Post Job Free
Sign in

Project Management Soc Analyst

Location:
Slidell, LA
Salary:
85,000 to 95,000
Posted:
June 18, 2024

Contact this candidate

Resume:

Winzlo Tate, Jr.

Cybersecurity Analyst Profile

********@*****.*** • 985-***-****

LinkedIn • Slidell, LA

Highly skilled, success-driven professional with 15+ years of expertise in identifying and mitigating cybersecurity threats.

Detail-oriented and organized, with proven ability to analyze complex data and develop effective security measures. Technically proficient in implementing and monitoring security systems to safeguard confidential information. Exceptional communicator with excellent interpersonal skills, fostering collaboration with cross-functional teams. Solid understanding of cybersecurity principles, protocols, and technologies. Thorough knowledge of vulnerability assessment, incident response, and risk management. Experienced in conducting security audits and recommending appropriate countermeasures. Demonstrated ability to stay updated with emerging cybersecurity trends and best practices.

Areas of Expertise

● Help Desk Support

● Information Security & Assurance

● It Hardware & Software Fundamentals

● Cyber Threats & Cyber Security

● Database Analysis & Management

● Networking & Programming Fundamentals

● Account & Project Management

● Administrative & Network Support

● Information Systems Project Management

Technological Proficiencies

Security Information and Event Management (SIEM) and Incident Response: Splunk CrowdStrike SentinalOne Microsoft Defender ePO McAfee ESM ArcSight NetWitness

Cloud Services and Platforms: Microsoft Azure

Identity and Access Management: Active Directory PKI (Public Key Infrastructure) Kerberos

IT Service Management and Ticketing Systems: ServiceNow Remedy

Network Management and Monitoring: SolarWinds Infoblox

Forensic and Investigation Tools: Access Data FTK Imager

Network Security and Firewalls: Cisco AWS

Vulnerability Management and Assessment: Tenable Nessus Security Center Information Security Vulnerability Management (ISVM)

Integrated Suites (covers multiple functionalities): Microsoft Suites

Professional Experience

Ultraviolet Cyber, Remote

Security Operation Center Analyst II (SOC Analyst)

2021 — 2023

Monitored and secured various contracts by actively investigating and mitigating security incidents, including malware and malicious activity in CrowdStrike. Ensured compliance and security of company assets by regularly conducting vulnerability checks via Tenable Nessus and Sentinel One. Researched and analyzed zero-day vulnerabilities, promptly notifying team and taking appropriate action to resolve issues efficiently. Provided recommendations to customers on escalations related to network failures.

●Enhanced workplace efficiency by reducing redundant incidents generated by Splunk logs by 10%.

●Analyzed daily access provisions to ensure proper role-based access within AWS Management Console.

TEKsytems, New Orleans, LA

Security Operation Center Analyst II

2021 — 2021

Reviewed malicious phishing emails, domains, and IPs using open-source intelligence for Hancock Whitney Bank. Managed vulnerability assessment requests on behalf of customers and tracked life cycle of requests to completion.

●Identified potential threat actors through threat hunting, enhancing network security.

●Ensured timely resolution of vulnerability assessment requests, improving customer service and system security.

●Analyzed data thoroughly and provided actionable recommendations for blacklisting.

Peraton, Stennis Space Center, MS

Security Operation Center Analyst (SOC Analyst)

2016 — 2021

Directed and analyzed security operations for Department of Homeland Security in Sensitive Compartmented Information Facility (SCIF). Scrutinized security threats in customer network endpoints to verify external data didn't pose threat to organization. Utilized Splunk for data analysis, troubleshooting incidents, and providing critical data for leadership review.

●Devised plans and procedures to respond to security incidents across DHS unclassified, classified, and Top-Secret networks, ensuring minimal damage and maximum system resilience.

●Conducted thorough investigations of events to confirm compliance of company assets and no security risks.

Solutions by Design II, Stennis Space Center, MS

SOC Computer Security Incident Response Team (CSIRT)

2013 — 2016

Analyzed network traffic and Intrusion Detection Systems (IDS) security event logs to maintain secure network environment. Produced reports on malicious codes affecting network, assisting in remediation of vulnerabilities threatening system. Evaluated packet data for potential threats and escalated malicious network behavior for further investigation. Collaborated with government employees to assess extent of threats and potential data breaches.

●Conducted in-depth research to gather and analyze threat intelligence, offering valuable guidance to stakeholders during investigations.

●Identified and promptly escalated high-level incidents to internal security teams, effectively communicating remediation recommendations for support.

●Created and shared detailed turnover reports with peers, featuring knowledge sharing and best practices for enhanced collaboration and learning.

Apex Systems, New Orleans, LA

IT Help Desk Support

2013 — 2013

Executed request fulfillment and incident management utilizing the BMC Remedy ticketing system. Oversaw management of Active Directory User and Computer objects to meet customer Role Access Requests in SIPR/NIPR and NMCI systems for both civilians and Marines.

●Resolved technical issues on assigned hardware and software platform(s)/application(s) adhering to established protocols.

●Identified and escalated incident trends in accordance with standard protocols.

Sprint Communication, Slidell, LA

Sales and Service Representative

2007 — 2013

Rectified equipment-related customer issues, encompassing operational, maintenance, and repair facets. Upheld Sprint's service workflow and models, enhancing customer satisfaction. Managed inventory levels, ensuring compliance with company reporting policies. Streamlined inventory monitoring, adhering to organizational guidelines.

●Surpassed service and repair benchmarks consistently.

●Conducted thorough triage, effectively reducing customer downtime.

●Demonstrated expertise in mobile OS platforms, including Android, Apple IOS, and Blackberry.

●Optimized repair/resolution strategies, balancing cost-efficiency with customer experience.

Education & Certifications

Associate in Computer Science, Tulane University, New Orleans, LA

Certified Ethical Hacker, ITILv3, CompTIA Security+



Contact this candidate