Baymayah Dunyankor
Silver Spring MD ***** • 240-***-**** • *.*********@*****.***
Objective
A versatile business & technical analyst, with a record of accomplishments in gathering requirements, testing software & products, supporting business solutions, analyzing business operations, prioritization, & helping advance projects to completion. Serves as part of global teams, working to deliver high quality products & services to internal and external clients. Excels in training team members and end users.
Summary of Qualifications / Career Synopsis
5+ years of experience with Business Requirements documents, System Requirements Diagrams, Business Process Workflows, User Requirements documentation, and system Test Cases
5+ years of working in an IT environment
5+ years in Cyber Security, particularly in client facing roles
5+ years of Business Analyst experience in technology settings
Cyber Security: Protect, Detect, Respond or Sustain within a computer incident. Understanding of the life cycle of cyber security threats, attacks attack vectors and methods of exploitation, with understanding of intrusion set tactics, techniques, and procedures (TTPs)
Security Tools: Python, SQL, Snowflake, Splunk, Fire Eye, ArcSight, Snort
Analyst: Analytical decision-maker, with extensive experience in building, turning around, operating businesses, along with a proven history of increasing productivity and turning around difficult situations, and leading the successful operations
Teamwork: Ability to operate effectively in a team setting or independently in a fast-paced and rapidly changing environment
Critical Thinking: Strong organizational, problem-solving, multi-tasking, and time-management skills
Audit: Experience with audit reporting plus demonstrated accuracy in internal and external auditing
Communication: Excellent communication and analytical skills, with a broad knowledge of Business Process and Business Transformation Implementations
Extensive experience in developing procedures, policies, salesforce platform, technical manuals, training, software guides and instructions, executive briefings and presentations
Microsoft Office/0365: Advanced user of MS Word, Excel and PowerPoint
Effective communicator and relationship-builder with superior detail orientation that gathers and imparts information effectively across all management, department, and discipline levels
Professional Experience
Thermo Fisher Technology Sr. Consultant (Cyber Risk & Compliance) Sept 2019 – Present
Maintaining systems to protect data from unauthorized users (identifying, investigating, reporting and resolving security violations/incidents)
Characterizing and analyzing network traffic to identify anomalous activity and potential threats to network
Documenting and escalating incidents that may cause ongoing or immediate impact to the environment
Performing event correlation using information gathered from a variety of sources within the enterprise
Providing cybersecurity situational awareness and determines the effectiveness of an observed attack
Providing daily summary reports of network events and activities relevant to cyber defense practices
Identifying suspicious/malicious activity spanning Firewall
Developing processes for incident detection and the remediation
Ability to perform static & dynamic malware analysis to understand the characteristics of malware
Research new and evolving threats and vulnerabilities with potential to impact the monitored
Identifying and ingesting indicators of compromise (IOC’s) (e.g., malicious IP’s/URL’s etc.) into network security tools/ applications
Analyzing Security event data from the network (IDS, SIEM)
Conducting proactive monitoring, investigation, and mitigation of security incidents
Rescanning mitigated systems for further infections. If none, commission systems back to the network
Conducting log analysis using Splunk
Conducting research on new and evolving threats and vulnerabilities using security blogs
Prioritize and differentiate between potential intrusion attempts and false alarms
Using McAfee DLP Manger to protect intellectual property and ensures compliance by safeguarding sensitive data
Rocket Cyber Cyber Security Analyst April 2016 – Sept 2018
Worked with basic security concepts and terminology such as risk, vulnerability, threat, attack vectors, encryption, encoding and various types of threat actors
Worked with protocols at layer 2 and high in the OSI model, to include ARP, TCP, UDP, ICMP, DNS, Telnet, SSH, HHPT and other common Protocols that use the well-known ports
Processed IDS Alerts and identifying incidents and events in customer data
Managed the SOC mailbox and monitor and analyze the emails for threats including phishing and malware and escalates per procedure
Monitored, evaluated, and assisted with the maintenance of assigned security systems in accordance with industry best practices to safeguard internal information systems and databases
Participated in the Investigation of security violations and breaches may prepare reports on intrusions as needed
Maintained an understanding of the current vulnerabilities, response, and mitigation strategies used to support cyber security operations
Conducted packet level analysis using Wireshark on the session and surrounding traffic of an IDS alert
Wrote incident reports, process documents and interact with customers
Transcribed and implemented indicators into an environment
Investigated malicious phishing emails, domains and IPs using Open-Source tools and recommend proper blocking based on analysis
Performed investigations and evaluations of network traffics, read & interpret log, sniffer packets, and PCAP analysis with RSA Security analytics and Wireshark
Monitored events respond to incidents, report findings and escalate critical tickets if need be
Education
Bowie State University – Bowie, MD
Bachelor of Science: Information Technology – June 2017
Howard Community College – Columbia, MD
Associate: Information Technology - January 2016
Certificates, Training & Honors
Networking (OSI, Port numbers, Protocols)
Cyber Security
Email Analysis
Domain Analysis
Packet Analysis
Malware Analysis
Areas of Expertise
• Structural Query Language • Business Process • Operations Management • Performance Management • Conflict Resolution • Strategic Planning/Tactical Execution • TCP/IP • DNS • WINS • Telnet • RDP • VLAN • Wireless • Routers & Hubs • HTML • DHCP • RSA Security Analytics • Splunk • Wireshark • McAfee ePO • FireEye (EX, NX, HX) • Sourcefire • Windows Defender Security • Cylance • PolarityX • Jira • Remedy • Service Now • Symantec Endpoint Protection • Cloud App Security • Stealth Watch • Threat Grid • MTIPS • Security +, • Network +, • A+, • ISACA CSX Cybersecurity Fundamentals • Staff Training/Development • Agile Scrum • Troubleshooting • Change Management • Project Management • Risk Management • Business continuity • MS Office (Word, Excel, Access, PPT.) • Network Administration • Citrix deployment • VMware • Cisco Routers & Switches • Microsoft Office/O365 • Server Configuration • Avaya Deployment • Microsoft Active Directory Administration • Microsoft SQL Server Implementation • Microsoft Windows 7,10 Deployment