Post Job Free
Sign in

Security Operations Incident Response

Location:
Balch Springs, TX
Posted:
September 30, 2025

Contact this candidate

Resume:

CHIDI DIOGU

Cybersecurity Analyst Security Operations Specialist

*******@****.*** 972-***-****

LinkedIn: www.linkedin.com/in/sectresevensecurity

PROFESSIONAL SUMMARY

Entry-level Cybersecurity Specialist with 2+ years of progressive experience in security operations, threat detection, and incident response and management. Certifications include CompTIA Security+, ISC2 CC, Teramind Insider Threat Detection and specialized vulnerability management platforms. Demonstrated expertise in endpoint protection, network security, and risk mitigation across enterprise environments. Proven track record in customer-facing technical support with strong focus on security awareness and education. TECHNICAL EXPERTISE

• Vulnerability Management: Qualys Guard VMDR, Nessus Professional, Patch Management Systems.

• Endpoint Security: Antivirus deployment, Mobile Device Management (MDM), Microsoft Defender for Endpoint Detection and Response (EDR).

• Network Security: VPN configuration, Firewall management, Network monitoring tools.

• Identity Management: IAM configuration, Access control implementation, User provisioning automation.

Security Operations & Analysis

• Incident Response: Threat hunting, Digital forensics, Breach investigation, Evidence collection.

• Risk Assessment: Vulnerability scanning, Security auditing, Compliance reporting.

• Threat Intelligence: OSINT collection, IOC analysis, Threat landscape monitoring, Attack pattern recognition.

• Security Monitoring: SIEM tools, Log analysis, Anomaly detection, Security event correlation.

Compliance & Frameworks

• Standards: NIST Cybersecurity Framework, ISO 27001, GDPR, HIPAA compliance

• Threat Modeling: MITRE ATT&CK framework, Cyber Kill Chain methodology, STRIDE analysis

• Web Security: OWASP Top 10, Application security testing, API security assessment

• AI/ML Security: Large Language Model security, Prompt injection testing, AI model vulnerabilities

INDUSTRY CERTIFICATIONS

Security+ CompTIA May 2024 – May 2027

Certified in Cybersecurity (CC) ISC2 Dec 2023 – Dec 2026 Qualys Guard VMDR Specialist Qualys Jan 2024 – Current Insider Threat Detection Teramind Apr 2025 – Apr 2026 PROFESSIONAL EXPERIENCE

CYBERSECURITY SPECIALIST - LEVEL 1

GenDigital November 2022 – November 2023 Security Operations & Incident Response • Executed incident response procedures for data breach investigations affecting 500+ enterprise clients • Implemented security controls and countermeasures to prevent unauthorized access and data exfiltration • Technical Security Implementation • Deployed endpoint security solutions across heterogeneous environments (Windows, macOS, Android, iOS) • Configured and managed VPN infrastructure supporting secure remote access for distributed workforce • Automated security tool deployment reducing manual configuration time by 60% • Administered Identity and Access Management systems ensuring principle of least privilege Stakeholder Education & Communication • Delivered cybersecurity awareness training to enterprise clients on phishing, social engineering, and data protection • Created technical documentation and standard operating procedures for security incident handling • Collaborated with cross-functional teams to integrate security best practices into business operations • Escalated complex security incidents through established chain of command to L2/L3 support tiers CONTENT SECURITY ANALYST - LEVEL 2

Genpact LLC March 2018 – September 2022 • Applied data classification and content filtering policies to protect sensitive information • Participated in policy development and quality assurance testing programs • Identified emerging social media threats and developed mitigation strategies • Contributed to continuous improvement initiatives for security policy frameworks TECHNICAL SUPPORT COORDINATOR

Hilton Worldwide May 2012 – May 2014 • Provided technical troubleshooting for web application security issues and system vulnerabilities • Supported secure payment processing systems and customer data protection protocols • Implemented conflict resolution procedures while maintaining data confidentiality standards

HANDS-ON CYBERSECURITY PROJECTS

Enterprise Security Assessment Datacom Simulation August 2024

• Conducted comprehensive penetration testing and vulnerability assessment for a simulated enterprise environment

• Developed incident response playbook documenting attack vectors, indicators of compromise, and remediation steps

• Performed risk analysis using qualitative and quantitative methodologies Cyber Defense Operations AIG Shields Up Program June 2024

• Monitored threat intelligence feeds and CISA alerts for emerging vulnerabilities and attack campaigns

• Analyzed Common Vulnerabilities and Exposures (CVE) reports for impact assessment and prioritization

• Developed Python-based cryptographic tools for ransomware key recovery and decryption Security Awareness Program MasterCard Simulation March 2024

• Designed phishing simulation campaigns to test employee security awareness levels

• Conducted gap analysis identifying high-risk departments requiring enhanced security training

• Developed role-based security training curricula tailored to specific business unit requirements Cloud Security Implementation Microsoft Azure Challenge February 2024

• Successfully deployed and configured Virtual Machines using Microsoft Azure

• Implemented security controls including port rules, disk encryption, and access management

• Configured Remote Desktop Protocol with security best practices

• Demonstrated cloud security configuration and management expertise EDUCATION & TRAINING

Bachelor of Science, Applied Sociology Texas State University Continuing Education: Advanced Python for Cybersecurity Automation, AI/ML Security and Adversarial Testing, Cloud Security Architecture and Implementation, Digital Forensics and Incident Response

(DFIR), IBM Machine Learning & LLM Technology, Python (Security automation, Data analysis, Penetration testing), PowerShell scripting, Bash/Shell scripting CORE COMPETENCIES

Operating Systems: Windows Server administration, Linux/Unix systems, macOS security configuration, Mobile device security (Android/iOS) Communication & Leadership: Technical writing, Stakeholder management, Security awareness training, Cross-functional collaboration, Conflict resolution Analytical Skills: Threat modeling, risk assessment, business impact analysis, root cause analysis, data correlation and pattern recognition Emerging Technologies: Large Language Model security testing, AI prompt engineering, Machine learning model vulnerabilities, Deepfake detection



Contact this candidate