Hyattsville, MD 443-***-**** email@example.com www.linkedin.com/in/damarn-carroll
Cyber Security Professional that is result driven!
Multi-talented professional with a successful record of embracing new challenges, a passion for going the extra mile and driven to achieve business objectives with excellent communication skills and a positive demeanor.
Resourceful team member, skilled in identifying project needs and coming up with effective solutions.
Professional and analytical skills; willing to initiate and take on conventional and the most unconventional challenges to deliver results that exceed expectations.
Possesses strong interpersonal and leadership skills for employers looking for new, rare talent.
AREAS OF EXPERTISE
Kali Linux Metasploit Nmap Splunk Wireshark
Windows OS X Android IOS Microsoft Office Suite Microsoft Azure
Log Analytics Windows Defender FireEye Microsoft Sentinel KQL
NIST SP 800-37 NIST SP 800-53r4-53a
FIPS-199 FIPS-200 RMF FISMA SSP SAP
Security Analyst II Zeneth Tech Partners (SBA) Washington, DC
●Served as Incident Commander utilizing the Cyber Kill Chain and NIST 800-61 guidelines during critical incidents; created Security Incident Reports tailored for executive or technical audiences.
●Identified and remediated incidents and breach activity, determined risk threats, established the scope of the breach, defined containment activities, and then contained and fully mitigated the attack.
●Performed monitoring and analysis, analyzed network traffic (i.e. PCAP) and log analysis, determined false positive alerts, insider threat and APT detection, and malware analysis/forensics.
●Performed role of Shift Lead, mentored and trained junior incident responders in the steps and procedures to investigate and resolve computer security incidents. Reported incidents to US-CERT.
●Identified weaknesses in customer processes and suggested improvements to AWS cloud migration.
●Developed, researched, and maintained proficiency in tools, techniques, countermeasures, and trends in computer and network vulnerabilities, data obfuscation, and encryption.
●Utilized Microsoft Azure (Function Apps) to create an application which uses API request to gather IOCs from Federal and open-source data feeds to ingest the data into a security log aggregator (Log Analytics).
Data were directly used to generate 2,200 leads for CTI to investigate suspicious attack vectors.
●Documented and revised metrics detailing the security posture of the client. Consisted of prepared daily incident summaries organized by attack vectors for presentation to executive management.
●Composed security alert notifications, tuned out misconfigured alerts via Windows Defender ATP.
●Advised and implemented proactive measures to improve detection and prevention capabilities for the SOC including recommending network-based ACL blocking and host-based custom signature rules.
Fraud Investigator PayPal Credit Hunt Valley, MD
●Proactively identify emerging fraud trends and develop recommendations based on data analytics to detect and prevent future fraud events. Research current phishing and hacking trends to help mitigate future fraud claims.
●Maintain fraud/dispute tracking system ensuring compliance with all regulatory and processor guidelines. Recommend and assist in implementing procedural changes to increase efficiency and/or quality of processes and services.
Technical Support Comcast York, PA
02/2016 – 06/2017
●Possesses an excellent knowledge of Windows and Macintosh operating systems, internet/IP, web browsers, e-mail, and other PC operating and connectivity technologies. Diagnoses PC hardware, software, operating system, and cable modem and cabling issues.
●Troubleshoots PC/e-mail/modem/home networking problems and escalates advanced troubleshooting problems to a technical support group when appropriate.
EDUCATION & CIVIC ENGAGEMENT
Education– Coppin State University, Baltimore, MD
Certifications – Certified Ethical Hacker (CEH)
CAP (RMF) Studying for the exam