Post Job Free

Resume

Sign in

Cybersecurity Analyst Soc

Location:
Easton, PA
Posted:
April 12, 2023

Contact this candidate

Resume:

SAİD CANDAN

H** Dream Dr, Wind Gap PA *****

570-***-****

adwh0f@r.postjobfree.com

PROFILE

Detailed oriented cybersecurity professional with an excellent work ethic and interpersonal skills, seeking a challenging position related to Information Technology and Cyber Security. Highly qualified and well-developed cyber security professional with 2 years of combined Cyber Security and Information Technology experience in both public and private sectors in which administrative, physical and technical cyber/information security controls are strictly applied. Specialized in analysis and solution implementation and currently working on hands-on projects in monitoring and analysis of potential and active threats, stopping hackers and securing networks and applications by using the best practices, tools and technologies.

EXPERIENCE

Cyber2Cyber Security Solutions San Jose, CA Dec 2020 - Present

●Follow detailed operational processes and procedures to appropriately analyze, escalate, and assist in remediation of security incidents.

●Liaise with the Company's Security Operation Center to respond to emerging incidents in a timely manner.

●Perform analysis of log files of Firewall, IPS, IDS, Server and Proxy via Splunk SIEM solution.

●Fulfilled PCAP analysis using the Wireshark, which captures and analyzes data on the network.

●Provide analysis and containment of compromised systems and mitigate root causes.

●Provided proper executive summary about security incidents using IBM Resilient and Jira ticketing systems.

●Assist in performing periodic access reviews/inactivity reviews.

●Performed comprehensive analysis to determine the legitimacy of files, domains, and emails using online resources such as Mxtoolbox, VirusTotal, UrlScanIo, and JoeSandbox in daily incident analysis.

●Expertise in the fundamentals of information security, including network technologies and tools, identity and access management, network security, secure systems implementation, and risk management.

●Investigated phishing emails by using Proofpoint and searching on OSINT to review attachments, header information, and the resource and taking required actions to prevent users from interacting with malicious contentAnalyze and review escalated cases until closure. This includes investigating and recommending appropriate corrective actions for cybersecurity incidents.

IT Coordinator / Administrator

Respect Gratuate scholl Bethlehem PA July 2017 - Dec 2020

Helped students develop self-esteem and islamic speech and critical thinking and communication.

Responsible for coordinating cultural center program and events by coordinating with director.

Volunteer organization in islamic studies in Monroe County Correctional.

SKILLS

Security: Cybersecurity, Network Security, CompTIA, Security Operations, Problem Solving, Teamwork, OWASP Risk Analysis, Malware Analysis, Phishing Analysis, Threat Analysis, Threat Hunting, Incident Response, Risk Mitigation,

Network: Wireshark, Nmap, Nessus, Pcap Analysis, TCP/IP, Snort, Cyber Kill Chain Framework, Networking.

Operating Systems: Windows, Linux Fedora/Ubuntu, Kali Linux, macOS.

Performance improvement, Leadership, Group and individual instruction

EDUCATION

2020—Respect Gratuate School Master of Religion

2016—Dokuz Eylül University Divinity School TURKEY

2011—Yamanlar High School TURKEY

CERTIFICATIONS AND TRAINING

●CompTIA Security+

●IBM Cybersecurity Analyst Professional Certificate

Courses include; IBM Cybersecurity Analyst Assessment, Cybersecurity Compliance Framework & System Administration, Penetration Testing, Incident Response and Forensics, Cybersecurity Roles, Processes & Operating System Security, Cyber Threat Intelligence, Network Security & Database Vulnerabilities, Introduction to Cybersecurity Tools & Cyber Attacks, Cybersecurity Capstone: Breach Response Case Studies

●Cyber Threat Intelligence by IBM

●DDoS Attacks & Defenses

●Programming Foundations, HTML

●Cyber Security Foundation

●Cyber Threat Detection and Mitigation

●Cyber Attack Countermeasures

●Cybersecurity Compliance Framework & System Administration by IBM

●Information Technology (IT) and Cloud Fundamentals

●Identifying Security Vulnerabilities

●Splunk Fundamentals Infrastructure Overview and User Behavior by Splunk

●Usable Security

●SOC Analyst Training Learning

LANGUAGES

Turkish (Native)

English (Advance)

Ottoman Turkish (Reading proficiency, paleography)

Arabic – Classical Standard (Reading)



Contact this candidate