Security Operation Center Analyst Resume
5.00/5 (Submit Your Rating)
Germantown, MD
SUMMARY:
- Cyber Security analyst with the ability of ensuring technical security planning, testing verification and risk analysis.
- Also, capable of defining, developing and monitoring risk management, compliance, and information security programs.
- Knowledge in IT management, deployment, staging + configuration, installation + integration, technical systems, and good communication skills.
TECHNICAL SKILLS:
- Splunk
- McAfee SIEM
- Linux/Unix Shell
- Qualys
- Amazon Web Services
- Access Control
- Windows Server 08/2012
- VMware Workstation
- TCP/IP & Networking
- Virtualization tools and Blue Coat
PROFESSIONAL EXPERIENCE:
Confidential, Germantown, MD
Security Operation Center Analyst
- Competence, including event monitoring, security event/alarm/traffic analysis, and incident responses.
- Provide technical guidance, troubleshooting, support, and assistance to a diverse scientific and engineering workforce.
- Strong analytical and problem - solving skills; written and verbal communication skills; and customer service skills.
- Use strong TCP/IP networking skills to perform network analysis to isolate and diagnose.
- Monitor SOC systems functionality, availability and emergency procedures.
- Monitor the SOC systems and notify the SOC Management of any outages or issues with the systems that affects productivity.
- Create, modify, and update IDS and Security Information and Event Management (SIEM).
- Work with internet protocols such as SMTP, HTTP, DNS.
- Communicates with clients, internal departments, ISPs and Registrars for various issues.
- Writing and maintaining technical documentation for new and existing projects.
- Develop an infrastructure to provide support to all business requirements and perform regular troubleshoot on systems to resolve all issues.
- Interact with technical leads, project and program managers to assess and determine requirements and constraints.
- Have knowledge and skills to proactively detect and mitigate network security threats.
- Perform daily review of system, application logs, and custom monitoring tools
- Monitor for and investigate suspicious or malicious activity and alerts
- Review Change Management requests for security relevance and impact
- View and analyze each URL & correctly categorize each URL with the correct classification.
- Create tickets on fraud detections for clients in Anti-Fraud ticket management and processing in RT ticketing system.
- Monitor the shutdown board and identify tickets with outstanding uptimes and escalate up to management for review.
- Ability to learn new technologies quickly.
Confidential, Rockville, MD
IT specialist technician
- Lead the Implementation Team Members (ITMs) to deploy, analyze, and configure Dell computers (avg. 200+) for use throughout Montgomery County Public schools and various other educational facilities.
- Instructed employees within the schools on the new systems.
- Provisioning Linux Ec2 on AWS cloud Create users, administer user, create groups, assign users to group accounts, setting permissions Web servers, file servers, firewalls, and directory services with ability to diagnose basic Apache Issues.
- Install, configure, maintain, administer Linux / UNIX operating systems and components.
- Snapshot automations on AWS cloud for Disaster Recovery.
- Configured technology to client specifications pre-delivery in a controlled environment.