Post Job Free
Sign in

Soc Analyst Security

Location:
Forney, TX
Posted:
September 04, 2022

Contact this candidate

Resume:

ELVIS ADE

978-***-****

***********@*****.***

OBJECTIVE:

An experienced and self-motivated cyber security professional with an integral knowledge of diversified systems. Proven skills in collaborating with diverse IT professionals to achieve the security goals for information systems in enterprise environments ( C.I.A). I have more than 6 years’ experience with specialized skills working in the Security Operation Center, Performing Network Traffic Monitoring, Threats Hunting and Vulnerability Management using Automated Tools.

AREAS OF EXPERTISE

•Network Traffic Monitoring.

•Splunk Enterprise Security (SIEM).

•Threat Hunting Using Open Sources Tools/ Technologies.

•Vulnerability and Risk Management Using Automated Tools (NESSUS).

•Package Capture- PCAP (Wireshark)

•Knowledge of TCP/IP Protocols and Network/Security Applications.

•Familiar with Interpreting and Analyzing Vulnerability Scan Results

•Email Threats Assessment, Social Engineering, End User Threats determine.

•Experience analyzing Firewall, IDS, IPS, DNS, DHCP, Web Proxy, Anti-Virus and SMTP data for security-related concerns and events

EDUCATION

2009-2011: Bachelors Degree.

Certification: CompTIA Security +

B.S- Cyber Security Degree. (In Progress).

EXPERIENCE

SOC ANALYST:

Murpy U.S.A

January 2020- Present

•Assist with the development of processes and procedures to improve incident response times, analysis of incidents, and overall SOC functions.

•Monitoring and analyzing network traffic, Intrusion Detection Systems (IDS), security events and logs.

•Prioritizing and differentiating between potential intrusion attempts and false alarms

•Opening tickets and assigning to correct resolver and validating/closing tickets related to false positives.

•Providing Tier 2 investigation, triage, and mitigation of detected security events.

•Advising incident responders in the steps to take to investigate and resolve computer security incidents.

•Staying up to date with current vulnerabilities, attacks, and countermeasures.

•Responsible for working in a 24 7 Security Operation Center (SOC) environment.

•Provide analysis and trending of security log data from many heterogeneous security devices.

•Provide Incident Response (IR) support when analysis confirms the actionable incident.

•Provide threat and vulnerability analysis as well as security advisory services.

•Analyze and respond to previously undisclosed software and hardware vulnerabilities.

•Investigate, document, and report on information security issues and emerging trends.

•Integrate and share information with other analysts and other teams.

CYBER SECURITY VULNERABIITY ANALYST:

Goldman sachs Bank

January 2018 to January 2020

• Serves as a Cyber Security/ Vulnerability Analyst for the Security Tea, Engineers.

• Performs vulnerability assessment, security test or evaluation during assessment and authorization process.

•Use industry accepted tools such as Nessus to assess the full scope of the vulnerability and compliance status of all classified IT software, hardware and network systems.

•Review and analyze security tool output and vulnerability data to identify relevant vulnerabilities; monitor external threat intelligence feeds for internal relevance.

• Work with System Owners and technical teams to prioritize and remediate identified threats and vulnerabilities during weekly scans.

•Conduct vulnerability assessments of failed scans and analyze vulnerability reports from enterprise assessment tools such as SCAP, Security Center, Nessus.

•Interface with Security Control Assessors (SCA), System Owners and System Administrators in order to coordinate and perform vulnerability and compliance testing on a wide range of classified IT systems.

•Support compliance and risk management activities recommend security controls and corrective actions to mitigate vulnerability risks.

•Coordinate with the Program Manager to ensure vulnerability scans adhere to approved timelines in support of the internal security policies.

•Participate in threat hunting activities and analysis to maintain a high degree of awareness on the current threat landscape.

CYBER SECURITY ANALYST.

U.S BANK

TX January 2016- January 2018

•Identified and investigated security events while maintaining daily shift logs.

•Carried out phishing email investigation using Iron port and Fire Eye ETP.

•Worked in a 24/7 environment monitoring and analyzing security events to determine intrusions, security breaches and malicious events.

•Used Google DLP and McAfee DLP manager to monitor outbound emails for PII, PHI AND BII

•Carried out continuous monitoring and interpretation of threats using IDS/IPS, SIEM tools.

•Conducted initial triage, containment and escalation for suspicious events and incidents

•Worked with team lead to develop and update SOP’s for DLP email alerts.

•Research new and evolving threats threats and vulnerabilities with potential to impact the monitored environment.

•Investigated malicious phishing emails, domains URLs and IPS using open source tools and SIEM tools and took action per company SOP.



Contact this candidate