Cyber Security Report: Incident Response and Security Analysis

Verified

Added on  2022/09/06

|4
|720
|24
Report
AI Summary
This report provides an overview of cyber security practices, focusing on the experience of an Information Security Analyst. The report details the analyst's responsibilities, including vulnerability scanning, network engineering, malware detection, and incident response. The analyst's experience at TCF bank is highlighted, including leading incident response teams and investigating security incidents. The report also covers the analyst's work at Egyptian Telecom, involvement in process assessments, and the development of procedures to improve incident analysis and response times. The report also includes a bibliography of relevant sources on cybersecurity education and implementation. The report emphasizes the importance of skills such as critical thinking, communication, and the ability to analyze network traffic and implement customer networks. The report also discusses the analyst's knowledge of scoring models and their ability to provide training and assistance to team members and clients.
Document Page
Running head: CYBER SECURITY
CYBER SECURITY
Name of the Student:
Name of the University:
Author Note:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1CYBER SECURITY
Cyber Security Discipline
As an employee, I am highly skilled and experienced Information Security Analyst with
experience of 5 years in vulnerability scanning, network engineering, malware detection, threat
management, incident response, threat hunting and unauthorized access. I am well versed within
remote and direct systems analysis along with communication skills and strong critical thinking.
As employee of TCF bank, I lead incident response over several cross-functional teams
leveraging several applications or tools. I perform investigation as well as escalation for
complicated or security incidents or threats. I document as well as investigate more complicated
security incidents as defined in company policy. I have interest and knowledge in discipline of
cyber security which impact monitoring as well as personal use policies. I escalate the reports of
incidents to IT management for maintaining compliance with regulatory requirements related to
security. I provide effective communications for team as well as recommend effective changes in
process for enhancing response and defensive procedures. I serve as escalation resource as well
as mentor for all other analysts.
I design as well as implement customer networks which includes firewalls, switches and
routers. I post implementation support as well as troubleshooting for clients. Decisions of long
term align more to permanent solving of issues as well as meeting the strategic goals I have
knowledge of scoring models like CVSS, CCSS. I analyze analysis of network traffic by using
network flow, raw packet data, Intrusion Prevention Systems (IPS), communication network’s
sensor output and Intrusion Detection Systems (IDS). I provide training as well as assistance to
the customers along with new members of the team. I have the skills needed for giving
presentations on the occasions. I assisted with development of procedures and processes to
Document Page
2CYBER SECURITY
improve incidents’ analysis, all SOC functions as well a response times of incident. I provided
support of helpdesk to the end users for proprietary software.
At Egyptian Telecom, I participated in process assessments and secure activities of
development lifecycle. I assisted in prioritization and valuation of assets depending on
consequence of loss. I tracked performance metrics as well as gave updates timely to
management. I have the ability to perform best practices improve them as well as implement
them for reduction of risk across wide range of organizational applications, networks, systems as
well as interfaces. I perform response to incident, investigation as well as mitigation of such
responses. I identify as well as evaluate potential vulnerabilities and threats based on company
framework of risk management. I monitor live systems for discovering threats of real time by
using deployed solutions of SIEM. I secure lifecycle activities as well as process assessment. I
keep trace of performance metrics as well as provide timely updates to the management. I assist
development of procedures as well as processes for improving response times of incident, overall
functions of SOC and incidents’ analysis. I install as well as configure several network devices. I
assist the clients assisted through phone to resolve issues of computer on phone as well as in
person. I research in details client issues researched for resolving complaints promptly.
Document Page
3CYBER SECURITY
Bibliography
Cabaj, K., Domingos, D., Kotulski, Z. and Respício, A., 2018. Cybersecurity education:
Evolution of the discipline and analysis of master programs. Computers & Security, 75, pp.24-
35.
Carter, A., 2016. DoD Cybersecurity Discipline Implementation Plan. Department of Defense
Washington United States.
Saydjari, O.S., 2019. Engineering trustworthy systems: a principled approach to
cybersecurity. Communications of the ACM, 62(6), pp.63-69.
Shoemaker, D., Davidson, D. and Conklin, A., 2017. Toward a Discipline of Cyber Security:
Some Parallels with the Development of Software Engineering Education. EDPACS, 56(5-6),
pp.12-20.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]