Michael Umeh
*********@*****.*** 832-***-**** Humble,TX
Results-driven Cybersecurity professional with hands-on experience in threat detection, incident response, cloud security, and vulnerability management. Proficient in security tools such as Splunk, Wireshark, Metasploit, and Wazuh, with a strong foundation in network security, digital forensics, and security automation. Analytical and solutions-focused, with a continuous learning mindset that drives adaptability and innovation in securing IT environments. A dedicated professional with progressive technical expertise, complemented by discipline, teamwork, and strategic thinking-traits developed over 14 years as an Olympic and professional athlete. Passionate about securing cloud infrastructures, automating security processes, and leveraging attention to detail to enhance organizational defenses against evolving cyber threats. EDUCATION
University of Nevada, Las Vegas (UNLV) - Bachelor of Science, Kinesiology 2006 Las Vegas, NV
Day0 Cybersecurity Institute
March 2024 - current
CERTIFICATIONS
CompTIA Security+ (CE)
Microsoft Certified: Azure Fundamentals
SKILLS
Security Operations & Threat Detection: SIEM (Splunk, Wazuh), IDS/IPS, Wireshark, Malware Analysis Incident Response & Digital Forensics: Windows Event Collector, File Carving, Joe Sandbox, NSRL Vulnerability Management & Penetration Testing: Nmap, Metasploit, Burp Suite, SQL Injection Testing Cloud Security & Virtualization: AWS Fundamentals, IPSec VPN, Virtual Machines (Hyper-V, VMware) Identity & Access Management (IAM): Active Directory, NTFS Permissions, Group Policy Objects (GPOs) Automation & Scripting: Python, PowerShell, Bash (for Firewall Configurations & Malware Removal) Compliance & Risk Management: CIS Benchmarks, CVSS, Security Awareness Training WORK EXPERIENCE
Day0 Cybersecurity Intern - Security Operations Analyst March 2024 - current
Configured and optimized Splunk and Wazuh, enhancing real-time security event monitoring and reducing threat detection time by 30%.
Conducted network scanning and vulnerability assessments using Nmap, Metasploit, and Burp Suite, identifying and mitigating security weaknesses.
Performed incident response and forensic investigations leveraging Wireshark, Windows Event Collector, and Joe Sandbox for malware analysis and data recovery.
Managed IAM policies, enforced NTFS permissions, and secured file access using EFS/DRA encryption techniques. Implemented IPSec VPN configurations to secure remote connections and monitor encrypted traffic using Wireshark. Automated security operations using Python and PowerShell scripts, streamlining firewall configurations and malware remediation processes.
Developed security awareness training simulations, including phishing campaigns and reverse shell initiation exercises. Business Owner/Operator - Double A Services
Sep 2021 - current Houston, TX
Achieved a 100% on-time delivery record by leveraging advanced GPS tracking and meticulous route planning. Maintained a flawless safety record through proactive vehicle inspections and strict adherence to safety regulations. Streamlined business operations by managing scheduling, invoicing, and comprehensive travel log documentation. Boosted profitability by negotiating contracts and implementing cost-effective fuel and maintenance strategies. Athletic Professional
Aug 2007 - June 2021
Nigerian Olympic Basketball team in 2016 (Rio De Janeiro, Brazil Achieved league and championship MVP titles in Spain (2010, 2011) and Italy (2017), contributing to team victories in three seasons.
My experience competing at the highest levels of professional basketball equipped me with a strong foundation in teamwork, strategic problem-solving, and adaptability, all of which have been instrumental in my transition to roles requiring quick decision- making and effective collaboration. These skills have allowed me to approach challenges with a solution-oriented mindset and perform confidently in dynamic, high-pressure environments. PROJECTS
Threat Intelligence & SIEM Deployment
Designed a Splunk-based SOC dashboard for real-time alerting and security analytics. Cloud Security Implementation
Deployed and secured AWS cloud instances, configured IAM roles, security groups, and VPN access. Deployed a virtual machine and established connectivity through newly created private and external switches, resulting in a streamlined operational environment for users.
Penetration Testing Simulation
Conducted ethical hacking exercises, testing SQL injection vulnerabilities and exploiting misconfigured web applications. Used SET to perform social engineering: Configured mass mailer attack with SET. Configured a reverse shell meterpreter payload. Created a zip of the payload and hosted it to a web server. Set a spoofed email with a malicious link to a victim using SET and acted like a victim that fell for the phishing attack downloading the file and executing it.