SAİD CANDAN
H** Dream Dr, Wind Gap PA *****
adwh0f@r.postjobfree.com
PROFILE
Detailed oriented cybersecurity professional with an excellent work ethic and interpersonal skills, seeking a challenging position related to Information Technology and Cyber Security. Highly qualified and well-developed cyber security professional with 2 years of combined Cyber Security and Information Technology experience in both public and private sectors in which administrative, physical and technical cyber/information security controls are strictly applied. Specialized in analysis and solution implementation and currently working on hands-on projects in monitoring and analysis of potential and active threats, stopping hackers and securing networks and applications by using the best practices, tools and technologies.
EXPERIENCE
Cyber2Cyber Security Solutions San Jose, CA Dec 2020 - Present
●Follow detailed operational processes and procedures to appropriately analyze, escalate, and assist in remediation of security incidents.
●Liaise with the Company's Security Operation Center to respond to emerging incidents in a timely manner.
●Perform analysis of log files of Firewall, IPS, IDS, Server and Proxy via Splunk SIEM solution.
●Fulfilled PCAP analysis using the Wireshark, which captures and analyzes data on the network.
●Provide analysis and containment of compromised systems and mitigate root causes.
●Provided proper executive summary about security incidents using IBM Resilient and Jira ticketing systems.
●Assist in performing periodic access reviews/inactivity reviews.
●Performed comprehensive analysis to determine the legitimacy of files, domains, and emails using online resources such as Mxtoolbox, VirusTotal, UrlScanIo, and JoeSandbox in daily incident analysis.
●Expertise in the fundamentals of information security, including network technologies and tools, identity and access management, network security, secure systems implementation, and risk management.
●Investigated phishing emails by using Proofpoint and searching on OSINT to review attachments, header information, and the resource and taking required actions to prevent users from interacting with malicious contentAnalyze and review escalated cases until closure. This includes investigating and recommending appropriate corrective actions for cybersecurity incidents.
IT Coordinator / Administrator
Respect Gratuate scholl Bethlehem PA July 2017 - Dec 2020
Helped students develop self-esteem and islamic speech and critical thinking and communication.
Responsible for coordinating cultural center program and events by coordinating with director.
Volunteer organization in islamic studies in Monroe County Correctional.
SKILLS
Security: Cybersecurity, Network Security, CompTIA, Security Operations, Problem Solving, Teamwork, OWASP Risk Analysis, Malware Analysis, Phishing Analysis, Threat Analysis, Threat Hunting, Incident Response, Risk Mitigation,
Network: Wireshark, Nmap, Nessus, Pcap Analysis, TCP/IP, Snort, Cyber Kill Chain Framework, Networking.
Operating Systems: Windows, Linux Fedora/Ubuntu, Kali Linux, macOS.
Performance improvement, Leadership, Group and individual instruction
EDUCATION
2020—Respect Gratuate School Master of Religion
2016—Dokuz Eylül University Divinity School TURKEY
2011—Yamanlar High School TURKEY
CERTIFICATIONS AND TRAINING
●CompTIA Security+
●IBM Cybersecurity Analyst Professional Certificate
Courses include; IBM Cybersecurity Analyst Assessment, Cybersecurity Compliance Framework & System Administration, Penetration Testing, Incident Response and Forensics, Cybersecurity Roles, Processes & Operating System Security, Cyber Threat Intelligence, Network Security & Database Vulnerabilities, Introduction to Cybersecurity Tools & Cyber Attacks, Cybersecurity Capstone: Breach Response Case Studies
●Cyber Threat Intelligence by IBM
●DDoS Attacks & Defenses
●Programming Foundations, HTML
●Cyber Security Foundation
●Cyber Threat Detection and Mitigation
●Cyber Attack Countermeasures
●Cybersecurity Compliance Framework & System Administration by IBM
●Information Technology (IT) and Cloud Fundamentals
●Identifying Security Vulnerabilities
●Splunk Fundamentals Infrastructure Overview and User Behavior by Splunk
●Usable Security
●SOC Analyst Training Learning
LANGUAGES
Turkish (Native)
English (Advance)
Ottoman Turkish (Reading proficiency, paleography)
Arabic – Classical Standard (Reading)