Quantcast

Soc Analyst Cyber Security Resume Rockwa...
Resumes | Register

Candidate Information
Name Available: Register for Free
Title Soc Analyst Cyber Security
Target Location US-TX-Rockwall
Email Available with paid plan
Phone Available with paid plan
20,000+ Fresh Resumes Monthly
    View Phone Numbers
    Receive Resume E-mail Alerts
    Post Jobs Free
    Link your Free Jobs Page
    ... and much more

Register on Jobvertise Free

Search 2 million Resumes
Keywords:
City or Zip:
Related Resumes

Cyber Security Threat Analyst McKinney, TX

Soc Analyst Network Engineer Dallas, TX

Cyber Security Analyst Dallas, TX

Cybersecurity Analyst Security Allen, TX

Cybersecurity Analyst Risk Management Forney, TX

Cyber Security Cybersecurity Analyst Dallas, TX

Information Systems Cybersecurity Analyst Carrollton, TX

Click here or scroll down to respond to this candidate
Candidate's Name
Cyber Security Specialist SOC Analyst Malware AnalystPhone: PHONE NUMBER AVAILABLERockwall, United StatesSUMMARY@ EMAIL AVAILABLE LINKEDIN LINK AVAILABLE Dynamic IT professional with 4 years of IT experience which includes 2 years of experience as a SOC Analyst. Demonstrated ability to utilize SIEM and OSINT tools to monitor, investigate, analyze, and respond to security events on network, application, and endpoint. I have a Graduate Certicate in Cybersecurity Technology (University of Maryland Global Campus), CompTIA Security+, Certied in Cybersecurity (CC), and Google Cybersecurity Professional Certicate. At the University of Maryland Global Campus, I am presently pursuing a master's degree in cybersecurity technology. I am seeking an entry- level position to leverage the knowledge I have acquired about protecting organizations from cyber threats. Detail-oriented, quick learner committed to staying up to date on cybersecurity trends and technologies. I can be a great contribution to security posture of your organization.SKILLSEXPERIENCESOC Analyst (Level-I)Securitas USA11/2022 till present Dallas, TX Actively engaged in real-time log analytics of ICT assets such as Firewalls, IDS, IPS, Operating Systems (Microsoft Windows, Linux, UNIX, and Solaris etc.), system applications, databases, web servers, and network devices scattered across multiple remote site. Reviewing Organizations Log Collection and retention policy based for real-time log traffic analysis on periodic basis. Responsible for security monitoring of networks, web sites, applications, databases, servers, data centers and other infrastructures to protect them from cyber threats. Report security incidents using ServiceNow ticketing system for events that signal an incident and require Tier 3 Incident Response review. Perform triage on alerts by determining their criticality and scope of impact. Investigate, analyze, and process endpoint alerts using SIEM tools; Crowstrike McAfee Antivirus, Mcaffee ePO, Cylance, Splunk Enterprise Security (IBM QRadar) and OSINT tools. Review and collect asset data; indicators of compromise, logs, configurations and running processes, on these systems for further investigation and reporting. Involved in planning and implementing preventative security measures and in building incident response and disaster recovery plans. Investigate, analyze, and process phishing email alerts from Proofpoint following standard operating procedures. Evaluate and process Web Site Review Requests from internal users to access blocked websites using OSINT tools. Perform proactive hunting for threats and using threat intelligent tools like Strike Ready to uncover threats that may have escaped the monitoring system. Actively engaged in round the clock monitoring and investigation of SOC Level-I security incidents [detection & response]. Escalating the security incidents to SOC Level-II after initial triage. Engaged with Incident Handling & Response Procedures (IHRPs) team (SIEM Managers, Threat Hunters & Senior SOC Analysts) to optimize CERT plan of the organization. Extracting & sharing IOCs with concerned ICT stakeholders for robust containment & remediation of sophisticated cyber- attacks on critical ICT infrastructure. Demonstrated skills in Statics, Dynamic and Automated Advance Malware Analysis. Hands of experience on secure malware sample extractions, diffusing obfuscations techniques, string analysis, behavioral and heuristic analysis, identification of Command and Control (C& C) communication points, API calls, DLL analysis, regshots and IOCs extraction. Expertise in customized and commercial automated sandboxing using enterprise level solutions (TrendMicro DDAN, Cuckoo [Open Source] etc). Analyze and resolve DLP alerts from McAfee DLP Manager and escalate True Positive PII incident to the Privacy Team for further investigation and action. Work incidents from initial assignment to final resolution. Investigate, interpret, and respond to complex security incidents. Fully document assigned tickets to show all work performed to pass SLRs. Develop and conduct weekly targeting training for the SOC team. Assist with the creation of the daily SOC report and brief customer, as necessary. IBM QRadar Dynamic & Automated Malware Analysis Static Malware Analysis Incident Response Network Defense MITE ATT&CK Framework Custom Parsing & correlation Yara Rules ISO 27001 Wireshark, ProcMon, PeStudio, Strings, Regshots, ProcessHacker, Fakenet NIST Log Analytics Endpoint MonitoringSOC Analyst (Level-I)Jendiz Furniture03/2019  11/2022 Dallas, TX Monitored and analyzed events with a Security Information Event Monitoring (SIEM) system. Review alerts generated by detection infrastructure for false positive alerts and modify alerts as needed. Responsible for documenting incident, conducting, escalation and providing support during cyber incidents. Demonstrated knowledge of networking (TCP/IP, topology, and security), operating systems (Windows/UNIX) and web technologies (IIS, Apache). Performed site review request. experience in incident response oversight, continuous monitoring, risk analysis, and continuous risk assessments. Demonstrating record of monitoring and managing vulnerabilities, best practices, enhancing organization trainings, certifications, and providing leadership, guidance and consultation as needed. Comfortable and capable of executing project plans, communicating recommendations and status to leadership Ensuring proper measures and documentation are completed when an information and incident or vulnerability is discovered. Lead incident response activities, interface with enterprise SOC, management, and system administrators, recommend and institute preventative measures, identify causes of any breach, contain the breach, and direct recovery actions of a breach. EDUCATIONMaster of Science: Cyber Security TechnologyUniversity of Maryland Global Campus07/2023 - 12/2024 MarylandGraduate Certificate: Cyber Security TechnologyUniversity of Maryland Global Campus07/2023 - 03/2024 MarylandBachelor of Science: Common LawUniversity of Yaound 209/2011 - 09/2011 Yaound CameroonThe GRC Approach to Managing CybersecurityUniversity System of Georgia12/2023 - 12/2023 GeorgiaCERTIFICATIONSCompTIA Security +10/2023Certified in Cyber Security (CC)+09/2023Google Cyber Security Professional Certificate (Coursera) 08/2023A GRC Approach to Manage Cyber Security by University Systems Gerogia 12/2023ReferencesReferences will be provided on organizations request

Respond to this candidate
Your Message
Please type the code shown in the image:

Note: Responding to this resume will create an account on our partner site postjobfree.com
Register for Free on Jobvertise