Assistant Vice President Cyber Threat Analytics Engineer Resume
5.00/5 (Submit Your Rating)
TECHNICAL SKILLS
- Passive Total
- RSA Security Analytics
- Symantec MSSP
- Domain Tools
- ThreatStream
- Cisco Talos
- Virus Total
- CrowdStrike
- MS Powershell Comm.
PROFESSIONAL EXPERIENCE
Confidential
Assistant Vice President Cyber Threat Analytics Engineer
Responsibilities:
- Author of analysis techniques using Confidential v6.3 stats, charts, and timechart commands and a slew of other Confidential functions
- Developing Confidential v6.3 analyst findings incumbent of no signature required analytics
- Detecting zero day attacks to include phishing, exploit kits, malware, Trojans, rootkits, APT, host latent infections, post compromise host, APT, and advanced APT potential nation state related
- Requiring no signature to detect unlike SOCs or most analysts, raw data required
- Network forensics and advanced incident response analysis using custom datasets, aggregate datasets enabled Big Data analysis unique macro style correlation unable to be performed by rookie analysts
- Setting the pace with daily finds distribution and origination of workflow checklists
- Creates group coverage by threat dissemination to group contact list and threat generated tickets in Cyber Threat Portal, most tickets and unique finds created
- Coaching junior analysts to use custom datasets and other investigation techniques, creating more thorough analysis where rookie analysts lack coverage prudence, reducing business risk of Cyber Threat Operations team
- Leader of new technology and technology improvement discussions, unofficial lead of vendor evaluations
- Primary author of Cyber Threat Road Map strategy used by Confidential to overhaul and improve information security infrastructure, operations, applications, endpoint, and insider threat security campaigns and security posture
- Point of contact to most security vendor partners of Cyber Threat Analytics and Cyber Threat Intelligence teams, organizer of product demonstrations, and influencer to Cyber Threat leadership
- Setting strategy and discussion points in leadership meetings, steering within the ranks no title given yet, leading leadership through guidance
- Organizer of analysis function to Cyber Threat Intelligence team, developer of proactive preliminary OSINT triage analysis function, covers domain discovery, passive dns review, and malware and reputation linking
- Organizer and creator of twelve point minimum criteria of evaluation standard in Cyber Threat Analytics datasource analysis, customized per each dataset
- Documenter and creator of Confidential v6.3 key standard operating procedure guideline used by Confidential to purpose operations to external regulators
Confidential
Senior Cyber Security Consultant
Responsibilities:
- Incident Response and Network Forensics lead and distributor of threat intelligence briefs and analysis mentor
- Manual dynamic reverse engineering sandbox analysis techniques revealing first stage dropper behavior, second stage point of infection and command and control variables
- Author of no signature phishing same day zero day captures using enterprise full network packet capture technology application RSA Netwitness Security Analytics v10.5
- Profiling of entire subnet and point of gateway egress ingress patterns per TCP.IP protocols with port activity to create normal and expected suspicious traffic and malicious traffic profiles to build investigation leads No signature no alert correlations of multiple datasets with RSA Security Analytics v10.5 to empower incident response reconstruction that no shadow IT or hacker will hide
- Drafter and creator of analyst reports with multiple datasets with RSA Security Analytics v10.5 combined with threat intelligence offering complete work product, and coaching inexperienced analysts to do the same Active Directory investigator of operational and security anomalies finding disaster recovery server errors and inappropriate administrative changes to core network services
- Creator and configurator of manual dynamic reverse engineering analysis virtual lab filled with freeware latest windows tools triage of samples extracted with RSA Netwitness
- Offline packet capture investigations with RSA Netwitness Investigator, Network Monitor v3.5 SP1, Microsoft Message Analyzer, and Wireshark, most often with RSA Netwitness Investigator because it is far faster than wireshark
- Ninety Nine percent system active code triage coverage fast host analysis review with RSA ECAT v4.1, limiting system offlining and incident response lags as in waiting drive imaging
- Confidential v6.x correlator of DNS activity with RSA Security Analytics and Confidential DNS analysis