Post Job Free

Resume

Sign in

Intrusion Detection, Network IDS/IPS, SIEM, Firewall rules.

Location:
Rancho Cordova, CA
Posted:
February 16, 2021

Contact this candidate

Resume:

PETER KINGORI

Email: adj78d@r.postjobfree.com Phone: 916-***-**** Rancho Cordova, CA 95670

LinkedIn: [linkedin.com/in/kingoripeter]

An enthusiastic Cyber Defense/Incident Response Analyst with 8 years of experience in Health care industry, 3 years dedicated to Information Security. Have a proven technical skill in improving the information security program of an organization through Monitoring, Vulnerability Management, and Escalating IT security incidents. Utilizes a risk-based approach to evaluate and implement security controls, and solutions. Holds a BSc. in Information Technology and a Certificate in Cybersecurity from UC Davis. Currently earning a CompTIA Security+ Certification.

TECHNICAL SKILLS

Cybersecurity & Networking: Advanced user of Intrusion-detection, Network IDS/IPS, SIEM, Vulnerability Scanning and Management, Web Gateway and Filtering, and Antivirus tools. IT Strategies: Setting Firewall Rules, Installing and Configuring, Patching, Backup and Archive Technologies, Research and Writing Reports.

Programming Languages & Technologies: Python, Log Analysis (Wireshark), Monitoring

(Splunk), IDS(SNORT), Windows, Linux/Kali, VM, Metasploit. MAJOR PROJECTS

Malware Analysis.

● Investigated computer system for Malware/Crypto Mining, in terms of source of the malware, and when it got discovered.

● Documented how it works, its scope, and the extent of impact. Did this by checking the number of devices affected, financial implications, and future outlook.

● Documented the technical findings from existing analysis and industry reports. Checked if the malware was remote or a local exploit, and how it was delivered, raw executable upload and phishing.

● Discussed containment and training strategies by recommending staff to be trained to look for malware signs such as slow computer performance, and updating all the affected software.

Red Team vs Blue Team

● Team lead for Blue Team. Our engagement was to investigate a log file done by the Red team, and then provide an audit of all encounters to help improve the system. Using our defensive tools (IDS and Wireshark) for log analysis, we were able to establish that the Red team was trying to Brute force the system and attempted to upload malicious software. We recommended upgrading the system and changing IDS policies. EXPERIENCE

Facilitator – Northern California Inalliance 05/2012 to Present Inalliance is a Nonprofit Organization that serves people with developmental disabilities.

● Collaborates with the information security team, and business stakeholders to respond and remediate identified vulnerabilities and gaps through security control and policies.

● Analyzes data from security technology sources, such as endpoint protection, intrusion detection, security event monitors to identify potential threats and defend against threats.

● Provides support and assistance to caregivers and participants across the organization related to information security related technology and programs.

● Coordinate with physicians and healthcare providers for participants’ appointments, record updates, and insurance coverage.

● Supports and responds to security-related investigations and other information security requests.

● Assists with the orientation and training of new employees as well as providing ongoing training and cross-training to ensure efficient, effective, and consistent daily operations.

● Perform other duties as assigned.

● Recognized by Supervisor for my positiveness and kindness to the participants, leadership, and good communication.

Information Security Analyst - Sysphony Technologies, Nairobi. Jan 2006 - Dec 2010 Sysphony is a large established IT company headquartered in Nairobi. It delivers IT solutions such as ICT consultancy, Security Solutions, Training, Infrastructures, and Maintenance services to corporate and private sectors.

• Monitored the client’s computer systems and network for intrusion by analyzing the logs.

• Identified security flaws and vulnerabilities, performed an audit, and wrote reports.

• Assisted callers with requests for IT Security solutions, Information, Complaints, and then direct them to appropriate IT personnel.

• Educated and communicated security requirements and procedures to all users and new employees to address system deficiencies and users’ needs.

• Developed and assisted in maintaining required technical documentation. EDUCATION

Boot Camp Cyber Security: University of California, Davis, California.

● Trained in Network Security Monitoring, Defensive Security, and Penetration Testing.

● Deep learning about Security Operating Center, and Security Access Controls.

● Learned about industry best practice including Open Web Application Security Project, performed Malware Analysis, and Red vs Blue team.

● Summarized and Documented results of testing for management reporting including proper disposition test.

● Described by the Instructor that I have a great analytical mind, which is exactly what is needed as a cybersecurity professional in the industry. http://t.cred.ly/l/c5008161-4f7c- 418a-b40c-752cae8e4865

CompTIA Security+ (in progress)

Bachelor of Science in Information Technology Concentration in Health Information Technology: University of Phoenix

Associate Degree in Electronic Health Records: University of Phoenix



Contact this candidate