TAMUYEH N. BONAVENTURE
SKILLS
Security Tools & Frameworks SIEM
(Splunk, QRadar), Nessus, Wireshark,
Metasploit, Burp Suite, Kali Linux
Endpoint & Network Security Firewall
Management, IDS/IPS (Snort, Suricata),
VPN Configuration, Endpoint Protection
Threat Management Threat Intelligence
Platforms, Incident Response,
Vulnerability Management
Programming & Scripting Python,
PowerShell, Bash, SQL Cloud Security
AWS Security, IAM, GuardDuty,
cloudtrial, cloudwatch, SNS, VPC,
Microsoft Azure Security, Cloud Access
Security Brokers (CASB) Collaboration &
PM Tools Trello, Jira, Slack, Confluence,
Microsoft Teams Compliance &
Governance ISO 27001, GDPR, NIST
Cybersecurity Framework, HIPAA, PCI-
DSS
CERTIFICATIONS
FrameWork,
CISA - Certified Information Systems
Auditor
•
• COMPTIA Sec+
• CEH
• LINUX fundamentals
• Splunk fundamentals
• NIST SP
• ISO 27001/31000
• HIPPA
• HITRUST CSF
• PCI DSS
As a SOC Analyst and Cyber Security Analyst with 4+ years of experience, I specialize in monitoring, detecting, and mitigating cyber threats to safeguard organizational assets. Proficient in SIEM tools, incident response, and vulnerability management, I excel at identifying risks and implementing proactive security measures. With expertise in network security, endpoint protection, and compliance frameworks like ISO 27001 and GDPR, I am committed to ensuring robust defense mechanisms and driving continuous improvement in cybersecurity practices. ACCOMPLISHMENTS
Clearance: Secret clearance
WORK HISTORY
March 2023 - Current
Soc Analyst Intel Santa Clara, CA
April 2021 - January 2023
Cybersecurity Analyst CDW, Chicago, IL
Conducted incident response for 50+ high-priority security incidents, including malware outbreaks, phishing attempts, and unauthorized access attempts, ensuring minimal business impact.
•
Performed vulnerability assessments on 500+ endpoints monthly using tools like Nessus and Qualys, implementing remediation strategies to enhance system security.
•
Maintained and updated 4 threat intelligence feeds, leveraging actionable data to proactively mitigate risks.
•
Developed and implemented security playbooks for incident response, improving response time by 30% across all security teams.
•
Conducted in-depth forensic analysis of security incidents to identify root causes and prevent recurrence.
•
Developed and maintained documentation for Incident Response Procedures and Security Operations Workflows.
•
Coordinated with external vendors and third-party service providers to resolve complex Security Issues efficiently.
•
Ensured compliance with internal policies and regulatory requirements by implementing and monitoring Security Controls.
•
Performed regular reviews of user access rights, minimizing the risk posed by insider threats or compromised accounts.
•
Analyzed security incidents post-resolution, identifying areas for improvement in both technical controls and incident response processes.
•
Reduced risk of cyber attacks by conducting regular vulnerability assessments and penetration testing.
•
Enhanced network security by implementing advanced threat detection and prevention systems.
•
Ensured compliance with industry regulations by performing comprehensive audits on existing security policies and procedures.
•
CONTACT
Richmond, TX 77469
************@*****.***
LANGUAGES
English
REFERENCES
Upon Request
May 2019 - February 2021
Cybersecurity Analyst Epsilon Consulting Services, Irving, TX Reduced downtime caused by security incidents by establishing a robust incident management and recovery framework.
•
Spearheaded the adoption of encryption technologies, safeguarding sensitive information during transmission and storage.
•
Developed and implemented incident response plans, reducing the average response time by 30% through effective coordination with cross-functional teams.
•
Monitored and analyzed security alerts using SIEM tools like Splunk and QRadar, resulting in the detection and remediation of 120+ potential threats.
•
Assisted in developing and maintaining security policies and procedures to ensure alignment with industry best practices and organizational goals.
•
Conducted vulnerability scans and assessments, identifying and addressing potential security gaps to strengthen the IT infrastructure.
•
Collaborated with cross-functional teams to investigate security incidents and recommend proactive measures to prevent future occurrences.
•
Supported the implementation of access control mechanisms and data protection strategies to safeguard sensitive information.
•
Led the configuration and deployment of endpoint protection solutions across 3,000+ devices, achieving 99% compliance with security policies.
•
EDUCATION
Expected in December 2026
Cybersecurity And Assurance
Western Governors University, Salt Lake City, UT
PROJECTS
• Designed and tested a ransomware attack simulation across the SOC. Developed custom CloudTrail-based alerts to monitor suspicious API activity and public S3 exposure.
•
Worked with network/security teams to enforce Zero Trust policies using Zscaler & Okta logs. Created user behavior analytics (UBA) rules to detect data exfiltration and privilege misuse.
•
Built an automated phishing analysis and response workflow in Splunk SOAR (formerly Phantom).
•
Led a threat hunting initiative to detect behaviors related to APT29
(Cozy Bear) across enterprise endpoints.
•