Devone Sansbury
Email: ******.********@*****.*** Phone: 301-***-****
Security Clearance: Active U.S. Secret Clearance
Professional Summary
Results-driven Cybersecurity Analyst with over 10 years of progressive experience in threat analysis, vulnerability management, incident response, and system hardening across government environments. Recognized for streamlining security operations, analyzing malware and phishing threats, and improving enterprise defense mechanisms. Proven expertise in SIEM, endpoint protection, vulnerability scanning, and threat hunting across cloud and on-prem infrastructure.
Certifications
CompTIA Security+
ITIL Foundation V3
HDI Certified Support Center Analyst (SCA)
CCZT (Certified Cybersecurity Technical Zone Technician)
Technical Skills
Threat/Vuln Mgmt Tenable/Nessus, Rapid7, Nikto, ZAP, Cuckoo Sandbox, VxStream, Threat Grid/Track
Endpoint Security CrowdStrike, Carbon Black, McAfee HBSS, SentinelOne, Bit9 Parity (App Whitelisting)
SIEM & Logging Splunk (Cloud/Enterprise), Security Onion, Syslog, Blue Coat, WebSense
Analysis Tools Wireshark, Burp Suite, OSINT, Packet Capture (PCAP), DLP (O365), Ubuntu
Ticketing Systems ServiceNow, Remedy
Scripting & OS Linux (Ubuntu/CentOS), VirtualBox, HTML/CSS/JS Analysis
Professional Experience
Security Analyst
Electrosoft Services, Inc. – Reston, VA
October 2018 – Present
Led vulnerability assessments and malware detonation using Threat Grid, Cuckoo Sandbox, VxStream, and GFI for Application Review Board (ARB) classifications.
Performed enterprise vulnerability scans using ACAS/Nessus, Rapid7, and web scanners (Nikto, ZAP).
Analyzed malicious emails and attachments (header analysis, OSINT lookups) and recommended DLP tuning.
Utilized Splunk and SIEM data to analyze Cisco ASA, DNS, Proxy logs and escalate alerts.
Drafted SOPs and technical documentation; conducted bi-weekly vulnerability and risk meetings.
Executed incident response actions, encryption policy enforcement, and event review (Splunk, CrowdStrike, Carbon Black).
Used Wireshark and Linux-based labs to detonate payloads and extract IOCs from PCAPs.
Network Analyst II
CACI International – Washington, DC
January 2016 – September 2018
Conducted vulnerability scanning across network/cloud assets and delivered remediation guidance.
Monitored DLP and threat activity using McAfee EPO, Splunk, and CrowdStrike; supported ARB software reviews.
Performed phishing investigations using email header forensics, domain reputation analysis, and sandboxing.
Supported threat intelligence reviews and drafted risk memos for internal management.
Created, tracked, and resolved incidents via ServiceNow; supported system tuning efforts (SHA-1 blocks, DNS blacklists).
Security Analyst
Super Systems, Inc. – Washington, DC
August 2015 – August 2016
Conducted DLP analysis, phishing investigations, IOC discovery, and incident escalation.
Tuned appliances and email policies to block known malicious indicators.
Used Splunk to review logs and escalate suspicious traffic to IT/security leadership.
Desktop Support Analyst
The MIL Corporation – Bowie, MD
March 2012 – July 2015
Supported 1000+ users in secure desktop and OS environment; deployed Windows migrations (Win 7/8).
Managed AD accounts and file share permissions; coordinated PC refreshes and security patches.
Received HDI Desktop Support Analyst of the Year award for excellence in end-user support.
Customer Support Center Analyst
The MIL Corporation – Bowie, MD
May 2010 – March 2012
Provided Tier 1/2 IT support; used Remedy and SolarWinds to monitor and escalate system events.
Delivered resolution tracking and SLA adherence for technical incidents and user requests.