Gilbertsville PA, US
Phone: xxx-xxx-xxxx
Email: xxx@xxxx.xxx
Looking For: SOC Analyst,
Occupation: IT and Math
Degree: Master's Degree
Career Level: Entry Level
Languages: english
Highlights:1. Threat Monitoring and Analysis: Proactively monitored and analyzed real-time alerts and events from SIEM tools to identify potential security incidents, ensuring rapid response to mitigate threats. 2. Incident Triage and Response: Efficiently prioritized, triaged, and resolved security incidents by correlating logs, analyzing attack patterns, and escalating critical events as necessary. 3. Email Security and Phishing Analysis: Conducted in-depth analysis of phishing emails using tools such as Proofpoint and KnowBe4, identifying malicious attempts and initiating remediation actions. 4. O365 Incident Management: Investigated and resolved O365-related security issues, including unauthorized access attempts, account lockouts, and email delivery issues. 5. Threat Intelligence Integration: Leveraged threat intelligence feeds to detect Indicators of Compromise (IOCs) and applied them to block malicious activities through blacklists and security controls. 6. Policy and Playbook Development: Contributed to the development of SOPs and incident response playbooks to standardize and enhance the efficiency of security operations. 7. Collaboration and Escalation: Worked closely with cross-functional teams, including L3 analysts and system administrators, to address complex incidents and ensure effective remediation. 8. Tool Expertise: Hands-on experience with advanced security tools such as Microsoft Sentinel, Proofpoint, KnowBe4, and EDR solutions to support security monitoring and investigations. 9. Training and Knowledge Sharing: Actively participated in knowledge-sharing sessions and provided guidance to junior analysts to enhance team capabilities and foster a collaborative environment.
Skills:LOG ANALYSIS, INCIDENT RESPONSE, ALERT MANAGEMENT, END-POINT SECURITY, NETWORK SECURITY, VUNERABILITY ASESSMENT, NETWORK TRAFFFIC ANALYSIS, THREAT INTELLIGENCE, SECURITY OPERATIONS, THREAT DETECTION, SIEM, MALWARE ANALYSIS, EDR, AZURE SENTINEL, CLOUD STRIKE, EMAIL GATEWAY, EMAIL ANALYSIS, O365, FISHING ANALYSIS, KNOW BE4
Goal:Over the next five years, my objective is to transition from my current role as a SOC Analyst to a Security Architect. I aim to deepen my expertise in designing and implementing enterprise-level security frameworks, advancing my technical proficiency in areas such as threat modeling, risk assessment, and secure architecture design. This progression will include achieving relevant certifications, gaining hands-on experience with advanced security solutions, and contributing to the strategic development of robust cybersecurity defenses within the organization.
Membership:(ISC)² Candidate: Engaged with the global cybersecurity community through (ISC)², accessing resources to enhance knowledge and pursue professional certifications like CISSP or SSCP. OWASP Member: Involved in the Open Web Application Security Project (OWASP), focusing on web application security and participating in knowledge-sharing forums.
Certification:SC-200 - Microsoft Security Operations Analyst. SC-100 - Microsoft Cybersecurity Architect.
Honor:Outstanding Achievement in Security Operations (Movadex) – Awarded for consistently meeting and exceeding performance goals in managing SIEM alerts, reducing response time, and improving the overall efficiency of the SOC team. Top Performer in Phishing Analysis (KnowBe4) – Acknowledged for identifying and mitigating high-impact phishing attacks, contributing to a significant reduction in phishing-related incidents within the organization. Incident Response Excellence Award (Movadex) – Recognized for excellence in triaging and resolving complex security incidents, ensuring timely remediation and minimal impact on business operations.
SOC ANALYST 02/2024 - current
Movadex, Brookyln, NY United States
Industry: IT SERVICES consulting
Having Overall 3+ years of experience as a SOC Analyst, with a focus on SIEM, EDR, and phishing analysis.
? My understanding of cyber-attacks and defensive measures is strong, and I've consistently shown the ability to identify, mitigate, and respond to security incidents effectively, safeguarding sensitive data and systems.
I am seeking the role of Cyber Security Analyst to leverage my expertise in SOC, ensuring the organization's digital assets are safeguarded with the highest level of security.
With over 3 years of experience as a SOC Analyst, I have developed a strong expertise in Security Information and Event Management (SIEM), Endpoint Detection and Response (EDR), and phishing analysis. Throughout my career, I have consistently demonstrated a deep understanding of cyber-attacks and defensive measures, enabling me to effectively identify, mitigate, and respond to security incidents. My ability to safeguard sensitive data and systems has been key in minimizing potential risks and ensuring the integrity of organizational assets. I am now seeking the role of Cyber Security Analyst to apply my skills and knowledge in a more strategic capacity, ensuring that the organization's digital infrastructure is protected with the highest level of security.--
WILMINGTON UNIVERSITY 08/2022 - 10/2023
NEWARK, DE, United States
Degree: Master's Degree
Major:Master of Science
Minor:Information Assurance
Completed master's degree in Information system technology from Wilmington University.
The program provided in-depth knowledge and practical skills related to information security, risk management, and system protection. Gained hands-on experience in securing digital infrastructures and analyzing cyber threats, equipping me with the tools necessary to address complex security challenges.
SOC ANALYST SIEM,EDR,AZURE,SENTINEL,O365,KNOW BE4
Login to view resume: SOC ANALYST - SIEM,EDR,AZURE,SENTINEL,O365,KNOW BE4