Post Job Free

Resume

Sign in

Soc Analyst Cybersecurity

Location:
Washington, DC
Posted:
February 02, 2023

Contact this candidate

Resume:

Hassan Elmajguari

Woodbridge, VA *****

571-***-****

adu3g3@r.postjobfree.com

Summary

As a Cybersecurity Analyst, I am responsible for supporting computer network defense, auditing the network for vulnerabilities, identifying relevant threats, recommending corrective actions, developing solutions for security issues, and investigating security incidents and breaches. I possess excellent communication, organizational and technical skills, a passionate problem solver who can manage multiple priorities and perform well under pressure. Highly adaptable at mastering new roles and responsibilities as directed.

Skills

● Firewalls, Anti-Virus, Virtual Private Network (VPN), Encryption, Routers, Switches, TCP/IP, LAN/WAN and IDS/IPS.

● IT Security: FireEye HX, Azure, Splunk, Nessus, QRadar, Nmap, Wireshark, Kali Linux, VirtualBox, Metasploit, Metasploitable, Malware Analysis Linux Command Line Tools, OWASP 10, Burp Suite, Phishing, Nagios.

● SQL queries, Linux, Python.

● Knowledge of all phases of Software Test Process including Test plan, writing Test Cases, Test Data creation, Test Execution and Test Closure.

● Knowledge of Defect Reporting and Defect Tracking tool like JIRA(Jira Helpdesk, Jira Service Desk)

Experience

Neovera March 2022 to Current

Threat Analyst

Reston, VA

Provide first level technical resolution for security alerts and SOC service requests.

Handle the offenses generated by AlienVault and Microsoft Azure Sentinel such as firewall denies, authentication failures, connection to a known malware site, traffic from an untrusted network, and potential data loss.

Log and record all alerts with integrated ticketing system.

Perform incident documentation by creating tickets. Incident documentation includes selection of the affected party, prioritization of the incident.

Analyze and triage security alerts.

Technical and analytical skills to handle security incidents and threats.

Provide timely and reliable service to customers.

Identify weaknesses in customer infrastructures and suggest improvements.

Mentor and train customers using and operating the client portal portions of the security Monitoring and ticketing system platform.

Document solutions, process, or procedures and present in written document, verbally on the phone, or in person.

Update customers regarding the status of their inquiries or issues via telephone or email.

Monitor the alarm activity (includes multiple customers and INOC internal infrastructure) through the software monitoring system.

CyberNow Labs 2021 to March 2022

SOC Analyst

Sterling, VA

Conducted log analysis on IBM QRadar SIEM solution and provided recommendations to the technical teams via The Hive ticketing system.

Created, modified, and updated (SIEM Security Information Event Management) rules.

Monitored and analyzed SIEM alerts through Splunk and identified security anomalies for investigation and remediation.

Familiarity with fundamentals of information security, including network technologies and tools, identity and access management, network security, implementing secure systems and risk management.

Analyzed PCAP files, narrowed down anomaly traffic with Wireshark, examined the details of the infected hosts and reviewed the indicators of compromise (IOCs).

Performed phishing email campaign and checking reputation, email header, domain, and IP address, by using open-source intelligence (OSINT) tools or websites.

Monitored computer virus reports to determine when to update virus protection systems.

Experience using and analyzing technical assessment tools such as Nessus, McAfee Vulnerability Manager (MVM), Wireshark, Snort and Nmap.

Education

Northern Virginia Community College

Cyber security

Alexandria, VA

Certifications

CompTIA Security+

Advanced Security Practitioner (CASP+)

Certified Ethical Hacker (CEH)

Fundamentals 1, Splunk



Contact this candidate