AKIN ALKAN, MSc, Sec+, CySA+
408-***-**** ad4s5s@r.postjobfree.com Bay Area, CA
www.linkedin.com/in/akinalkan github.com/songthrushs/ TECHNICAL PROFICIENCY & SKILLS
● Skills: Expert in Data Analysis, Statistical and Machine Learning Anomaly Detection, Threat Hunting, Vulnerability Management, Incident Response, Malware and Phishing Analysis, Digital Forensics
● SIEM / EDR & Ticketing System: IBM QRadar, Elastic Search, Splunk ES, Crowdstrike Falcon, Trellix/Fireeye HX, JIRA
● Network: Wireshark, OSI Models, TCP/IP, Symantec DLP
● Vulnerability Analysis: Tenable.
● Digital Forensics Tools: Magnet Axiom Examiner, Autopsy, FTK Imager, Cellebrite Reader.
● Frameworks & Compliance Policies: MITRE ATT&CK, OWASP, NIST 800.53 - 800.61, HIPAA, PCI DSS, GDPR.
● OSINT: VirusTotal, URLScan, Shodan, Centralops, MXToolbox, TALOS Intelligence.
● Programming Languages: Python, PySpark, SQL.
● Others: Cloud computing, AWS, IBM-Watson Studio, Virtualization, Docker, API Data Extraction, Data Parsing, Regex. CERTIFICATIONS
CEH (in progress), Security +, CySA+, Databases and SQL for Data Science with Python, Data Analysis with Python, Machine Learning with Python
PROFESSIONAL EXPERIENCE
Cybersecurity Analyst (Trainee) CyberTech Labs, Wayne, NJ Jan 2023 – Present
● Monitor systems using ElasticSearch, conduct in-depth log analysis, identify, and investigate security anomalies.
● Acquire and analyze triages to gain insight on the incidents using Crowdstrike Falcon and Trellix/Fireeye HX EDR.
● Conduct threat hunting by reviewing endpoint and network logs to identify IOCs and enhance security.
● Triage phishing emails using Tirellix/Fireeye ETP email security solution.
● Conduct security analysis to determine the legitimacy of files, domains and emails using OSINT tools.
● Performed static and dynamic malware analysis on Cuckoo Sandbox
● Leveraged Tenable to assess system security posture by scanning for vulnerabilities and misconfigurations.
● Designed and implemented cybersecurity controls aligned with the NIST Cybersecurity Framework. Research Assistant University of Nevada, Reno, NV Aug 2021 - Dec 2022
● Conducted comprehensive analysis of Linux Log Data with Python to unveil attack vectors, discern patterns of attackers, classify botnets, and identify malicious IPs not reported in existing databases.
● Deployed machine learning models to identify stealthy, distributed SSH brute force attacks on host-based systems, achieving 1-2% higher scores compared to network-based detection methods.
● Automated image content analysis using AWS services for Digital Forensics investigations, resulting in a remarkable over 90% reduction in investigation time.
● Performed a comprehensive investigation of the 2017 Equifax Data Breach to evaluate and enhance the incident response process effectiveness.
● Analysis of Brute Force Attacks in Campus Network - delivered a poster presentation in UNR Cyber Conference 2022. Data Curator Advantis Global, San Jose, CA May 2020 – Present
● Optimized Siri performance through knowledge graph, input validation and data verification.
● Contributed ML tools improvement by data quality assurance, data labeling, bias detection, and data augmentation.
● Analyzed data, identified patterns, trends, and relationships. Officer/ Analyst/ Project Developer Turkish Naval Forces, Turkey
● Analyzed the capabilities, risks, vulnerabilities, and trending technologies for specific warfare domains.
● Collaborated with academia, industry, and government agencies for system development as well as foreign agencies.
● Presented on demand reports to decision makers to overcome complicated problems and generate insightful reports. EDUCATION
University Of Nevada, Reno, NV Aug 2021 – May 2024 Master of Science, Computer Science (Thesis on Intrusion Detection) Naval Academy, Istanbul, Turkey
Bachelor of Science, Industrial Engineering