GIDEON ASANJI
admog6@r.postjobfree.com 202-***-**** Dardenne Prairie, MO 63368
Summary
Experienced SOC Analyst knowledgeable about statistical analysis and proficient in Redhat Linux engineering. Bringing 6 years of experience in Cybersecurity field and all together 12 years in the IT industry. I am a Security Operations Center Analyst with experience in network, application, endpoint, threat intelligence, and forensics investigation. Have analyzed phishing emails including email headers, malware, and act as a first responder to security incidents. I also, have experience in investigating compromised systems and to determine threat vectors and provide initial remediation. He also has experience in utilizing SIEM tools to monitor and analyze incidents, and work with stakeholders to resolve incidents.
Skills
Cisco, PowerPoint, Unix
Unix-Based Systems (Solaris 10& 11, Redhat Linux 6,7 & 8); Windows.
Networking: LANs, VPNs, Routers, Firewalls, TCP/IP
Software: MS Office (Word, Excel, Outlook, Access, PowerPoint)
Ticket Systems: Archer, Service Now, Remedy & JIRA, IRT
Open Source Site Check tools (OSINT): URLVOID.COM, VirusTotal.com, zscaller.com, IBM-XFORCE, Looking Glass, URLSCAN etc.
Anti-Virus, Mail, TCP/IP
Antivirus, MS Office, Tomcat
Apache, Outlook, Troubleshooting
Clustering, Windows, Upgrading
COM, Word, VERITAS
Databases, Enterprise, VPN
Debugging, Networks, Web Server
DHCP, Networking, Websites
Disaster Recovery, Network, Web Site
DNS, NFS, Web sites
Edge, Norton, Author
Email, OS
Ethernet, Operating Systems
Firewalls, Oracle
Firewall, Pick
FTP, Processes
Gateway, Protocols
HTTP, Proxy server
IBM, PXE
DB2, Express
Web Sphere, Real-time
IDS, Redhat 5
Image, Red Hat
Intel, Red Hat 5
LANs, Redhat Linux 6
LDAP, Reporting
Linux, Routers
Linux OS, Samba
Logic, Servers
McAfee, SNMP
Meetings, Solaris
Access, SSL
Excel, Symantec
Anti-Virus, Antivirus, Apache, Cisco, Clustering, COM, Databases, Debugging, DHCP, Disaster Recovery, DNS, Edge, Email, Ethernet, Firewall, Firewalls, FTP, Gateway, HTTP, IBM, DB2, Web Sphere, IDS, Image, Intel, LANs, LDAP, Linux, Linux OS, Logic, McAfee, Meetings, Access, Excel, Mail, MS Office, Outlook, PowerPoint, Windows, Word, Enterprise, Networks, Networking, Network, NFS, Norton, OS, Operating Systems, Oracle, Organizational, Pick, Policies, Processes, Protocols, Proxy server, PXE, Express, Real-time, Redhat 5, Red Hat, Red Hat 5, Redhat Linux 6, Reporting, Research, Routers, Samba, Scanning, Servers, SNMP, Solaris, SSL, Symantec, TCP/IP, Tomcat, Troubleshooting, Unix, Upgrading, VERITAS, VPN, Web Server, Websites, Web Site, Web sites, Author
Experience
Security Operation Center, SOC, Lumen Technologies
SENIOR SOC ANALYST
08/2017 - Current
Responsible for security monitoring of networks, web sites, applications, databases, servers, data centers and other infrastructures to protect them from cyber threats.
Provide 24/7/365 real-time monitoring of security tools, dashboards, and email alerts.
Report security incidents using ServiceNow ticketing system for events that signal an incident and require Tier 3 Incident Response review.
Perform triage on alerts by determining their criticality and scope of impact.
Investigate, analyze, and process endpoint alerts using SIEM tools; FireEye HX, McAfee Antivirus, Cylance, Splunk Enterprise Security (Splunk ES) and OSINT tools.
Review and collect asset data; indicators of compromise, logs, configurations and running processes, on these systems for further investigation and reporting.
Involve in planning and implementing preventative security measures and in building incident response and disaster recovery plans.
Investigate, analyze, and process phishing email alerts from IronPort and FireEye following standard operating procedures.
Evaluate and process Web Site Review Requests from internal users to access blocked websites using OSINT tools.
Perform proactive hunting for threats that may have escaped the monitoring system.
Analyze and resolve DLP alerts from McAfee DLP Manager and Splunk Enterprise Security (Splunk ES) and Escalate cyber privacy incidents to the Privacy Team.
Work incidents from initial assignment to final resolution.
Investigate, interpret, and responds to complex security incidents.
Author SOPs as needed or directed to facilitate SOC operations.
Fully document assigned tickets to show all work performed to pass SLRs.
Perform Computer Security Incident Response activities for a large global enterprise, coordinate with other enterprise IT teams to record and report incidents.
Work incidents from initial assignment to final resolution.
Perform Root Cause Analysis (RCA) and make preventative recommendations.
Conduct forensics and investigations as needed using security tools such as Splunk, FireEye, Cisco IPS, OSINT, etc.
Recognize potential, successful, and unsuccessful intrusion attempts and compromises through reviews and analysis of security tools.
Investigate, interpret, and responds to complex security incidents.
Author SOPs as needed or directed.
Create, track, and work to resolution Normal and Standard job-related Change Requests.
Develop and conduct weekly targeting training for the SOC team.
Coordinate threat hunting activities across the network leveraging intelligence from multiple internal and external sources, as well as cutting-edge security technologies.
Assist with the creation of the daily SOC report and brief customer as necessary.
Participate in daily security meetings with other contractor and customer teams.
State Farm Phoenix, AZ
Sr. Linux Administrator
10/2009 - 02/2021
Oversaw Linux system administration and configuration maintenance governing user access, privacy and data integrity.
Designed and deployed disaster recovery systems for business continuity.
Maintained minimum organizational performance threshold for Linux server-based operations.
Performed patch, update, security scanning and configuration to meet OS performance mandates.
Generated OS-specific custom coding to automate deployment processes.
Developed, implemented and supported Linux training resources and initiatives as defined by organizational strategy.
Reduced service backlog by resolving daily tickets efficiently.
Configured, tested and managed software installations.
Cultivated Linux technology skills by maintaining technical familiarity with up-to-date standards.
Implemented network security improvements to resolve vulnerabilities.
Planned, tested and supported high-availability infrastructures.
Configured and updated Linux servers with latest releases and patches.
Increased system security and performance with proactive changes.
State Farm Insurance Phoenix, Arizona
SOC SECURITY ANALYST
03/2013 - 07/2017
Conduct proactive monitoring, investigation, and mitigation of security incidents.
Analyze security event data from the network (IDS, SIEM).
Recognize potential, successful, and unsuccessful intrusion attempts and compromises thorough reviews and analyses of relevant event detail and summary information.
Ensure the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies, through monitoring of vulnerability scanning devices.
Research new and evolving threats and vulnerabilities with potential to impact the monitored environment.
Conduct log analysis using Splunk.
Identify suspicious/malicious activities or codes.
Worked in a 24x7 Security Operations Center.
Monitoring and analysis of security events to determine intrusion and malicious events.
Search firewall, email, web or DNS logs to identify and mitigate intrusion attempts.
Investigate malicious phishing emails, domains and IPs using Open Source tools and recommend proper blocking based on analysis.
Education and Training
UNIVERSITY OF BUEA
B.S Biochemistry
2008
References
Available Upon Request