MESUT MIZRAK
New York, New York, United States · 773-***-****
*****.******@*****.*** · https://www.linkedin.com/in/mesut-m-19b2556/ Results-driven and well-developed Cyber Security professional with 3+ years of proven experience in both public and private sectors in which administrative, physical, and technical cyber/information security controls are strictly applied.
EXPERIENCE
JANUARY 2020 – SEPTEMBER 2022 (2 YEARS 9 MONTHS +) CYBER SECURITY ENGINEER, BROOKDALE UNIVERSITY HOSPITAL - MEDICAL CENTER
•Train and help junior-level analysts with intelligence report writing and using closed/open- source tools to check, analyze cyber threats and provide recommended actions. •Research and check the clear, deep & dark web, hacker forums, and other channels for signs of cyber threats against customers, data breaches, leaked credentials, payment card data exposure, PII (Personal Identifiable Information), intellectual properties, illicit/counterfeit products, and services, malware, chatter by known threat actors, discussions, and threats. • Follow detailed operational processes and procedures to appropriately analyze, escalate, and aid in the remediation of security incidents. • Liaise with the Company's Security Operation Center to respond to emerging incidents on time. • Perform analysis of log files of Firewall, IPS, IDS (Intrusion Detection Systems) • As a member of Security team, SaaS and Web Application Security platforms are part of my day to day. • Responsible for compiling the findings of penetration tests and assessments into formal reports that are provided to the system and application stakeholders using Python/Java.
SEPTEMBER 2022 – PRESENT (1 MONTH +)
INFORMATION TECHNOLOGY SECURITY ADMINISTRATOR, ONE BROOKLYN HEALTH Administrating the Network, Infrastructure and Security teams Analyze PCAP files for Malware analysis and find details of the infected Windows hosts and write IOC (Indicators of compromise) on executive summary reports. • Liaise with the Company's SOC
(Security Operations Center) to respond to emerging incidents promptly; triage details and supply support to both the SOC and Business Managers • Conduct core information security activities: Security Information & Event Management (SIEM), Malware Detection, Vulnerability Management, Education & Awareness, Open-Source Intelligence (OSINT), Penetration Testing, Incident Response, Network Monitoring, and Log Analysis. • Analyze and review escalated cases until closure. This includes investigating and recommending proper corrective actions for cyber security incidents • Perform postmortem analysis on logs, traffic flows, and other phishing activities to identify malicious actors.
JUNE 2018 - JANUARY 2020(1 YEAR 7 MONTHS)
CYBERSECURITY ANALYST, SOLVENT CYBERSECURITY FAIRFAX, VA
• Analyze PCAP files for malware analysis and find details of the infected Windows hosts and write IOC on executive summary reports. • Conduct core information security activities: SIEM, Malware Detection, Vulnerability Management, OSINT, Incident Response, Network Monitoring, and Log Analysis. • Analyze and review escalated cases until closure. This includes investigating 2
and recommending proper corrective actions for cyber security incidents • Providing analysis and containment of compromised systems and mitigating root causes. • Assist in performing periodic access reviews/inactivity reviews. • Identify, track, and investigate high-priority threat campaigns, malicious actors with interest, capability, and TTPs (Techniques, Tactics, and Procedures). • Orchestrated deployment, security patching with the SaaS and AWS. •Maintained web security applications by keeping them up to date using Java and Python in script modules of Splunk. • Assisted in remediation of vulnerabilities for critical web applications with Python and Java platforms.
EDUCATION
JUNE 2000
BACHELOR OF SCIENCE(PHYSICS), BOGAZIÇI UNIVERSITY (ISTANBUL, TURKIYE) SKILLS-LICENSES & CERTIFICATIONS
• CompTIA Security+ ce and Network+
• CompTIA Cybersecurity Analyst
• CompTIA CySA+ (CS0-002) Cert: Threat
Management
• Splunk Search Expert
• MS Azure
• Microsoft Office O365
• IBM Cyber Security Analyst
• Cyber Threat Intelligence by IBM
• Qualys Certified Specialist
• Wireshark Essential Training
• Cloud Services
• Cybersecurity Compliance Framework &
System Administration by IBM
• Cloud Security, Packet Analysis, TCPDump,
TCP/IP, Snort, Cyber Kill Chain Framework,
NIST (National Institute of Standards and
Technology) 800-53, PCI DSS
• Networking and Network Security
• Project Management
• Threat & Vulnerability Management
• Elastic Search
• Cisco Threat Hunting Workshop Training
• Cybersecurity Roles, Processes & OS
• Vulnerability Management Specialist (Qualys)
• Vulnerability Management with Nessus
• MITRE ATT&CK Framework
• Nmap, Kali Linux
• QRadar SIEM, Virus Total, Phishing Analysis
• Oracle Learning VirtualBox
• DevOps Foundations: Monitoring and
Observability
• Computer Forensics
• Penetration Testing Essentials
• Web Application Security
• Python, Java
ACTIVITIES
• Perform passive-reconnaissance vulnerability assessment and monitoring service • Analyze CTI findings (Fraudulent domains, Phishing sites, Fraudulent Mobile Apps, etc.) • Monitor and analyze Security Information and Event Management (SIEM) alerts through Splunk and identify security incidents for remediation and investigation •Incident Response Investigations •AWS Networking Security Fundamentals, Vulnerability Management, OWASP (Open Web Application Security Project), Log Analysis, Scanning, Malware Detection and Analysis, VMware •Access Management
•EPIC, HITECH (Health Information Technology for Economic and Clinical Health), HealthStream, ePHI, PII, HIPAA (Health Insurance Portability and Accountability) Compliance