Post Job Free
Sign in

United States Incident Response

Location:
Salt Lake City, UT
Posted:
June 09, 2025

Contact this candidate

Resume:

Alex Gholami

801-***-**** **********@*****.*** Salt Lake City, United states

Professional Summary

Sr. Cyber Security Analyst with 7+ years of experience Innovative IT security and network administration specialist with a decade of experience safeguarding enterprise environments, conducting risk assessments, optimizing network performance, and mitigating cyber threats. Adept at forensic analysis, threat hunting, incident response, and third-party security evaluations. Skilled at collaborating across teams, mentoring junior analysts, and enhancing overall cyber resilience.

Skills

Security Automation & Orchestration: Incident response, log correlation & analysis Cyber Security: Firewalls, IDS/IPS, W, VPN solutions, endpoint protection Security Infrastructure & Monitoring: SIEM, threat intelligence tools (SolarWinds SEM, Identity & Access Management (IAM): integrated SolarWinds security applications with AWS and Azure, vulnerability management Network Operation, data protection, DLP systems using SEM. Compliance & Frameworks: NIST, ISO 27001, HIPAA, PCI Tenable vulnerability scan and mitigations MITRE ATT&CK Technical Leadership: Mentorship, collaboration with IT & security teams.

Experience

SolarWinds, Sr. Cyber Security Analyst Lehi, united states 04/2018 – 12/ 2024

Investigated incidents from multiple sources, performing forensic analysis, log correlation, and threat hunting to identify vulnerabilities and misconfigurations. Provide expert guidance to internal and external stakeholders on complex security risk assessments and related projects. Oversee high-level projects and initiatives to strengthen the organization's security risk management capabilities. Perform comprehensive evaluations of third-party security controls to ensure alignment with SolarWinds' risk management standards.

• Identify and assess potential vulnerabilities, respond to cyber events, and proactively defend against threats by leveraging intelligence gathered from intrusion detection systems, firewalls, network traffic logs, and host system logs.

• Led incident response efforts, analyzing cyber threats, vulnerabilities, and attack vectors, ensuring timely containment and mitigation.

• Conducted forensic analysis to determine malware propagation methods, root causes of breaches, and proactive defense strategies.

• Actively contribute ideas to enhance processes and workflows, optimizing efficiency in threat detection and response. Provided mentorship to junior analysts, strengthening technical capabilities in threat detection, security operations, and policy enforcement.

• Worked alongside Security team, Application engineer and DevOps team to align security strategies with business continuity plans.

• Collaborate with clients to understand their system requirements and develop customized solutions to meet their needs.

• Mentor and coach L1 and L2 team members to enhance their technical skills and support their career growth.

• Created and updated IT security KB, procedures, and documentation to align with the organization's objectives and support company goals.

Genesys, NOC Network Engineer Salt Lake City, United States 01/ 2013 – 10/2017

Utilized network performance monitoring tools to detect and mitigate system failures, miscommunications, and security vulnerabilities. Saved $240K+ over four years by bringing backup/restore operations in-house, eliminating third-party dependency. Provided Incident Response, Disaster Recovery, and Business Continuity concepts. Enhanced network reliability through Active monitoring, incident response, and mentorship of L1/L2 teams. Contributed to the incident response team to promptly resolve critical issues.

• Monitor security events in real - time, respond promptly to emergencies, and effectively mitigate risks.

• Identified, analyzed, and resolved complex technical problems for hardware, software, and connectivity quickly and effectively to maintain peak system performance.

• Address and resolve network critical incidents promptly to minimize disruption to business operations.

• Maintained the highest level of security and confidentiality in all aspects of NOC, in compliance with company and government standards to prevent potential threats.

• Conduct comprehensive risk assessments, identify vulnerabilities, and implement effective mitigation strategies.

• Served as escalation point for new employees and Tier 1 staff, while guiding and training team members to strengthen their skills and foster professional growth.

• NetApp Storage & Systems Administration Orem, United States 04/2012- 09/2013

Provide advanced technical support to premium enterprise customers via phone, web, and NetApp Auto-Support software for complex hardware and software issues.

• Deliver professional guidance for troubleshooting and resolving problems across Linux, Windows Client/Server, and VMware platforms.

• Investigate and resolve customer concerns promptly, offering tailored recommendations and actionable plans to address issues.

• Collaborate with team members to resolve technical cases and provide mentorship when needed.

• Utilize and support industry-standard protocols, including iSCSI, TCP/IP, DNS, SNMP, RDP, NFS, CIFS, SAN, and NAS, during troubleshooting and resolution.

• Document and share technical knowledge, ensuring efficient case management and resolution.

Certification

CHE- CHFI -NPM-Net+, Juniper IDS. working on CISSP in progress. Language: English



Contact this candidate