Angel Nava
Paso Robles, California I 831-***-**** I ********@*****.***
Linkedln
Summary
Highly motivated professional with extensive experience in the military field within US Air Force, eager to transition into cybersecurity field. Blends critical thinking and problem-solving to maintain safety, enforce protocols, and address complex challenges. Known for delivering effective support in fast-paced settings and ensuring a resilient, secure environment. Committed to expanding knowledge in the cyber landscape and improving technical literacy in a new role within a dynamic team.
EDUCATION
Associates of Science: Computer Science
Cuesta College I 2025 - Present
Associates of Applied Science: Construction Technology Community College of the Air Force I 2023 -2024
EXPERIENCE
DefendEdge - SOC Analyst II
Fort Walton Beach, FL (Remote)! July 2024-January 2025
• Monitored and analyzed security alerts across EDR, RDR, FortiAnalyzer, Cisco AMP, and SIEM platforms to detect and remediate advanced threats.
• Triaged and responded to 327+ security incidents and executed 541 + endpoint security investigations, improving response efficiency under strict SLAs.
• Investigated root causes of security events through forensic analysis, threat hunting, and log correlation using SIEM and threat intel tools.
• Created and tuned custom SIEM use cases, detection rules, alerts, dashboards, and reports to streamline threat identification.
• Contained and mitigated active threats while coordinating cross-functionally with Threat Analysis and Incident Response teams.
• Performed network assessments, firewall configuration, and policy tuning (IPS, malware inspection, web filtering) for optimized client defense.
• Produced technical advisory briefs and security reports to communicate incident impact, remediation steps, and strategic recommendations.
• Maintained and documented case activities via JIRA and case management tools, ensuring detailed audit trails of all investigations.
• Acted as subject matter expert and senior analyst to six Tier I analysts, offering mentorship and technical guidance.
• Trained and developed junior team members by designing hands-on cybersecurity training sessions in collaboration with leadership.
• Engaged with Fortinet to validate and improve detection logic, increasing detection effectiveness by 35%.
• Identified and addressed security posture gaps in client environments; implemented best-practice security policies for five major clients.
• Participated in SOC operations including tool configuration, basic malware analysis, exceptions tracking, documentation, and metrics reporting.
Tools & Technologies: CrowdStrike, SentinelOne, Cisco AMP, FortiAnalyzer, RDR, EDR, SIEM (e.g., LogRhythm, Splunk), JIRA, Fortinet Firewalls