Post Job Free
Sign in

Cyber Security Analyst

Location:
Bethlehem, PA
Posted:
September 18, 2024

Contact this candidate

Resume:

ROSEPOLAT

CYBER SECURITY ANALYST

Citizen Roseto, PA 484-***-****

**************@*****.*** in/rosepolat

Professional Summary

● CompTIA Security+ Certified Cyber Security Analyst with dynamic SOC Environment experience.

● Specialize in security analyst and monitoring, incident response, triage, endpoint security alert remediation tuning, ticketing, reporting and tool deployment.

● Great team player, passionate learner, ambitious to advance career in cyber security.

● Experience in investigation tracking, threat resolution, and incident reporting with ticketing programs like IBM Resilient and Jira.

● Conduct root-cause analysis and determine the initial access for security incidents.

● Experience in working with phishing, malware, data theft (data exfiltration), unauthorized access, inappropriate usage, and denial of service (DOS, DDOS) cases.

Skills

● Expertise: Monitoring, Incident Response, Escalation, Phishing & Malware Analysis, Defense and Security Operations, Log Analysis, Security Information and Event Management (SIEM), Endpoint Detection and Response (EDR)

● Cyber Security Tools: IBM Qradar, Splunk ES, CrowdStrike Falcon, Sentinel One, Proofpoint, Microsoft Sentinel, Microsoft Defender, Darktrace.

● Various IT Skills: SQL, KQL, IBM Resilient, Jira, MITRE ATT&CK, OWASP Top10, Kali Linux Databases, Googling & Research, Data Analysis, Microsoft Office, Active Directory, Time Management Computer Networking.

● Open-Source Intelligence Tools (OSINT): Virus Total, MX Toolbox, Hybrid Analysis, Joe Sandbox Central Ops, IBM X-force, URLscanio, and Abuse IPDB, CyberChef.

● Interpersonal Skills: Possess good communication skills, analytical skills, self-motivated, proactive task oriented, good team player, and quick learner, Situational Awareness, Multitasking, Teamwork

● Problem Solving, Leadership, Management, Leading, Driving, Facilitating, and Chairing all incidents including investigation activities, Meetings, and Conference calls, I formed collaborative action plans with specific actions, roles, and deadlines, and ensuring these are completed.

● Other: SANS, NIST, DOs, DDos, Cyber Kill Chain.

Certifications

● CompTIA Security + March 2022

● Learning the OWASP Top 10 - Course Completion, April 2022

● The Absolute Guide to Mitre Att&ck - Purple Academy, May 2022

● Splunk ES May 2022

● MICROSOFT SC 900

● HIPAA Awareness for Business Associates

● HIPAA Security

● CySa + In Progress

Experience

SOC Analyst- Accesspoint Consulting, Allentown, PA April 2024 – (Part-Time) (On-Site)

• Utilized Microsoft Sentinel to monitor, detect, and analyze security events across the organization's infrastructure.

• Conducted continuous surveillance and analysis of security events to ensure prompt detection of suspicious activities.

• Responded to security incidents by investigating alerts, performing root cause analysis, and documenting findings.

• Coordinated with cross-functional teams to contain, eradicate, and recover from security incidents.

• Leveraged Microsoft Defender to provide endpoint protection, threat analytics, and vulnerability management.

• Analyzed email security alerts and incidents, implementing necessary countermeasures to prevent recurrence.

• Generated detailed reports on security incidents, trends, and metrics for management review.

• Documented processes, procedures, and incident response activities for knowledge sharing and continuous improvement.

• Detail-oriented with a proactive approach to security challenges.

• Committed to continuous learning and professional development in cybersecurity.

• I received Datadog training.

• I obtained a HIPAA certification.

Cyber Security Analyst - CyberNow Labs, Chantilly, VA December 2021 – Present

• Identify events that pose a threat to the confidentiality, availability and integrity of information or systems.

• Conduct log analysis on Splunk and Used IBM QRadar SIEM solutions and provided recommendations to the technical teams via Resilient and Jira ticketing systems.

• Provide cyber support in a 24x7 Cyber Security Operation Center (SOC), including detection and support roles.

• Effectively analyze to determine the reputation of files, domains and phishing emails using online resources such as Virus Total, Any Run, URLscan.io, Central Ops, Abuse IPDB, IBM X-Force Exchange, Joe Sandbox, and MX Toolbox.

• Identify security anomalies, malicious domains and prepare executive summary reports after investigation and remediation through analyzing network traffic and host logs.

• Monitor and analyze SIEM alerts through Splunk and IBM QRadar and Identified security anomalies for investigation and remediation.

• Static and dynamic malware analysis to detect the nature of malicious executable in VM as sandboxing.

• Monitor the company devices with Endpoint Detection and Response (EDR) solutions like CrowdStrike Falcon and Sentinel One.

• Monitor the company e-mails with cloud-based E-mail Security solution like Proofpoint.

• Review systems by means of host visibility and flawless log supply and notified engineering teams.

• Collaborate with a team to brainstorm and prototype solutions to security challenges.

• Work with other groups to continuity and coverage of the enterprise. Social Science Teacher, Private School, Kutahya August 2011 - August 2013

• Managed project.

• Strong critical thinking skills.

• Coordinated, Communicated, Organized my team and students.

• Ensured all quality standards, conducting and reporting statistical analysis.

• Created and processed data sets with excel, presented with PowerPoint.

• I taught courses to the students and parents which solidified my public speaking and management skills. Education

Bachelor’s Degree: Istanbul University – Turkey – Social Science 2007-2011 Northampton Community College PA– ESL Courses 2015-2019



Contact this candidate