
Experienced Cyber Security Analyst with 3 years of experience, specializing in information security, network security and endpoint security. Skilled in threat and malware analysis, phishing investigations, and incident response. Proficient in managing SIEM, SOAR, EDR, and email security platforms. Committed to staying updated on industry standards and ensuring thorough analysis and timely resolution of security events. Thrives in fast-paced environments, excelling in problem-solving and collaboration. Seeking to leverage expertise in security operations, incident response, and risk management to contribute effectively.
•Reduced critical vulnerabilities requiring patching by 60% through vulnerability scans using Qualys and Burp Suite Pro. This significantly reduced the organizations attack surface.
•Utilized and maintained SIEM, IDS, and IPS tools, in addition to drafting compliance guidelines. This resulted in a 45% decline in identified workplace threats, bolstering network security holistically.
•Engaged in continuous monitoring of threat intelligence outlets such as MITRE ATT&CK and IBM X-Force, adjusting correlation rules to detect emerging threats. This ensured the security posture stayed current in the face of evolving dangers.
•Implemented and optimized network segmentation strategies, isolating critical assets and sensitive data from potential threats, thus enhancing overall network resilience and minimizing the risk of lateral movement by malicious actors.
•Monitored network activity using IBM QRadar, investigating security events. This proactive method enhanced application security and led to the detection of 40% more incidents.
•Utilized advanced frameworks such as the Cyber Kill Chain and MITRE ATT&CK to identify insider threats at an earlier stage, resulting in a 40% enhancement in detection and mitigating potential risks.
•Built a program (Python, HTML/CSS, Django) that uses machine learning to automatically detect DDoS attacks by constantly monitoring network traffic for suspicious activity.
•Performed in-depth security checks (penetration tests) that found and fixed weaknesses, reducing potential security breaches by 30%. Used top tools (Burp Suite, OWASP ZAP) to find these issues 25% more effectively.
•Created detailed reports on security weaknesses with clear instructions to fix them, helping improve security faster. Also provided round-the-clock support to clients via email and phone.
•Created a user-friendly web app (Java) that made managing users 20% faster and the app itself run 15% smoother by using a special code trick vitality ranking algorithm.
Technical Skills: Network Security, Information Security Principles Governance, Risk and Compliance, Data Protection, Cybersecurity Operations, Security Metrics Generation, Vulnerability Assessment and Management, System Administration, Penetration Testing, Risk Assessment and Mitigation, Endpoint Security, Cybersecurity Awareness & Training, Troubleshooting, Computer Network Defense (CND), Security Incident Response, Disaster Recovery, Security Information and Event Management (SIEM), IDS/IPS, Encryption Methods, Malware Analysis, Firewalls
Languages: Python, PowerShell, Linux, Active Directory, Google Workspace, Microsoft Office Suite, Windows OS, Mac OS
Tools: Splunk ES, IBM QRadar, Nessus, Tenableio, Acunetix, Burp Suite Pro, SentinelOne, Qualys, Proofpoint, Jira
Security Frameworks and Compliance: ISO/IEC 27001, PCI DSS, HIPAA, SSL/TLS, SSH, VPN, MITRE ATT&CK, Cyber Kill Chain, Defense in Depth, NIST Cybersecurity Framework, RMF
CompTIA Security+ Certified.
Google Cybersecurity Professional Certificate.
CWAPT – Certified Web Application Penetration Tester.
CEH – Certified Ethical Hacker.
Palo Alto Networks Cybersecurity Foundations.