About Candidate

Dedicated and detail-oriented SOC Analyst with hands-on experience in
threat intelligence, malware analysis, phishing investigations, and security incident response. Proficient in using SIEM tools like Splunk and Elastic Stack for monitoring and analyzing security events. Skilled in cybersecurity reporting, forensic analysis, and utilizing tools such as VirusTotal, Hybrid Analysis, Kali Linux, and MX Toolbox. Proven ability to identify threats, analyze indicators of compromise (IOCs), and recommend mitigation strategies through practical lab demonstrations and real-world simulations.
Seeking to leverage technical expertise to enhance organizational security postures.

Nationality
Cameroonian

Location

Work & Experience

S
SOC Analyst 01/01/2025 - 20/01/2026
Personal Projects

- Conducted threat intelligence analysis on malicious artifacts using VirusTotal and Hybrid Analysis, identifying detection ratios, IOCs (e.g., hashes, IPs, domains), and mapping behaviors to MITRE ATT&CK tactics such as Execution (T1106), Privilege Escalation (T1055), and Command & Control (T1071). - Utilized SIEM tools including Splunk and Elastic Stack to monitor security events, analyze logs, and correlate data for incident response in simulated environments.