| 20,000+ Fresh Resumes Monthly | |
|
|
| | Click here or scroll down to respond to this candidateGertrude Chi SOC ANALYSTMD, USA EMAIL AVAILABLE PHONE NUMBER AVAILABLE LinkedInPROFESSIONAL EXPERIENCEJPMC MD, USASOC Analyst Jan 2022- Current Ensured continuous 24/7/365 monitoring using Splunk ES, Mimecast, and IronPort, achieving zero downtime and enhancing threat detection by 25%. Led the rapid containment and escalation of over 200 incidents monthly with AWS CloudTrail and CloudWatch, reducing response time by 30% and mitigating high-severity threats. Managed and analyzed phishing emails with IronPort and FireEye, reducing false positives by 15% and blocking malicious domains, files, and IPs, leading to a 30% decrease in email-based threats. Utilized Cisco Sourcefire and EDR tools to detect and mitigate over 500 brute force attacks, resulting in a 20% reduction in successful breaches and enhancing overall security posture. Implemented IAM policies and updated SOPs for AWS services, streamlining incident triage, reducing escalation time by 20%, and ensuring least privilege access.BNY MD,USASOC Analyst Jun 2020- Dec 2021 Proficiently utilized TCP/IP, network fundamentals, and security tools like Wireshark, Snort IDS, and Splunk to ensure comprehensive network surveillance, resulting in a 20% increase in threat detection accuracy. Conducted targeted Splunk searches for monitoring proxy and firewall systems, improving the timeliness and accuracy of security analysis by 25%. Supported incident response by developing and implementing procedures with RSA Net Witness and SIEM solutions, leading to a 15% improvement in incident management efficiency. Monitored and analyzed security events using Cisco Firepower, FireEye, Carbon Black, and McAfee, enhancing collaborative cybersecurity responses and reducing incident resolution time by 20%. Developed key risk indicators and optimized IDS/IPS rules to proactively detect and prevent malicious activities, improving overall security posture by 30%.TECHNICAL SKILLSCybersecurity: Incident Response and Handling (Detection, Analysis, Triage), Malware Analysis and Endpoint Security, Threat and Vulnerability Assessment, Forensics and Investigation of Security Events, System Security Attacks and Defenses Network Security: Network Security Protocols (TCP/IP), LAN, VPN, Routers, Firewalls, Network Traffic and Log Analysis, Tools: Splunk, Wireshark, Nessus, Snort, Firepower, FireEye, CrowdStrike, Carbon BlackCompliance & Standards: PCI-DSS, FIPS, NIST 800 Series, ISO 27001 Tools & Technologies: Splunk, Wireshark, ServiceNow, Microsoft Office 365, McAfee Web Gateway, McAfee SIEM, Suite/SharePoint/OneDrive/Sentinel/Power Apps, Run Sandbox, Joe Sandbox, Silo Cloud Browser, VirusTotal, Domain Tools, IP/URL void, IBM X- ForceApplication Tools: Mimecast, IronPortCloud Security: AWSOperating Systems: Linux, WindowsCERTIFICATIONCOMPTIA+SecurityEDUCATIONUniversity of Yaounde 1 Cameroon Sep 2004 Nov 2007 Bachelors Degree in Anthropology |