Skip to content

Commit

Permalink
Update cv.md
Browse files Browse the repository at this point in the history
  • Loading branch information
schlangens authored Apr 1, 2024
1 parent d9f26e7 commit 9cf3174
Showing 1 changed file with 5 additions and 3 deletions.
8 changes: 5 additions & 3 deletions content/cv.md
Original file line number Diff line number Diff line change
Expand Up @@ -24,10 +24,10 @@ _Lifelong learner with a big-picture mindset, exceptional technical management s

- Monitor network traffic and security alerts to identify potential cyber threats.
- Investigate alerts generated by security tools and escalate potential incidents.
- Perform analysis of log files from various sources (e.g., individual host logs, network traffic logs, firewall logs, and intrusion detection system [IDS] logs) to identify possible threats to network security.
- Perform analysis of security incidents for further enhancement of the alert catalog.
- Analyze log files from various sources (e.g., individual host logs, network traffic logs, firewall logs, and intrusion detection system [IDS] logs) to identify possible threats to network security.
- Analyze security incidents to enhance the alert catalog further.
- Perform analysis of malicious activity to determine weaknesses exploited, exploitation methods, and effects on system and information.
- Perform analysis of available data sources, security tools, and threat trends and lead security monitoring and analysis techniques to identify attacks against the enterprise.
- Analyze available data sources, security tools, and threat trends and lead security monitoring and analysis techniques to identify attacks against the enterprise.


### MIE Medical Information Engineering
Expand Down Expand Up @@ -79,6 +79,8 @@ _Additional Experience as_ **_NOC Service Desk Technician_**, Indiana University

**Information Security:** Patch Management | Threat Hunting | Vulnerability Assessment | Malware Remediation | Firewalls | VPN | Security Awareness Training | Log Management / Correlation, Risk Assessment | System Scanning | System Registration | SADLC (Secure Application Development Life Cycle)

**Digital Forensics:** Evidence Collecion | Disk Forensics | USB Forensics | Memory Forensics | Network Forensics | Kape | FTK Imager | Dumpit | Volatility | Wireshark | PCAP Analysis

**SecOPS:** OSSEC | NESSUS | Microsoft Sentinel SIEM | Canary Tokens | Honeypot

**Incident Response:** Suricata | Rita | Sysmon | Velociraptor
Expand Down

0 comments on commit 9cf3174

Please sign in to comment.