Post Job Free
Sign in

Cybersecurity Analyst / Engineer

Location:
Huntersville, NC
Posted:
June 11, 2025

Contact this candidate

Resume:

Rordan Stanton

Charlotte Metro, North Carolina 630-***-**** *************@*****.*** rordancstanton.com PROFESSIONAL SUMMARY:

Prior cybersecurity analyst with experience in monitoring, analyzing, and responding to security threats across cloud and on- premises environments. Able to interface with cross functional teams in cybersecurity, network operations, and risk management. Known for excellent interpersonal skills, teamwork, and maintaining a professional and welcoming attitude. CERTIFICATIONS:

• AWS Certified Security – Specialty (2025)

• AWS Certified SysOps Administrator – Associate (2024)

• AWS Certified Solutions Architect – Associate (2023)

• CompTIA Cybersecurity Analyst – CySA+ (2024)

• CompTIA PenTest+ (2023)

• CompTIA Security+ (2022)

• Python Institute Entry-Level Python Programmer (2023)

• Linux Professional Institute Linux Essentials (2022)

• Microsoft Certified Security, Compliance, and Identity Fundamentals (2022) EXPERIENCE:

DUKE ENERGY CHARLOTTE, NC SEP 2024 - NOV 2024

Associate CSOC Analyst

• Used AWS GuardDuty for threat detection, AWS Detective for in-depth incident analysis and root cause identification, and AWS CloudTrail for API log investigations.

• Leveraged Microsoft Defender for Cloud Apps to detect suspicious behavior, as well as the Alert and Incident tabs in Defender for detailed analysis and response.

• Performed malware analysis using VirusTotal and urlscan Pro, identifying vulnerabilities and reducing risks by 15%.

• Monitored email delivery, quarantine, and security status through the Microsoft 365 Security & Compliance Center, utilizing message preview and header information to validate email content.

• Queried ServiceNow and Phantom SOAR repositories for historical data to assess benign or anomalous events and conducted forensic investigations via XDR solutions and Microsoft Purview audit logs to track user activity and system processes. CENTRALERT LEXINGTON, KY OCT 2023 - JUL 2024

Systems Deployment Engineer

• Executed system configurations after installing Windows 11 Professional on customer appliances, increasing operational efficiency and reducing setup time by 15 minutes per device, saving approximately $5, 000 annually.

• Optimized credential manager for access to local network share server files and applications, enhancing security protocols and reducing unauthorized access incidents by 30%, which improved overall network integrity

• Managed VMware- hosted environments via RDP, resolving client-level support tickets promptly, achieving a 95% first-time resolution rate and reducing average ticket resolution time, leading to increased client satisfaction and retention.

• Contributed to system documentation to ensure comprehensive coverage and improvements in onboarding time for new IT staff. FREELANCE SEO BUSINESS HUNTERSVILLE, NC JUN 2022 – MAY 2023 Volunteer Web Assistant

• Developed several responsive websites using HTML, CSS, and WordPress, ensuring cross-device compatibility and 100% functionality. Managed the installation, configuration, and maintenance of 15+ WordPress plugins, optimizing site features.

• Configured DNS records, implemented hosting solutions, and installed SSL certificates, significantly enhancing site security and improving user trust metrics and overall performance.

• Utilized SEO tools such as Ahrefs and Google Analytics to analyze site performance and enhance site structure and loading speeds, resulting in a boost for search engine rankings and a 25% increase in user engagement.

• Improved usability by refining Call-to-Action button functionality, optimizing content layout, and enhancing readability. EDUCATION:

• North Carolina State University (Aug 2021–Jun 2022) Accredited Cybersecurity Bootcamp

• University of Missouri-Columbia (Aug 2016–Dec 2016) PROJECTS:

AWS LANDING ZONE

AWS Certified Specialty Exam Guide: by Adam Book and Stuart Scott

• Created a secure, scalable, and compliant AWS environment while simplifying multi-account management. Project included governance guardrails, KMS encryption, centralized logging with CloudTrail, least-privilege roles, compliance automation with Security Hub and Config, and AWS SSO integration with an enterprise identity provider. INFRASTRUCTURE AS A CODE

HashiCorp Developer Tutorial

• First searched for the latest Ubuntu Server AMI within the AWS AMI Catalog and copied the ID into the code template, along with the specified region and desired name.

• Then utilized terraform commands to initialize a working directory, show what changes will be made, and lastly to change the infrastructure, and provided my terminal with sufficient authorization via the Secret Access Keys held in KMS. SSH INTO A VIRTUAL MACHINE

DevOps for the Desperate: A Hands-on Survival Guide

• Deployed, updated, and upgraded an Ubuntu machine on Digital Ocean. Generated asynchronous SSH keys from my home machine, then transferred the public key information into a new file on the Cloud machine to ensure connectivity. TRAINING PLATFORMS:

AWS SIMULEARN & MICROSOFT LEARN

Security Learning Plan

• Gained expertise in AWS security core services, including encryption, resource security (EC2, S3, RDS), and serverless functions.

• Implemented network traffic controls via route table configurations, security group rules, and VPC peering connections.

• Utilized AWS tools CloudWatch, Config, GuardDuty, and Security Hub for monitoring, threat detection, and automation. LETSDEFEND

Security Operations Center Analyst

• Analyzed suspicious files via Email Header Analysis, Static and Dynamic Malware Analysis. Detected threats through log analysis, including DNS, Web, WAF, IDS/IPS, Proxy, and VPN logs.

• Built SIEM environment in Virtual Box using Splunk, pfSense, and Active Directory. Also configured two Malware Analysis environments, a FlareVM and REMnux machine.

TRYHACKME

Security Engineering CTF

• Emphasized understanding threats and risks, managing incidents, integrating security into development processes, enhancing security posture, compliance with industry standards, preemptive risk identification, and mitigating risks.

• Security principles, cryptography, identity and access management, threat modeling, risk management, vulnerability management, network security architecture, Linux and Windows hardening, Active Directory and network device hardening.

• OWASP Top 10, SSDLC, SAST, DAST, DevSecOps, incident response, logging, first responder duties, cyber crisis management. CompTIA PenTest+ CTF

• Gained hands-on experience with industry-standard tools like Metasploit, Wireshark, Burp Suite, and Nmap.

• Enhanced proficiency in conducting phishing, web application assessments, exploiting network services, and secure coding practices. Followed penetration test guidelines to identify vulnerabilities and recommend mitigation strategies. KEY STRENGTHS:

• Hands-on experience with tools such as CloudWatch, Microsoft Defender, and Sentinel to monitor threat actor activity, perform incident analysis, and enhance SOC operations.

• Proficient in deploying cloud infrastructure using user-data scripts and IoC to automate, standardize, and scale environment provisioning.

• Capable of using Splunk to filter and analyze network traffic, driving rapid detection and effective incident response.

• Skilled in conducting advanced cyber investigations involving computer forensics, network forensics, malware analysis, and root cause analysis.

• Strong understanding of TCP/IP, DNS, HTTPS, firewalls, VPNs, cloud networking (VPC, Subnets, Security Groups), JavaScript, Python, and KQL (Kusto Query Language).



Contact this candidate