SUMMARY
Cyber Security Specialist with more than 19 years of experience in the area of information security. Proficient in security event monitoring, threat hunting, i
report investigation, i
looking to join a global security operations team that safeguard organization’s information systems and assets.
EXPERIENCE
Senior Security Analyst
November 2023 / Present
- Lead and participate in i
- Proactively search for signs of malicious activity within the network, using advanced tools, techniques, and threat intelligence. Identify and mitigate potential security risks before they escalate.
- Monitor security alerts and events generated by security information and event management (SIEM) systems. Analyze patterns and trends to identify potential security i
- Analyze and interpret logs from various security and network devices to identify abnormal patterns or potential security i
- Create detailed i
-Work closely with other teams, such as network operations, system administrators, and i
- Actively participate in the continuous improvement of SOC processes and procedures. Provide recommendations for enhancing the effectiveness and efficiency of security operations.
Cyber Security Engineer
January 2023 / November 2023
-Develop standard templates & policies to scan client infrastructure for security threats using industry-standard penetration testing tools
- Use templates & policies to perform regular scans (penetration testing) on internal & external infrastructure
- Review results of scans to identify security risks (ie. unpatched software, insecure passwords, insecure network configurations)
- Respond to new and emerging threats by proactively monitoring security feeds (ie. Microsoft Security Intelligence) and updating the scanning templates/policies accordingly.
- Work with internal maintenance teams to resolve the identified issues (ie. Updates, patching, new security policies etc).
- Develop run sheets & manage projects to bring client infrastructure up to security standards (ie. Australian ASCS/ASD "Essential 8", NIST, ISO27001 etc)
- Planning, implementing, managing, monitoring, and upgrading security measures for the protection of the organization's data, systems, and networks.
- Responding to all system and/or network security breaches.
Cyber Security Analyst
January 2019 / November 2022
- Monitor security information and event management (SIEM) system that correlate networks, systems, and applications logs with the objective of detecting and responding to information security i
- Perform information security i
- Perform threat hunting activity for detecting advanced security threat that are not covered by existing log correlation rules or use cases.
- Documentation of threat scenario or use cases, capturing relevant information such as correlation rules and provide standard response and escalation for SOC team to follow or refer to.
- Identify risk and potential vulnerabilities in the IT environment resulting from poor system configuration, hardware or software flaws, or operational deficiencies through security research and automated scanning tools.
Cyber Security Consultant
November 2017 / December 2018
- Perform information security assessment and provide assurance that third party vendor adopts effective organizational, technical and physical controls to safeguard company’s proprietary and sensitive information.
- Perform security and compliance monitoring tasks including access reviews, log reviews, and network vulnerability and penetration test reviews.
- Conducts risk assessment for changes in business requirements. Present security risk reports to management and track mitigation activities.
- Assists with creating and maintaining overall security review project plans aligned to the standard of information security management system.
- Research current trends in information security, emerging technologies and industry best practices. Information
Security Officer I
February 2010 / November 2017
- Manage and operate cyber security technical controls consist of firewall, intrusion prevention system, virtual private network, web application firewall, web and
- Manage and operate malware protection for 3000+ workstations and 200+ servers. Perform and oversee anti-virus updates and security patches of operating systems.
- Manage and operate centralize logging of information technology systems. Monitor server logs, firewall logs, intrusion detection logs, and network traffic for unusual or suspicious activity. Interpret activity and make recommendations for resolution.
- Perform vulnerability scanning of public facing and internal systems in order to identify system vulnerabilities and provide remediation.
- Project team lead for implementation of information security technical controls.
- Conducts security risk assessment to check effectiveness of current security controls and provide compliance audit preparedness.
- Provide assistance in implementing security policy, identity and access management.
Technical Services Engineer
May 2004 / August 2009
- Designed and implemented network and security solutions for new customers and successfully maintained existing customer accounts.
- Pre-sales assistance in covering clients to identify possible opportunities requiring the product line.
- Provide technical support services for network security products such as firewall, IPS/IDS, and Anti-virus software.
- Document and baseline clients network infrastructure and security.
- Conduct technical training to clients regarding maintenance, configuration and installation of the product line.
Experience: 2 - 5 years
Experience: 5 - 10 years
Experience: 5 - 10 years
Experience: 6 months - 1 year
Experience: 6 months - 1 year
Experience: 6 months - 1 year
Experience: 6 months - 1 year
“I have found someone who is smart, has a great work ethic and is easy to work with.”
Sara Brumfield
SEE MORE REAL RESULTS“We'll definitely continue to hire people using Onlinejobs because it has taken our agency to the next level”
- Marc Diez
Onlinejobs.ph "ID Proof" indicates if "they are who they say they are".
It DOES NOT indicate skill level.
ID Proof scores are 0 - 99 with 99 being the best. It is calculated based on dozens of data points.
It's intended to help employers know who they're talking to is real, and not a fake identity.