We provide IT Staff Augmentation Services!

Senior Soc Analyst / Incident Response Analyst / Malware Analyst Resume

4.67/5 (Submit Your Rating)

Washington, DC

SUMMARY:

  • With continuous monitoring, I can interpret and prioritize threats using Intrusion Detection/Prevention Systems; Security Information/Event Management (SIEM).
  • I can analyze packets using various security tools and recognize potential, successful, and unsuccessful intrusion attempts and compromises through analysis and review of security events, logs and network traffic.
  • Above all, I can also perform static, dynamic, behavioral, and code - level malware analysis in an isolated virtualized environment.

TECHNICAL SKILLS:

  • Security Management: Nitro, ArcSight, Splunk, RSA Security Analytics, NetWitness, FireEye, Trend Micro, TippingPoint, Snort, App Detective, IDS Policy Manager, Nmap, Nessus, Firewall Logs, Remote Administration (VNC, Putty, SSH), CheckPoint Firewall, Linux and Windows OS, Wireshark, TCPdump, REMnux, and various tools for Malware and Packet analysis
  • Security, Network, and Scripting skills
  • Excellent verbal and written communication skills
  • Great Troubleshooting and Customer Support Service
  • Work efficiently with little or no supervision, and meets deadline
  • Strong Analytical skills and background in Computer Architecture
  • Working knowledge of UNIX and Windows Operating System Environments

PROFESSIONAL EXPERIENCE:

Confidential, Washington DC

Senior SOC Analyst / Incident Response Analyst / Malware Analyst

Responsibilities:

  • Proactively hunt for and research potential malicious activity and incidents across multiple platforms using tools like Netwitness, Splunk, advanced threat network and host-based tools.
  • Build indicators of compromise into monitoring tools using internal and external sources to integrate these tools with one another to provide data enrichment
  • Strong TCP/IP networking skills used in performing network analysis. Also isolate and diagnose potential threats and anomalous network behavior
  • Conduct senior level log analysis, proactive monitoring, mitigation, and response to network and security incidents
  • Analyze traffic, review logs and identify potential security threats.
  • Recognize potential, successful, and unsuccessful intrusion attempts and compromises thorough reviews and analyses of relevant event detail and summary information.
  • Perform static and dynamic malware analysis on virtual servers with proper documentation and steps for removal on infected systems.
  • Triage security events and carry out incident response steps.
  • Examine malicious code to understand key components and execution flow using disassembler and debugger
  • Interact with malicious programs by redirecting and intercepting network traffic to properly explore its capabilities
  • Analyze malicious Microsoft Office, RTF, and PDF files
  • De-obfuscate malicious JavaScript; unpack executable files; and dump programs from memory using debuggers

Confidential

Senior Network Security Analyst / Incident Response SOC Analyst

Responsibilities:

  • Analyze security event data from the network (IDS sensors, firewall traffic).
  • Rescan mitigated systems for further infections. If none, commission systems back to the network.
  • Continuous monitoring and interpretation of threats through use of intrusion detection systems, firewalls and other boundary protection devices, and any security incident management products deployed.
  • Ensure the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies, through monitoring of vulnerability scanning devices.
  • Research new and evolving threats and vulnerabilities with potential to impact the monitored environment
  • Comb and fetch data for further analysis using Splunk.
  • Identify suspicious/malicious activities or codes.
  • Report malicious activity to client locations with recommendations for remediation
  • Worked in a 24x7 Security Operations Center

Confidential

Vulnerability Scanner /IT Security Specialist

Responsibilities:

  • Performed adhoc scans on Linux systems using Nessus and provided compliance reports to Projects.
  • Develop hardening scripts to conform to IRS’s Internal Revenue Manual (IRM) Unix security requirements. Also perform Alpha and Beta test on new security packages
  • Acted as a Subject Matter Expert in resolving and mitigating risks on Unix/Linux servers.
  • Provide SME support for Unix security including server hardening and monitoring
  • Supported Unix SAs with engineering procedures for our Unix environment
  • Use Vulnerability Assessment tools such as Nessus, UPC, and NMAP to perform security testing
  • Identified new malware infections and removed those remotely using admin tools or by identifying the user and guiding them through a removal process.
  • Daily research of existing and new security vulnerabilities including 0-day vulnerabilities. These vulnerabilities are documented and network hosts are patched against these vulnerabilities and threats
  • Supported Federal Information Security Management Act (FISMA) Compliance.
  • Make enterprise security recommendations and technical evaluation of new solutions

We'd love your feedback!