| 20,000+ Fresh Resumes Monthly | |
|
|
| | Click here or scroll down to respond to this candidateCandidate's Name
PHONE NUMBER AVAILABLE EMAIL AVAILABLESUMMARYDynamic and skilled Cybersecurity Professional with expertise in leading incident response efforts and threat analysis. Leveraging a comprehensive understanding of attack signatures and advanced threat tactics, I aim to contribute to a team dedicated to safeguarding organizational assets and mitigating security risks, with the overall objective to ensure confidentiality, integrity and availability of the systems. SKILLS Malware Analysis/Endpoint Security Incident Response Cyber Threat Intelligence Data Loss Prevention/Anti-Phishing Wireshark/IBM Big Fix Vulnerability Assessment & Management Network Security Protocols/ TCP/IP Cyber kill chain Threat Hunting Mitre Attack Framework Nessus Splunk ES/Splunk SOAR/Logz.io/UES Rapid7 InsightIDR, R7 InsightVM & R7 InsightConnect ServiceNow/Jira/Swimelane CrowdStrike/SentinelOne/Salt Security/Demisto XSOAR Palo alto/Cisco/Fortinet Linux/Windows/MacOS Active Directory/Microsoft Office (O365) VirusTotal, DomainTools, IP/URLvoid, IBM X-Force EDUCATION & CERTIFICATIONS/AWARDs Certified Ethical Hacker (CEH) - Certification Certified CompTIA CySA+ (Cyber Security Analyst). - Certification Certified AWS Cloud Practitioner (CLF C01) - Certification Splunk Core Certified Power User (SPLK-1002) - Certification Cybersecurity essentials Cisco Badge Networking Essentials Cisco Badge NDG Linux Essentials Cisco Certificate of completion. Packet Tracer Cisco Certificate of completion Per Scholas Cyber Security Analyst Certificate of Completion Bachelor of Agriculture - Obafemi Awolowo University, Ile-Ife. Nigeria. 2008 PROFESSIONAL EXPERIENCEPage 1 of 3Candidate's Name
PHONE NUMBER AVAILABLE EMAIL AVAILABLECelsius Network LLC. (Kforce Inc.)SOC Analyst March 2023 Present Monitoring systems, identifying, studying and resolving all instances/events reported by various users. Leading a team of Incident Handlers/Analysts, providing supervision, guidance, and mentorship to ensure efficient incident response analysis. Investigated, coordinated, resolved, and reported security incidents escalated or identified, ensuring timely and effective response to mitigate potential risks. Monitoring, analyzing and interpreting network traffic alert using Logz.io Experience researching emerging cyber threats to understand and present hacker methods and tactics system vulnerabilities, and indicators of compromise Completed complex analysis of artifacts collected during security incidents and forensic investigations, extracting actionable intelligence to enhance threat detection and response capabilities. Performing endpoint investigations using falcon Crowdstrike Responsible for detecting successful and unsuccessful intrusion attempts through analysis of relevant event logs and supporting data sources by utilizing SIEM tools such as Logz.io and Salt Security Continuously monitor the network, systems, and applications for any security incidents, suspicious activities, or vulnerabilities. Respond to security incidents promptly, investigate their nature and impact, and take appropriate actions to contain, mitigate, and resolve them. Stay updated on the latest security threats, vulnerabilities, and attack techniques to proactively identify potential risks and enhance the organization's security posture. Document and track security incidents, maintain incident response procedures, and provide reports on incident trends, root causes, and resolution status. Analyze security events and alerts generated by various security monitoring tools, identify patterns, trends, or anomalies that may indicate potential security breaches or attacks. Contribute to the development, implementation, and enforcement of security policies, standards, and procedures to ensure compliance with industry regulations and best practices. Prepare detailed incident reports, including incident analysis, impact assessment, and recommendations for improving the security infrastructure and incident response processes. Collaborate with other teams within the organization, such as network operations, system administrators, and application developers, to ensure a coordinated approach to security and effective incident response. Page 2 of 3Candidate's Name
PHONE NUMBER AVAILABLE EMAIL AVAILABLEPitch Technologies ConsultingSOC Analyst February 2019 March 2023 Consistently monitoring and working on alerts generating on Splunk Assisting in creating Splunk dashboards to capture all customized logs generated by systems and applications Assisting in creating new use cases and performing SOC testing Creating and updating SOC run books as required Conducted proactive threat hunting operations within SIEM and other relevant tools, collaborating with partner organizations to identify and neutralize potential threats. Collaborated with server owners, system custodians, and IT contacts to pursue security incident response activities, including artifact collection, containment, and remediation actions. Giving client recommendations on how to securely resolve escalated issues Training new employees on how to handle investigations and safely deal with phishing emails Developing follow-up action plans to resolve reportable issues and communicating with other IT teams to address security threats and incidents accordingly Escalating incidents to incident response and forensic analysts for further analysis Supporting Incident Response till resolution following Standard Operation Procedures (SOP) Prioritizing and differentiating between potential intrusion attempts and false alarms Assisting with the development of processes and procedures to improve incident response times, analysis of incidents, and overall, SOC functions Responding to computer security incidents by collecting, analyzing, preserving digital evidence Delight Colors LTD, Lagos. NigeriaIT Support Analyst April 2010 July 2018 Troubleshooting endpoints, monitored network performance to determine if Adjustments were required Planned and recommended network hardware, systems management software and architecture Recommended modifications of basic IT systems to improve and simplify business systems and reduce operating cost Responsibility for network planning, design, security, and optimization Installed/Reimaged, configured and maintained staff computers, file servers, ethernet networks and network cabling Established and developed procedures for proper utilization of IT technology Developed strategies and direction for network systems solutions Implemented and maintains security strategies for internal network Ensured maximum system uptime by performing routine/preventative maintenance tasks Tested new software for bugs before deployment/provisioning Page 3 of 3 |