Post Job Free

Resume

Sign in

Cyber Security Analyst

Location:
Warren, MI
Posted:
December 11, 2020

Contact this candidate

Resume:

ABDUSH SHUKKUR

Detroit, MI, adik9c@r.postjobfree.com- 313-***-****

Cybersecurity Analyst with expertise in computer forensics investigations, networking, endpoint, and log analysis. Investigated over 2,000 network traffic logs utilizing SIEM to respond and triage incidents. Conducted Data Loss Prevention (DPL) reviews and recommend best practices to senior-level management.

SKILLS

Splunk SIEM STIG Zendesk Aure Services now Palo Alto Active Directory MS Office tools (Excel, SharePoint, OneNote, Access) Wireshark Nmap IAM applications Nessus QRadar SOAR McAfee Fortigate Puppet PKI VPN Checkpoint Juniper firewalls IDS/IPS Data Loss Prevention (DLP) Networking Protocols AWS Azure cloud Unix Windows Kali Linux C++ Java Python Bash MAC Linux SQL Event Logs Windows Registry Firewalls Web Filter Network Forensics Fortinet proxy filtering EDR FortiGate Routers Switches Content Filtering Devops/Cloud sandbox

EDUCATION

Bachelor of Science in Cybersecurity Associate of Science in Cybersecurity

Walsh College 2020 Wayne County Community College 2018

CERTIFICATIONS

CompTIA Security + CompTIA Network+ Certified Cisco Certified Network Associate (CCNA)

PROFESSIONAL EXPERIENCE

Ismile Technologies July 2020 to Present

Cyber Security Analyst

Monitor and respond to security events providing notification, analysis, forensics and reviews.

IDS/IPS, SIEM, DLP, Attack Mitigation and Prevention

Collaborate with the internal and external users, Document incident and configuring incident resolve the issues.

Working with NIST SP 800-53 controls are properly implemented and assessed throughout the ATO lifecycle, (Azure), configure security polices and Audit compliance controls,

Reviewing log data analysis, and malware triage in support of incident response investigations and code reviews, and writing scripts: Threat analysis, wireless network and social engineering assessment

monitoring and risk mitigation and manage Security Awareness program. Reviewing packet level analysis using tcpdump or Wireshark on the session and surrounding traffic of an IDS alert, Vulnerability

working in IPS/ IDS monitoring and analysis, network traffic and log analysis, prioritization and differentiation between potential intrusion attempts, determination of false alarms, APT detection, and malware analysis/forensics. Scanning tools. (etc) Incident Response and Investigation,

Toyota Feb 2020 to October2020

Networking Support II

Configuring: firewalls, routers, switches and IDS devices and troubleshoot Ethernet connectivity issues

Working with OSI Model, including ARP, TCP, UDP, ICMP, DNS, Telnet, SSH, HTTP, SSL, SNMP, SMTP, (Etc)

Installing software upgrade, Configuring and maintain servers and networks. DHCP/DNS/IPv6/IPv4

Collaborate with the internal and external users to resolve there issues.

Design and deploy networks; Maintain network servers such as file servers, and VPN gateways

Cisco Switches and AP’s – including VSS and Nexus 7K,5K,2K switches.

Excellent understanding on Routing protocols like BGP, EIGRP etc.

Network and packet analysis through Wireshark tool

Strong knowledge of TCP/IP networking, network protocols and packet analysis

IT Support Jan 2019 to Dec 2019

Stefanini

Collaborate with the internal and external users to resolve issues.

Network configuration and management of a wide array of networking equipment including firewalls, switches, routers, load balancers, VoIP systems, etc.

Create network diagrams and update network documentation

Monitor and work on maintaining the LAN or WAN infrastructure in the office. Ability to troubleshoot TCP / IP networking issues. Reimage PCs, Break fix PCs,

Administer servers, laptop and desktop computers, printers, routers, switches, firewalls, phones, software deployment, security updates and patches

Installing software upgrade, Configuring and maintain servers and networks. DHCP/DNS/IPv6/IPv4

Desktop Support Sep 2016-2019

Wayne County Community College District

Collaborate with the internal and external users to resolve issues.

Install, configure, and maintain personal workstations, servers, ethernet networks, network cabling, and other related equipment, devices, and systems

Administer LANs according to TCP/IP networking protocols

Working with remote imagining tools, SCCM and Casper

Maintaining and working with wireless technologies, LAN, VPN, DSL

PROFESSIONAL DEVELOPMENT / ACTIVITIES

Security Blue Team

Threat hunting

Monitored cloud network traffic to identify possible IOC.

Investigate security incidents for cloud environment and end-user devices.

Exposure to Regulatory & Audit compliance management for HIPAA and HITRUST.

Conducted security audits to identify vulnerabilities.

Recommend improvements in security systems and procedures

Identify research and prioritize threat actor behaviors for hunting across the enterprise

Lead small hunt teams to design and prototype new ways to identify malicious activity in our systems and networks.

Document and communicate hunt methodologies and findings.

Develop, maintain and revise operational hunt procedures and documentation.

Collect metrics to measure the impact of individual hunts and the hunt program as a whole.

Mandiant IOC Collector, MD5 Hashing, SHA-1 Hashing, Strings, File Properties, Mandiant Redline, Virtual Machines

Cybaray

Security Analyst

Identified intrusions and mitigated attacks with RHEL serves

Monitor and respond to potential security incidents, service requests and requests for information.

IDS (Snort, Suricata, Bro/Zeek, etc.) rule creation and tuning based on indicators in network traffic.

Monitor and manage Security Awareness program. Reviewing packet level analysis using tcpdump or Wireshark on the session and surrounding traffic of an IDS alert

Assist in system security vulnerability and risk assessments.

Assist with security systems test scripts.

Cybrary Academy

Microsoft Azure Architect Technologies

Deploy and configure infrastructure, Implement workloads and security

Implement authentication and secure data, Develop for the cloud and for Azure storage

Design SIEM and create detection for internal security programs.

Deploy Container security as part of CI/CD pipeline & container behavior monitoring using open-source software.

Collegiate Cyber Defense Network Competition 2018 & 2019 Students competition,

Tasks include keeping services like DHCP, DNS, Web Server, FTP, and other services. While being attacked by a professional red team, it also includes writing incidents reports.

Information Security Talent Search (ISTS 17) Competition, Rochester, NY .

Tasks include keeping services like DNS, DHCP, Web Server,ElasticSearch, and include injects ( service request) while an attack by the professional red team.

YOLOcon March 2019

Student-run conference where presented developing Mitre ATT&CK into existing policies to mitigate and detect adversary tactics and techniques.



Contact this candidate