Post Job Free
Sign in

Security Cyber

Location:
Fredericksburg, VA
Posted:
September 20, 2020

Contact this candidate

Resume:

Ellison Felder

Security Analyst with deeper knowledge in SIEM and understanding of cyber security policy, technology and other programs for protection against threats and vulnerabilities. Passionate and dedicated towards cyber security solutions for advance protection against threats.

*********@*****.*** (M) 347-***-****

Technical Proficiency

Data Loss Prevention End Point Protection Threat Modeling Advanced Threat Protection Cyber Kill Chain APT Malware Analysis Network Security System Security Vulnerability Scanning

Computer Proficiency:

Windows

Cyber Security:

IDS/IPS-SNORT SIEM-Splunk Vulnerability Scanner-Nessus Port Scanner-Nmap Data Loss Prevention (DLP) VPN protocols Packet capturing and analysis-Wireshark Next Generation Firewall (NGFW) Web Application Firewall (WAF) OWASP Top-10 and other attack vectors OSI Model Protocols-TCP/IP, UDP, LDAP, SNMP, NetBIOS, Telnet, SSH, SSL, TLS, etc. and FakeDNS and other required technologies.

Miscellaneous:

Virtual computing-VMware, Hyper-V, Active Directory, SIEM, IDS, Service-Now

Professional Experience

Graceful Caregivers Stafford, VA MAY 2019 – PRESENT Systems Analyst

Conducting data loss prevention with and implementing appropriate measures.

Prioritizing data loss scan on repositories based on pre-defined criteria and policies.

Analyzing potential privacy violations to identify false positives and policy violations with immediate remediation.

Conducting SIEM analysis and generating dashboard/reports.

Identifying vulnerabilities through scans and penetration tests to report the issues.

Scanning and Identifying Indicators of Compromise (IOC’s).

Performing threat intelligence and implementing Cyber Kill Chain defense against APT.

Employing cyber modeling techniques to identify malicious threats and activities.

Analyzing network traffic for malicious or abnormal activity for attack vectors.

Identify adversary's Tactics, Techniques, and Procedures (TTPs) for technical mitigation strategies for preventing, controlling, and isolating incidents.

Performing malware analysis using different malware analysis methodologies.

Performing digital forensics to identify suspicious malicious content.

Conducting intrusion detection and prevention.

Performing log analysis and identifying malicious activities.

Kare Management Solutions, Alexandria VA FEB 2016 – MAR 2018

Cyber Security Specialist

Analyzed compromised machines to provide explanation of break-in process

Investigated email threats, fraudulent emails and copyright violations

Researched in-progress attacks by use of network sniffers

Analyzed pre-production systems for security vulnerabilities.

Responsible for phishing mailbox, blocking URL’s and log analysis.

Researched on an emerging threat, updated emerging threats, and detection capabilities.

Analyzed most prevalent vulnerabilities, threats, attack methods, and infected vectors.

Assisted SOC hire and training on Networking and Security fundamental of TCP/IP and other core Internet protocols.

Monitored Security Information and Event Management (SIEM); Intrusion Detection System (IDS); Network Monitoring and Response Services.

Managed global threat landscape by tracking changes in directing Manage services.

Responded to evaluation-related queries from the evaluation facilities and assisted in resolving evaluation-related issues.

Southern New Hampshire University Manchester, NH 2015-2018

Degree in AS Business Administration Received in August 2018

Northern Virginia Community College Annandale, VA 2012-2014

Program of study: AS Business Administration

CERTIFICATION & TRAINING

Associates Degree in Business Administration (2018)

Security+CE (CompTIA Security+)



Contact this candidate