Professional Documents
Culture Documents
Professional Summary
10 years of experience in Cyber Security, Networking, Security audit, security
assessments, Risk Management, Security Awareness and Training, and Information
Systems Management.
Experienced in the creation of reports on Cyber Security events and Vulnerabilities found
in vulnerability assessment scans using tools such as (Nessus, OpenVAS, Retina CS).
Investigated and analyzing Cyber Security events found in vulnerability scans and
suggest countermeasures to mitigate the threats.
Penetrated tested systems and networks for vulnerabilities and auditing by performing
Footprinting and Scanning using tools such as Nmap, Hping3, Whois lookup, Path
Analyzer Pro, OpUtils, Google hacking.
Skilled in finding Cyber Security vulnerabilities and risks in computer networks and
resolve those vulnerabilities by ensuring patch management, security in-depth, and
updating systems.
Performed security assessments and audits for compliance with the NIST Risk
Management Framework.
Followed Incident Response Plan to mitigate system breach, document findings, and
perform post-incident analysis to update the Incident Response Plan.
Performed Access Control Identity Management, Penetration Testing, Vulnerability
Assessment, SOC Analysis, Incident Response, and Threat Mitigation.
Experienced in evaluating systems for Cyber Security best-practices and vulnerabilities
by performing systems Footprinting and scanning with tools such as Whois Lookup,
DNSstuff, Social Engineering Toolkits.
Experienced in performing log analysis, intrusion detection/prevention, and incident
management as SOC Analyst by reviewing alerts from various SIEM tools.
Hands-on experience in using tools such as IDA Pro, ArcSight, Splunk, LogRhythm,
AlienVault, Nessus, Wireshark, ForgeRock, Tcpdump, and Nmap.
Skilled in collecting network traffic and perform analysis from network devices such as
Firewall, IDS/IPS, Antivirus, Switches, and Router traffic through Log and Event-based
on TCP/IP.
Experienced with AWS Cloud Security and architectural technology.
Experienced in monitoring systems for any anomalies, proper updating, and patch
management by taken systems baseline.
Proficient in using encryption and hashing tools such as the MD5 online tool, Hash Calc,
and Crypto Demo.
Experienced in malware analysis including viruses, worms, trojans, botnets, and rootkits
using both static and dynamic analysis.
Good background knowledge on common protocols such as HTTP, FTP, SSH, DNS,
DHCP, SNMP, SMB, TLS, SSL.
Expert in using applications such as Microsoft Office Suite/365 (Word, Excel,
PowerPoint).
Skilled in Networking protocols and packet analysis tools, Computer Networking and
TCP/IP stack
Technical Proficiencies
Investigative/Pentest tools
Wireshark MyDNSTools
NMAP DIG
Burpsuite Path Analyzer Pro
Email Tracker Pro Maltego
Web-stat Recon-ng
Whois Netscan Tool Pro
Protocol Analyzer Colosoft ping tools
Nessus Proxy Switcher
Saint OpManager
AirCrack-ng Netcat
Hashcat AirCrack
Zenmap John the Ripper
Netcraft OpUtils
Shodan Engineer Toolset
Geo IP Lookup tool Kismet
Ettercap Cain and Abel
Hping3
Operating Systems
SIEM Security Onion
Splunk Kali
ArcSight Mac OS
LogRhythm Windows Server Desktop Editions
IDS/IPS
CYBERSECURITY FRAMEWORKs
Snort
HIPPA Sourcefire
NIST 800 SERIES TippingPoint
SOX AlienVault
COBIT Advanced Threat Protection (ATP)
RMF
PROFESSIONAL EXPERIENCE