Post Job Free

Resume

Sign in

Soc Analyst Information Technologies

Location:
Tucson, AZ
Salary:
80,000.00
Posted:
January 14, 2024

Contact this candidate

Resume:

FEYZA ROSE SANAL

CERTIFIED SOC ANALYST - PERMANENT US RESIDENT

Tucson, AZ ad2rwc@r.postjobfree.com 520-***-**** www.linkedin.com/in/feyza-rose-sanal Professional Summary

Highly motivated and Security+ certified SOC analyst with 10 years of experience in information technologies. Experienced in identifying and mitigating potential risks, analyzing security logs using SIEM and EDR solutions, conducting reputation checks with OSINT, performing Phishing and Malware analysis, and responding to incidents using the incident response framework. I am a reliable, collaborative, and trustworthy professional. Technical Skills & Tools

Core Qualification: Network and endpoint anomaly detection & response, escalation of alerts Endpoint Security Detection and Response (EDR): CrowdStrike- Falcon Frameworks: MITRE ATT&CK, Cyber Kill Chain, NIST 800-53, SANS Network: IDS, IPS, TCP/UDP, Firewall, VirtualBox, Wireshark Security Information of Event Management (SIEM): Elastic Stack- Kibana, Splunk Ticketing Systems: The Hive

OSINT: Virus total, Hybrid Analysis, AlienVault, Cisco Talos, AbuseIPDP, ANYRUN, Shodan, MX- Toolbox, Cyberchef, Phish Tool, Censys

Operating Systems: Linux, Windows

Vulnerability Management: Tenable Nessus

Professional Experience

SOC Analyst

Cyblu, Austin, TX 07.2023-Current

• Prioritization of event logs and alerts, reviewing events starting from high-risk alerts.

• Monitoring SIEM and EDR sensors to detect anomalies and security events.

• Analyzing network traffic anomalies using Wireshark and Elastic Stack Kibana.

• Investigating and identifying phishing emails, suspicious files and domains using OSINT Framework.

• In malware analysis using VirtualBox, suspicious activity is examined in more detail using the Anyrun sandbox to observe its behavior.

• Using CrowdStrike to detect and respond to malicious activity on enterprise endpoint devices.

• Create executive summaries of security events and effectively log observable data and IOCs using The Hive.

• Taking affected hosts containment, terminating malicious processes, removing suspicious files and taking necessary measures.

• Escalating information to the Incident Response Team to reduce risk within the organization.

• Conducting investigations and implementing mitigation actions.

• Resolving security incidents by following the NIST Incident Response framework. Information Communication Technology Teacher

Ministry of Education, Turkey 09.2011-01.2021

• Covered comprehensive courses on various IT aspects including software, hardware and operating systems.

• Taught basic networking concepts including Domain Name System (DNS) and Internet Protocol (IP).

• A wide range of cybersecurity topics were covered, including identifying and preventing malware (viruses, trojans, worms).

• Simple code logic was implemented with Scratch and Codeorg code programs. Education

Uludag University, Bursa, Turkey 09.2003–06.2007

Bachelor’s degree / Computer and Instructional Technology Education Certification

CompTIA Security +

Volunteering

Turkish Cultural Center in Pittsburgh, PA 09.2021-05.2023 Orchestrated and enhanced engaging intercultural dialogue initiatives, fostering effective communication, collaboration, and cross-cultural understanding in a dynamic and interactive learning environment.



Contact this candidate