Summary
Results-driven Cybersecurity professional with a passion for solving security challenges and a deep curiosity for emerging threats. Experienced in securing enterprise environments, enhancing threat detection, and driving compliance with security frameworks. Skilled in incident response and security operations, with a proactive approach to mitigating cyber threats and protecting critical assets. Experience
Cyber Security Analyst
HFC Bank
03/2022 - Present
Conduct regular vulnerability assessments to identify and remediate security weaknesses, strengthening the organization’s overall security posture.
Develop, refine, and automate incident response playbooks and SOC workflows, ensuring efficient coordination, faster escalation, and optimized remediation during security events. Deployed and manage Privileged Access Management (PAM), Multi-Factor Authentication (MFA), Web Application Firewalls (WAFs), and Network Access Control (NAC) solution, enforcing least privilege access and minimizing unauthorized access risks.
Lead security monitoring operations, analyzing security incidents raised by SIEM, IDS, endpoint security tools, and end users to determine severity and coordinate appropriate response actions. Conduct proactive threat hunting, leveraging threat intelligence and behavioral analytics to detect and mitigate emerging risks.
Enforce security policies and compliance frameworks, ensuring alignment with ISO 27001, NIST, and company- specific security policies to strengthen overall governance and risk management. Collaborate with IT teams and business units to integrate security measures into system designs and operational processes, ensuring a holistic approach to cybersecurity. Maintain detailed records of security incidents, analyses, and remediation actions. Generate reports for management to inform decision-making and improve security posture. SOC Analyst
Konvergenz Network Solutions • 1 yr 2 mos
02/2021 - 03/2022
Worked in a 24/7 Security Operations Center (SOC), monitoring security events, investigating alerts, and escalating incidents based on severity.
Analyzed and triaged security incidents from SIEM, IDS, and endpoint security tools, determining impact and coordinating response actions.
Assisted in SIEM rule tuning and log correlation, reducing false positives and improving detection capabilities. Conducted threat intelligence enrichment, mapping incidents to MITRE ATT&CK and identifying potential indicators of compromise (IOCs).
IT Support Officer
Visibility Technology Services • 6 mos
08/2020 - 01/2021
Provided technical support for hardware, software, and network issues, achieving a high-resolution rate. Assisted IT teams with technical problem resolution, enhancing overall productivity and speeding up issue resolution processes.
Abdijabar Abass
**************@*****.***
Linkedin: abass-abdijabar
Education
Msc. Information Security
United States International University
03/2025
Bsc. Information Systems & Technology
United States International University
09/2021
Certificates
Certified Ethical Hacker (CEH)
Azure Security Engineer - Microsoft
Data Protection - Strathmore University
CompTIA Security+ - Cybrary
Oracle Certified Foundations Associate
NSE 1,2&3 - Fortinet
Projects
Project: Network Threat Detection: Integrating Suricata and Wazuh Source: medium.com/@aj-abass
Platform and Technology Used: Linux, Suricata IDS, Wazuh SIEM Skills and Technologies
Security Information and Event Management (SIEM): FortiSIEM, Splunk, Wazuh SIEM Intrusion Detection and Prevention Systems (IDS/IPS): Snort, Suricata IDS, Security Onion IDS, DarkTrace IPS Endpoint Security: Trellix AV, Symantec Endpoint Protection Network Access Control (NAC): Portnox NAC, FortiNAC Identity and Access Management (IAM): CyberArk Privileged Access Management (PAM), FortiAuthenticator Multi-Factor Authentication (MFA)
Database Activity Monitoring (DAM): IBM Guardium DAM Vulnerability Assessment and Management: Nessus Vulnerability Management, OpenVAS, Nipper Penetration Testing and Security Assessment: Kali Linux, Metasploit, Burp Suite, OWASP ZAP, GoPhish, Nmap, SQLmap, BloodHound, CrackMapExec
Web Application Firewall (WAF): ModSecurity WAF
Network Monitoring and Analysis: Wireshark, Zabbix, Arkime Data Backup and Recovery: Actifio Backups
Virtualization Platforms: VMware
Database Management Systems: Microsoft SQL Server
Incident Response and Threat Intelligence: Velociraptor, TheHive, MISP, YARA Rules Compliance and Benchmarking: CIS Benchmarks
Network Security: Azure Network Security Groups (NSG), Checkpoint Firewall Data Loss Prevention (DLP): Forcepoint DLP
Personal Interests
Football Player: Competed in the KIB Interbank 2023 and 2024 tournaments.