Post Job Free
Sign in

Soc Analyst Incident Response

Location:
Fredericksburg, VA
Posted:
June 01, 2025

Contact this candidate

Resume:

ABDUL KAHAR AHMED SUALLAH

************@*****.*** 202-***-**** Stafford, USA 22554

Summary

Accomplished Snr. SOC Analyst with a proven track record at Amazon, adept in leading incident response teams and conducting advanced threat analysis. Excelled in leveraging SIEM for optimal incident identification, demonstrating exceptional teamwork and communication skills. Skilled in Python programming and effective incident prioritization, enhancing organizational cybersecurity posture.

Technical Abilities

Python, TCP/IP, LANs, VPNs, Routers, Firewalls, Wireshark

Nmap, Azure Sentinel, Microsoft 365 Defender, Azure AD

Splunk, QRadar, Qualys, Log Management,

Anti-Virus Tools, Sourcefire, McAfee Web Gateway

McAfee DLP, Norton, Symantec, Cisco ASA

Cisco Firepower, VirusTotal

URLVoid, Metadefender, URLscan, AbusIPDB, PVoid

LookingGlass, MxToolbox, Joe Sandbox, Hybrid Analysis

CyberChef, Zscaler, Active Trust, Cloud Security

Firewall configuration, Access control, Endpoint security

Security policies, Operating system security

Data loss prevention, Encryption techniques

Social engineering, Malware analysis, Wireshark usage

Web security, Security analysis, Python programming

Intrusion detection, SIEM management, Reverse engineering, Network Monitoring

DNS management, Incident response, Threat intelligence, Penetration testing, TCP and IP protocols

Experience

Snr. SOC Analyst Amazon - Virginia 04/2022 - Current

Leadership and Training: Led and mentored Tier 1 and Tier 2 incident responders, fostering teamwork and skill development to investigate and resolve computer security incidents effectively

Technical Lead: Served as the primary technical lead during incident events, offering hands-on investigation expertise and support

Intrusion Investigation: Spearheaded investigations into network intrusions and various cybersecurity incidents, determining the root causes and extent of attacks

Effective Communication: Summarized events and incidents in both written and verbal forms, tailoring communication for diverse audiences, including legal counsel, executive management, and technical staff

Incident Response Ownership: Took ownership of incident response based on escalation and handoff procedures from junior or mid-career team members

SIEM Utilization: Leveraged the Security Incident Event Management (SIEM) platform for incident identification and response

Continuous Monitoring: Conducted ongoing reviews of SIEM dashboards, system and application logs, Intrusion Detection Systems (IDS), and custom monitoring tools

Advanced Threat Analysis: Performed sophisticated malware detection and in-depth threat analysis

Incident Prioritization: Effectively prioritized and distinguished between potential incidents and false alarms, optimizing incident response efforts

Collaborative Teamwork: Collaborated with cross-functional teams including DLP Engineers, Splunk Engineers, NOC, Threat Intel Team, Red Team, Hunt Team, Forensic Investigators, and Database Analysts

Evidence Handling: Maintained the chain of custody for all evidence collected during incidents, ensuring the integrity of data for security and forensic investigations

Information Security Analyst Walmart - Virginia 04/2017 - 01/2022

Employ MITRE ATT&CK and Cyber Kill Chain methodologies to proactively conduct threat research

Monitor and analyze network traffic and alerts for potential security threats

Perform Tier II initial incident triage, swiftly identifying and prioritizing security incidents

Investigate intrusion attempts and conduct in-depth analysis of exploits to assess their impact and scope

Offer guidance on network intrusion detection to support timely incident declaration and effective decision-making

Conduct a thorough analysis of phishing emails to identify tactics, techniques, and indicators of compromise

Manage vulnerability assessments and coordinate the remediation of security vulnerabilities within the organization

Maintain meticulous documentation of all incident-related activities and deliver regular status updates throughout the incident lifecycle

Prepare comprehensive final incident reports outlining the sequence of events and lessons learned

Collaborate with US government agencies to provide critical information on intrusion events, security incidents, and emerging threat indicators and warnings

Help Desk Assistant Ghana Telecommunication - Ghana 04/2014 - 01/2017

Supported internal and external users through troubleshooting, issue escalation, and deploying hardware/software

Assisted with installations, upgrades, and provided advanced troubleshooting for Windows and Mac OS

Identified and recommended upgrades to IT and communications infrastructure

Collaborated with unit personnel on infrastructure development

Addressed performance and capacity issues

Provided onsite and remote technical support

Managed equipment installations, removals, and monitored network infrastructure

Utilized ticketing systems Remedy and ServiceNow for documentation and issue resolution

Education

University of Education Winneba 08/2014

Bachelor of Science: Computer Science

Ho Technical University 08/2011

Higher National Diploma: Computer Science

Certifications

CompTIA Security+

Certified Ethical Hacker Certification (CEH)

Certified Information Security Manager (CISM)

Technical abilities

Windows, Linux, Mac OS, Service Now, JIRA/Confluence, Spiceworks, Archer, Remedy, SIMS Ticketing, Java, Python, TCP/IP, LANs, VPNs, Routers, Firewalls, Wireshark, Nmap, Snort, Azure Sentinel, Microsoft 365 Defender, Azure AD, Splunk, QRadar, Qualys, Log Management, Anti-Virus Tools, Fire Eye, IronPort, Sourcefire, McAfee Web Gateway, McAfee DLP, Wireshark, Norton, Symantec, Cisco ASA, Cisco Firepower, Metadefender, VirusTotal, URLVoid, URLscan, AbusIPDB, IPVoid, LookingGlass, MxToolbox, Joe Sandbox, Hybrid Analysis, CyberChef, Zscaller, Active Trust



Contact this candidate