Uploaded File
add photo
Kendall
kenjones411@hotmail.com
404-395-8076
Wash, DC 20032
SENIOR SECURITY ANALYST
11 years experience W2
0
Recommendations
Average rating
13
Profile views
Summary

My credentials include over eight years of Cyber/Network Security education and experience which includes an Applied Science Degree-Information Technology and several certification which includes EC-Council Certified Ethical Hacker (CEH), Splunk Certified Power User, Network+ and Security+.

Experience and Knowledge:

  • Splunk
  • Nessus
  • McAfee HIPS
  • FireEye
  • Cisco Routers
  • CheckPoint
  • BigFix
  • WireShark
  • Palo Alto
  • Pen Testing
  • NMAP
  • Qualys
  • Kali Linux
  • Splunk ES
  • Arcsight SIEM
  • Metasploit

Experience
CYBER THREAT HUNTER -Tier III
Information Technology
Jul 2017 - May 2019
Washington, DC
  • Cyber Threat Analyst Tier III supporting the government agency’s Network Security Operations Center. Duties and responsibilities include providing operational support and analysis regarding Advanced Persistent Threats (APTs), indicators of compromise (IOC), intelligence gathering and cyber threat hunting. Provide event monitoring, incident response management, configuration recommendations of the security tools for potential threats and active malicious events. Create incident summaries/notifications and artifacts of the security investigation.
  • Provide detailed threat hunting analysis which includes OSINT research, analyzing packet captures, providing written/verbal reports, artifacts and recommendations for remediation for security threats. Create custom Splunk queries and analyze results to correlate security events. Profile and track APT actors that pose a threat to the organization in coordination with threat intelligence and other support teams. Familiar analyzing and investigating phishing attacks, DDoS attacks, SQL injections, cross site scripting, etc.
  • Responsibilities also include creating and monitoring Splunk security dashboards, maintaining Daily Activity Reports and spreadsheets within SharePoint. Support the incident response team by providing advanced analysis services when requested to include recommending containment and remediation best practices. Hands on experience with multiple network and cyber security tools. Attend weekly threat brief meetings. Mentor and train junior threat analysts. Great attention to detail, customer service, oral/written communication and problem solving.
Security Analyst Information Security Cyber Security Cyber Threat Intelligence
Remove Skill
SENIOR SECURITY ANALYST
Information Technology
Feb 2017 - Feb 2017
  • Responsibilities as a Senior Security Analyst for Apex Systems include daily monitoring of security events within the clients network. Perform analysis of threat events within Arcsight SIEM, FireEye, Source Fire and McAfee HIPS. Create incident summaries/notifications and artifacts of the security investigation. Provide recommendations and potential actions for remediation. Coordinate incident response, triage and escalation activities for security events impacting the company’s assets. Assist in the improvement and development of standard operation procedures for advanced persistent threat detection, vulnerability analysis and incident response.
  • Duties also include recommending new or improved processes in accordance with existing policy, industry standards and best practices. Self-starter with the ability to work independently and within a dynamic team environment. Provide mentoring and training to teammates. Excellent attention to detail, logical and analytical thinking and systematic problem-solving capability and adept with researching and investigating anomalies.
Security Analyst Microsoft Excel
Remove Skill
Senior Security Analyst
Information Technology
Apr 2011 - Feb 2017
  • Time Warner Cable Corporation Global Network Operations Center. Responsibilities include assisting in the implementation and development of a new Security Operations Center. This includes creating procedural documentation security tools job aids and processes for incident response. Created standard operation procedures for the Security Operations Center. Experience performing incident response duties which includes investigating and correlating security related events, analyzing system access/event logs and packet captures to provide threat assessment and make recommendations for containment and eradication.
  • Daily responsibilities also include investigating malware infected hosts, DDoS attacks, and phishing emails. Experience conducting Nessus and Qualys network vulnerability scans. Experience with Netscout, Netwitness, WireShark. Experience with analyzing Sourcefire IDS/IPS and system event logs. Hands on experience with Arbor TMS, McAfee EPO, NMAP, Kali Linux and Remnux. Duties also include quarantining compromised/infected hosts from the network, performing analysis of compromise and writing incident reports. Experience using Encase to remotely extract potential malicious files from user (s) PC for analysis.
  • Manage bridges as needed in support ongoing network security related incidents across the enterprise. Maintain incident response procedural documentation, security tools job aids. Mentor junior analysts on new processes to ensure technical improvements are effective and maintained during the incident management life cycle. Excellent written, interpersonal and communication skills. Able to initiate, multi-task, coordinate and prioritize responsibilities and follow through on tasks and projects. Highly competent, self-starter, professional and a self-motivated team player.
Linux Microsoft Excel Wireshark Social Engineering Security Analyst Network Security NetScout Nessus Malware Incident Management IDS EnCase
Remove Skill
SYSTEMS ANALYST
Information Technology
Jun 2010 - Dec 2010
  • Responsibilities include performing proprietary eRoom database system evaluation, security analysis, user account access issues and access management to the database environment. Experience with Share Point 2007. System patching and upgrades. Documenting database system configuration and architecture. Developed database security access parameters, performed upgrades, security system hardening, and analysis of database structure. Perform system vulnerability assessments and backups. Organize, analyze and prepared eRoom database reports of technical data and information. Troubleshoot and investigate user access/lockout issues in Active Directory and other systems components to adhere to information security policies and procedures.
Project Management System Analysis
Remove Skill
Edit Skills
Non-cloudteam Skill
Education
Associate's in Applied Science
Network Administration
Certifications
EC-Council Certified Ethical Hacker (C| EH)
Splunk Certified Power User 6.3
EC-Council Incident Handler (CIH)
Security +
Network +
MILITARY STATUS: United States Navy Veteran
Skills
Security Analyst
2019
7
EnCase
2017
5
IDS
2017
5
Incident Management
2017
5
Linux
2017
5
Malware
2017
5
Microsoft Excel
2017
5
Nessus
2017
5
NetScout
2017
5
Network Security
2017
5
Social Engineering
2017
5
Wireshark
2017
5
Cyber Security
2019
1
Cyber Threat Intelligence
2019
1
Information Security
2019
1
Project Management
2010
1
System Analysis
2010
1