Post Job Free

Resume

Sign in

Customer Service Cloud Security

Location:
South Carolina
Posted:
August 21, 2023

Contact this candidate

Resume:

OUSSAMA BOUKARAA

Charleston, South Carolina Multilingual ady3tw@r.postjobfree.com +1-843-***-****

https://www.linkedin.com/in/oussama90/ https://www.youtube.com/channel/UCDQu5oGnv7EyuAQeo7PTbKQ OBJECTIVE PROFESSIONAL SUMMARY TARGET-ROLE SUMMARY Quick learner and efficient worker with attention to detail, seeking to begin a career in the Cyber/Information Technology SOC analyst Cybersecurity industry to continue building on and utilizing experience in customer service, leadership, and knowledge gained through Professional Cybersecurity Certificate Program at North Carolina State University.

EDUCATION CERTIFICATIONS

North Carolina State University

Cybersecurity Professional Certificate, June 2022

A defensive Cybersecurity program, complete with in-depth networking, Cloud, Windows, and Linux security courses that aided in the mastery of Cyberinfrastructure, incident response techniques, and digital forensic theories. University of Algiers Certificate of Professional Competency for Lawyer, 2013 University of Algiers Bachelor of Legal and Administrative Sciences, 2012 TECHNICAL SKILLS

Certifications: Security + (2022)

Technology: Foundational Knowledge of Wireshark, Honeypots, PyCharm, DLP system, IDS/IPS, Snort, Splunk Programming Languages: Foundational knowledge of Python Operating Systems: Knowledge of Windows 10, Windows 16 Server, Kali Linux, Ubuntu, Debian, Red hat, Centos

Windows Security: Knowledge of Active Directory, Windows Server, Group Policy, DNS, Shares and Permissions, DHCP, Disk Management, Microsoft Endpoint Security, Security Policy, Microsoft Authentication Networking: Networking fundamentals, Networking, Switch & IOS, IP & Routing, Subnetting, IPv4/6 Static Routing, Dynamic Routing, VLANs and Trunking, Diagnostics & Troubleshooting, Access Control List, Infrastructure Services,

Cloud: Foundational Knowledge of Cloud Security, Virtualization and Container, and Advanced Cloud Security Additional Relevant Experience: Microsoft Security, Computer Networking, Cloud Security, Linux Security, Network Security, Cyber Technologies, Python, Ethical Hacking, DFIR, Game Theory

• Intermediate understanding of cloud security ( AWS)

• Experience with SOAR tools (Security Orchestration and Automation, Security Incident Response Platforms ( TheHive)

• Intermediate experience using an IDS eg., Snort

• Good practice command of Linux systems administration and working with BASH

• Hands on labs configuring Windows or Linux system logging

• Intermediate understanding of networking including TCP/IP

• Hands on monitoring and packet analysis tools

• Intermediate understanding of HTTP/HTTPS, SSL/TLS,

• Good understanding of the OWASP Top 10

• knowledge of threat vectors against the Windows or Linux platform

• Basic knowledge anomaly detection based on security systems

• Basic knowledge of netflows and netflow analysis Languages: English, French, Arabic

Installation of WAN

Scope: Built Wide Area Network (WAN) for a bank branch including three LANs.

• Identified ISP, designed layout for bandwidth, line quality, and hardware OUSSAMA BOUKARAA

Charleston, South Carolina Multilingual ady3tw@r.postjobfree.com +1-843-***-**** https://www.linkedin.com/in/oussama90/ https://www.youtube.com/channel/UCDQu5oGnv7EyuAQeo7PTbKQ

• Built WAN utilizing VPN.

• Utilized Cisco Packet Tracer 7.2.2.

Network Configuration

Scope: Set up a corporate network and implement security settings for a new bank branch.

• Devised network Topology plan and where to assign the IP address.

• Built VLANs, trunks, and routers to allow multiple stream communication. Arranged switches to communicate with port security and routers to work with OSPF.

• Set up 3 machines: client, host, and threat; established connection and engaged in communication through network requests and emails.

• Imitate a threat to extract info and intercept traffic-utilizing Wireshark.

• Kali.org. Configured firewall using Pfsense

Cyber infrastructure & Technology

• install, configure, and run a data loss prevention system.

• how the Modern Honey Network (MHN) on a Linux machine works and how to configure the Dionaea honeypot.

• Configure Snort on pfSense and monitor ICMP traffic with custom rules.

• Install Splunk Enterprise on Linux, connect, and gather logs from Windows OS using Splunk Universal Forwarder

Python

• Scope: Create code that receives input; a program that will accept user information.

• Create Python script(s) using PyCharm

• Create input fields

• Create a statement for the desired output.

• Test/Run to ensure correct output.

• Established protocols, secured channel in a sandbox environment, translated and encrypted code. Ethical Hacking

• Use scanning techniques on the network to find the target on the vulnerable machine using Nmap, masscan, zenmap commands.

• Use Brute-Force tools, such as Hydra, Cupp, John the Ripper, and rar2john

• Use the Metasploit Framework (MSF) to scan for HSTS configurations and gain a remote shell on the Windows 7 VM

• Use Wireshark to track passwords. Using Windows and Linux, look up IP addresses. Try to crack passwords by monitoring the flow of traffic

• execute and defend against a variety of cyber-attacks, including social engineering attacks, network attacks, applicative attacks, and cryptography attacks

• Technologies used in HTTP client-server communication. Also explained are the concepts of traffic interception and manipulation.

• infrastructure attacks using built-in Linux tools, including Metasploit and Reverse Shell, and about the Lateral Movement method

DFIR

Scope: Performed a forensic investigation within a lab environment using SIFT Workstation & Flare VM. Learned techniques concerning finding “noisy” IP addresses using Zeek to parse pcap Files, filtering techniques, finding malicious files on infected computers/backdoors, investigating malware behavior, and finding secrets.

• Learned about the DFIR Lifecycle

OUSSAMA BOUKARAA

Charleston, South Carolina Multilingual ady3tw@r.postjobfree.com +1-843-***-**** https://www.linkedin.com/in/oussama90/ https://www.youtube.com/channel/UCDQu5oGnv7EyuAQeo7PTbKQ

• Able to acquire data from live and dead Windows & Linux systems. (dd, mount, CAINE, FTK, OSFMount, Sysinternals.

• Knowledge in memory analysis (Volatility), log analysis, and timeline analysis (log parser/Splunk)

• Learned about network forensics (proxy, DNS tunnel, malware). PROFESSIONAL EXPERIENCE

Expert Coatings LLC Jun 2018 – today

Owner / Operator

• planned, coordinate, budgeted, and supervised construction projects of small and medium scale buildings, including built-out and quality

• drive business trough aggressive management initiatives resulting in increased revenue growth

• Ensure customer service and satisfaction is afforded highest attention and priority Trejo Constructions Feb 2015 – Jun 2018

Supervisor / Team manager

• managed diverse team of iron-workers, tradesmen, and general roles, train and motivate new hires for operations to ensure optimal efficiency

• supervised 13+ building projects of various sizes in the residential construction area

• assist the construction site manager in all areas of supervision, from liaising with architects and engineers to coordinating with surveyors and site owner



Contact this candidate