| 20,000+ Fresh Resumes Monthly | |
|
|
| | Click here or scroll down to respond to this candidateCandidate's Name
Address: Madison, AlabamaMobile: PHONE NUMBER AVAILABLEEMAIL: EMAIL AVAILABLEJob Title: Security Operations Center (SOC) Analyst with Interim Secret ClearanceSUMMARY:Dedicated SOC Analyst with four years of experience managing security for 30,000 endpoints and 40,000 employees. Skilled in both 24/7/365 and in-house SOC environments, with expertise in monitoring and responding to security incidents. Proficient in Cyber Threat Detection, Response Analysis, and investigating, containing, and preventing network, host, and email-based attacks. Dedicated analyst with a strong networking background in the TCP/IPSOC ANALYST IIBaylor University September 2023 to PresentManage security operations for approximately 30,000 endpoints and 40,000 employees.Monitor and respond to security incidents in both 24/7/365 SOC environment.Conduct Cyber threat detection, response analysis, and investigations for network, host, and email-based attacks.Perform malware analysis and participate in incident containment and prevention strategies.Ensure the safety and security of the organization's IT infrastructure by implementing proactive measures and responding to emerging threats.ACHIEVEMENTS:Proactively contributed to setting up Baylor Universitys SOC from the ground up, achieving outstanding results.Authored detailed playbooks to standardize incident response procedures and improve operational efficiency.Developed detection rules in Microsoft Defender, enhancing the organization's ability to identify and respond to threats.Trained and mentored interns on critical security topics, including phishing detection, suspicious logins, malware analysis, suspicious network traffic, and file analysis.Monitored and responded to security incidents across 30,000 endpoints and 40,000 employees, ensuring the safety of the organization's infrastructure.CYBERSECURITY HOME LAB PROJECT:Developed a home lab environment to simulate and understand cyberattacks, improving defensive skills and technical expertise.Set up a Windows 10 server with Active Directory, Kali Linux, and Metasploit to launch targeted attacks against Metasploitable2.Utilized Wireshark to analyze PCAP files and gain deeper insights into network traffic and attack patterns.Enhanced skills in penetration testing, vulnerability analysis, and traffic monitoring for improved incident response.SOC ANALYST:DeltaahTech Consulting LLC / Haleon January 2020 to August 2023SKILLS:Security Expertise: Phishing email analysis, malware analysis, threat hunting, endpoint investigations, Cyber Kill Chain, MITRE ATT&CK, lookalike domains, brute force alerts, suspicious file on endpoints, geo-hopping alerts, host containment, unfamiliar sign-ins.Security Platforms and Tools: IPS/IDS (Firepower, FireEye NX/HX), Varonis (DLP), IronPort, Proofpoint Tab Dashboard, Proofpoint Email Protection, McAfee Web Gateway, SolarWinds ServiceDesk, Cylance Protect, Microsoft Defender for Endpoints, Datto (Device Management), ServiceNow, Jira, Nmap, Nessus, Lacework, Zscaler, Splunk SOAR, Splunk ES, Azure Sentinel One, Microsoft Azure Sentinel, CrowdStrike, Archer.Operating Systems: Linux, Windows.EDUCATION:University of Yaound, CameroonBSc in Computer ScienceCERTIFICATIONS: CompTIA Security+ (active) CompTIA CYSA+ (active) |