Quantcast

Incident Response Cyber Security Resume ...
Resumes | Register

Candidate Information
Name Available: Register for Free
Title Incident Response Cyber Security
Target Location US-GA-Atlanta
Email Available with paid plan
Phone Available with paid plan
20,000+ Fresh Resumes Monthly
    View Phone Numbers
    Receive Resume E-mail Alerts
    Post Jobs Free
    Link your Free Jobs Page
    ... and much more

Register on Jobvertise Free

Search 2 million Resumes
Keywords:
City or Zip:
Related Resumes
Click here or scroll down to respond to this candidate
Candidate's Name
EMAIL AVAILABLE  PHONE NUMBER AVAILABLEhttps://LINKEDIN LINK AVAILABLE  Atlanta, GACYBERSECURITY PROFESSIONALDynamic Cyber Security Professional with a proven track record in security incident response, event management, digital forensics, and threat intelligence. Demonstrated success with cross-functional stakeholders in the implementation, management, and administration of security tool stacks leveraging industry-leading technology and security frameworks. Adept at researching exploit techniques, performing vulnerability assessments, and integrating vulnerability management tools with other systems to enhance security posture.AREAS OF EXPERTISENetwork SecurityStakeholder EngagementThreat AnalysisIncidence ResponseChange ManagementSecurity Protocol DevelopmentThreat HuntingConfiguration ManagementSecurity AutomationCompliance and GovernanceSecurity Awareness TrainingAdvanced Security TechnologiesCollaboration and LeadershipContinuous ImprovementCloud SecurityData protection and EncryptionIdentity and Access ManagementApplication SecuritySecurity Information and Event ManagementEndpoint SecurityZero Trust ArchitecturePROFESSIONAL EXPERIENCECyberVergent 2020  2024Cybersecurity AnalystReviewed, monitored, and enhanced SIEM dashboards for clients using Qradar, AlientVault USM, Splunk, and ELK Stack, resulting in a 30% increase in event correlation efficiency.Led deployment, configuration, and monitoring of SentinelOne, Crowdstrike, Carbon Black, and Defender EDR agents across multiple client networks, ensuring 100% endpoint coverage and reducing incident response time by 20%.Conducted thorough investigations into security incidents, using real-time threat intelligence and threat hunting techniques, identifying root causes, and implementing corrective actions, reducing recurrence of similar incidents by 15%.Assessed and prioritized vulnerabilities based on business impact and exploitability using Tenable Nessus and Qualys, facilitating effective mitigation strategies that reduced high-risk vulnerabilities by 40%.Automated incident response and security processes using Fortinet FortiSOAR, decreasing manual intervention by 25% and improving response times.Provided detailed security metrics to management, measuring efficiencies of security controls and KPI initiatives, leading to a 20% improvement in security posture awareness.Automated redundant security operations for Linux and Windows using Python and Bash scripts, reducing operational workload by 30%.Managed email filtering and reputation-based controls using Proofpoint TAP and TRAP, successfully blocking or quarantining 95% of malicious emails before reaching end-users.Utilized sandboxes to enhance threat hunting and intelligence exercises, improving detection rates of advanced threats by 20%.Conducted comprehensive assessments and gap analyses to evaluate and ensure client compliance with NIST 800-61, NIST 800-53, and ISO standards, achieving 100% compliance.Managed design and implementation of cybersecurity infrastructure (firewalls, IDS/IPS, endpoint protection, SIEM solutions) for clients, ensuring 100% alignment with industry best practices and client requirements, resulting in a 25% increase in overall security effectiveness..Connect Marketing Services 2017  2019Cybersecurity AnalystManaged SOC incident response teams, overseeing detection, triage, and response processes for cybersecurity incidents, achieving an MTTR under 3 days, which reduced overall incident resolution time by 40%.Conducted Tier III analysis and triage for Connect Marketing's 24/7 SOC, identifying and mitigating high-severity threats, contributing to a 30% reduction in critical incidents.Implemented and configured AWS security services and policies (IAM, WAF, Security Groups, AWS Shield, AWS Security Hub), enhancing cloud security posture and reducing vulnerabilities by 25%.Managed Microsoft E5 tool stack for event management and response, including Defender and SentinelOne, improving threat detection and response efficiency by 20%.Implemented and maintained AWS cloud security controls and best practices, ensuring 100% compliance with industry standards and regulatory requirements, resulting in zero compliance-related incidents.Led integration of security stack tooling for log ingestion into the SIEM with third-party providers, enhancing continuous improvement of alert rule sets and event correlation, reducing false positives by 35%.Implemented KnowBe4's platform to streamline security awareness training delivery and tracking, resulting in a 60% decrease in user click rates on phishing emails.Maintained incident response playbooks, providing recommendations for tuning signatures, rules, alerts, and custom scripts, resulting in a 30% reduction in man-hours required for monitoring.Monitored and managed EDR tool (Carbon Black & Defender) alerting, configuration, and deployment on endpoints and servers, reducing malware incidents by 20%.Designed and managed user access provisioning and de-provisioning processes, including user lifecycle management, RBAC, and entitlement management, improving access control efficiency by 25%.Provided guidance on secure cloud architecture design and implementation, considering data encryption, network segmentation, and disaster recovery, resulting in a 20% increase in overall cloud security resilience.Conducted security reviews and audits to ensure compliance with SOC1, ISO 27001, and NIST 800-61 frameworks, achieving 100% compliance and reducing audit findings by 30%.Coordinated and executed system patching and vulnerability management using InsightVM Rapid7, resulting in a 35% decrease in vulnerability exposure across client systems.EDUCATION & CERTIFICATIONSBachelor of Science Cardiff Metropolitan University, Cardiff, UKCertified Ethical Hacker- EC-CouncilCompTIA Cybersecurity Analyst (CySA+) CompTIACompTIA Network+ CompTIACompTIA A+ CompTIATECHNICAL SKILLSVirtualization: VMware, Vsphere, Vcenter, EsXi, NSXNetwork Security Tools: Cisco Routers, switches, Firewalls, WiresharkOffensive Security tools: Metasploit, Shodan, Nmap, HashcatSIEM: AlienVault Rapid 7, Splunk Enterprise SolutionsEDR: SentinelOne, CarbonBlack, Crowdstrike, Microsoft Defender ATPWAF: Apptrana, Fortinet & ImpervaScripting: Powershell, BashOperating System: Linux, Windows & Mac OSForensic Tools: FTK imager, Volatility, YARA, Timeline Analysis Ticketing_System: ServiceNow, JiraEmail Security: Proofpoint (TAP & TRAP)

Respond to this candidate
Your Message
Please type the code shown in the image:

Note: Responding to this resume will create an account on our partner site postjobfree.com
Register for Free on Jobvertise