Post Job Free
Sign in

Soc Analyst Customer Service

Location:
Brooklyn, NY
Salary:
90k
Posted:
April 06, 2022

Contact this candidate

Resume:

GODSPOWER OVBOKHAN OMOROGIEVA

Tel: 929-***-**** US Citizen Email: ********@*****.***

Summary Statement:

I am a SOC Analyst with over 2 years of IT experience and 2 years of incident response experience. I have experience in analyzing phishing email using different email monitoring and processing application method. I also have experience in investigating network alerts as well as endpoint alerts. I utilized all the different SIEM tools such as Fire Eye Nx, FireEye ETP, Crowdstrike just to name a few to perform my investigation. Prior to becoming a SOC Analyst, I worked as a Helpdesk Support Associate where I assisted user in unlocking their accounts and directing them to the different teams to provides all the support requested. I am a team player with very good communication skill. I perform very well under stressful situation and great at managing time that has helped me meet all my project deadline.

Education:

B.Sc. Banking & Finance - 06/2005

Certifications:

CompTIA Security Plus - 06/2022

Professional Career:

SOC Analyst 06/2019 to Present

Think Tech consulting LLC

Manage a SOC to provide comprehensive Computer Network Defense support through security event monitoring, advanced analytics and response, and cyber intelligence activities in support of the client operational mission.

Conduct quality assurance reviews of all SOC activities through reviewing of metrics and case analysis.

Maintain a 24x7 schedule and minimum-manning requirements

Construct and optimize operational workflows for 24x7 teams across multiple shifts

Research, evaluate, recommend, and design new security technologies and supporting infrastructure

Develop technical cyber security solutions in response to customer requests or in support of proposal solution development

Support documentation of all business and workflow processes in this cybersecurity

Provides technical consultation in cyber security capability development

Maintains current knowledge of relevant cyber security and related technologies as assigned

Serves as liaison with various customers (internal and external).

Interpret, analyze, and report all events and anomalies in accordance with Computer Network directives, including initiating, responding, and reporting discovered events.

Manage and execute first-level responses and addresses reported or detected incidents.

Report to and coordinates with external organizations.

Coordinate and distribute directives, vulnerability, and threat advisories to identified consumers.

Provide daily summary reports of network events and activities and delivers metric reports.

Provide detection, identification, and reporting of possible cyber, physical, and communications threat.

Perform cyber, physical, and communications incident trend analysis and reporting functions.

Characterize and preform analysis of potential threat activities.

Perform Cyber, Physical, and Communications triage and make proper recommendations which enable expeditious remediation.

Interact with government Program Manager for the service desk regarding operational issues.

Ensure timely and effective response to internal and external mission partners.

Follow the appropriate incident escalation and reporting procedures.

Seek to improve the quality, productivity, and culture of the service desk environment.

I also have experience in identifying, logging, categorizing, performing initial triage, routing, and resolving incidents and requests.

Manage the lifecycle of incident and request tickets in accordance with interface agreements.

IT Helpdesk Support Associate 05/2018 – 05/2015

Darlington Groups LLC

Provided first contact and incident resolution to customers with hardware, software, and application problems. Includes both customer telephone support as well as electronically submitted requests

Provided polite and friendly customer service

Attempted to resolve as many incidents during the first contact, or at Tier I. Efficiently escalates incidents to higher Tier II or Tier III when required

Documented incident status and solutions in incident database tools.

Possessed current working knowledge of computers, printers, laptops, and common windows applications

Worked through various types Tier II issues with telephone assist

Provided answers to Frequently Asked Questions or solutions to common problems as part of a customer self-help capability

Possessed comprehensive knowledge of the principles, methods, and techniques used in computer troubleshooting and support

Possessed comprehensive knowledge of desktop operating systems and applications

Technical Skills:

FireEye, IronPort, Sourcefire, McAfee Web Gateway, Splunk, Splunk Express, McAfee DLP, Wireshark, IDS/IPS; Log Management, Anti-Virus Tools.

Operating Systems: Unix-Based Systems (Solaris, Linux); Windows.

Ticket Systems: Archer, Remedy & JIRA

Open Source Site Check tools (OSINT).

OSINT: Virus Total, IBM XFORCE, IPVOID, MX TOOLBOX, etc.



Contact this candidate