Quantcast

Information Technology Soc Analyst Resum...
Resumes | Register

Candidate Information
Name Available: Register for Free
Title Information Technology Soc Analyst
Target Location US-DC-Washington
Email Available with paid plan
Phone Available with paid plan
20,000+ Fresh Resumes Monthly
    View Phone Numbers
    Receive Resume E-mail Alerts
    Post Jobs Free
    Link your Free Jobs Page
    ... and much more

Register on Jobvertise Free

Search 2 million Resumes
Keywords:
City or Zip:
Related Resumes

Information Technology Security Operations Randallstown, MD

Quality Assurance Information Technology, Information Security O Laurel, MD

Cyber Security Information Technology Washington, DC

Information Technology It Auditor Washington, DC

Information Technology Computer Washington, DC

Information Technology Executive Washington, DC

Information Technology Active Directory Lanham, MD

Click here or scroll down to respond to this candidate
Candidate's Name

PROFESSIONAL SUMMARY'm a passionate SOC analyst with proven professional experience and a good understanding of information technology. I Have a deep knowledge of identifying and analyzing suspicious events. Versatile, bilingual professional and able to manage sensitive materials. Able to use various security tools to perform logs and packet analysis. Furthermore, I can perform static malware analysis with the overall objective to ensure confidentiality, integrity, and availability of the systems, networks, and data. A strong creative, detail-oriented, and consistent individual who enjoys working with diverse. Groups of people. An extremely organized person who is focused on solving problems, troubleshooting, and producing results. Enthusiastically optimistic, see setbacks as opportunities. to learn and grow. A great problem solver, seek opportunities in Cybersecurity that will heighten my knowledge and offer opportunities for growth. Bilingual in English and French and a quick learner, keen on time management and eager of producing quality.SKILLSTECHNICAL EXPERTISESkills: TCP/IP, SIEM, DDOS, DOS, IDS/IPS/Network security, cyber kill chain/Mittre attack,DLP analysis, Phishing email analysis, Endpointsecurity, ports, protocols IPS, Firewall Logs,Linux and Windows OS, Security Awareness,Microsoft Office Applications (Word, PowerPoint,Excel, Access, Outlook), Adobe Acrobat, VMWare, Active Directory.Tools: Spunk, CrowdStrike, Proofpoint, Nessus,FireEye Nx, Cisco SourceFire, McAfee DLP,McAfee Web gateway, Google DLP, Cofense,FireEye Ex, Symantec Endpoint, Wireshark,TCPdump, ServiceNow.Risk MitigationRisk AnalysisWORK HISTORY04/2022 - CurrentSOC Analyst L2The Arc Central Of ChesapeakeParticipates in the development of communications and related campaigns for information security awareness among all staffGaithersburg, MD 20879 PHONE NUMBER AVAILABLE EMAIL AVAILABLE Assists in reviewing development testing and implementation of security plans products and control techniques (e.gPassword administration intrusion detection software data encryption data backup and recovery) Helps to coordinate the reporting of data security incidents and may participate in investigations Provides technical support to client's management and staff in risk assessments and implementation of appropriate data security procedures and productsPerforms access control and account administration of critical information resources including data access rules tablesActs as a liaison to the product groups and assists them in the implementation of security technologies and application securityMonitors existing and proposed security standard setting groups State and Federal legislation and regulationsIdentifies and escalates changes that will affect information security policy standards and procedures. 12/2018 - 01/2022SOC Analyst L1The Arc Central Of ChesapeakeAssist with the development of processes and procedures to improve incident response times, analysis of incidents, and overall SOC functionsDocument all activities during an incident and provide leadership with status updates during the life cycle of the incidentAnalyze a variety of network and host-based security appliance logs (Firewalls, NIDS, HIDS, Sys Logs, etc.) to determine the correct remediation actions and escalation paths for each incident Track threat actors and associated tactics, techniques, and procedures (TTPs) Capture intelligence on threat actor TTPs and develop first level countermeasures in response to threat actorsProvide information regarding intrusion events, security incidents, and other threat indications and warning informationWork as part of a growing team to disseminate information to others, which continually improves Observe security solutions; SIEMs, firewall appliances, intrusion prevention systems, data loss prevention systems, analysis tools, log aggregation tools Technical analysis of network activity monitors and evaluates network flow Provide real-time guidance to customers on network configuration, security settings, and policies, and attack mitigation proceduresCreate and maintain operational reports for Key Performance Indicators of weekly and Monthly Metrics TCP/IP 3-way handshakeAnalyze network flow data for anomalies and detect malicious network activity Basic Incident Response and Investigation and escalation Availability for rotating on-call shiftsEDUCATIONExpected in 05/2025Master: Cybersecurity TechnologyUniversity of Maryland Global Campus - MarylandBachelor: BiochemistryUNIVERSITY OF Douala

Respond to this candidate
Your Message
Please type the code shown in the image:

Note: Responding to this resume will create an account on our partner site postjobfree.com
Register for Free on Jobvertise