Threat Hunting & Soc Analyst Resume
2.00/5 (Submit Your Rating)
Lexington, VA
TECHNICAL SKILLS
Platforms: Windows 7/8/8.1/10, Linux (Ubuntu, Kali)
Languages: Python (Intermediate), C++, Java (Beginner), Bash scripting (Novice)
Spoken Languages: Arabic (Intermediate), German (Beginner)
Tools: VirtualBox (Intermediate) VMWare Workstation (Intermediate)
PROFESSIONAL EXPERIENCE
Threat Hunting & SOC Analyst
Confidential
Responsibilities:
- Log analysis/Forensics, Kernel log audits, Windows event logs, Network forensics/packet analysis, Wireshark/Tshark, Real - time packet sniffing, analytics, and filtering, DdoS tracing and ID, session reconstruction and reverse capturing, Windows forensics
AWS DC Meetup
Confidential
Responsibilities:
- AWS IoT Quickstart and Use Cases, AWS CodeStar introduction
Commonwealth Cyber Fusion 2017 Competitor
Confidential, Lexington, VA
Responsibilities:
- Capture the Flag/Jeopardy format, member of 11 man Confidential team
- Topics incl. Encryption, Reverse Engineering, Reconnaissance, Forensics
ITN 261 NETWORK ATTACKS, COMPUTER CRIME AND HACKING
Confidential
Responsibilities:
- Topics incl. hacker attack techniques, methodologies, and tools, network worms, viruses, and malicious code, computer crime, industrial espionage, and information warfare
- Tools used incl. Nmap, wireshark, nessus, sqlmap, msfconsole, binwalk, quickstego, truecrypt, dirb
- Assessing/Securing Systems on a WAN, Applying Encryption and Hashing Algorithms, Data Gathering and Footprinting on a Targeted Website, Using Nessus on a Vulnerable Webapp and Database, ID’ing/Removing Malware on Windows Systems, Analyzing Network Traffic to Create a Baseline Definition, Auditing a Wireless Network and Planning for Secure WLAN Implementation, Investigating/Responding to Incidents, Implementing an IDS, SET Credential Harvester and Infectious Media Creation
- Topics incl. Rings, Groups, Fields, Integer and Equivalence Relations