Ngwengeh FONGUH
Email: *******@*****.*** Cell: +1-272-***-****
Detailed, results-oriented, and dynamic Cyber-Security Analyst with proficient experience and good understanding of information security principles and concepts. Specialized in risk assessments, security control frameworks, network monitoring of SIEM tools, identification and analysis of suspicious events, IOC’s, phishing emails, endpoint and DLP alerts. Experience using various security tools to perform logs and packet analysis, as well as malware analysis using OSINT tools, with the objective of ensuring Confidentiality, Integrity and availability of the systems, networks, and data. Great communication and problem-solving skills, with a passion for continual learning and progress. Demonstrated servant leadership with the ability to foster team engagement and collaboration. Knowledge of agile software development methodologies, values, and procedures. Best Team Leader Award 2017. Woman of Inspiration Nominee 2021.
EDUCATION & CERTIFICATIONS:
-University Yaounde, Cameroon - Bachelor’s Degree
-University of Maryland - Master’s Degree in Cybersecurity and Governance (In Progress)
-CUNY Graduate School of Journalism - Certificate in Financial Reporting
-CUNY Graduate School of Journalism - Certificate in Arts and Entertainment Reporting
-COMPTIA Security+
-CISSP Certification (in progress)
-Professional Scrum Master (CSM)
-Licensed Insurance Producer
Key Competencies
• Executed critical risk and business impact assessments, and recovery management plans, while addressing security and business continuity concerns in a professional and timely matter.
• Expertly monitored and managed IT security environment to immediately detect, verify, and respond swiftly to cyber threats like vulnerability exploitation, malwares, cyber-attacks, etc., to ensure that gaps are closed, and risks are accurately mitigated.
• Promote the ongoing culture of continuous learning and Incidence Response Management through the documentation of daily operations, shift schedules, turn over procedures, SOP’s, while reinforcing principles within the Cyber Kill Chain and security best practices.
• Made recommendations for updating the controls needed for the mitigation of risks for IT processes which are outdated or not compliant with information security and risk frameworks, or legal/regulatory requirements.
• Demonstrated servant leadership with the ability to foster team engagement and collaboration.
• Working knowledge about task definition, backlog tracking, burndown metrics, velocity, user stories, etc.
• Knowledge of agile software development methodologies, values, and procedures.
Professional Experience
June 2020 – Present
Senior Cybersecurity Analyst – INFOSPRO – Washington DC
Responsibilities:
• Performed and delivered accurate technical security risk assessments using various frameworks to assist clients in mitigating existing and future security risks based on industry standards (NIST, ISO, SANS, Critical Security Controls).
• Assist in the maintenance of information Incident Response Framework, including the design and implementation of standards, procedures, and knowledge-based articles.
• Providing first level response for security events including but not limited to intrusion detection on the network, application, and operating systems (endpoint security).
• Expertly monitored and managed IT Security environment to immediately detect, verify, and respond swiftly to cyber threats: vulnerabilities, malwares, cyber-attacks, to ensure risks are accurately mitigated.
•Coordinate investigations and response efforts throughout the Incident Response lifecycles and analyze events and data to determine scope of cyber incidents.
• Lead and mentor new CSIRT and threat analysts responsible for the detection, containment, eradication, recovery, and lessons learned, with all security incidents.
• Performed real time analysis and correlation of logs/ alerts from a multitude of client devices with a focus on the determination of whether the said events constitute security incidents.
•Participated in incidence response with security team members and other departments as a member of CSIRT, to investigate and remediate incidents in a timely manner.
•Collect, analyze, and correlate security events, and use discovered data to enable recommendations for the mitigation of potential incidents.
•Identified and analyzed malicious activity to determine weaknesses exploited, exploitation methods, effects on the system and information.
• Worked on projects related to risk management, governance, policy, program management, incidence response, continuous monitoring, using (NIST) Special Publication (SP) 800-53 Rev 4 and 5 Security controls.
• Identified and analyzed information security business practice irregularities and information security breaches, assessed potential damage, monitored corrective action, and recommended cost-effective measures to mitigate vulnerabilities.
• Experience with anti-malware protection systems such as IDS/IPS, Sandboxing technologies, Next Generation Firewalls.
•Ability to recognize attacker tactics, techniques, and procedures as potential indicators of compromise (IOC’s), that can be used to improve monitoring, analysis, and Incident Response.
•Experience managing large software development projects that meet demanding time restraints, in a product development organization that diligently applies Security, Agile/Scrum principles, practices and theories.
July 2019 – April 2020
Senior Security Analyst – Ahold delhaize- carlisle, PA
Responsibilities:
• Reviewed all necessary security information to clearly explain that all safeguards meet security standards and will be implemented to meet all security requirements
• Worked with team members within the Risk and Compliance organization in assessing risk, developing appropriate controls, and advised on creation of action plans to address gaps.
• Performed and delivered written and verbal technical security risk assessments using various frameworks to assist clients in mitigating existing and future security risks based on industry standards (NIST, ISO, SANS, Critical Security Controls)
•. Checked that File data transfers are monitored and adhere to the secure file transfer guidelines of our environment and every one-time file transfer should be accomplished using encrypted email attachments, and encryption passwords and keys provided through different communication methods.
• Attend daily security and threat briefing meetings, and document ongoing security incidents, after action reports, and escalate as needed.
• Providing first level response for security events including but not limited to intrusion detection on the network, application, and operating systems (endpoint security).
•Performed initial analysis and investigation into alerts as they are seen, including antivirus and phishing alerts.
•. Made sure procedures related to different security solutions are documented and performed in a secure manner to ensure the protection of sensitive data.
• Expertly monitored and managed the IT Security environment to immediately detect, verify, and respond swiftly to cyber threats, like vulnerability exploitation, malware, cyber-attacks, to ensured that risks are accurately mitigated.
•. Made sure that the Mission Critical Value level of the solution is defined, and business continuity and disaster recovery plans are clear enough, explaining how MCV levels are maintained in case of incidents or disasters. MCV1 must be back online in 24 hours, MCV2 must be back in 48 hours, and MCV3 in one week.
• Executed critical risk and business impact assessments, continuity, and recovery management plans, while addressing security and business continuity concerns in a professional matter.
• Identified and developed controls needed for mitigation of risks for IT processes which are not compliant with information security and risk frameworks, or legal/regulatory requirements.
• Proficiently prepared management reports and assisted with project management responsibilities
• Productively refined and documented crucial security policies and guidelines, and reviewed disaster recovery policies, and updated as necessary.
Cybersecurity Analyst – DEFTECH GROUP, April 2017 – JUNE 2019
Responsibilities:
• Worked with business teams across company global organization to develop and execute the IT Risk Compliance and Risk Management program framework, extending processes as necessary to help businesses identify information risk and manage mitigation to an acceptable level.
•. Worked with team members within the Risk and Compliance organization in assessing risk, developing appropriate controls, and advised on creation of action plans to address gaps.
• Organized and performed system risk and information security risk assessments and promoted best practices for risk management through effective risk control, monitoring and improvement of risk management processes.
•. Was part of managing information security incident response plan, policies, and procedures.
•. Served as leader for several security-related initiatives including antivirus roll-out, problem management and the launch of a disaster recovery site and data leakage and loss prevention.
• I encouraged an environment where team members understand that the team succeeds or fails together.
• Initiated, participated, and promoted activities to foster information security awareness within the organization.
• Expertly promoted continuous improvement and helped teams increase productivity and innovation.
• Present quarterly updates to the Board of Directors on all information security matters.
IT Analyst – BRIGHT STONE NETWORK, JULY 2015 – MARCH 2017
• Assist in coordination of organization's IT systems to ensure that risk and security objectives are met.
•. Worked with team members within the Risk and Compliance organization in assessing risk, developing appropriate controls, and advised on creation of action plans to address gaps.
• Conducted and performed system risk and information security risk assessments and ensured that risks were accurately mitigated.
•. Was part of managing information security incident response plan, policies, and procedures.
•. Monitor internal control systems to ensure that appropriate information access levels and security clearances are maintained.
• Part of team that conducted phishing attack test to recognize phishing emails in working environment.
• Part of a team that planned, maintained, and tested for BCP and DR.
• Part of an assessment team that lead to an ATO.
IT Help Desk / Junior Analyst – REVOLUTION SOLVERS, JANUARY 2014 – MAY 2015
• Provided technical support over the phone, and in person to peers within the organization as needed.
•. Help desk link ticketing systems.
• Taking inventory of equipment and supplies.
•. Part of Troubleshooting team.
•. Took part in the IT seminars and documented IT reports as assigned.
•. Junior team member for Risk Management Framework.
•. Part of team appointed to work on organization’s policies and procedures.
Technical Skills
Disaster Recovery Planning
SIEM / IAM
IT Compliance
Control and Vulnerability Assessment
Risk Assessment and Compliance
NIST SP 800 Special Publication Series
FIPPS 199 Categorization
Risk Management Framework
FISMA and POA&M Management
Assess and perform information security risk analysis and periodic information system activity reviews for information security processes.
Experience in Agile Project Management Tools such as JIRA, Confluence, Version One, and Rally etc.
Experience in Microsoft applications (Word, Excel, Visio, Project, PowerPoint, SharePoint).