Post Job Free
Sign in

Information Security Analyst with SOC Expertise

Location:
San Jose, CA
Salary:
75,000
Posted:
January 11, 2026

Contact this candidate

Resume:

ERIC STOTZ

617-***-**** • *******@*****.*** • Boston, Massachusetts, 02127, United States • Open to Remote • Open to Relocate • LinkedIn www.linkedin.com/in/eric-stotz

Information Security Analyst

Security+ certified Tier 1 SOC Analyst with over a decade of managerial experience in customer service, skilled at detecting, analyzing, and mitigating security threats within intricate network environments using technologies such as Splunk Enterprise, IBM QRadar, SentinelOne, CrowdStrike Falcon, and SOC Radar. Proficient in log analysis, monitoring system vulnerabilities, incident response and implementing robust security measures. Experienced in actively monitoring SIEM alerts using Splunk and IBM QRadar resulting in reducing incident response time by 50%. Adept at utilizing threat intelligence capabilities to investigate and mitigate email-based security incidents. Holds CompTIA Security+ certification.

Core Competencies

SKILLS AND TOOLS • Cyber Security: Splunk Enterprise, IBM QRadar, SentinelOne, CrowdStrike Falcon, SOC Radar,

NMAP, Fortinet, Proofpoint, Jira, VirusTotal, Anyrun, Mx Toolbox, Tenable.IO, Nessus, Kali Linux, Armis. • Networking &

Virtualization: Wireshark PCAP Analysis, DNS, Whois, Virtualbox, VMware, Web Application Firewall, Next Generation Firewall, IDS/IPS. • Frameworks: OWASP, MTTRE ATT&CK, CyberKill Chain, SANS. • Technology: Google Suite & Google Docs, Microsoft Office Suite, Excel, Tanium.

Professional Experience

Apprenticeship Rapid Ascent

Soc Analyst Apprentice July 2025 –October 2025

Installed and managed virtual machines using Windows Server, Ubuntu, and Kali Linux.

Configured and deployed Microsoft Active Directory; created users and groups using PowerShell automation and STIG compliance tools.

Programmed in Python and used Visual Studio Code and Replit for development and debugging.

Applied Linux and Windows fundamentals, including system administration and file management using Nano.

Configured routers, switches, and firewalls; implemented IP addressing, subnetting, and OSI model concepts.

Conducted vulnerability scanning and traffic analysis using Nmap and Wireshark.

Utilized SIEM and SOAR tools, including Splunk, for network traffic log analysis and event correlation.

Applied frameworks such as the Lockheed Martin Cyber Kill Chain, Diamond Model, and MITRE ATT&CK for threat analysis.

Investigated Indicators of Compromise and developed threat intelligence reports using OSINT and STIX.

Practiced cryptography, forensic analysis, and data handling using CyberChef and Autopsy.

Implemented IAM principles, adhered to FISMA, FERPA, and PCI standards, and applied CI/CD and OWASP security concepts.

Followed NIST 800-61 (S1-IR100B) guidelines for incident response procedures.

Conducted Windows Registry monitoring and network security assessments.

CyberNow Labs, United States Jan 2023 - Present

Apprenticeship

Identified gaps in security event monitoring (Problem) by utilizing Splunk and IBM QRadar to proactively analyze SIEM alerts (Action), resulting in early detection and escalation of potential threats that improved incident response time by 30%.

Reduced threat detection and response delays (Problem) through the implementation and optimization of CrowdStrike EDR across endpoints (Action), cutting average incident detection and response time by 50%.

Contained a ransomware outbreak (Problem) by leading a detailed investigation using SentinelOne’s malware analysis capabilities (Action), successfully minimizing operational downtime and data loss.

Mitigated frequent phishing email intrusions (Problem) by configuring and actively monitoring Proofpoint email security platform (Action), achieving a significant reduction in successful phishing attacks by over 40%.

Strengthening incident response efficacy for email threats (Problem) by collaborating with the IR team using Proofpoint’s threat intelligence tools (Action), accelerating threat mitigation and reducing risk exposure.

Ensured accurate threat validation (Problem) by performing comprehensive analysis of suspicious files, domains, and emails using VirusTotal, Any.Run, and MX Toolbox (Action), enhancing decision-making accuracy and reducing false positives by 25%.

TD SYNNEX, United States May 2022 - Sep 2022

Field Service Technician, Boston

Spearheaded the installation of over 500 cutting-edge thin clients and high-performance workstations for a diverse client base, including Fortune 500 companies in the finance and healthcare sectors. This initiative boosted client operational efficiency by 25% and cut down on IT support requests by 40%.

•Achieved a 98% success rate in complex motherboard and Integrated Circuit Systems (ICS) repairs, servicing over 1,000 units. This extended hardware lifespan by an average of two years and generated an estimated $200,000 in savings for clients by avoiding costly replacements.

•Streamlined the imaging process for over 100 Point of Sale (POS) units and performed critical hard drive replacements, leading to a 50% reduction in deployment time and a 99.9% uptime rate for client retail operations.

•Network and Server Administration

•Configured and maintained a robust network infrastructure of over 100 switches, routers, and servers, ensuring 99.99% network availability and supporting seamless operations for more than 3,000 end-users.

•Proactively monitored and optimized server performance, resulting in a 30% improvement in data processing speeds and a 15% reduction in energy consumption.

Tek-Systems/State, United States Sep 2021 - Dec 2021

Help – Desk Technician, Quincy

Orchestrated large-scale migration of user endpoints from Windows 10 to Windows 11 by leveraging unified endpoint management (UEM) tools, ensuring security compliance, hardware compatibility, and minimal operational disruption.

Configured and deployed secure VPN solutions on laptops to enable resilient remote connectivity, integrating authentication and network access policies within centralized management platforms.

Installed, optimized, and maintained critical business applications—including Citrix Workspace, Microsoft Teams, Salesforce, Office 365—in accordance with endpoint management standards and automated provisioning workflows.

Deployed and supported IBM Lotus Notes across managed endpoints, implementing standardized profiles and troubleshooting replication and synchronization issues to maintain seamless communication

Delta Global Staffing, United States Feb 2017 - Oct 2020

Security Technical Supervisor, Boston

Oversee and enforce access control systems for all secure and restricted areas, ensuring only authorized personnel gain entry by using ID badges, biometric checks, and continuous background verification.

Implement and manage endpoint security controls across all IT assets, including laptops, mobile devices, and workstations, to prevent unauthorized access, malware infections, and data exfiltration.

Monitor and respond to internal security alerts, including real-time detection of threats, incident response, and continuous threat monitoring on both operational (OT) and information technology (IT) systems.

Conduct security awareness and compliance training, making sure employees are trained on security protocols (such as reporting anomalies, phishing recognition, and use of secure communication platforms).

Coordinate patch management for all digital assets and mission-critical systems, ensuring vulnerabilities are promptly remediated to reduce risks from unpatched software or firmware.

Coordinate patch management for all digital assets and mission-critical systems, ensuring vulnerabilities are promptly remediated to reduce risks from unpatched software or firmware.

Encrypt sensitive data on endpoints and networks to protect passenger information, business records, and confidential communications, both in transit and at rest.al Responsibilities.

Additional Responsibilities

Enforce regulatory compliance, such as requirements from the Transportation Security Administration (TSA), International Civil Aviation Organization (ICAO), and other governing bodies.

Manage physical security, including passenger and staff screening, surveillance, and law enforcement collaboration to prevent and respond to security incidents.

Integrate risk management, vulnerability assessment, and threat intelligence into ongoing security programs to proactively address emerging threats specific to the aviation industry.

Maintain detailed records of security actions, audits, and incidents as required by internal policy, regulatory mandates, and industry best practice.

Education

COLLEGE

Springfield College, Springfield, United States, Bachelor of Science in Bachelor of Science in Criminal Justice, (GPA: 3.4)

Certifications

Security+, CompTIA

Will be taking CYSA+ on November 28th.



Contact this candidate