Post Job Free

Resume

Sign in

Team Member Information System

Location:
Downey, CA, 90241
Posted:
November 14, 2023

Contact this candidate

Resume:

Luther Atayi

***** ******** **

Omaha, NE *****

Objective: To work in the computer networking and security field where the ability to work as a team member, a sense of responsibility, and excellent communication skills are assets.

EDUCATION

Bellevue University, Omaha, Nebraska, Graduation: 06/2013, GPA: 3.278

Master’s degree in management information system

ITT Technical Institute, Omaha, Nebraska, Graduation: 06/2009, GPA: 3.52

Bachelor’s degree in information system security

ITT Technical Institute, Omaha, Nebraska, Graduation: 06/2007, GPA: 3.48

Associate Degree in Computer Science

Associate of Applied Science Degree in Computer Networking

Metropolitan Community College, Omaha, Nebraska, Graduated in 2003, GPA: 3.00

Associate Degree in Computer Programming

CERTIFICATION

COMPTIA Security+

CORE SKILLS

Using Microsoft Project 2010 to complete a live project involving data modeling process ending with the data flow diagram (DFD)

Running security scanner and security analyzer as NESSUS and MBSA to scan the entire system to detect vulnerabilities,

Installing TRUECRYPT to encrypt critical data.

Installing open-source Antivirus software as AVAST, AVG, CLAMWIN or CLAMAV to keep the network free of viruses.

Installing a Firewall system which is the most efficient way to secure a network.

Installing SANDBOXIE on the user computer to secure web site browsing and create a quarantine area on hard drive.

Configuring IP ACL (Access Control List) for ports filtering to prevent unwanted traffic in the network.

Making straight through, crossover and rollover cables to configure LAN and WAN system

Using CAMTASIA Studio 6 to make videos of network security tools that is object of presentation at NEBRASKA CERT

Working with a team of 7 students to design and implement an enterprise-wide network including a Local Area Network and a Wide Area Network to provide data connectivity between 5 schools.

Using HTML to design a web page for the schools.

Configuring IP ACL (Access Control List) on the router to prohibit all traffic from student LAN on the administration LAN.

Installing Active directory to setup students and administrators accounts.

Configuring DHCP to automatically assign IP address to the computers on the school network.

Installing DNS to translate every Domain name used into IP address.

Installing FTP to allow transferring and sharing files between different schools.

Leading a team of 4 to conduct research on VPN (Virtual Private Network)

TECHNICAL SKILLS

Linux, MS Project 2010, Server 2003, Window XP Professional, Window NT

ADDITIONAL SKILLS

MS Office (Word, Power Point, Access, Excel, Visio)

PROFESSIONAL EXPERIENCE

LinkedIn, Omaha, NE 05/2021 - Present

Job Fraud Analyst (Job Abuse Team)

Review job abuse models and take action on the jobs and member accounts.

Interpret and enforce LinkedIn policies related to fake/fraud jobs, scam jobs, and jobs with harmful content.

Provide jobs abuse insight to cross-functional teams in ongoing bases.

NTT Security, Omaha, NE 01/2016 – 04/2020

Information Security Analyst (Cyber Fraud & Crime Prevention)

Identify new or changing cyber threats online and their impact on client platforms and recommend controls to mitigate known risks, threats, and vulnerabilities.

Identify, collect, document, and investigate fraudulent or criminal activities on client platforms, review and take action on collected content to ensure all accounts are compliant with clients Terms of Use and community guidelines.

Take action on security events presented to Analyst via SIEM, user submissions, dashboards.

Self-initiate hunting initiatives to Client potential breaches or undiscovered cyber threats.

Communicates with management on incident updates.

Work closely and provide cyber support to Corporate Security, Fraud, Risk Management, Supply Chain, and New Product Development.

Monitors SIEM and analyzes security events to determine appropriate actions.

Coordinate mitigation or remediations task with stakeholders or supporting teams.

Identify and tune false positives associated with current security events.

Escalation resource for other Cyber Security Analyst

Develop used cases to increase visibility across Client threat landscape.

Using cyber kill chain framework to identify and prevent cyber-attack and data exfiltration.

Draft processes and procedures associated with daily operations.

Worked as data research analyst in SOC to research vulnerabilities that match our log transport analyzer, firewall-1, Snort, Palo Alto, Symantec, ASA etc, and documented their exploits, problems, solutions, the related attack phases, and the impact on CIA triad.

Solutionary, Omaha, NE 04/2010 – 12/2015

Cyber Security Specialist (CCS) Operating in Security Operation Center (SOC)

Involved in strategic and tactical analysis in support of cyber operations, and investigations, and cyber threat.

Using database Active Guard (Portal) to process and monitor client’s activities.

Motivated investigators and analysts responsible for the investigation of complex financial crimes (e.g. external, internal, cyber fraud, money laundering)

Pushing and applying shun on the client devices according to client’s recommendation to block specific IP addresses to communicate with their site.

Using Hobbit system to manage the client devices for connectivity issues, feeds lost, process anomalies, and Disk issues.

Using agjump to check connectivity and feeds of the client’s devices.

Using ActiveGuard Investigator (AGI) to track client’s database and detect vulnerable traffic.

Troubleshooting firewalls and snort appliances and restarting them using UNIX commands

Analyzing the events on the Portal and sending out the suspicious events to the clients, closing the non-malicious activities, and escalating the problematic events to the engineering team.

Complete the daily summaries (PCI) and send an email to the clients in a timely manner.

Communicating client’s system anomalies to engineers.

Modifying client’s escalation procedures, resetting clients’ passwords according to clients’ request.

Processing client’s emails and coordinating with other teams (SDM, MDT, ISET, Scanners) to meet the client’s expectations.

First Data Resources 04/2004 – 03/2010

Fraud Prevention Analyst

Monitoring, analyzing, and investigating payment card transactions and account activity for potential fraud.

Reviewing and analyzing transaction data from application interfaces and transaction logs to identify suspicious activities and detect fraud.

Investigates suspicious activities to verify fraudulent transactions and takes measures to control, mitigate and prevent further risks.

Analyzing card program transactions to identify emerging patterns associated to specific card programs or account types and devise.

Regularly files fraud reports on payment networks systems (MasterCard, VISA systems such SAR reporting).

First Data Resources 03/1998 – 03/2004

Insert Operator

Producing credit cards statements with insert machine

Managing computer and machine for job processing

Retrieving the jobs from Mainframe or PC

Selecting appropriated job from jobs queued

Operating with window XP Pro to direct job process

Completing each order from beginning to end

Performing sequence check for accuracy of the count



Contact this candidate