Post Job Free
Sign in

Cybersecurity Analyst Incident Response Threat Detection Vulnera

Location:
Nairobi, Nairobi County, Kenya
Posted:
April 05, 2025

Contact this candidate

Resume:

Summary

Results-driven Cybersecurity professional with a passion for solving security challenges and a deep curiosity for emerging threats. Experienced in securing enterprise environments, enhancing threat detection, and driving compliance with security frameworks. Skilled in incident response and security operations, with a proactive approach to mitigating cyber threats and protecting critical assets. Experience

Cyber Security Analyst

HFC Bank

03/2022 - Present

Conduct regular vulnerability assessments to identify and remediate security weaknesses, strengthening the organization’s overall security posture.

Develop, refine, and automate incident response playbooks and SOC workflows, ensuring efficient coordination, faster escalation, and optimized remediation during security events. Deployed and manage Privileged Access Management (PAM), Multi-Factor Authentication (MFA), Web Application Firewalls (WAFs), and Network Access Control (NAC) solution, enforcing least privilege access and minimizing unauthorized access risks.

Lead security monitoring operations, analyzing security incidents raised by SIEM, IDS, endpoint security tools, and end users to determine severity and coordinate appropriate response actions. Conduct proactive threat hunting, leveraging threat intelligence and behavioral analytics to detect and mitigate emerging risks.

Enforce security policies and compliance frameworks, ensuring alignment with ISO 27001, NIST, and company- specific security policies to strengthen overall governance and risk management. Collaborate with IT teams and business units to integrate security measures into system designs and operational processes, ensuring a holistic approach to cybersecurity. Maintain detailed records of security incidents, analyses, and remediation actions. Generate reports for management to inform decision-making and improve security posture. SOC Analyst

Konvergenz Network Solutions • 1 yr 2 mos

02/2021 - 03/2022

Worked in a 24/7 Security Operations Center (SOC), monitoring security events, investigating alerts, and escalating incidents based on severity.

Analyzed and triaged security incidents from SIEM, IDS, and endpoint security tools, determining impact and coordinating response actions.

Assisted in SIEM rule tuning and log correlation, reducing false positives and improving detection capabilities. Conducted threat intelligence enrichment, mapping incidents to MITRE ATT&CK and identifying potential indicators of compromise (IOCs).

IT Support Officer

Visibility Technology Services • 6 mos

08/2020 - 01/2021

Provided technical support for hardware, software, and network issues, achieving a high-resolution rate. Assisted IT teams with technical problem resolution, enhancing overall productivity and speeding up issue resolution processes.

Abdijabar Abass

**************@*****.***

+254-*********

Linkedin: abass-abdijabar

Education

Msc. Information Security

United States International University

03/2025

Bsc. Information Systems & Technology

United States International University

09/2021

Certificates

Certified Ethical Hacker (CEH)

Azure Security Engineer - Microsoft

Data Protection - Strathmore University

CompTIA Security+ - Cybrary

Oracle Certified Foundations Associate

NSE 1,2&3 - Fortinet

Projects

Project: Network Threat Detection: Integrating Suricata and Wazuh Source: medium.com/@aj-abass

Platform and Technology Used: Linux, Suricata IDS, Wazuh SIEM Skills and Technologies

Security Information and Event Management (SIEM): FortiSIEM, Splunk, Wazuh SIEM Intrusion Detection and Prevention Systems (IDS/IPS): Snort, Suricata IDS, Security Onion IDS, DarkTrace IPS Endpoint Security: Trellix AV, Symantec Endpoint Protection Network Access Control (NAC): Portnox NAC, FortiNAC Identity and Access Management (IAM): CyberArk Privileged Access Management (PAM), FortiAuthenticator Multi-Factor Authentication (MFA)

Database Activity Monitoring (DAM): IBM Guardium DAM Vulnerability Assessment and Management: Nessus Vulnerability Management, OpenVAS, Nipper Penetration Testing and Security Assessment: Kali Linux, Metasploit, Burp Suite, OWASP ZAP, GoPhish, Nmap, SQLmap, BloodHound, CrackMapExec

Web Application Firewall (WAF): ModSecurity WAF

Network Monitoring and Analysis: Wireshark, Zabbix, Arkime Data Backup and Recovery: Actifio Backups

Virtualization Platforms: VMware

Database Management Systems: Microsoft SQL Server

Incident Response and Threat Intelligence: Velociraptor, TheHive, MISP, YARA Rules Compliance and Benchmarking: CIS Benchmarks

Network Security: Azure Network Security Groups (NSG), Checkpoint Firewall Data Loss Prevention (DLP): Forcepoint DLP

Personal Interests

Football Player: Competed in the KIB Interbank 2023 and 2024 tournaments.



Contact this candidate