Threat Hunter and Cybersecurity Analyst with 18 years of experience in technical support oriented to networking and high-tech computers. Worked for large companies overseas, providing first and second-level support in Networking, hardware, and software. Provided remote support to foreign clients through applications such as Zoom, Team Viewer, Zendesk, Fresh Service, Slack, and AnyDesk. 5 years of experience in Cybersecurity and Threat Hunting handling security tools such as Azure Sentinel, Wazuh, Sentinel One, Alert Logic and Microsoft Defender. Vast experience conducting investigations using OSINT, HUMINT among others. Experienced in the Service Management Framework ITIL V3 handling the knowledge base management, Zero Trust cybersec model, NIST security framework, MITRE Attack framework, SLA management, and project managing platforms such as JIRA, FreshService among others. Experience with handling Cloud Storage solutions such as NetApp's SnapCenter. Always seeking and maintaining full-time position that offers professional challenges utilizing interpersonal skills, excellent time management, and problem-solving skills.
Professional diplomas
• Handling the ticket system company within JIRA platform according to SLA Framework in ITIL v3.
• Fill in and manage knowledge base with previous incidents and lessons learned.
• Perform daily cybersecurity operations to detect and respond to threats and anomalous or suspicious activity, identifying potential and active risks to systems and data.
• Conduct comprehensive investigation and triage on a wide variety of security events and implement response and remediation efforts by performing digital forensics when needed.
• Drive prioritization of significant security events by participating in the incident response team.
• Maintain details and document Cyber Security Incidents
• Collaborate with the security team to pinpoint signals and warnings of future threats and use this information for proactive threat monitoring.
• Apply appropriate incident response handling procedures to investigations.
• Develop and maintain security incident handling procedures.
• Develop and maintain threat intelligence programs integrated with security operations.
• Enhance Security Operations through process improvement and automation.
• Keep up to date on emerging vulnerability and threat trends.
• Investigated and resolved incidents of unauthorized access to sensitive information.
• Conduct proactive investigations using Kali Linux and OSINT Tools.
• Train other coworkers for fostering Threat Intelligence and Threat Hunting skills.
• Conducting threat hunting and threat intelligence for the company’s clients.
• Create reports based on findings during pentesting exercises.
• Create and document threat cases involving data exfiltration, phishing, and infrastructure exposure of the clients.
• Provide technical security recommendations for customers based on the case analysis and risk analysis.
• Measure the risk of security incidents based on the DREAD framework.
• Automatize tasks using Python and PowerShell for processing data.
• Surfing the dark and the deep web in search of data breaches, new threats active in the wild and current attack tendencies.
• Conducting proactive monitoring and analysis of the the client’s infrastructure for checking vulnerabilities or security risks.
• Stay tuned with the cybersecurity news, forums, and channels of interest for the labor.
• Have meetings with customers to share monthly reports regarding the client’s cybersecurity landscape.
• Report all CVE’s and vulnerabilities that could compromise the client’s infrastructure in a timely manner.
Bachelors degree in English language teaching.
Reached 8th semester. Program is abandoned.
Technical Support
Troubleshooting
Networking
Azure Cloud System
Azure Sentinel
ITIL v3 (SLA, KBM, Incident Management)
MS Defender
Cybersecurity
Threat Hunting
Sentinel One
Cyber Threat Hunting
SIEM tools
Cybersecurity Support
Cybersecurity Analysis
NIST Cybersecurity Framework
Ethical hacking
Kali Linux
Ticket Management
OSINT
Wazuh