Madison Hind
Security Analyst - SOC Analyst
385-***-**** ************@*****.*** Orem, UT http://linkedin.com/madison-hind/
Results-driven information security professional with a strong interest in security infrastructure. Adept at designing solutions for aligning security architecture plans and processes with SOC standards. Eager to join a team and positively contribute to team and organizational goals.
TECHNICAL SKILLS
Knowledgeable: Linux, Windows Server, Active Directory, Python, Bash, Snort, Splunk, Wireshark, Burp Suite, SIEM, Scripting, Metasploit, Nmap, OSINT, Firewalls, Networking, Command Line, Virtual Machines
Certificates
CompTIA Security+ (In Progress - Expected: June 2023)
ADDITIONAL TRAINING
Whizlab- Completed training/earned certificates
TryHackMe- Presecurity & Introduction to Cybersecurity certificates
Projects
Red 1 - As a final project our group was tasked with regaining access to a vulnerable machine.
Tools used in this project: Kali Linux, NMap, netdiscover, dirbuster, burpsuite, cyber chef, hashcat, hydra.
EXPERIENCE
Customer Service Rep Teleperformance Orem, UT (Remote) Oct 2021 – Feb 2022
Handle Inbound calls from USAA customers
Assist customers with account inquiries, billing issues, payment arraignments, and promote services
Machine Operator Danone NA West Jordan, UT Jul 2019 – Sept 2022
As a trainer created a new training template for new-hires
Collaborated on an engineering project on how to run a change-over more efficiently
Machine Operator Walmart DC Corrine, UT June 2013 – Oct 2018
Implemented a new forklift operator training programs
Designed a new program on how to orderfill certain items more efficiently
EDUCATION
Oct 2022 – Apr 2023
Utah State University Cyber Bootcamp
Powered by Fullstack Academy
Six-month immersive program designed to train in advanced red team/blue team skills and use of security tools.
Formed a solid foundation of computer knowledge including Windows client/server and various Linux distros
●Mastered common CLI navigation for Linux through Fullstack’s CTF challenges
●Learned Python basics and Bash scripting as well as PowerShell cmdlets
●Practiced offensive techniques and how to mitigate these threats using blue team industry tools to align with cybersecurity frameworks such as NIST and MITRE ATT&CK
●Wrote and modified rule sets for IPS/IDS such as Snort and ACLs for firewalls based on parameters provided
●Used packet capture tools such as Wireshark and TCPdump to investigate traffic for Indicators of Compromise
●Executed basic incident response procedures and gained familiarity with digital forensics tools and utilities
●Performed simulated threat hunting by analyzing large data sets in Splunk
●Gained familiarity with a variety of tools including Snort, Splunk, Wireshark, Burp Suite, Metasploit, Nessus, Nmap, and ping/netstat