Summary
Overview
Work History
Education
Skills
Certification
Work Preference
Timeline
Hi, I’m

Innocent Anozie

SOC ANALYST
Brooklyn,NY

Summary

Highly skilled SOC Analyst with over 3 years of experience specializing in monitoring, analyzing, and mitigating security threats across diverse platforms. Proficient in conducting vulnerability assessments, leading incident response efforts, and implementing proactive security measures. Certified Hands-On Cyber Security Specialist + Linux with 450 hours of comprehensive training completed in March 2024. .

Overview

9
years of professional experience
1
Certification

Work History

GE Management Development Institute
New York, NY

SOC Analyst
01.2018 - Current

Job overview

  • Perform advanced triage and analysis across various network infrastructures, ensuring comprehensive threat detection and timely incident response
  • Lead and coordinate threat hunting activities on company networks, resulting in a 60% reduction in undetected threats and enhanced security posture
  • Conduct thorough security investigations, successfully detecting and neutralizing various types of malicious activities, including malware infections and unauthorized access attempts
  • Spearhead incident response efforts, providing in-depth analysis and recommendations to mitigate security risks and prevent future incidents
  • Collaborate with cross-functional teams to identify and address vulnerabilities in network infrastructure and implement proactive security measures
  • Develop and maintain security policies, procedures, and runbooks to standardize and streamline security operations
  • Act as a subject matter expert and provide guidance and mentorship to junior SOC analysts, enhancing team performance and capabilities
  • Participate in regular security awareness training sessions for employees to promote a culture of security awareness and compliance
  • Receive commendation for exceptional performance and dedication to maintaining a secure and resilient IT environment.

GE Management Development Institute
Ossining, NY.

System Analyst
02.2016 - 12.2017

Job overview

  • Monitor security events and alerts using security information and event management (SIEM) tools
  • Investigate and analyze security incidents to identify root causes and recommend remediation actions
  • Implement and maintain security controls and technologies to protect against cybersecurity threats
  • Ensure that essential tasks are completed according to our Security Operations Runsheet
  • Collaborate with cross-functional teams to develop and implement incident response plans
  • Conduct regular security assessments and vulnerability scans to identify and mitigate security risks
  • Stay up-to-date on emerging cybersecurity threats, vulnerabilities, and best practices
  • Provide timely and accurate reports on security incidents, trends, and metrics to management
  • Participate in security incident response activities, including containment, eradication, and recovery
  • Assist in the development and implementation of security policies, procedures, and standards
  • Serve as a subject matter expert on cybersecurity matters and provide guidance to other team members
  • Ability to confidently and simply explain technical security issues
  • Familiar with MITRE ATT&CK Framework and TTPs
  • Review threats and incidents related to vulnerability scanning and determine root cause analysis, conduct validation and recommend remediation
  • Provide the various business units with incident response and threat and vulnerability management services as required by the business
  • Conduct hands-on analysis of high volumes logs, network data, and other attack artifacts in support of incident investigations utilizing SIEM platforms
  • Maintain awareness of new and emerging cyber-attack and network threats correlated with Threat Intelligence and CISA Reporting
  • Conduct incident response and triage of security events that contribute to indicators of attack or compromise
  • Provide suggestions, solutions and integrations to improve SOC Operations
  • Assist with escalations, reporting procedures and investigations
  • Provide Knowledge of TCP/IP communications and how common protocols and applications work at the network level to include DNS, HTTP, and SMB
  • Ensure security appliances, data sources and configurations are up to date
  • Working knowledge of PowerShell or Python to automate daily tasks
  • Works well in a cohesive team environment to include being able to work alone with minimum guidance.

Education

Kernelios Institute

Diploma
March.2024

Certified Hands-On Cyber Security Specialist + Linux (450 Hours

Bachelor of Education from Economics
November.2012

Skills

  • Operating Systems
  • Installation and configuration operating systems and Servers (Windows and Linux)
  • Active Directory, Domain Controller
  • Basic Powershell commands
  • Backup , Terminal servers
  • Networking
  • TCP/IP, DHCP, DNS, VLANs, IAM, NAC; IDS, Firewall, VPN, EDR, DLP, Subnetting, ACLs
  • Programming
  • Python, Bash, PowerShell
  • Platforms & Tools
  • SIEM, SOAR, AWS, Active
  • Directory, Wireshark, Metasploit
  • Nmap, Nessus
  • Pycharm, Proxy – Burpsuite
  • Metasploit, Sysinternals suite
  • SECURITY
  • Network traffic analysis (Wireshark, NMAP, NC), Password Cracking & Mitigation, I
  • Intelligence gathering methods
  • Experience with VMware, Kali Linux:
  • Terminal and tools
  • INFRASTRUCTURE ATTACKS AND DEFENSE
  • Static & Dynamic Malware Analysis
  • DDOS, MITM
  • Encryption methods App Security & Mitigation
  • (SQL injection, CSRF, XSS, Session Hijacking, MITB)
  • OSI, TCP\IP, Set up switches and routers (Cisco)
  • L2: VLANs , VTP , STP, L3: Static and dynamic routing

Vulnerability assessment

Endpoint security

SIEM management

Threat intelligence

Incident response

Log analysis

TCP and IP protocols

Intrusion detection

Identity management

Wireshark usage

Data loss prevention

Nmap scanning

Python programming

Operating system security

Access control

Web security

Penetration testing

DNS management

Security awareness training

Security policies

Packet analysis

PowerShell scripting

Application security

Bash scripting

Encryption techniques

Metasploit framework

Compliance standards

Wireless security

Physical security

Virtualization security

Network monitoring

Malware analysis

Firewall configuration

Security analysis

Risk assessment

Network security

Disaster recovery

Data encryption

Problem-solving

Attention to detail

Incident response management

Analytical thinking

Security protocols

Data analysis

Risk management

Compliance monitoring

DDoS prevention

Business continuity

IDS integration

Programming languages

Security monitoring

Intrusion test oversight

Threat hunting

Cybersecurity frameworks

Information protection

Developing security plans

Wireshark software

Regulatory compliance

Procedure documentation

Certification

CC-Certified In CyberSecurity Cisco Cyber Ops Associate GSEC - GIAC Security Essentials LPI, Linux Essential Certificate LANGUAGES English Full Professional

Work Preference

Work Type

Full TimePart TimeContract Work

Work Location

HybridRemoteOn-Site

Important To Me

Career advancementCompany CultureTeam Building / Company RetreatsPersonal development programsWork-life balance

Timeline

SOC Analyst

GE Management Development Institute
01.2018 - Current

System Analyst

GE Management Development Institute
02.2016 - 12.2017

Kernelios Institute

Diploma

Certified Hands-On Cyber Security Specialist + Linux (450 Hours

Bachelor of Education from Economics
Innocent AnozieSOC ANALYST