Profile
- I have a comprehensive understanding of security management systems and am intimately familiar with auditing procedures and security best practices.
- I understand the fact that securing online transactions is a never-ending business with new emerging threats daily.
- Good with the design of security systems, defining perimeter access, and continuously reviewing these arrangements.
- I developed enterprise security standards including encryption, ISMSs, PAM.
- With high profile data breaches lately, it is vital companies can provide safety guarantees to customers.
- I take pride in knowing I can help set up and maintain those various security settings, both internally and externally. Through continuous education and research, I am up to date on industry trends and technologies and remain one step ahead of all cyber-attacks.
- It is my focus to ensure company information remains safe and in the proper control.
- I have responded to several critical threats during my time in the organization.
- As an information security professional, I understand the high-security needs of corporate law firms.
- With extensive experience handling varying security threats, regulating data access, and am confident I will be an asset to your organization for those very reasons.
- I am detail-oriented and provide strong layers that are difficult for hackers to penetrate.
- I can ensure the confidentiality and security of key sensitive data.
- As an Information Security Analyst, I am adept at-risk assessment, planning, and mitigation strategies.
- Moreover, while my on-the-job experience has afforded me a well-rounded skill set, including first-rate project management and problem-solving abilities:
- Overseeing hardware infrastructure and incorporating new technologies.
- Examining systems to uncover vulnerabilities and access attempts.
- Maintaining and testing corporate response plans.
- Increasing security awareness throughout the company.
- I am responsible, honest, and efficient and have a long history of getting things done whilst working under pressure and to deadlines.
- Possessing superb analytical skills, I can interrogate data to find out if there is any fraud, violation of laws or irregular management policies.
- Furthermore, I have a comprehensive understanding of complex accounting methods, and experience within an Internal or External audit environment.
- I am a good team player who can easily interact with peers and counterparts whilst working independently or as part of a team.
- I also have well-developed verbal as well as written communication skills and can present information, and compile reports of audit results to senior managers.
- I have the temperament for today?s daily "turf wars" and my track record provides the necessary certification for this claim.
- I have a solid educational foundation and a passion for information security.
- Building a strong, focused, and dedicated team has helped me develop a successful career, thus far.
Summary
I am an IT security and cyber security consultant with more than 20 years of experience in analyzing, recovering, mitigating, auditing, and safeguarding hundreds of architectural incidents in containers, VMs, endpoints, mobile devices, servers, SCADA, network boundaries, mainframes, wireless, IoTs, embed, and cloud instances. I look forward to using my years of professional experience in those fields in an IT company specializing in information security and cyber information security.
Reveal breaking points, Shadow infrastructure
OSINT
- Spycloud
- Cycognito
- SpiderfootHX
- Insight TI Rapid7 ZeroFOX
- Security Score Card
- Maltego
- BitSight
- Censys
- FOCA
- Faraday Opensource
- MISP TI Opensource
- Data and API surface discovery in cloud tenants
Network protections NBAR NBAN NAND:
- Arbor Peaxflow
- Allot
- BroIDS
- Zeek Darktrace IT and OT
- Netenforcer
- Sandvine
- Suricata
- Intrushield
- Proventia Site defender
- Tipping Point
- Nozomi OT
- Guardicore Illumio
- Vectra O365
EPP XDR EDR AV NGAV:
- CarbonBlack
- Wazuh/ELK
- Crowdstrike
- Loki/Thor
- Juniper, Fortigate XDR
- HIPS FIMs UNIX/WIN
- Defender ATP
- Redcloak
SIEM and SOARS:
- AlienVault
- ArcSight
- Elastic Search
- SentinelOne
- Siemplify
- MozDef
- Swimlane
- QRadar
- Splunk
- Sentinel Azure
- Logrhythm
- LogicHub
- Demisto
Compliance and Governance
- ISO62443
- ISO 27001-27018
- NIST ISMS
- SoX
- MArisk
- KRITIS
- COBIT
- DREAD
- OCTAVE
- MAGERIT
- FinSma
- PCI-DSS
- ISM3
- Cloud Security Alliance
- BaFin
- COSO
- CIS20
- STRIDE
- MEHARI
- Pilar tool
Network behaviour analysis
- CAPSA WIRESHARK
- Omnipeek
- Xplico
- TCPDUMP
- OpenNAC
- Netflow
- Moloch
- Fiddler
- SNMP Cacti Nagios
- Cisco ISE
Penetration tests, Redteaming, ethical hacking:
- OWASP
- OSSTM
- Metasploit rapid7
- OpenVas
- Vega
- Netsparker
- Burpsuite
- Nikto and nmap
- Core Impact
- ISSAF
- Qualys
- Nessus
- Greenbone
- Retina
- Acunetix
- Blackduck
- TamperData
- Greenbone
Network security devices:
- Palo Alto
- Pfsense
- IPS IDP IDS NGIPS
- Cisco X FW ATA
- Juniper
- WatchGuard
- Alteon Nortel
- Cisco CCSS
- Webwasher
- OpenDNS
- Fortigate
- ISA TMG
- F5 ASM
- Cortex NDR XDR
- Checkpoint
- Arbor
- Radware
- L7Filter Ndpi Ntop
- Websense
- Bluecoat
- NXFilter
Digital Forensics:
- HELIX FTK
- Radar
- Autopsy, volatility
- Topsy
- SANS SIFT DEFT
- Ollidbg IDA
Virtualization:
- Virtual Box
- VMWARE ESX NSX
- Qemu Proxmox
- HyperV
- XEN server
Dynamic Malware Analysis:
- Sandboxing
- Recovery engines or rebuilders
- Detonation engines
Routing and Switching:
- DMVPN VPLS MLPS
- E/iBGP
- OSPF EIGRP
- MLS STP RIP
Network Forensics:
- DAM Database
- Imperva
- IBM Guardium
- OnionSecurity
- Sink holing
- RSA envision netwittness
- GTB DLP
- DNS behaviour
- DarkTrace
Wireless Security:
- Rogue Detection
- WIPS
- VoiPW VPLSoW
- Wcrack
- 802.11x
- WIDS
Cloud security CASB CSWP CIEM
- Data discovery tools Netwrix, Defender Data
- Data classification tool Classefi, Microsoft DLP
- Data leakage for endpoints and networks
- Cloudguard, Cloudone, Aqua, Sysdig, Prisma Paloalto
Ticketing collaboration:
- Remedy
- Sirios
- MSTeams
- Peoplesoft
- ServiceNow
- Jira Confluence
- Guardicore
- Verve Industrial
- Claroty SRA, CTD
- Macfee Solidcore
- Vectra OT
- Darktrace OT
OT Security Solutions
- Armis
- Palo Alto OT firewall
- Nozomi
- Tenable OT
- Nanolock
- CyberX Defender IoT