PROFESSIONAL PROFILE:
Active U.S. Government Top Secret Security Clearance (TS/SCI with CI Poly).
Purposeful and resolute professional with solid experience in cyber security operations, Intelligence collection and linguistic support, network administration, data management, customer service. A proven leader in a progressively dynamic environment with the ability to communicate and provide services to a diverse group of people speaking different languages. Initiative-taking, dependable, and demonstrates professionalism in handling various organizational functions and administrative strategies critical to organizational success with the ability to thrive in busy environments. Multilingual (Hausa, Djarma, French and English).
CORE COMPETENCIES:
Customer service Task prioritization Excellent work ethics Experience with Elastic Cyber threat hunting Network operations
PROFESSIONAL EXPERIENCE:
Army National Guards
SOC Analyst 12/2020-Present
•Currently serving on Task Force Echo 6 as a SOC Analyst
•As a Defensive Cyber Operations (DCO) SOC Analyst, I developed a threat hunting methodology SOP that we used daily in performing threat hunting activities.
• I used the MITRE attack framework to build hunt models based on the adversaries TTPs.
•I used biweekly INTSUMS to run queries against our infrastructure and populate an IOC list that is eventually used to build hunt profiles.
•I created various Dashboards in Kibana for better visualization and data analysis.
•I used my knowledge of commonly used network protocols and detection methods to create cases in security onion and generate PCAPs for analysis.
•I also analyzed data captured through Arkime using specific queries.
•I helped my SOC team create Suricata rules based on our mission requirements to satisfy our SIEM needs.
•I used Kibana to monitor detections from custom rules that my team created, triaged, identified, and analyzed the captured data for evidence of anomaly.
•I used Redmine for ticketing to report anomalous events that need further investigation to our DFIR team and help protect our assets.
•I used confluence for mission management and information sharing among mission teams.
•I used Endgame for end point detection, prevention, and response during my unit’s 2022 validation exercise and helped achieve a successful evaluation as a member of the clear team.
Cyber Operations Sergeant, 03/2020-Present
•As a Cyber Operations Sergeant, I held the role of Linux system administrator for my unit where I conducted new system build, system backups, patch management, application installation and configuration.
•Defended against threats to the DoD Information Networks (DoDIN) while ensuring the professional development, combat readiness, and health and welfare of all soldiers assigned under me.
•Assisted and advised the leadership in overall mission readiness
CWU INC.
Linguist, 02/2017-Present
•Provided foreign language support services, including transcription, and translation / interpretation services in support of military interrogations, intelligence collection, and other operational missions.
•Provided all cultural and ethnic context of translations, interpretations, and transcriptions with an expert linguist’s opinion given to the supported organization or agency as to the meaning/intent of terms, phrases, or statements that may have multiple valid interpretations.
•Performed document exploitation, scan, research, and analysis of foreign language documents and intercepted data for key information pertinent and specific to professional fields, such as medicine, scientific, engineering, legal, etc. and identify and extract information components meeting military information requirement list criteria as well as provide input to reports.
Army National Guards
Human Intelligence Collector, 12/2013-03/2020
•Performed all-source analysis including social network analysis and geospatial analysis to identify potential human sources that can resolve these information needs.
•Compiled information into clear concise packages which are delivered to Intelligence Analysts for action.
•Collaborated with collection managers to identify critical information gaps.
•Provided identification of all related intelligence requirements for the assigned issues.
•Developed collection and data-mining strategies.
•Developed link analysis and social network analysis to identify targets.
•Produce target profiles.
EDUCATION:
•Sec+ July 2022
•Cisco CCENT Certification May 2018
•Joint Cyber Analytics Course (JCAC) Training Certificate 07/2020-05/2021
•Cyber Common Technical Core (CCTC) training Certificate 06/2021-12/2021
•STRAYER UNIVERSITY 10/2016-03/2018 (BS Information Technology/ Cyber Security)
•ITT Tech 12/2014-09/2016 (AS Network Systems Administration)
ACHIEVEMENTS/HONORS:
•Honor roll BS Information Technology/ Cyber Security Strayer University
•Honor Graduate AS Network Systems Administration ITT-Tech
•Student of The Cycle (Human Intelligence Collector Course
References are available upon request.