Post Job Free
Sign in

Incident Response Network Security

Location:
Richmond, TX
Posted:
July 12, 2025

Contact this candidate

Resume:

TAMUYEH N. BONAVENTURE

SKILLS

Security Tools & Frameworks SIEM

(Splunk, QRadar), Nessus, Wireshark,

Metasploit, Burp Suite, Kali Linux

Endpoint & Network Security Firewall

Management, IDS/IPS (Snort, Suricata),

VPN Configuration, Endpoint Protection

Threat Management Threat Intelligence

Platforms, Incident Response,

Vulnerability Management

Programming & Scripting Python,

PowerShell, Bash, SQL Cloud Security

AWS Security, IAM, GuardDuty,

cloudtrial, cloudwatch, SNS, VPC,

Microsoft Azure Security, Cloud Access

Security Brokers (CASB) Collaboration &

PM Tools Trello, Jira, Slack, Confluence,

Microsoft Teams Compliance &

Governance ISO 27001, GDPR, NIST

Cybersecurity Framework, HIPAA, PCI-

DSS

CERTIFICATIONS

FrameWork,

CISA - Certified Information Systems

Auditor

• COMPTIA Sec+

• CEH

• LINUX fundamentals

• Splunk fundamentals

• NIST SP

• ISO 27001/31000

• HIPPA

• HITRUST CSF

• PCI DSS

As a SOC Analyst and Cyber Security Analyst with 4+ years of experience, I specialize in monitoring, detecting, and mitigating cyber threats to safeguard organizational assets. Proficient in SIEM tools, incident response, and vulnerability management, I excel at identifying risks and implementing proactive security measures. With expertise in network security, endpoint protection, and compliance frameworks like ISO 27001 and GDPR, I am committed to ensuring robust defense mechanisms and driving continuous improvement in cybersecurity practices. ACCOMPLISHMENTS

Clearance: Secret clearance

WORK HISTORY

March 2023 - Current

Soc Analyst Intel Santa Clara, CA

April 2021 - January 2023

Cybersecurity Analyst CDW, Chicago, IL

Conducted incident response for 50+ high-priority security incidents, including malware outbreaks, phishing attempts, and unauthorized access attempts, ensuring minimal business impact.

Performed vulnerability assessments on 500+ endpoints monthly using tools like Nessus and Qualys, implementing remediation strategies to enhance system security.

Maintained and updated 4 threat intelligence feeds, leveraging actionable data to proactively mitigate risks.

Developed and implemented security playbooks for incident response, improving response time by 30% across all security teams.

Conducted in-depth forensic analysis of security incidents to identify root causes and prevent recurrence.

Developed and maintained documentation for Incident Response Procedures and Security Operations Workflows.

Coordinated with external vendors and third-party service providers to resolve complex Security Issues efficiently.

Ensured compliance with internal policies and regulatory requirements by implementing and monitoring Security Controls.

Performed regular reviews of user access rights, minimizing the risk posed by insider threats or compromised accounts.

Analyzed security incidents post-resolution, identifying areas for improvement in both technical controls and incident response processes.

Reduced risk of cyber attacks by conducting regular vulnerability assessments and penetration testing.

Enhanced network security by implementing advanced threat detection and prevention systems.

Ensured compliance with industry regulations by performing comprehensive audits on existing security policies and procedures.

CONTACT

Richmond, TX 77469

835-***-****

************@*****.***

LANGUAGES

English

REFERENCES

Upon Request

May 2019 - February 2021

Cybersecurity Analyst Epsilon Consulting Services, Irving, TX Reduced downtime caused by security incidents by establishing a robust incident management and recovery framework.

Spearheaded the adoption of encryption technologies, safeguarding sensitive information during transmission and storage.

Developed and implemented incident response plans, reducing the average response time by 30% through effective coordination with cross-functional teams.

Monitored and analyzed security alerts using SIEM tools like Splunk and QRadar, resulting in the detection and remediation of 120+ potential threats.

Assisted in developing and maintaining security policies and procedures to ensure alignment with industry best practices and organizational goals.

Conducted vulnerability scans and assessments, identifying and addressing potential security gaps to strengthen the IT infrastructure.

Collaborated with cross-functional teams to investigate security incidents and recommend proactive measures to prevent future occurrences.

Supported the implementation of access control mechanisms and data protection strategies to safeguard sensitive information.

Led the configuration and deployment of endpoint protection solutions across 3,000+ devices, achieving 99% compliance with security policies.

EDUCATION

Expected in December 2026

Cybersecurity And Assurance

Western Governors University, Salt Lake City, UT

PROJECTS

• Designed and tested a ransomware attack simulation across the SOC. Developed custom CloudTrail-based alerts to monitor suspicious API activity and public S3 exposure.

Worked with network/security teams to enforce Zero Trust policies using Zscaler & Okta logs. Created user behavior analytics (UBA) rules to detect data exfiltration and privilege misuse.

Built an automated phishing analysis and response workflow in Splunk SOAR (formerly Phantom).

Led a threat hunting initiative to detect behaviors related to APT29

(Cozy Bear) across enterprise endpoints.



Contact this candidate