Cyber Security Analyst Resume
4.00/5 (Submit Your Rating)
SUMMARY
- He is a computer forensic investigator, with experience in APT intrusions involving payment gateway data breaches, nation state attacks and industrial espionage.
- Through learning and experience, he has gained industry noledge providing a good level of understanding of incident response and intrusion forensics methodologies and tools.
- He currently works for Confidential UK in the defense industry and is responsible for monitoring, auditing and protecting Confidential UK infrastructure.
- Industry experience as part of CSIRT, SOC, Security Operations and Investigations Team in a data regulated and mission critical environment.
- Experience in responding to and containing security incidents such as crime ware, data breaches and advanced targeted attacks following a standard incident handling life cycle.
- Experience in dealing with APT and TTP attacks from different threat levels.
- The ability to create a response and remediation plan during and after an incident.
- Ability to make real - time key decisions under pressure across heterogeneous and unstructured environments.
- Ability to report key findings in a clear and concise manner both at a technical and senior management level.
- Knowledge of TCP/IP networking with the ability to perform network forensic analysis.
- Good understanding of underlying service protocols such as HTTP, HTTPS and DNS.
- Knowledge working with security information and event management tools.
- Understanding of client-server infrastructures, security architectures and related logging and alerting.
- Good understanding of file system analysis including FAT, NTFS, HFS+ and EXT2/3/4 and ability to find and extract common disk based indicators of compromise.
- Knowledge of Windows, Linux and OS X system internals with emphasis on memory structures and ability to find and extract common memory based indicators of compromise.
- Experience conducting malware analysis activities through behavioral techniques for dynamic analysis and reverse engineering.
- Limited experience with scripting languages such as WMIC, PowerShell, Batch and Python in incident response environments.
- Experience in analysing network traffic and alerts from various sources in order to determine the cause of it.
- Limited experience working with YARA and SNORT rules.
TECHNICAL SKILLS
Operating Systems: Windows, Linux, Unix, Mobile OS's
Host Analysis: GRR, EnCase, FTK, XRY, TSK, Log2Timeline, Volatility Framework, ELK Stack, SIFT Workstation, Cuckoo, Viper
Network Traffic: Wireshark, TCPdump
Monitoring Tools: SIEM (QRadar, AlienVault, LogRhythm, Splunk, Alert Logic, Elastic Stack), AV (Sophos, McAfee), Malware Detection (McAfee, CISCO, F-Secure, FireEye, Wildfire)
PROFESSIONAL EXPERIENCE
Cyber Security Analyst
Confidential
Responsibilities:
- Examining system logs and threat intelligence about the normal activities of the system to allow a history of events to be reconstructed, making use of appropriate forensic techniques and technologies.
- Conduct detailed analysis and investigation of alerts generated via SIEM, IDS/IPS and other related data sources.
- Responsible for developing, researching and maintaining proficiency in tools; including researching techniques, countermeasures and trends in computer and network vulnerabilities, data obfuscation, and malware analysis.
- Evaluate and implement intelligence regarding new threats and vulnerabilities and ensure detective controls are updated to detect new attacks.
- Carry out analysis to determine the root cause of events, and to provide incident response and reporting in support of operational TEMPeffectiveness.
Incident Response Investigator
Confidential
Responsibilities:
- Primary responsibility is to work with MWR's clients to deliver Investigations and Incident Response services.
- The role involved performing intrusion forensics by identifying unauthorised access into network estates.
- Gained experience from working with a large set of clients from different global industries which gave me the exposure to different environments and architectures.
- Acquainted to work in SOC environments. Some of these involved APT attacks, ransomware, fraud and phishing.
- Developed forensic laboratory, incident response procedures and first responder training.