| 20,000+ Fresh Resumes Monthly | |
|
|
| | Click here or scroll down to respond to this candidateCandidate's Name
CYBER SECURITY ANALYSTCitizen Roseto, PA PHONE NUMBER AVAILABLEEMAIL AVAILABLE in/Candidate's Name
Professional Summary CompTIA Security+ Certified Cyber Security Analyst with dynamic SOC Environment experience. Specialize in security analyst and monitoring, incident response, triage, endpoint security alert remediation tuning, ticketing, reporting and tool deployment. Great team player, passionate learner, ambitious to advance career in cyber security. Experience in investigation tracking, threat resolution, and incident reporting with ticketing programs like IBM Resilient and Jira. Conduct root-cause analysis and determine the initial access for security incidents. Experience in working with phishing, malware, data theft (data exfiltration), unauthorized access, inappropriate usage, and denial of service (DOS, DDOS) cases.Skills Expertise: Monitoring, Incident Response, Escalation, Phishing & Malware Analysis, Defense and Security Operations, Log Analysis, Security Information and Event Management (SIEM), Endpoint Detection and Response (EDR) Cyber Security Tools: IBM Qradar, Splunk ES, CrowdStrike Falcon, Sentinel One, Proofpoint, Microsoft Sentinel, Microsoft Defender, Darktrace. Various IT Skills: SQL, KQL, IBM Resilient, Jira, MITRE ATT&CK, OWASP Top10, Kali Linux Databases, Googling & Research, Data Analysis, Microsoft Office, Active Directory, Time Management Computer Networking. Open-Source Intelligence Tools (OSINT): Virus Total, MX Toolbox, Hybrid Analysis, Joe Sandbox Central Ops, IBM X-force, URLscanio, and Abuse IPDB, CyberChef. Interpersonal Skills: Possess good communication skills, analytical skills, self-motivated, proactive task oriented, good team player, and quick learner, Situational Awareness, Multitasking, Teamwork Problem Solving, Leadership, Management, Leading, Driving, Facilitating, and Chairing all incidents including investigation activities, Meetings, and Conference calls, I formed collaborative action plans with specific actions, roles, and deadlines, and ensuring these are completed. Other: SANS, NIST, DOs, DDos, Cyber Kill Chain.Certifications CompTIA Security + March 2022 Learning the OWASP Top 10 - Course Completion, April 2022 The Absolute Guide to Mitre Att&ck - Purple Academy, May 2022 Splunk ES May 2022 MICROSOFT SC 900 HIPAA Awareness for Business Associates HIPAA Security CySa + In ProgressExperienceSOC Analyst- Accesspoint Consulting, Allentown, PA April 2024 (Part-Time) (On-Site) Utilized Microsoft Sentinel to monitor, detect, and analyze security events across the organization's infrastructure. Conducted continuous surveillance and analysis of security events to ensure prompt detection of suspicious activities. Responded to security incidents by investigating alerts, performing root cause analysis, and documenting findings. Coordinated with cross-functional teams to contain, eradicate, and recover from security incidents. Leveraged Microsoft Defender to provide endpoint protection, threat analytics, and vulnerability management. Analyzed email security alerts and incidents, implementing necessary countermeasures to prevent recurrence. Generated detailed reports on security incidents, trends, and metrics for management review. Documented processes, procedures, and incident response activities for knowledge sharing and continuous improvement. Detail-oriented with a proactive approach to security challenges. Committed to continuous learning and professional development in cybersecurity. I received Datadog training. I obtained a HIPAA certification.Cyber Security Analyst - CyberNow Labs, Chantilly, VA December 2021 Present Identify events that pose a threat to the confidentiality, availability and integrity of information or systems. Conduct log analysis on Splunk and Used IBM QRadar SIEM solutions and provided recommendations to the technical teams via Resilient and Jira ticketing systems. Provide cyber support in a 24x7 Cyber Security Operation Center (SOC), including detection and support roles. Effectively analyze to determine the reputation of files, domains and phishing emails using online resources such as Virus Total, Any Run, URLscan.io, Central Ops, Abuse IPDB, IBM X-Force Exchange, Joe Sandbox, and MX Toolbox. Identify security anomalies, malicious domains and prepare executive summary reports after investigation and remediation through analyzing network traffic and host logs. Monitor and analyze SIEM alerts through Splunk and IBM QRadar and Identified security anomalies for investigation and remediation. Static and dynamic malware analysis to detect the nature of malicious executable in VM as sandboxing. Monitor the company devices with Endpoint Detection and Response (EDR) solutions like CrowdStrike Falcon and Sentinel One. Monitor the company e-mails with cloud-based E-mail Security solution like Proofpoint. Review systems by means of host visibility and flawless log supply and notified engineering teams. Collaborate with a team to brainstorm and prototype solutions to security challenges. Work with other groups to continuity and coverage of the enterprise. Social Science Teacher, Private School, Kutahya August 2011 - August 2013 Managed project. Strong critical thinking skills. Coordinated, Communicated, Organized my team and students. Ensured all quality standards, conducting and reporting statistical analysis. Created and processed data sets with excel, presented with PowerPoint. I taught courses to the students and parents which solidified my public speaking and management skills. EducationBachelors Degree: Istanbul University Turkey Social Science 2007-2011 Northampton Community College PA ESL Courses 2015-2019 |