SYLVIA AMOH
Chantilly VA ***** C: 571-***-**** *******.****@*****.***
SYSTEMS INFORMATION SPECIALIST
Security Specialist with knowledgeable, interpersonal, communication skills and abilities for enhancing the development and implementation of best practices for security tool and technologies and other programs for protection against threats and vulnerabilities. Passionate and dedicated towards cyber security solutions for advance protection against threats.
Technology Summary
Security Tools:
NMAP, Nessus, McAfee SIEM, Palo Alto, IDS, Wireshark
Systems:
Windows (all), VMware and Linux (Kali)
Networking:
LANs, WANs, VPNs, Routers, Firewalls, TCP/IP
Ticketing:
Remedy, ServiceNow
Key Skills
Knowledge and experience with security and network monitoring, strong communication and interpersonal skills. Vast experience working with clients. Effective problem-solving skills.
EMPLOYMENT
STRATEGIC SYSTEMS, Technical Lead (Contractor) 03/2020 – Date
Install and configure new PC hardware and software on desktops, printers, external drives and
other hardware.
Map Network Drive
Provides support to end users on a variety of issues
Answer calls, email and personnel request for technical support
Provides first and second tier support to end users for their PC, operating systems or hardware
Develop, document and communicate job processes, procedure and techniques
Document, tracks, and monitors the incident/problem to ensure a timely resolution
Communicate clearly technical concepts to non-technical staff and customers
Experience with Tier I and Tier II support for Service Desk and Desktop Support
SLAMM TECHNOLOGIES, MANASSAS, VA 11/2019 – 03/2020
Employs techniques to perform log analysis in systems.
Performs network traffic analysis utilizing raw packet data, NetFlow, IDS, and Network custom security tools
Correlates actionable security events which includes (SIM) data and performs unique correlation techniques.
Performs Network Monitoring and Incident Response.
Create, modify, and update Intrusion Detection Systems (IDS) and Security Information Management (SIM).
Monitoring of the Security Operations Center (SOC) hotline, emails and dashboards
Identifies, analyzes and reports security incidents.
FREDDIE MAC LOAN SERVICING, MCLEAN, VA 08/2015 – 11/2019
Cyber Security
Key adviser to the Communications Officer on information technology resources, planning, and Ensuring clients and employee data security against threats with data de-identification.
Conducting data loss prevention with and implementing appropriate measures.
Prioritizing data loss scan on repositories based on pre-defined criteria and policies.
Analyzing potential privacy violations to identify false positives and policy violations with immediate remediation.
Conducting SIEM analysis and generating dashboard/reports.
Identifying vulnerabilities through scans and penetration tests to report the issues.
Scanning and Identifying Indicators of Compromise (IOC’s).
Performing threat intelligence and implementing Cyber Kill Chain defense against APT.
Employing cyber modeling techniques to identify malicious threats and activities.
Analyzing network traffic for malicious or abnormal activity for attack vectors.
Identify adversary's Tactics, Techniques, and Procedures (TTPs) for technical mitigation strategies for preventing, controlling, and isolating incidents.
Performing malware analysis using different malware analysis methodologies.
Performing digital forensics to identify suspicious malicious content.
Conducting intrusion detection and prevention.
Performing log analysis and identifying malicious activities.
COMSCORE CORPORATION, VA 10/2014 - 7/2015
Cyber-Security Analyst
Researched on an emerging threat, updated emerging threats, and detected capabilities.
Analyzed most prevalent vulnerabilities, threats, attack methods, and infected vectors.
Assisted with New SOC hire trainee on networking fundamentals, included a detailed understanding of TCP/IP and other core Internet protocols.
Monitoring Security Information and Event Management (SIEM); Intrusion Detection System (IDS); Network Monitoring and Response Services; Email and Web activities.
Analyzed AV Logs, Content Filtering and Remote access logins.
Managed global threat landscape by tracking changes in directing Manage services.
Developed detailed recommendations for mitigating findings and processed improvement.
Examined and evaluated computer software and hardware to uncover access attempts.
Assessed incoming threats and developed plans to close loopholes.
Performed risk assessments to help create optimal prevention and management plans.
Monitored compliance with organization's information security policies and procedures
Identified and evaluated potential threats and vulnerabilities.
Monitored events, responded to incidents and reported findings.
Monitored live systems to discover real-time threats.
Demonstrated effectiveness of security controls and tracked security breach
Utilized Security Information and Event Management (SIEM), Intrusion Detection & Prevention (IDS / IPS), Data Leakage Prevention (DLP), forensics, sniffers and malware analysis tools.
NAI – PERSONNEL – FOOD & DRUG ADMINISTRATION 06/2011 - 10/2014
Helpdesk Analyst
Responsible for maintenance of all company computer, printer, and peripheral equipment.
Configured, installed, monitored and maintained IT users’ desktop software and hardware.
Provided support for the of end-user computing and desktop-based LAN systems software.
Provided site-related support for network technical problems and performance issues.
Responsible for documenting solutions to problems and developed end-user guidelines.
Responsible for providing on-site training to users.
Evaluated, maintained, modified (e.g., created macros, templates) and documented desktop application packages.
Participated in testing and evaluated of new desktop packages and implemented prototypes.
EDUCATION
University of Maryland, University College 07/2019 – Present
Candidate for Business Administration
Computer Learning Center 03/1998 – 11/1998
Diploma in Information Technology Support
CERTIFICATIONS
COMPTIA Security Plus Certificate
REFERENCES : Available Upon Request