Jonathan

Cyber Security Specialist

70 ID PROOF
Verified
With Timeproof
contact
mark as hired

Overview

Looking for part-time work (4 hours/day)

at $11.36/hour ($1,000.00/month)

Bachelors degree

Last Active

May 3rd, 2024 (2 days ago)

Member Since

October 11th, 2023

Profile Description

SUMMARY
Cyber Security Specialist with more than 19 years of experience in the area of information security. Proficient in security event monitoring, threat hunting, iUpgrade to see actual info
report investigation, iUpgrade to see actual info handling and reporting. Capable of performing vulnerability assessment and penetration testing to identify risk and potential vulnerabilities in the IT environment. Highly motivated and team player,
looking to join a global security operations team that safeguard organization’s information systems and assets.

EXPERIENCE

Senior Security Analyst 
November 2023 / Present
- Lead and participate in iUpgrade to see actual info response activities, including investigating security iUpgrade to see actual info, analyzing security logs, and coordinating with various teams to contain and remediate security threats.
- Proactively search for signs of malicious activity within the network, using advanced tools, techniques, and threat intelligence. Identify and mitigate potential security risks before they escalate.
- Monitor security alerts and events generated by security information and event management (SIEM) systems. Analyze patterns and trends to identify potential security iUpgrade to see actual info.
- Analyze and interpret logs from various security and network devices to identify abnormal patterns or potential security iUpgrade to see actual info. Develop and maintain a deep understanding of the organization's infrastructure.
- Create detailed iUpgrade to see actual info reports and documentation for management and other stakeholders. Communicate effectively with technical and non-technical audiences.
-Work closely with other teams, such as network operations, system administrators, and iUpgrade to see actual info response teams, to enhance overall security and iUpgrade to see actual info response capabilities.
- Actively participate in the continuous improvement of SOC processes and procedures. Provide recommendations for enhancing the effectiveness and efficiency of security operations.

Cyber Security Engineer
January 2023 / November 2023 
-Develop standard templates & policies to scan client infrastructure for security threats using industry-standard penetration testing tools
- Use templates & policies to perform regular scans (penetration testing) on internal & external infrastructure
- Review results of scans to identify security risks (ie. unpatched software, insecure passwords, insecure network configurations)
- Respond to new and emerging threats by proactively monitoring security feeds (ie. Microsoft Security Intelligence) and updating the scanning templates/policies accordingly.
- Work with internal maintenance teams to resolve the identified issues (ie. Updates, patching, new security policies etc).
- Develop run sheets & manage projects to bring client infrastructure up to security standards (ie. Australian ASCS/ASD "Essential 8", NIST, ISO27001 etc)
- Planning, implementing, managing, monitoring, and upgrading security measures for the protection of the organization's data, systems, and networks.
- Responding to all system and/or network security breaches.
 
Cyber Security Analyst
January 2019 / November 2022
- Monitor security information and event management (SIEM) system that correlate networks, systems, and applications logs with the objective of detecting and responding to information security iUpgrade to see actual info that could negatively impact the organization’s business operation.
- Perform information security iUpgrade to see actual info triage, manage escalation, and provide assistance during remediation. Ensure a consistent and effective approach to the management of information security iUpgrade to see actual info.
- Perform threat hunting activity for detecting advanced security threat that are not covered by existing log correlation rules or use cases.
- Documentation of threat scenario or use cases, capturing relevant information such as correlation rules and provide standard response and escalation for SOC team to follow or refer to.
- Identify risk and potential vulnerabilities in the IT environment resulting from poor system configuration, hardware or software flaws, or operational deficiencies through security research and automated scanning tools.
 
Cyber Security Consultant
November 2017 / December 2018 
- Perform information security assessment and provide assurance that third party vendor adopts effective organizational, technical and physical controls to safeguard company’s proprietary and sensitive information.
- Perform security and compliance monitoring tasks including access reviews, log reviews, and network vulnerability and penetration test reviews.
- Conducts risk assessment for changes in business requirements. Present security risk reports to management and track mitigation activities.
- Assists with creating and maintaining overall security review project plans aligned to the standard of information security management system.
- Research current trends in information security, emerging technologies and industry best practices. Information

Security Officer I 
February 2010 / November 2017
- Manage and operate cyber security technical controls consist of firewall, intrusion prevention system, virtual private network, web application firewall, web and email content filtering.
- Manage and operate malware protection for 3000+ workstations and 200+ servers. Perform and oversee anti-virus updates and security patches of operating systems.
- Manage and operate centralize logging of information technology systems. Monitor server logs, firewall logs, intrusion detection logs, and network traffic for unusual or suspicious activity. Interpret activity and make recommendations for resolution.
- Perform vulnerability scanning of public facing and internal systems in order to identify system vulnerabilities and provide remediation.
- Project team lead for implementation of information security technical controls.
- Conducts security risk assessment to check effectiveness of current security controls and provide compliance audit preparedness.
- Provide assistance in implementing security policy, identity and access management.

Technical Services Engineer 
May 2004 / August 2009
- Designed and implemented network and security solutions for new customers and successfully maintained existing customer accounts.
- Pre-sales assistance in covering clients to identify possible opportunities requiring the product line.
- Provide technical support services for network security products such as firewall, IPS/IDS, and Anti-virus software.    
- Document and baseline clients network infrastructure and security.
- Conduct technical training to clients regarding maintenance, configuration and installation of the product line.

Top Skills

Software » Databases » Elasticsearch

Experience: 2 - 5 years

Systems Administration » Linux Administrator

Experience: 5 - 10 years

Systems Administration » Windows Administrator

Experience: 5 - 10 years

Other Skills

Web Programming » PHP

Experience: 6 months - 1 year

Web Programming » Javascript

Experience: 6 months - 1 year

Web Programming » HTML

Experience: 6 months - 1 year

Web Programming » Python

Experience: 6 months - 1 year

Basic Information

Age
43
Gender
Male
Website
Sign Up with Pro Account to View
Address
Bacoor, Cavite
Tests Taken
None
Uploaded ID
Sign Up with Pro Account to View

“My virtual assistant literally changed my life.”

Cody Russell

SEE MORE REAL RESULTS

“I'm working with a very very talented person.”

- Austin L. Church

Onlinejobs.ph "ID Proof" indicates if "they are who they say they are".

It DOES NOT indicate skill level.

ID Proof scores are 0 - 99 with 99 being the best. It is calculated based on dozens of data points.

It's intended to help employers know who they're talking to is real, and not a fake identity.

Read More »