End User Computing Analyst Resume
2.00/5 (Submit Your Rating)
Manassas, VA
SUMMARY
- Security Analyst with deeper knowledge in SIEM and understanding of cyber security policy, technology and other programs for protection against threats and vulnerabilities. Passionate and dedicated towards cyber security solutions for advance protection against threats.
TECHNICAL SKILLS
- Data Loss Prevention | End Point Protection | Threat Modeling | Advanced Threat Protection | Cyber Kill Chain | APT | Malware Analysis | Network Security | System Security | Vulnerability Scanning
- IDS/IPS - SNORT | SIEM-Splunk | Vulnerability Scanner-Nessus | Port Scanner-Nmap | Data Loss Prevention (DLP) | VPN protocols | Packet capturing and analysis-Wireshark| Next Generation Firewall (NGFW) | Web Application Firewall (WAF) | OWASP Top-10 and other attack vectors| OSI Model| Protocols-TCP/IP, UDP, LDAP, SNMP, NetBIOS, Telnet, SSH, SSL, TLS, etc.| and FakeDNS and other required technologies.
- Virtual computing-VMware, Hyper-V, Active Directory, SIEM, IDS, Service-Now
PROFESSIONAL EXPERIENCE
Confidential, Manassas, VA
End User Computing Analyst
Responsibilities:
- Ensuring Patients and employee data security against threats with data de-identification.
- Conducting data loss prevention with and implementing appropriate measures.
- Prioritizing data loss scan on repositories based on pre-defined criteria and policies.
- Analyzing potential privacy violations to identify false positives and policy violations with immediate remediation.
- Conducting SIEM analysis and generating dashboard/reports.
- Identifying vulnerabilities through scans and penetration tests to report the issues.
- Scanning and Identifying Indicators of Compromise (IOC’s).
- Performing threat intelligence and implementing Cyber Kill Chain defense against APT.
- Employing cyber modeling techniques to identify malicious threats and activities.
- Analyzing network traffic for malicious or abnormal activity for attack vectors.
- Identify adversary's Tactics, Techniques, and Procedures (TTPs) for technical mitigation strategies for preventing, controlling, and isolating incidents.
- Performing malware analysis using different malware analysis methodologies.
- Performing digital forensics to identify suspicious malicious content.
- Conducting intrusion detection and prevention.
- Performing log analysis and identifying malicious activities.
Confidential, Manassas, VA
Behavioral Health Tech
Responsibilities:
- Communicated patients’ needs to the appropriate staff member.
- Assisted with ADL’s, assist patients with exercise and/or ambulation, promptly report changes to the patient condition to the Registered Nurse.
- Assisted in the monitoring and managing of the patient milieu and preform safety checks as needed.
- Assisted in the professional development of co-workers as a preceptor by mentoring, teaching, and orienting.
Confidential, Alexandria VA
Cyber Security Specialist
Responsibilities:
- Analyzed compromised machines to provide explanation of break-in process
- Investigated email threats, fraudulent emails and copyright violations
- Researched in-progress attacks by use of network sniffers
- Analyzed pre-production systems for security vulnerabilities.
- Responsible for phishing mail box, blocking URL’s and log analysis.
- Researched on an emerging threat, updated emerging threats, and detection capabilities.
- Analyzed most prevalent vulnerabilities, threats, attack methods, and infected vectors.
- Assisted SOC hire and training on Networking and Security fundamental of TCP/IP and other core Internet protocols.
- Monitored Security Information and Event Management (SIEM); Intrusion Detection System (IDS); Network Monitoring and Response Services.
- Managed global threat landscape by tracking changes in directing Manage services.
- Responded to evaluation-related queries from the evaluation facilities and assisted in resolving evaluation-related issues.