Professional Documents
Culture Documents
Experienced In Information Security, in deploying Identity Access Management (IAM) |Privileged Access
Management (PAM)| Cyber Security Management Strategic Planning and Implementations |Regulatory
Compliance | Cloud administration, analysis, design, support
Public Cloud (AWS) | Threat and Vulnerability Management | Risk Management |Security Architecture| Project
Management Change Management | Software Development Life Cycle Management Deployments and Migrations
| Security Implementation Administration |Web Penetration Testing | Integration and Delivery.
CyberArk Certified Delivery Engineer, experienced in using IAM/PAM tools for deployment, configuration,
integration, upgrades and troubleshooting of CyberArk PAS suite - Enterprise Password Vault, Password Vault Web
Access, Central Policy Manager, Application Access Manager, Privileged Threat Analytics.
Professional Experience
Solvent, Fairfax VA
Role- Cyber Security Analyst March 2020-Present
• Perform analysis of log files of Firewall, IPS, IDS, Server and Proxy via Splunk SIEM solution.
•Follow detailed operational processes and procedures to appropriately analyze, escalate, and assist in
remediation of security incidents.
•Create and track incidents and requests with an integrated ServiceNow (SNOW) ticketing system.
•Perform post-mortem analysis on logs, traffic flows, and phishing activities to identify malicious actors.
•Analyze PCAP files for Malware analysis, find details of the infected hosts, and write IOC on executive summary
reports.
•Demonstrate ability to develop and implement security policies and procedures specific to OT environments,
ensuring compliance with industry standards and best practices.
•Conducted thorough root cause analysis of security incidents, identifying vulnerabilities and weaknesses to
prevent future occurrences.
•Implementation of secure data transmission practices within SQL environments, utilizing SSL/TLS for encrypted
communication.
•Effective collaboration with cybersecurity teams to integrate SQL database security into the broader
organizational security framework.
•Liaise with the Company's Security Operation Center to respond to emerging incidents in a timely manner.
• Monitor and analyze Security Information and Event Management (SIEM)alerts through Splunk and identify
security incidents for remediation and investigation.
Slalom, WA
Role-Cyber Security Analyst Feb 2019 - March 2020
•Responsible for implementing, and managing Identity Directory and Identity Governance, including IAM architecture
and integrations, Cloud, AWS Cloud, and GCP migrations, utilizing scripting tools, two-step verification systems, and
deploying IAM protocols such as SSO/SAML, OAuth/OIDC, and SCIM for Byte dance enterprise architecture.
•Proficient in configuring SQL database logging and monitoring systems to detect and respond to security events,
enabling timely incident response.
•Project Portfolio Management (PPM),integrating SAML server Ping IDand Okta libs, (java & eclipse), VPN, SIEM,SOAR.
•Developed and implemented robust security architectures for industrial control systems, ensuring the integrity and
confidentiality of critical infrastructure.
•Establish and maintain an information security governance framework to guide activities that support the
information security strategy.
•Responsible for PAM Operational tasks defining access control, user entitlements, user access policy management.
Exxon Mobil, TX
Role- IT Specialist Jan 2018- Jan 2019
• Manage user account settings according to user’s process.
• Image a Desktop or Laptop, whether newly received or to repair.
• Using hardware systems and updating software and installing necessary software.
• Maintained network system of store and repaired electronic devices with network issues.
•Ticket handling standards and resources.
• Managed and maintained customer databases for ordering and communication purposes.
• VPN authentication to gain access to networks.
• Checking and updating software systems.
Rainpark Solution,NJ
Role- Salesforce Administrator Jul 2016-Dec 2017
Skills
Security Tools: Risk Analysis, Malware Analysis, Phishing Analysis, Threat Analysis, Incident Response, Cloud
Security, Risk Mitigation, MITRE ATT&CK, SIEM tools Cisco-EDR, NIST, OT Security.COBIT frameworks, Splunk,
DELL XDX AnyRun, Snort,Keylogger,Yara ,Incident,Crowdstrike, Jenkins CI/CD .
Network: Wireshark, Nmap, Zenmap, Nessus, Pcap Analysis, TCP/IP, Bro Zeek, Suricata, VERIS, Cyber Kill
Chain Framework, Active Directory, DNS Server, DHCP Server.
Technologies: CSS, jQuery, Web Services, SOAP, REST, WSDL, HTML,SOAR.
Languages/Methodologies: Apex, Visualforce, Java, XML, XSLT, UML, JavaScript, Agile, SQL, HTML, Python
Scripting, Shell Scripting,PowerShell , DSC.
Operating Systems: SUSE Linux 9/10/11, Windows Server 2000/2003/2008, Unix.
Education
Associate Degree in Computer and Information system University of Tirana| Tirana Albania
Bachelor’s Degree in Law University of Tirana |Tirana Albania
Certifications