Uploaded File
add photo
Dallas, TX 75251
Junior Information Security Analyst (Security Monitoring Analyst
10 years experience W2
Average rating
Profile views

Skilled Information Security Specialist with expertise in risk management framework (RMF), systems development life cycle (SDLC), security life cycle, and vulnerabilities management of a wide range of vulnerabilities and threats, fundamental business analysis, and project management. Specialized in providing IT security expertise and guidance in support of security assessments and continues monitoring for government (FISMA & NIST) and commercial clients. I am very passionate about Information Security Technology and often seek new responsibilities within a wide range of employment areas.

Junior Information Security Analyst (Security Monitoring Analyst)
Information Technology
Aug 2017 - present
Dallas/Fort Worth Area, TX
  • I utilize Splunk to plan and carry out security measures to protect BCBSSC computer networks, systems, investigate security incidents and vulnerabilities.
  • I Configure Splunk Searching and Reporting modules, Knowledge Objects, Administered Data Ingestion, Add-On's, Dashboards, Index Cluster and Forwarder Management. Design and maintained complex Splunk dashboards on Enterprise and Enterprise Security.
  • Utilize the Distributed Management Console to monitor our Splunk Deployment by providing real-time monitoring and performance reporting from a central search head via eight different dashboards
  • I use Splunk to perform capturing, indexing, and correlating the real-time data in a searchable container from which it can generate Graphs, run daily and Monthly reports, alerts, dashboards, and visualizations.
  • I manage and support the Virtual Data Center VDC Security and Provider/Fee for Service Splunk Instances in the BCBSSC VDC Center.
  • I manage our Splunk Search Heads, Heavy Forwarders, Indexers, Splunk Universal Forwarders, Splunk Deployment servers, Management console Servers in our Security Operations Center.
  • I assign and manage roles, users on our Splunk On-Premises and Splunk Gov Cloud.
  • I use the Splunk Cloud to search and navigate all the machine data we ingest into the service. I use Splunk Search Processing Language (SPL) to display and analyze data graphically.
  • I make sure there is current and stable flow of data from our Heavy Forwarders, Indexes to Search Heads in our Splunk Gov cloud Instance and all other Instances.
  • Install security measures, operate software to protect systems and information infrastructure, including firewalls, vulnerability management, and SIEM programs.
  • Expertise in technology platforms, tools and processes used in the healthcare environment
  • Expertise of enterprise architecture, IT Operations and Security.
  • In-depth knowledge of applicable laws and regulations as they relate to IT and healthcare, including HIPAA, NIST, GLBA, ISO 27001/27002, ITIL frameworks.
  • Experience implementing and maintaining information security technologies, such as: IDS/IPS, Malware prevention, End-point protection, Multi-factor authentication, Security information and event management (SIEM), Web content filtering, Encryption, Network access control (NAC), Data loss prevention (DLP), Firewall administration and vulnerability scanners.
  • Manage ticketing queue and prioritization provide continuous and timely updates to customers, take ownership to resolve customer issues in accordance with service level agreements (SLAs) balancing speed and quality
  • Monitor alerting systems and servers. Monitor information security risks related to the system, servers, and processes to ensure internal security controls.
  • Work with developers, system/network administrators, and other associates to ensure secure design, development, and implementation of applications and networks BLUE CROSS BLUE SHIELD PROJECTS
  • Designed and implemented our Virtual Data Center (VDC) connectivity to AWS Splunk
  • Configure FFS Splunk HF to send data to AWS Splunk
  • Configure CDS Security Splunk HF to point to AWS Splunk
  • Currently Installing Tripwire Enterprise on the VDC Security Splunks.
  • I participated with FISMA Tagging of our computers in the VDC
  • VDC Security Splunk
  • Determine method for long retention beyond 90-day default
  • Set up all VDC end user access to FFS and AWS Splunk
  • We created the PECOS maintainer and NPPES Indexes and ran a successful performance test
  • Migrated and moved the Splunk on premises to the Splunk Cloud
  • Created Splunk ITSI Glass Tables on the Fee for Service Instance
  • Migrated all SOLARIS Servers in the VDC to X 86 RHEL
  • SplunkCloud Migration planning and integration for Blue Cross Blue Shield.
  • Migration Plan 1. Create Indexes 2. Migrate Props and Transforms 3. Redirect/Duplicate data sources 4. Validate data sources 5. Create Roles 6. Migrate Users 7. Validate Users and Dashboards
Enterprise Security FISMA GLBA HIPAA IDS Information Security IPS NIST Security Analyst SIEM Splunk ITSI Vulnerability Managment
Remove Skill
Associate Security Analyst
Information Technology
Mar 2012 - Jul 2017
Rockwall, TX
Corrugating Division
  • Execute on security strategy as defined by the Information Security Manager.
  • Take ownership of the Firm's Vulnerability Management Program, working with cross-functional teams to identify, manage and mitigate security vulnerabilities across the Firm.
  • Assist with the administration of the Firm's Vendor Risk Management process, including analyzing and responding to third-party risk assessments.
  • Monitor and respond to information security alerts and notifications (IDS/IPS, SIEM, AV/EDR, etc.).
  • Collaborate and advise on IT projects to ensure security issues are addressed throughout the project life cycle.
  • Assist other IT teams in developing and employing security solutions across various applications and product platforms.
  • Administer and utilize various endpoint and network security tools, such as antivirus/EDR, SIEM, Cisco FirePower or other comparable advanced detection and response tools.
  • Administer and utilize vulnerability scanning, packet analysis and exploitation tools such as Nessus, nmap, Wireshark, tcpdump, Metasploit or similar technologies.
  • Design, review and aid with implementation of secure networks and system architecture (ex. network topology reviews, firewall ruleset reviews, minimum security baselines, etc.).
Information Security IPS Network Security Risk Management Security Analyst SIEM
Remove Skill
Edit Skills
Non-cloudteam Skill
Certified Information Security Manager (CISM), SAFe Scrum Master (5.0) Certified, Certified Scrum Ma
Amazon Web Service Certified Solutions Architect (CSA) - Associate (AWS) and CompTIA Security+ (In P
Bachelor of Science in Geology & Mining Tech: Delta State University, Abraka, Nigeria
U. S Equivalence: Evaluated to US Standard by Global Credential Evaluators Inc
GCE#: NG62004.RR
Public Trust Security Clearance: Center for Medicare and Medicaid Services
Technical Support: Networking, Servers, Linux, Virtualization, Windows Active Directory, VMWare AirW
Security Tools: Security Information and Event Management (SIEM), Wireshark, Nmap, Kali Linux, Nessu
Microsoft Office: Word, Outlook, Excel, Power point, Adobe Acrobat, and Google Docs
Azure platforms
Information Security
Security Analyst
Network Security
Risk Management
Enterprise Security
Splunk ITSI
Vulnerability Managment