Post Job Free
Sign in

Incident Response Network Security

Location:
Germantown, MD
Posted:
June 06, 2025

Contact this candidate

Resume:

Alexander Nguyen

Germantown MD +1-240-***-**** *******************@*****.***

https://www.linkedin.com/in/alexanderhonguyen/ https://github.com/4Al3xG4mesYY/ SUMMARY

Dynamic Cybersecurity Specialist with 2 years of experience in incident response and threat analysis using SIEM tools. Demonstrated ability to monitor alerts, investigate incidents, and manage vulnerabilities in high-stress environments. Proven skills in network security and operational incident management, ensuring precise documentation and effective collaboration with diverse teams. Adept at leveraging industry best practices to continuously enhance security protocols. EDUCATION

Montgomery College Present

Associate, Computer Science

CERTIFICATIONS

• GIAC Foundational Cybersecurity Technologies (GFACT): May 2024

• Forage: Mastercard Phishing Simulation: June 2024

• Qualys Vulnerability Management Foundations: April 2025

• CompTia Network+: Expected June 2025

TRAINING & EXPERIENCE

KC7Cyber Nov 2023 - Present

Security Analyst

•Conducted in-depth investigations into over ten end-to-end intrusions, enhancing the ability to recognize and respond to all phases of the attack life cycle and cyber kill chain, leading to improved incident response strategies

•Analyzed large datasets to find patterns and irregularities of potential malicious activities using Kusto Query Language (KQL) and Azure Data Explorer (ADX), which improved threat detection capabilities

•Applied understanding of attacks and exploits, such as Windows privilege escalation and lateral movement, to enhance security protocols and prevent unauthorized access

•Identified tactics, techniques, and procedures (TTPs) based on observed threat activity, which informed the development of more effective threat mitigation strategies TechMAP - Montgomery College Sep 2024 - Present

Cybersecurity Pathway Fellow

•Gained hands-on experience with Intrusion Prevention Systems (IPS), firewalls, and other network security tools, enhancing the ability to monitor alerts and analyze network security events effectively.

•Utilized Wireshark to trace packet interactions with WANs and Fortinet firewall, contributing to incident investigations and improved security posture.

NCyTE Mar 2024 - May 2024

Virtual Cybersecurity Career Challenge Internship

•Configured Active Directory environments with user accounts and groups; developed Visio diagrams to document processes and enhance incident response coordination.

•Utilized Vsphere to connect multiple workstations, including Windows Server 2016, Kali Linux, pfSense, and Windows 10 Home, supporting streamlined network integration and operational efficiency in a cybersecurity context.

Codepath Sep 2024 - Nov 2024

Cybersecurity Fellow

•Investigated 60+ packets to identify 5+ network events involving phishing links and credential theft.

•Monitored Linux systems with Auditd to detect unauthorized file changes, preventing potential breaches and improving system security.

•Leveraged Splunk to detect malicious file uploads and suspicious login attempts, identifying Indicators of Compromise (IOCs) to enhance security monitoring and response.

•Analyzed the simulated CICIDS2017 dataset with peers nationwide using cybersecurity tools and playbooks to study patterns of malicious activity and enhance threat detection skills. Mastercard Cybersecurity Virtual Experience Program on Forage Jun 2024 Virtual Internship

•Completed a job simulation as an analyst on Mastercard's Security Awareness Team.

•Helped identify and report security threats such as phishing.

•Analyzed and identified areas of the business needing more robust security training and implemented training courses and procedures for those teams. Identified phishing threats and proposed awareness strategies for enterprise users

PROJECTS

KC7 Case Vault and Intrusion Simulations

•Completed 12+ simulated cases in KC7 Case Vault using MITRE ATT&CK techniques to trace threat actors, pivot across datasets, and document incident reports for scenarios like phishing, credential theft, and lateral movement.

CyberDefenders Blue Team Labs

•Engaged in realistic, browser-based labs simulating real-world cybersecurity scenarios, enhancing skills in threat detection, malware analysis, incident response, and digital forensics. LetsDefend SOC Analyst (In-Progress)

•Gaining hands-on experience with SOC tools (SIEM, EDR, malware analysis), enhancing skills in threat detection, incident response, and vulnerability management, while preparing for certifications (CySA+, CompTIA Security+) through real-world simulations. TECHNICAL SKILLS

•Programming: Python, C++, Java, KQL

•Operating Systems: Windows, Linux (Mint, Debian, Ubuntu)

•Networking: Fundamental knowledge of cables, topologies, protocols

•Cybersecurity & Additional Expertise: Wireshark, NetworkMiner, Auditd, Hashcat, Splunk (SIEM), Any.Run, Azure Data Explorer, VirusTotal, Incident Response, Threat Intelligence, Threat detection, log analysis, digital forensics, risk mitigation Security Education and Awareness, Open-source Intelligence, Data Analysis, Threat Identification

HONORS & AWARDS

• CyberStart America: Silver Badge, National Cyber Scholar Badge

• Fall 2023 MC Cyber Challenge: 3rd place (U.S Cyber Range)

• 2CDC: 2-Year College Cyber Defense Competition (team): 2nd place

• MD Cyber Challenge 2023: 2nd place (team)

• NCL (Spring 2024): Team game: 1470 points Individual game: 1170 points



Contact this candidate