ABDUSH SHUKKUR
Detroit, MI, adik9c@r.postjobfree.com- 313-***-****
Cybersecurity Analyst with expertise in computer forensics investigations, networking, endpoint, and log analysis. Investigated over 2,000 network traffic logs utilizing SIEM to respond and triage incidents. Conducted Data Loss Prevention (DPL) reviews and recommend best practices to senior-level management.
SKILLS
Splunk SIEM STIG Zendesk Aure Services now Palo Alto Active Directory MS Office tools (Excel, SharePoint, OneNote, Access) Wireshark Nmap IAM applications Nessus QRadar SOAR McAfee Fortigate Puppet PKI VPN Checkpoint Juniper firewalls IDS/IPS Data Loss Prevention (DLP) Networking Protocols AWS Azure cloud Unix Windows Kali Linux C++ Java Python Bash MAC Linux SQL Event Logs Windows Registry Firewalls Web Filter Network Forensics Fortinet proxy filtering EDR FortiGate Routers Switches Content Filtering Devops/Cloud sandbox
EDUCATION
Bachelor of Science in Cybersecurity Associate of Science in Cybersecurity
Walsh College 2020 Wayne County Community College 2018
CERTIFICATIONS
CompTIA Security + CompTIA Network+ Certified Cisco Certified Network Associate (CCNA)
PROFESSIONAL EXPERIENCE
Ismile Technologies July 2020 to Present
Cyber Security Analyst
Monitor and respond to security events providing notification, analysis, forensics and reviews.
IDS/IPS, SIEM, DLP, Attack Mitigation and Prevention
Collaborate with the internal and external users, Document incident and configuring incident resolve the issues.
Working with NIST SP 800-53 controls are properly implemented and assessed throughout the ATO lifecycle, (Azure), configure security polices and Audit compliance controls,
Reviewing log data analysis, and malware triage in support of incident response investigations and code reviews, and writing scripts: Threat analysis, wireless network and social engineering assessment
monitoring and risk mitigation and manage Security Awareness program. Reviewing packet level analysis using tcpdump or Wireshark on the session and surrounding traffic of an IDS alert, Vulnerability
working in IPS/ IDS monitoring and analysis, network traffic and log analysis, prioritization and differentiation between potential intrusion attempts, determination of false alarms, APT detection, and malware analysis/forensics. Scanning tools. (etc) Incident Response and Investigation,
Toyota Feb 2020 to October2020
Networking Support II
Configuring: firewalls, routers, switches and IDS devices and troubleshoot Ethernet connectivity issues
Working with OSI Model, including ARP, TCP, UDP, ICMP, DNS, Telnet, SSH, HTTP, SSL, SNMP, SMTP, (Etc)
Installing software upgrade, Configuring and maintain servers and networks. DHCP/DNS/IPv6/IPv4
Collaborate with the internal and external users to resolve there issues.
Design and deploy networks; Maintain network servers such as file servers, and VPN gateways
Cisco Switches and AP’s – including VSS and Nexus 7K,5K,2K switches.
Excellent understanding on Routing protocols like BGP, EIGRP etc.
Network and packet analysis through Wireshark tool
Strong knowledge of TCP/IP networking, network protocols and packet analysis
IT Support Jan 2019 to Dec 2019
Stefanini
Collaborate with the internal and external users to resolve issues.
Network configuration and management of a wide array of networking equipment including firewalls, switches, routers, load balancers, VoIP systems, etc.
Create network diagrams and update network documentation
Monitor and work on maintaining the LAN or WAN infrastructure in the office. Ability to troubleshoot TCP / IP networking issues. Reimage PCs, Break fix PCs,
Administer servers, laptop and desktop computers, printers, routers, switches, firewalls, phones, software deployment, security updates and patches
Installing software upgrade, Configuring and maintain servers and networks. DHCP/DNS/IPv6/IPv4
Desktop Support Sep 2016-2019
Wayne County Community College District
Collaborate with the internal and external users to resolve issues.
Install, configure, and maintain personal workstations, servers, ethernet networks, network cabling, and other related equipment, devices, and systems
Administer LANs according to TCP/IP networking protocols
Working with remote imagining tools, SCCM and Casper
Maintaining and working with wireless technologies, LAN, VPN, DSL
PROFESSIONAL DEVELOPMENT / ACTIVITIES
Security Blue Team
Threat hunting
Monitored cloud network traffic to identify possible IOC.
Investigate security incidents for cloud environment and end-user devices.
Exposure to Regulatory & Audit compliance management for HIPAA and HITRUST.
Conducted security audits to identify vulnerabilities.
Recommend improvements in security systems and procedures
Identify research and prioritize threat actor behaviors for hunting across the enterprise
Lead small hunt teams to design and prototype new ways to identify malicious activity in our systems and networks.
Document and communicate hunt methodologies and findings.
Develop, maintain and revise operational hunt procedures and documentation.
Collect metrics to measure the impact of individual hunts and the hunt program as a whole.
Mandiant IOC Collector, MD5 Hashing, SHA-1 Hashing, Strings, File Properties, Mandiant Redline, Virtual Machines
Cybaray
Security Analyst
Identified intrusions and mitigated attacks with RHEL serves
Monitor and respond to potential security incidents, service requests and requests for information.
IDS (Snort, Suricata, Bro/Zeek, etc.) rule creation and tuning based on indicators in network traffic.
Monitor and manage Security Awareness program. Reviewing packet level analysis using tcpdump or Wireshark on the session and surrounding traffic of an IDS alert
Assist in system security vulnerability and risk assessments.
Assist with security systems test scripts.
Cybrary Academy
Microsoft Azure Architect Technologies
Deploy and configure infrastructure, Implement workloads and security
Implement authentication and secure data, Develop for the cloud and for Azure storage
Design SIEM and create detection for internal security programs.
Deploy Container security as part of CI/CD pipeline & container behavior monitoring using open-source software.
Collegiate Cyber Defense Network Competition 2018 & 2019 Students competition,
Tasks include keeping services like DHCP, DNS, Web Server, FTP, and other services. While being attacked by a professional red team, it also includes writing incidents reports.
Information Security Talent Search (ISTS 17) Competition, Rochester, NY .
Tasks include keeping services like DNS, DHCP, Web Server,ElasticSearch, and include injects ( service request) while an attack by the professional red team.
YOLOcon March 2019
Student-run conference where presented developing Mitre ATT&CK into existing policies to mitigate and detect adversary tactics and techniques.