SYMPLICE SIEWE
• •
PROFESSIONAL SUMMARY
'm a passionate SOC analyst with proven professional experience and a good understanding of information technology. I Have a deep knowledge of identifying and analyzing suspicious events. Versatile, bilingual professional and able to manage sensitive materials. Able to use various security tools to perform logs and packet analysis. Furthermore, I can perform static malware analysis with the overall objective to ensure confidentiality, integrity, and availability of the systems, networks, and data. A strong creative, detail-oriented, and consistent individual who enjoys working with diverse. Groups of people. An extremely organized person who is focused on solving problems, troubleshooting, and producing results. Enthusiastically optimistic, see setbacks as opportunities. to learn and grow. A great problem solver, seek opportunities in Cybersecurity that will heighten my knowledge and offer opportunities for growth. Bilingual in English and French and a quick learner, keen on time management and eager of producing quality.
SKILLS
TECHNICAL EXPERTISE
Skills: TCP/IP, SIEM, DDOS, DOS, IDS/IPS/
Network security, cyber kill chain/Mittre attack,
DLP analysis, Phishing email analysis, Endpoint
security, ports, protocols IPS, Firewall Logs,
Linux and Windows OS, Security Awareness,
Microsoft Office Applications (Word, PowerPoint,
Excel, Access, Outlook), Adobe Acrobat, VM
Ware, Active Directory.
Tools: Spunk, CrowdStrike, Proofpoint, Nessus,
FireEye Nx, Cisco SourceFire, McAfee DLP,
McAfee Web gateway, Google DLP, Cofense,
FireEye Ex, Symantec Endpoint, Wireshark,
TCPdump, ServiceNow.
Risk Mitigation
Risk Analysis
WORK HISTORY
04/2022 - Current
SOC Analyst L2
The Arc Central Of Chesapeake
Participates in the development of communications and related campaigns for information security awareness among all staff
Gaithersburg, MD 20879 301-***-**** *************@*****.*** Assists in reviewing development testing and implementation of security plans products and control techniques (e.g
Password administration intrusion detection software data encryption data backup and recovery) Helps to coordinate the reporting of data security incidents and may participate in investigations Provides technical support to client's management and staff in risk assessments and implementation of appropriate data security procedures and products
Performs access control and account administration of critical information resources including data access rules tables
Acts as a liaison to the product groups and assists them in the implementation of security technologies and application security
Monitors existing and proposed security standard setting groups State and Federal legislation and regulations
Identifies and escalates changes that will affect information security policy standards and procedures. 12/2018 - 01/2022
SOC Analyst L1
The Arc Central Of Chesapeake
Assist with the development of processes and procedures to improve incident response times, analysis of incidents, and overall SOC functions
Document all activities during an incident and provide leadership with status updates during the life cycle of the incident
Analyze a variety of network and host-based security appliance logs (Firewalls, NIDS, HIDS, Sys Logs, etc.) to determine the correct remediation actions and escalation paths for each incident Track threat actors and associated tactics, techniques, and procedures (TTPs) Capture intelligence on threat actor TTPs and develop first level countermeasures in response to threat actors
Provide information regarding intrusion events, security incidents, and other threat indications and warning information
Work as part of a growing team to disseminate information to others, which continually improves Observe security solutions; SIEMs, firewall appliances, intrusion prevention systems, data loss prevention systems, analysis tools, log aggregation tools Technical analysis of network activity monitors and evaluates network flow Provide real-time guidance to customers on network configuration, security settings, and policies, and attack mitigation procedures
Create and maintain operational reports for Key Performance Indicators of weekly and Monthly Metrics TCP/IP 3-way handshake
Analyze network flow data for anomalies and detect malicious network activity Basic Incident Response and Investigation and escalation Availability for rotating on-call shifts
EDUCATION
Expected in 05/2025
Master: Cybersecurity Technology
University of Maryland Global Campus - Maryland
Bachelor: Biochemistry
UNIVERSITY OF Douala