Post Job Free

Resume

Sign in

Soc Analyst Security

Location:
O Fallon, MO
Posted:
May 24, 2021

Contact this candidate

Resume:

GIDEON ASANJI

admog6@r.postjobfree.com 202-***-**** Dardenne Prairie, MO 63368

Summary

Experienced SOC Analyst knowledgeable about statistical analysis and proficient in Redhat Linux engineering. Bringing 6 years of experience in Cybersecurity field and all together 12 years in the IT industry. I am a Security Operations Center Analyst with experience in network, application, endpoint, threat intelligence, and forensics investigation. Have analyzed phishing emails including email headers, malware, and act as a first responder to security incidents. I also, have experience in investigating compromised systems and to determine threat vectors and provide initial remediation. He also has experience in utilizing SIEM tools to monitor and analyze incidents, and work with stakeholders to resolve incidents.

Skills

Cisco, PowerPoint, Unix

Unix-Based Systems (Solaris 10& 11, Redhat Linux 6,7 & 8); Windows.

Networking: LANs, VPNs, Routers, Firewalls, TCP/IP

Software: MS Office (Word, Excel, Outlook, Access, PowerPoint)

Ticket Systems: Archer, Service Now, Remedy & JIRA, IRT

Open Source Site Check tools (OSINT): URLVOID.COM, VirusTotal.com, zscaller.com, IBM-XFORCE, Looking Glass, URLSCAN etc.

Anti-Virus, Mail, TCP/IP

Antivirus, MS Office, Tomcat

Apache, Outlook, Troubleshooting

Clustering, Windows, Upgrading

COM, Word, VERITAS

Databases, Enterprise, VPN

Debugging, Networks, Web Server

DHCP, Networking, Websites

Disaster Recovery, Network, Web Site

DNS, NFS, Web sites

Edge, Norton, Author

Email, OS

Ethernet, Operating Systems

Firewalls, Oracle

Firewall, Pick

FTP, Processes

Gateway, Protocols

HTTP, Proxy server

IBM, PXE

DB2, Express

Web Sphere, Real-time

IDS, Redhat 5

Image, Red Hat

Intel, Red Hat 5

LANs, Redhat Linux 6

LDAP, Reporting

Linux, Routers

Linux OS, Samba

Logic, Servers

McAfee, SNMP

Meetings, Solaris

Access, SSL

Excel, Symantec

Anti-Virus, Antivirus, Apache, Cisco, Clustering, COM, Databases, Debugging, DHCP, Disaster Recovery, DNS, Edge, Email, Ethernet, Firewall, Firewalls, FTP, Gateway, HTTP, IBM, DB2, Web Sphere, IDS, Image, Intel, LANs, LDAP, Linux, Linux OS, Logic, McAfee, Meetings, Access, Excel, Mail, MS Office, Outlook, PowerPoint, Windows, Word, Enterprise, Networks, Networking, Network, NFS, Norton, OS, Operating Systems, Oracle, Organizational, Pick, Policies, Processes, Protocols, Proxy server, PXE, Express, Real-time, Redhat 5, Red Hat, Red Hat 5, Redhat Linux 6, Reporting, Research, Routers, Samba, Scanning, Servers, SNMP, Solaris, SSL, Symantec, TCP/IP, Tomcat, Troubleshooting, Unix, Upgrading, VERITAS, VPN, Web Server, Websites, Web Site, Web sites, Author

Experience

Security Operation Center, SOC, Lumen Technologies

SENIOR SOC ANALYST

08/2017 - Current

Responsible for security monitoring of networks, web sites, applications, databases, servers, data centers and other infrastructures to protect them from cyber threats.

Provide 24/7/365 real-time monitoring of security tools, dashboards, and email alerts.

Report security incidents using ServiceNow ticketing system for events that signal an incident and require Tier 3 Incident Response review.

Perform triage on alerts by determining their criticality and scope of impact.

Investigate, analyze, and process endpoint alerts using SIEM tools; FireEye HX, McAfee Antivirus, Cylance, Splunk Enterprise Security (Splunk ES) and OSINT tools.

Review and collect asset data; indicators of compromise, logs, configurations and running processes, on these systems for further investigation and reporting.

Involve in planning and implementing preventative security measures and in building incident response and disaster recovery plans.

Investigate, analyze, and process phishing email alerts from IronPort and FireEye following standard operating procedures.

Evaluate and process Web Site Review Requests from internal users to access blocked websites using OSINT tools.

Perform proactive hunting for threats that may have escaped the monitoring system.

Analyze and resolve DLP alerts from McAfee DLP Manager and Splunk Enterprise Security (Splunk ES) and Escalate cyber privacy incidents to the Privacy Team.

Work incidents from initial assignment to final resolution.

Investigate, interpret, and responds to complex security incidents.

Author SOPs as needed or directed to facilitate SOC operations.

Fully document assigned tickets to show all work performed to pass SLRs.

Perform Computer Security Incident Response activities for a large global enterprise, coordinate with other enterprise IT teams to record and report incidents.

Work incidents from initial assignment to final resolution.

Perform Root Cause Analysis (RCA) and make preventative recommendations.

Conduct forensics and investigations as needed using security tools such as Splunk, FireEye, Cisco IPS, OSINT, etc.

Recognize potential, successful, and unsuccessful intrusion attempts and compromises through reviews and analysis of security tools.

Investigate, interpret, and responds to complex security incidents.

Author SOPs as needed or directed.

Create, track, and work to resolution Normal and Standard job-related Change Requests.

Develop and conduct weekly targeting training for the SOC team.

Coordinate threat hunting activities across the network leveraging intelligence from multiple internal and external sources, as well as cutting-edge security technologies.

Assist with the creation of the daily SOC report and brief customer as necessary.

Participate in daily security meetings with other contractor and customer teams.

State Farm Phoenix, AZ

Sr. Linux Administrator

10/2009 - 02/2021

Oversaw Linux system administration and configuration maintenance governing user access, privacy and data integrity.

Designed and deployed disaster recovery systems for business continuity.

Maintained minimum organizational performance threshold for Linux server-based operations.

Performed patch, update, security scanning and configuration to meet OS performance mandates.

Generated OS-specific custom coding to automate deployment processes.

Developed, implemented and supported Linux training resources and initiatives as defined by organizational strategy.

Reduced service backlog by resolving daily tickets efficiently.

Configured, tested and managed software installations.

Cultivated Linux technology skills by maintaining technical familiarity with up-to-date standards.

Implemented network security improvements to resolve vulnerabilities.

Planned, tested and supported high-availability infrastructures.

Configured and updated Linux servers with latest releases and patches.

Increased system security and performance with proactive changes.

State Farm Insurance Phoenix, Arizona

SOC SECURITY ANALYST

03/2013 - 07/2017

Conduct proactive monitoring, investigation, and mitigation of security incidents.

Analyze security event data from the network (IDS, SIEM).

Recognize potential, successful, and unsuccessful intrusion attempts and compromises thorough reviews and analyses of relevant event detail and summary information.

Ensure the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies, through monitoring of vulnerability scanning devices.

Research new and evolving threats and vulnerabilities with potential to impact the monitored environment.

Conduct log analysis using Splunk.

Identify suspicious/malicious activities or codes.

Worked in a 24x7 Security Operations Center.

Monitoring and analysis of security events to determine intrusion and malicious events.

Search firewall, email, web or DNS logs to identify and mitigate intrusion attempts.

Investigate malicious phishing emails, domains and IPs using Open Source tools and recommend proper blocking based on analysis.

Education and Training

UNIVERSITY OF BUEA

B.S Biochemistry

2008

References

Available Upon Request



Contact this candidate