Post Job Free
Sign in

Cyber Security Information

Location:
Denton, TX
Posted:
May 06, 2025

Contact this candidate

Resume:

CLINTON IWUJI

Email- **************@*****.***, Phone 945-***-****

*** ******* ****, *******, *****. 75078.

PROFILE:

As an Information Security Professional, I am committed to safeguarding confidentiality, integrity, and data availability while ensuring streamlined policy implementation. With a strong drive and meticulous attention to detail, I bring 2 years of experience as a SOC 1 Analyst, aiming to utilize my expertise to bolster organizational security and resilience without impeding productivity. Proficient in Security Operations, Incident Response, Blue Teaming, and adept in tools like Kali Linux and REMnux Distro.

EDUCATION:

College of New Caledonia. Associate Degree in Psychology. Cyber Security Certification (Relevant Information/Cyber Security Courses) CYBER SECURITY CERTIFICATIONS:

CompTIA IT Certifications (Security+) (In Progress) CompTIA IT Certifications (Network+) (In progress) ACTIVE PROFESSIONAL ORGANIZATIONAL MEMBERSHIP:

CompTIA Information Technology (IT) Certifications & Training Cybersecurity Certifications and Continuing Education (ISC) Security Operation Analyst (SOC)

360Cyberx, LLC - Dallas, TX (Remote Position) Oct 2023 – Present 360cyberx is a comprehensive cybersecurity provider that offers various managed services, including Cloud solutions, vulnerability assessments, penetration testing, compliance assessments, security operations, and incident response. Our solutions are tailored to help organizations proactively identify and address potential information security risks, enhance their cybersecurity posture, and rapidly respond to security incidents. Responsibilities: Handling the response to high-severity incidents, coordinating efforts across different teams, and working with leads in handling complex cybersecurity threats. Providing tactical hands-on investigation for the Security Operations duties, Phishing, and helping clients implement, monitor, and continuously improve their security measures. Accomplishments:

• Analyze and promptly respond to security incidents and threats, including phishing attacks. Perform initial triage to assess the severity and impact of the incident, follow established procedures to contain and mitigate threats, and document incident details.

• Phishing Investigation and Analysis: Specifically, investigate phishing emails and websites reported by users or detected by security tools. Analyze the content, headers, and URLs to determine the legitimacy and the potential impact. Use threat intelligence and phishing analysis tools to identify patterns and indicators of compromise.

• Prepare detailed reports on security incidents, including phishing attempts, outlining the findings, impact, and recommendations for preventing future incidents.

• Continuously monitor security tools and systems, including DLP solutions, for alerts and indicators of data exfiltration or unauthorized access to sensitive information.

• Investigate phishing emails and websites, analyze threats, and recommend preventative measures. Use specialized tools and techniques to identify malicious actors and safeguard against phishing schemes.

• Conduct detailed investigations into DLP alerts to identify unauthorized data handling activities. Analyze data movement and usage patterns to determine whether incidents are false positives or genuine threats. Recommend enhancements to DLP policies and procedures to prevent future incidents.

• Participate in containment and eradication efforts to minimize the impact of incidents and prevent their recurrence.

• Continuously monitor security tools and systems, including DLP solutions, for alerts and indicators of data exfiltration or unauthorized access to sensitive information.

• Assist in configuring and tuning security monitoring tools, including anti-phishing solutions, to improve detection capabilities and efficiency.

• Investigate phishing emails and websites, analyze threats, and recommend preventative measures. Use specialized tools and techniques to identify malicious actors and safeguard against phishing schemes.

• Gather relevant IOCs and document findings, decide fidelity of alert using the findings and escalation alerts to appropriate fusion center team.

• Collaborate with the team to analyze and investigate security incidents, determining the root cause, scope, and impact. Apply threat intelligence and analysis to enhance incident response effectiveness.

• Continuously evaluate and enhance SOC processes, playbooks, and standard operating procedures to improve incident detection, response, and resolution times.

Network Security Specialist

Takla First Nation Band - Prince George, BC, Canada. Oct 2022 -Feb 2025 Takla First Nation Band work together towards creating a sustainable, healthy, and prosperous community that is grounded in the culture, heritage, and respectful of the traditional lands. Responsibilities: Network Security Analyst

As a Network Security Analyst, I was responsible for safeguarding the confidentiality, integrity, and availability of organizational network infrastructure and data. My role included continuous monitoring of network activity, managing firewalls, intrusion detection/prevention systems (IDS/IPS), and performing vulnerability assessments. I collaborated with IT, compliance, and executive teams to enforce security policies, respond to threats, and ensure compliance with industry standards such as ISO 27001, NIST, and HIPAA. I was actively involved in incident response, risk analysis, and implementing tools for endpoint protection, SIEM, and network segmentation to strengthen the organization’s security posture. Accomplishments – Network Security Analyst

• Mitigated critical vulnerabilities across the enterprise network by leading a comprehensive vulnerability assessment and patch management initiative, reducing exploitable risks by over 70% within six months.

• Implemented and optimized a SIEM solution (e.g., Splunk, QRadar, or LogRhythm), increasing real-time threat detection and response efficiency, and enabling a 40% faster incident resolution time.

• Developed and enforced security policies and access control standards, helping the organization pass multiple audits

(e.g., ISO 27001, PCI-DSS) with zero critical findings.

• We conducted security awareness training for technical and non-technical staff, which contributed to a 60% drop in phishing-related incidents within the first quarter.

• Led investigations of network intrusions and security breaches, coordinating incident response procedures that minimized downtime and prevented further damage.

• Maintained and fine-tuned firewall rules and intrusion prevention systems, ensuring optimal performance while blocking unauthorized access and suspicious traffic.

• Collaborated with DevOps and cloud engineering teams to secure cloud-based infrastructure (AWS/Azure), implementing multi-factor authentication, encryption, and least-privilege models.

• Deployed network segmentation and zero trust architecture, significantly limiting lateral movement and increasing internal threat containment.

• Monitored logs and alerts to detect anomalies and implemented automation for common threat scenarios, reducing manual workload and improving response times.

• Contributed to business continuity and disaster recovery planning, ensuring secure and timely data recovery through encrypted backups and tested recovery procedures.

REFERENCES

Available upon request.



Contact this candidate