Blue Team Member, Incident Management, Security Tools Monitoring, Alerting Management, Threat Hunting, Incident Management, Support for Tier 1 and 2 of SOC.
SAST & DAST analysis, Treat Modeling, Vulnerability Assessment, Penetration Testing, black, gray and white box analysis, Social Engineering, Incident Management, Threat Hunting, SOP documentation, Cybersecurity Awareness, and Expert Support for Tier 1 and 2 of SOC.
Evaluation and Implementation of ISMS on clients in EU, UK, USA, and Latam, Design Cybersecurity Strategies, implement NIST CSF assessments, Vulnerability Assessment, Penetration Testing, Social Engineering, Cybersecurity Awareness, Expert Support for Tier 1 and 2 of SOC.
Activities related to information security, implementing strategies based on ISO 27001 and NIST framework, vulnerability testing, penetration testing, and ethical hacking implementing OWASP and CEH Methodologies, Social Engineering, Incident response, malware analysis, managing McAfee ePO, Awareness to team of diversity areas respect to cyber security and other activities related to managing and improving information security on Compensar Health Client.
Risk Analysis in Nearshore campaigns: - Corporative Information Security Audits - Incident Management & Incident Response. - Review Security Policies. - Cybersecurity Advice
My direct responsibilities as a cyber security consultant in this client Liberty Insurance were: • Vulnerability assessment and exploitation. • Pen-testing with OWASP methodology • POC • Hacking along perimeter infrastructure • Incident response and management • Social Engineering campaigns • Awareness in information security Traversal functions to support identity management, IT projects such as the migration of on-premise systems to AWS cloud, where need to support the team in USA head quarters to migrate the South America subsidiaries. Also, support the cybersecurity audits under the NIST framework performed to the client by third parties.
Vulnerability Assessment and exploitation, Penetration testing based on OWASP methodology, Social Engineering, Incident response management, malware analysis, Cyber Intelligence, implementing security tools such as Cuckoo Sandbox, IDS Alien Vault, and the Hive.
Activities related to the assessment of the information security system of the company, assess the operational infrastructure area topics related to ISO 27001:2013, GAP analysis using MAGERIT and ISO 27005, audit established process adjusting it to compliance of ISO 27001:2013 Standard to prepare the company for ISO 27001 certification. Also supports other areas of IT services, and PMO with third clients such as Pfizer laboratories, Citibank, and Amdocs as SLA Specialist.
Active Directory management, Administrator of Gras and VPN services, analysis and debugging database, site care requirements for hardware and software problems, Interactions work with other countries USA, Poland, Finland, India, Costa Rica.
Second level support cases escalated by helpdesk in Argentina, liaison with central helpdesk in USA for HP project (Pfizer Laboratories), interactions work with other countries Poland, Finland, Costa Rica, Active Directory management, Administrator of Gras and VPN services, manage the Mcafee orchestator console for local domain, remediation of security issues reported by the global console, analysis and debugging database , site care requirements for hardware and software problems, assembly and installation of desktop and laptop computers Lenovo, Hewlett Packard, Dell and others, configuration profiles CRM and ERP software owner.
Managing technical contractors and field engineers belong to compartel program in telecenter projects and BDP for 3.5G connectivity issues, WIMAX and satellite, electronics, electricity, routing networks, nodes, and clusters, system administration, Linux Server, Informix, Windows Server 2003, 2008, client systems such as Win 98, XP, W7, Solaris and Linux, internal audit quality of technical maintenance performed by contractors validating the networks function efficiently in compliance with the regulations requested by the Ministry of Technology Information and Communications of Colombia