SOC Analyst L1-L2
Digital 14
Total years of experience :11 years, 10 Months
• Worked on a "Continuous Improvement Process" project in the Cyber Resilience Services department.
• Coordinated security operations and oversaw access management and physical security.
• Respond to and resolve security incidents, selected and implemented security technology.
• SOC log monitoring and suggestion for rule fine tuning
• ensure security standards and procedures were implemented with stakeholders.
• Stay up-to-date with relevant information and contribute to the execution of any necessary activities to ensure work continuity.
• Worked on different OS Spunk, LogRhythm, Qradar, ArcSight
• Investigate and report incidents related to phishing Emails, Intrusion, data exfiltration.
• Familiar with different logs sources (EDR, PAM, Antimalware systems).
• EDR - CrowdStrike | Carbon Black | Microsoft 365 Defender
• Provided strategic and operational insight in IT security, following the best practicing ensuring adherence to the standards like ISO27001 and NIST.
• Conducted research, awareness sessions and training for employees and entities implemented risk management processes, and operated an SOC.
• Administered, maintained, and operated existing security solutions for proactive and reactive security.
• Working with Incident handling and Digital Forensics and Incident Response team
• Vulnerability Assessment teams and creating incidents analysis reports and documentation of all incidents and procedures, presenting findings to team and leadership on a routine basis.
• DFIR team to in depth investigation any all raised incidents from SOC and create a reports.
• Integrated multiple data feeds from local network devices and forwarded into SIEM.
• Analyzing different logs from different systems and network devices in the organization.
• Threat Hunting, Reporting and SEIM system monitoring.
• Administrating different OS: Linux, Red-hat and Windows servers and security systems like WAF, Antiviruses, access controls, firewalls
• Training and mentoring for new employees and trainees on our network architecture.
• Products working with:
-Arcsight SIEM, F5 ASM (WAF), Citrix net-scaler (WAF), Palo Alto, Fortigate, Firepower (FMC-FTD), ASA firewalls, Nagios Monitoring system, VMware ESXI hypervisor, Symantec end point security, TrendMicro, Using encase, volatility, FTK Imager and Wireshark, OS and web Penetration testing tools, Nessus Vulnerability scanner, Acunetix Web vulnerability scanner, NMAP, Netcat, Metasploit.
Zajil is a internet service provider and my position is NOC Engineer and INOC links
1st level and 2nd troubleshooting LAN and WAN Network issue.
Familiar with CISCO, Juniper, Redback Devices.
MPLS, BGP
Network issues and end user support
outlook configurations
providing support to customers and resolve and follow up all cases over phone and via emails.
Monitoring
Technical Support (Customer Care) at Jordan Telecom Group (Orange).
• ADSL and Internet Troubleshooting .
• Develped my communication skills.
• Work under pressure.
Network Engineer
Networking at Jordan Telecom Group (Orange) for 2 months.
• Routers and switchs Configurations.
• Monitoring Skills.
I complete my Bachelor's degree in 4 years, while it need 5 years. Graduation project is a wheel chair for special needs.