Security Operations Center (soc) Analyst Resume
5.00/5 (Submit Your Rating)
SUMMARY:
- Thomas Itoe is a Cyber Defense Analyst with experience in Network, Application, Endpoint, Threat intelligence, Forensics, as well as teh functioning of specific applications or underlying IT infrastructure.
- I analyze Phishing emails including email Headers, Malware, Source code, acts as a first responder to account/system attacks and compromises to determine Threat vectors and provide initial remediation.
- I also has experience in utilizing SIEM tools to monitor and analyze incidents. He works well with stakeholders to resolve incidents and escalates incidents when necessary following policies and procedures.
TECHNICAL SKILLS:
Operating Systems: Unix - Based Systems (Solaris, Linux); Windows.
Networking: LANs, VPNs, Routers, Firewalls, TCP/IP
Software: MS Office (Word, Excel, Outlook, Access, PowerPoint)
Ticket Systems: Archer, Service Now, Remedy & JIRA
Open Source Site Check tools: URLVOID.COM, VirusTotal.com, zscaller.com etc
PROFESSIONAL EXPERIENCE:
Confidential
Security Operations Center (SOC) Analyst
Responsibilities:
- Use Splunk Enterprise Security (ES) to monitor and analyze network traffic, by Intrusion Detection Systems (IDS) and security events logs.
- Use Cisco Sourcefire to monitor network traffic to ensure malicious network traffic is dropped.
- Perform incident response to investigate and resolve computer security incidents.
- Process Daily Threat Intel and blocking malicious MD5 hashes, IPS and Domains following standard operation procedure.
- Block malicious domains, Hashes, Files and IPs following company's Standard Operation Procedures.
- Process Web Site Review Requests using McAfee Web Gateway GUI to grant temporal Web Access to users within teh Company to websites that are being blocked for security.
- Use Splunk to search and analyze email logs to confirm a malicious email were not delivered or is quarantined and malicious attachment is dropped.
- Stay up to date with current vulnerabilities, attacks, and counter measures.
- Develop follow - up action plans to resolve reportable issues, and communicate with other Analysts to address security threats and incidents.
- Review and process accidental disclosure requests following standard operation procedures
- Regularly develop new use cases for automation and tuning of security tools.
- Analyze, investigate and process Malicious/Phishing Email alerts from IronPort and FireEye following standard operation procedure.
- Lead, perform, review or track security incident investigations to resolution.
- Lead and perform or review root cause analysis efforts following incident recovery.
- Compose security alert notifications and other communications.
- Use McAfee DLP Manager to protect intellectual property and ensures compliance by safeguarding sensitive data.
- Contribute to security strategy and security posture by identifying security gaps, evaluate and implement enhancements.
- Prioritize and differentiating between potential intrusion attempts and false alarms.
- Assist with teh development of processes and procedures to improve incident response times, analysis of incident, and overall SOC functions.
- Provide Incident Response (IR) support when analysis confirms actionable incident.
- Strong working knowledge of network security monitoring and incident response, as well as superior written and technical communications skills.
Confidential
SYSTEM ADMINISTRATOR
Responsibilities:
- Monitor Performance and Maintain systems according to requirements
- Troubleshoot issues and outages
- Ensure security Backup/ Recovery of Data.
- Familiarity with various operating systems and Platforms
- Manage network servers and technology tools
- Ensure security through access controls, backups and firewalls
- Also Upgrade systems with new releases and models
- Set up accounts and workstations
- Installation / configuration of software and hardware
- Develop expertise to train staff on new technologies
- Build an internal wiki technical documentation, manuals and IT Policies.
