Post Job Free
Sign in

cyber security analyst

Location:
Washington, VA, 22747
Salary:
70-80,000
Posted:
April 04, 2021

Contact this candidate

Resume:

Baymayah Dunyankor

Silver Spring MD *****240-***-**** • adle2a@r.postjobfree.com

Objective

A versatile business & technical analyst, with a record of accomplishments in gathering requirements, testing software & products, supporting business solutions, analyzing business operations, prioritization, & helping advance projects to completion. Serves as part of global teams, working to deliver high quality products & services to internal and external clients. Excels in training team members and end users.

Summary of Qualifications / Career Synopsis

5+ years of experience with Business Requirements documents, System Requirements Diagrams, Business Process Workflows, User Requirements documentation, and system Test Cases

5+ years of working in an IT environment

5+ years in Cyber Security, particularly in client facing roles

5+ years of Business Analyst experience in technology settings

Cyber Security: Protect, Detect, Respond or Sustain within a computer incident. Understanding of the life cycle of cyber security threats, attacks attack vectors and methods of exploitation, with understanding of intrusion set tactics, techniques, and procedures (TTPs)

Security Tools: Python, SQL, Snowflake, Splunk, Fire Eye, ArcSight, Snort

Analyst: Analytical decision-maker, with extensive experience in building, turning around, operating businesses, along with a proven history of increasing productivity and turning around difficult situations, and leading the successful operations

Teamwork: Ability to operate effectively in a team setting or independently in a fast-paced and rapidly changing environment

Critical Thinking: Strong organizational, problem-solving, multi-tasking, and time-management skills

Audit: Experience with audit reporting plus demonstrated accuracy in internal and external auditing

Communication: Excellent communication and analytical skills, with a broad knowledge of Business Process and Business Transformation Implementations

Extensive experience in developing procedures, policies, salesforce platform, technical manuals, training, software guides and instructions, executive briefings and presentations

Microsoft Office/0365: Advanced user of MS Word, Excel and PowerPoint

Effective communicator and relationship-builder with superior detail orientation that gathers and imparts information effectively across all management, department, and discipline levels

Professional Experience

Thermo Fisher Technology Sr. Consultant (Cyber Risk & Compliance) Sept 2019 – Present

Maintaining systems to protect data from unauthorized users (identifying, investigating, reporting and resolving security violations/incidents)

Characterizing and analyzing network traffic to identify anomalous activity and potential threats to network

Documenting and escalating incidents that may cause ongoing or immediate impact to the environment

Performing event correlation using information gathered from a variety of sources within the enterprise

Providing cybersecurity situational awareness and determines the effectiveness of an observed attack

Providing daily summary reports of network events and activities relevant to cyber defense practices

Identifying suspicious/malicious activity spanning Firewall

Developing processes for incident detection and the remediation

Ability to perform static & dynamic malware analysis to understand the characteristics of malware

Research new and evolving threats and vulnerabilities with potential to impact the monitored

Identifying and ingesting indicators of compromise (IOC’s) (e.g., malicious IP’s/URL’s etc.) into network security tools/ applications

Analyzing Security event data from the network (IDS, SIEM)

Conducting proactive monitoring, investigation, and mitigation of security incidents

Rescanning mitigated systems for further infections. If none, commission systems back to the network

Conducting log analysis using Splunk

Conducting research on new and evolving threats and vulnerabilities using security blogs

Prioritize and differentiate between potential intrusion attempts and false alarms

Using McAfee DLP Manger to protect intellectual property and ensures compliance by safeguarding sensitive data

Rocket Cyber Cyber Security Analyst April 2016 – Sept 2018

Worked with basic security concepts and terminology such as risk, vulnerability, threat, attack vectors, encryption, encoding and various types of threat actors

Worked with protocols at layer 2 and high in the OSI model, to include ARP, TCP, UDP, ICMP, DNS, Telnet, SSH, HHPT and other common Protocols that use the well-known ports

Processed IDS Alerts and identifying incidents and events in customer data

Managed the SOC mailbox and monitor and analyze the emails for threats including phishing and malware and escalates per procedure

Monitored, evaluated, and assisted with the maintenance of assigned security systems in accordance with industry best practices to safeguard internal information systems and databases

Participated in the Investigation of security violations and breaches may prepare reports on intrusions as needed

Maintained an understanding of the current vulnerabilities, response, and mitigation strategies used to support cyber security operations

Conducted packet level analysis using Wireshark on the session and surrounding traffic of an IDS alert

Wrote incident reports, process documents and interact with customers

Transcribed and implemented indicators into an environment

Investigated malicious phishing emails, domains and IPs using Open-Source tools and recommend proper blocking based on analysis

Performed investigations and evaluations of network traffics, read & interpret log, sniffer packets, and PCAP analysis with RSA Security analytics and Wireshark

Monitored events respond to incidents, report findings and escalate critical tickets if need be

Education

Bowie State University – Bowie, MD

Bachelor of Science: Information Technology – June 2017

Howard Community College – Columbia, MD

Associate: Information Technology - January 2016

Certificates, Training & Honors

Networking (OSI, Port numbers, Protocols)

Cyber Security

Email Analysis

Domain Analysis

Packet Analysis

Malware Analysis

Areas of Expertise

• Structural Query Language • Business Process • Operations Management • Performance Management • Conflict Resolution • Strategic Planning/Tactical Execution • TCP/IP • DNS • WINS • Telnet • RDP • VLAN • Wireless • Routers & Hubs • HTML • DHCP • RSA Security Analytics • Splunk • Wireshark • McAfee ePO • FireEye (EX, NX, HX) • Sourcefire • Windows Defender Security • Cylance • PolarityX • Jira • Remedy • Service Now • Symantec Endpoint Protection • Cloud App Security • Stealth Watch • Threat Grid • MTIPS • Security +, • Network +, • A+, • ISACA CSX Cybersecurity Fundamentals • Staff Training/Development • Agile Scrum • Troubleshooting • Change Management • Project Management • Risk Management • Business continuity • MS Office (Word, Excel, Access, PPT.) • Network Administration • Citrix deployment • VMware • Cisco Routers & Switches • Microsoft Office/O365 • Server Configuration • Avaya Deployment • Microsoft Active Directory Administration • Microsoft SQL Server Implementation • Microsoft Windows 7,10 Deployment



Contact this candidate