpoint Protection
McAfee ePolicy Orchestrator (ePO)
Network Security
G2 Analyzer
VPN/AnyConnect
Websense (Forcepoint)
FireEye Network Security (NX)
Cisco Firepower
Palo Alto Networks
Cisco IDS/IPS
Cisco ASA
Security Information and Event Management (SIEM)
ArcSight
LogRhythm
Splunk
IBM QRadar
Vulnerability Management
Nessus
Qualys
Rapid7 Nexpose
Digital Forensics
Encase
Cellebrite
FTK (Forensic Toolkit)
Data Loss Prevention (DLP)
Symantec DLP
McAfee DLP
Forcepoint DLP
Threat Intelligence & Malware Analysis
MISP (Malware Information Sharing Platform)
FireEye Email Security (EX)
Wireshark
Collaboration & Documentation
Confluence
JIRA
SharePoint
ServiceNow
Remedy
Microsoft Suite
Google Workspace
Certification
Information Assurance Security Officer Course, 01/01/2001, U.S. Army, Fort Eustis, VA
Standardized COMSEC Custodian Course, 01/01/2000, U.S. Army, Vilseck, Germany
Internetworking TCP/IP for Windows NT 4.0, 01/01/2000, Aris, Ansbach, Germany
MS Windows NT Workstation 4.0, 01/01/1999, LAN Schaeffer, Ansbach, Germany
Installing and Configuring MS Windows NT Workstation 4.0, 01/01/1999, LAN Schaeffer, Ansbach, Germany
Advanced Military Training in Signal Support Systems, 01/01/1997, U.S. Army, Fort Gordon, GA
Desired Job
Security Operations/Analyst role in Atlanta, Georgia
References
Sheryl Hanchar, Broadcom Corporation, Director Information Security, 904-309-1822, shanchar@broadcom.com
Paul Krell, Broadcom Corporation, Manager/Lead Incident Response, 321-749-6775, paul.krell@broadcom.com
Timeline
E-Discovery Specialist
Equifax
01.2020 - 11.2021
Cyber Security Operations
Equifax
01.2015 - 01.2020
IT Documentation and Operations Analyst / Technical Writer
Equifax
12.2014 - 12.2021
Incident Response / Cyber Security Analyst
Equifax
12.2014 - 01.2019
Cyber Network Analyst /Security Operations
Broadcom
01.2014 - 01.2015
Support Service Technician
Broadcom
01.2004 - 01.2014
Information Management Officer/ Network Administrator
U.S. Army
01.2001 - 01.2004
Systems Administrator/ Technical Support Specialist