TALLA NIXON
SECURITY OPERATIONS CENTER ANALYST
331-***-**** ad2au3@r.postjobfree.com Richardson, TX 75081 Career
Objective
Passionate SOC Analyst with about 4 years in investigating and preventing network, host, and email-based attacks. Performing malware analysis, incident response, data loss prevention and improving SOC processes by utilizing top industry security solutions. Self-motivated, goal-oriented, and customer-focused with excellent communication. Prioritizing and managing multiple tasks concurrently. Troubleshoot and resolve complex issues in a demanding work environment quickly and efficiently. Experience
Apr 2019 - Present SOC ANALYST
Appriss Insights
• Consistently monitoring and working on
alerts generating on Splunk.
• Assisting in creating Splunk dashboards to
capture all customized logs generated by
systems and applications.
• Assisting in creating new use cases and
performing SOC testing
• Performing endpoint investigations using
FireEye and McAfee ePO
• Investigating attachments and links for
imbedded malware using FireEye ETP,
IronPort and ThreatGrid
• Giving client recommendations on how to
Education
BACHELOR'S DEGREE IN
INFORMATION TECHNOLOGY
University of Dschang
securely resolve escalated issues.
• Training new employees on how to handle
investigations and safely deal with phishing
emails.
• Developing follow-up action plans to resolve
reportable issues and communicating with
other IT teams to address security threats
and incidents accordingly.
• Supporting Incident Response till resolution
following Standard Operation Procedures
(SOP)-Prioritizing and differentiating
between potential intrusion attempts and
false alarms.
• Assisting with the development of processes
and procedures to improve incident response
times, analysis of incidents, and overall SOC
functions.
• Responding to computer security incidents
by collecting, analyzing, preserving digital
evidence, and ensuring that incidents are
recorded and tracked in accordance with
organizational SOC requirements.
• Using McAfee DLP to protect intellectual
property and ensuring compliance by
safeguarding sensitive data.
• Analyzing email logs to confirm malicious
emails were not delivered or are quarantined
and malicious attachments dropped.
• Monitoring and analyzing network traffic,
Intrusion Detection Systems (IDS), security
events and logs to identify abnormal and
suspicious activity.
• Working with SOC Engineers and other SMEs
to operate Intrusion detection and
prevention systems (IDS/IPS) such as SNORT
and Sourcefire to analyze, detect worms and
vulnerability exploit attempts.
• Staying up to date with current
vulnerabilities, attacks, and
countermeasures.
Mar 2017 - Apr 2019 IT/NETWORK ADMINISTRATOR
-Unisys
• Planned and recommended network
hardware, systems management software
and architecture
• Installed/Reimaged, configured and
maintained staff computers, file servers,
ethernet networks and network cabling
• Monitored network performance to
determine if adjustments were required
• Established and developed procedures for
proper utilization of IT technology
• Developed strategies and direction for
network systems solutions
• Implemented and maintains security
strategies for internal network
• Ensured maximum system uptime by
performing routine/preventative
maintenance tasks
• Recommended modifications of basic IT
systems in order to improve and simplify
business systems and reduce operating
cost
• Had responsibility for network planning,
design, security and optimization
• Tested new software for bugs before
deployment/provisioning
•
Aditional
skills
• • Endpoint Investigations • Phishing Email Investigations • Network Security Protocols/ TCP/IP • Tenable Nessus • Anyrun • Splunk • Firepower, FireEye • ServiceNow • CrowdStrike • Palo alto/Cisco • Windows • Incidence Response • Active Directory/Microsoft Office • VirusTotal, IP/URLvoid/MxToolbox • Malware Analysis/Endpoint Security • Cyber Threat Intelligence • Data Loss Prevention/Anti- Phishing
Certifications
• CompTIA Security+ SYO-601