| 20,000+ Fresh Resumes Monthly | |
|
|
| | Click here or scroll down to respond to this candidate Candidate's Name
Cyber Security Engineer
Location: Edison, NJ Street Address | Email: EMAIL AVAILABLE | Phone: PHONE NUMBER AVAILABLE | Linkedin
Summary:
3+ years of hands-on experience in the field of Information Technology, specializing in Cyber Security, and Software
Quality Assurance with both Mobile and Web-based applications.
Expertise in conducting Vulnerability assessments using tools like Metasploit to profile an app for vulnerabilities
and then exploit those vulnerabilities.
Configure mechanisms on a virtual network, deploy them to the cloud, and investigate cloud security risks.
Good knowledge of writing bash scripts to automate security and operating system tasks.
Quality-driven, positive team player who always looks for efficiency and accuracy.
Enjoy learning new technologies and challenging concepts and Passionate about Cyber Security.
Skilled Cyber Security Analyst with expertise in risk management of unauthorized access viruses and a wide range
of vulnerabilities and threats.
Develop and implement a toolkit using Bash.
Proficient with various operating systems like Linux (Kali) with Windows.
Experience working with network security monitoring tools using SIEM or IDS/IPS technologies (Splunk, Wireshark,
Metasploit, Kibana, etc.)
Expertise in Cybersecurity & Information Assurance with a good understanding of Cryptography, Vulnerability
Assessment, Cloud Security & Virtualization, and Identity Access Management.
Creating/editing Bash scripts to automate tasks.
Management of Cloud security, Vulnerability assessment, and Security audits.
Great written/oral communication, asset ownership, policies, procedures, data management, DLP & zero trust model.
Expert in Vulnerability Assessment using Nessus tool to evaluate attack vectors, identify system vulnerabilities and
develop remediation plans and security procedures.
Skills:
Languages Bash Scripting, Shell Scripting, Splunk Processing Language (SPL) and Python
Framework NIST and HIPPA
Tools Nessus, Splunk, Nmap, Firewalls, Wire shark, CSAM, Microsoft Office Suite, VLANs, DNS,
DHCP, TCP/IP, IPV4/IPV6, IDS/IPS, CSAM and EMASS
Security Information & SIEM tools, Splunk Enterprise Security, McAfee Web proxy, IronPort, Cisco Sourcefire,
Management Tools Splunk, McAfee DLP, Symantec DLP, Google DLP, Nessus Security Center, Wireshark,
Palo Alto and Crowd Strike
Others Azure Cloud, Zero Trust, Networking (Routers & Switches), Encryption, Scanning web
vulnerability, Network defenses Network security monitoring, and Detecting network
intrusions
Operating System Windows, Mac OS, UNIX and Linux (Kali and Ubuntu)
Experience:
ACL Digital, USA
Cyber Security Analyst | Jan 2022 to Present
Analyze daily reports, generated by Wireshark and Nessus.
Monitoring and interpretation of threats using the IDS and SIEM.
Document all activities during an incident and provide support and status updates during the life cycle incident.
Investigate malicious phishing emails, domains, and IPS using open-source tools and recommend proper blocking-
based analysis.
Provide day-to-day operational guidance to the team to ensure required tasks & service requests are completed.
Develop after-action reports including root cause analysis.
Monitoring security controls using SRD and Splunk.
Experience implementing/architecting cloud-based Active Directory solutions for Azure
Worked on projects moving to cloud services such as Azure, Office 365
Downloading weekly security vulnerability reports from Tableau, analyzing data using Excel, and presenting it to
the team.
Implemented security ACL, IP Sec, VPN, TACACS+, and RADIUS+.
Provided Tier 1 and Tier 2 incident analysis and response support for real-time events generated by security devices,
as well as possible post-incident support.
Worked in a 24x7 Security Operations Center.
Monitoring and analysis of security events to determine intrusion and malicious events.
Identify suspicious/malicious activities or codes.
Maintain & modify hardware/software components, content & documentation. Azure O365 Advance Threat Protection.
Extensive experience in Cloud and On-Prem (Hybrid) environments, Azure Cloud security experience.
Responsible for incident response work including analyzing security events, identifying false positives vs. real
threats, identifying host involvement, comparing scan results, analyzing Splunk logs & prioritizing incidents/events.
Research new and evolving threats and vulnerabilities with the potential to impact the monitored environment.
Ensure integrity and protection of networks, systems, and applications by technical enforcement of organizational
security policies, through monitoring of vulnerability scanning devices.
Consulted security architecture using the Zero Trust model on Azure and on-premises by using least privilege across
these applications.
Recognize potential, successful, and unsuccessful intrusion attempts, compromises thorough reviews & analyses of
relevant event detail and summary information.
Assist with the development of processes and procedures to improve incident response times, analysis of incident,
and overall SOC functions.
At-Bay, USA
SOC Analyst | Jun 2020 to Dec 2021
Analyzed, investigated & processed Malicious/Phishing Email alerts from IronPort & FireEye following standard
operation procedure.
Worked closely with other teams to support incident management processes.
Provided Incident Response (IR) support when analysis confirms actionable incident.
Monitored systems and networks for intrusions or security breaches.
Reviewed and processed accidental disclosure requests following standard operating procedures.
Partake in the Composition of security alert notifications and other communications.
Used Cisco Source fire to monitor network traffic to ensure malicious network traffic is dropped.
Reported and coordinated with external organizations and authorities.
Coordinated and distributed directives, vulnerability, and threat advisories to identified consumers.
Collaborated with lead investigators into breaches that occur.
Process Web Site Review Requests using McAfee Web Gateway GUI to grant temporal Web Access to users within
the Company to websites that are being blocked for security.
Block malicious domains, Hashes, Files, and IPs following the company's Standard Operating Procedures.
Trained or educated network users on information security.
Continually developed new use cases for automation and tuning of security tools.
Led, performed, reviewed, or tracked security incident investigations to resolution.
Used McAfee DLP Manager to protect intellectual property and ensure compliance by safeguarding sensitive data.
Led, performed, or reviewed root cause analysis efforts following incident recovery.
Developed follow-up action plans to resolve reportable issues and communicate with other Analysts to address
security threats and incidents.
Contributed to security strategy & security posture by identify security gaps, and evaluate & implement enhancements.
Prioritized and differentiated between potential intrusion attempts and false alarms.
Education:
Bachelor of Science: Information Technology from William Paterson University of New Jersey, NJ
CompTIA Security+ Certificate
AWS Developer Certificate
|