Jeremiah F.
Details
Information Security/IT Security
Brigham Young University-Idaho
2009 : 2013
2018 : Present
SIC
Information Security Analyst
SOC analyst
2014 : 2018
SIC
Operations Analyst
• Worked in a SOC under security operations and monitoring roles using enterprise tools (e.g., Splunk, RSA enVision, Agiliance Riskvision, Apache Directory Studio, etc.) in a fast-paced 24x7/365 environment
• Responsible for active and concurrent monitoring of logs for network devices to insure compliance with security protocols; analyzed raw data syslog/snares reports and documented any suspicious events
• Created and developed technical documentation used to perform tasks and processes covering Monitoring, Operations, and Access Management; this also helped create a new standard for the Operations role, helping staff to be cross trained in Monitoring and Access Management roles as well
2013 : 2014
CPB
Information Security Operations Center, Security Analyst - Operations
• Enhanced interpersonal skills, while performing control response on university hardware and software
• Demonstrated troubleshooting and problem solving skills in order to resolve campus wide technical support and malware containment; worked personally with faculty and campus IT teams
2013 : 2013
BYU-Idaho
Technology Support Specialist - Tier 2
• Lead a small team of advisers in a project to increase customer satisfaction, sales, and success of company goals, which helped to increase sales and customer satisfaction
• Guided customers in making financial decisions to help save money and become financially successful
• Resolved customer issues, which in turn helped establish greater trust and loyalties to Wells Fargo and customer satisfaction--excelled in leadership opportunities
2012 : 2013
Wells Fargo
Financial Advisor/ Phone Banker
Skills
Active Directory, AWS, Azure, CCSP, CISSP, Cloud Security, Cooking, Email Security, Incident Response, Information Security, Linux, Log Analysis, Microsoft Office, Organization Skills, Project Coordination, Project Management, Secure Configuration, Security Operation Center, SIEM, System Administration, Technical Documentation, Threat & Vulnerability Management, Threat Intelligence, Troubleshooting, Windows Server, Cisco Technologies, Splunk, VMware, Security Operations Center, Security Analysis, Apache Directory Studio, Wireshark, Sourcefire, Kali Linux, Burp Suite, Russian, Invincea Enterprise, FireEye, Cloud Computing, Bluecoat Proxies, IBM Tivoli, Syslog-ng, Dell SecureWorks, VDI, PCI Standards, Service Desk, Enterprise Software, Mac OS X, Proofpoint, Network Forensics, Malware Forensics, CompTIA Security, Java, MySQL
About
Bachelors in Computer Information Technology primarily focused in Information Security analysis and investigation. I have a natural curiosity for learning—the ability to quickly assimilate information and new technology. Certified Information System Security Professional (CISSP) since 2020.
I believe information security has become a fundamental aspect of any system worth protecting and plays a key role in the success of organizations and institutions. In a world where knowledge is power, information security ensures the protection of data assets by understanding the security risks and designing appropriate controls.
Interests include, but are not limited to, information security (e.g., data protection and breach prevention, project analysis and consulting, incident response and investigation, risk management and analysis, etc.), security operations, security awareness and education training, third-party risk management, and cloud security.