Profiles search
Nicholas DeLibero
Information Security Analyst
Washington D.C., DC, United States
Details
Experience:
2022 : Present
ZeniMax Media
Information Security Analyst
Security Operations Center Analyst serving on a team that provided 24/7 threat monitoring services to public- and private-sector clients. During shift, would investigate and triage events detected in any environment among a pool of clients.
• Leverage OSINT, a myriad of SIEMS (Splunk, LogRhythm, QRadar), and other research tools to develop high-quality investigations and pro-actively search client environments for indicators of compromise.
• Analyze a variety of network and host-based security appliance logs (Firewalls, NIDS, HIDS, Sys Logs, etc.) to determine the correct remediation actions and escalation paths for each intrusion detection event.
• Provide tuning recommendations and process improvement ideas to improve quality of service and delivery.
2020 : 2022
Deloitte
Security Operations Center Analyst
Public sector consultant serving a U.S. government entity delivering projects to clients on both the CISO and IT Compliance teams. Throughout these projects, maintained a position collaborating and reporting directly to clients in a role typically reserved for senior- or manager-level consultants.
• Facilitated vulnerability remediation and change requests for over 30 data protection tools, storage devices, and Oracle databases housed within the client’s Cardholder Data Environment to ensure Payment Card Industry (PCI) Data Security Standard compliance.
• Analyzed Penetration Test reports developed by a third-party vendor to identify opportunities to further improve the security posture of the client’s Cardholder Data Environment and maintain PCI compliance.
• Developed a 65-page Procedures Handbook that standardized the Assessment & Authorization (A&A) process for the client’s ISSOs, shortening the average length of assessment from one year to two months.
• Developed a training plan that was presented to over 60 stakeholders having a role in the A&A process so they could to understand the most effective methodology for efficient completion of A&A Packages.
• Automated timekeeping processes using Python to increase efficiency of identifying and resolving differences between Deloitte’s and the client’s timekeeping systems, reducing a weekly three-hour process to ten minutes.
• Leveraged a risk-based approach to develop a set of standardized corrective actions, enabling the organization to effectively enforce their acceptable use policy to enhance operational security.
• Prioritized system risk concerning cyber threats, system compromise, and system failure through assessments.
2019 : 2020
Deloitte
Cyber Security Consultant
• Provided both traditional consulting and managed-services to clients in multiple industries including life sciences and sales
• Collaborated with a small team of client personnel to deploy and implement the anti-virus solution CylancePROTECT to over 100,000 endpoints, comprising of workstations, virtual desktops, Windows servers, Linux servers, and Macbooks
• Implemented the CylanceProtect antivirus solution for a client consisting of over 5,000 endpoints. Required developing a project plan, interfacing with stakeholders to facilitate requirements and buy-in, integrating with the SOC team’s SIEM (Splunk), and establishing single-sign on to the management console over the span of nine months.
• Authored SDLC documentation for CylancePROTECT’s implementation as well as the operational runbook used by the SOC team after implementation.
• Coordinated with the SOC on alert investigation and incident response for potentially high-impact events.
• Presented three informational lunch and learn sessions for a client to educate the employees on various cybersecurity topics such as phishing, social engineering tactics, and general best practices for technology use.
• Designed and distributed cybersecurity awareness posters to over 250 branch locations for a particular client.
• Managed a list of blacklisted and whitelisted domains in the Cisco ESA Firewall to reduce the average employee’s spam
from dozens of emails per day to only one a week while maintaining communication with business partners.
• Simultaneously managed client-responsibilities and projects while attending internal EY meetings and assisting in the pursuit of new engagements.
2017 : 2019
EY
Cybersecurity Consultant
10-Week Summer Internship Program :
Performed Anti-Spoofing and Recipient Email Verification data analysis to define a Sender Policy Framework for an eventual Domain-based Message Authentication, Reporting, and Conformance system implementation covering 50,000+ employees.
Automated and increased efficiency of analysis through identification of common patterns, Microsoft Access SQL queries, Microsoft Excel functions, and Shell scripting
Gained experience with various security tools such as enVision, FireEye, enCase, Proofpoint, and Blue Coat ProxyClient
Presented slideshows about cryptography and the internship program to senior management at the conclusion of the summer
Evaluated various endpoint security products as well as determined cloud computing best practices for security
2016 : 2016
AIG
Technology Analyst
ZeniMax Media
Information Security Analyst
Security Operations Center Analyst serving on a team that provided 24/7 threat monitoring services to public- and private-sector clients. During shift, would investigate and triage events detected in any environment among a pool of clients.
• Leverage OSINT, a myriad of SIEMS (Splunk, LogRhythm, QRadar), and other research tools to develop high-quality investigations and pro-actively search client environments for indicators of compromise.
• Analyze a variety of network and host-based security appliance logs (Firewalls, NIDS, HIDS, Sys Logs, etc.) to determine the correct remediation actions and escalation paths for each intrusion detection event.
• Provide tuning recommendations and process improvement ideas to improve quality of service and delivery.
2020 : 2022
Deloitte
Security Operations Center Analyst
Public sector consultant serving a U.S. government entity delivering projects to clients on both the CISO and IT Compliance teams. Throughout these projects, maintained a position collaborating and reporting directly to clients in a role typically reserved for senior- or manager-level consultants.
• Facilitated vulnerability remediation and change requests for over 30 data protection tools, storage devices, and Oracle databases housed within the client’s Cardholder Data Environment to ensure Payment Card Industry (PCI) Data Security Standard compliance.
• Analyzed Penetration Test reports developed by a third-party vendor to identify opportunities to further improve the security posture of the client’s Cardholder Data Environment and maintain PCI compliance.
• Developed a 65-page Procedures Handbook that standardized the Assessment & Authorization (A&A) process for the client’s ISSOs, shortening the average length of assessment from one year to two months.
• Developed a training plan that was presented to over 60 stakeholders having a role in the A&A process so they could to understand the most effective methodology for efficient completion of A&A Packages.
• Automated timekeeping processes using Python to increase efficiency of identifying and resolving differences between Deloitte’s and the client’s timekeeping systems, reducing a weekly three-hour process to ten minutes.
• Leveraged a risk-based approach to develop a set of standardized corrective actions, enabling the organization to effectively enforce their acceptable use policy to enhance operational security.
• Prioritized system risk concerning cyber threats, system compromise, and system failure through assessments.
2019 : 2020
Deloitte
Cyber Security Consultant
• Provided both traditional consulting and managed-services to clients in multiple industries including life sciences and sales
• Collaborated with a small team of client personnel to deploy and implement the anti-virus solution CylancePROTECT to over 100,000 endpoints, comprising of workstations, virtual desktops, Windows servers, Linux servers, and Macbooks
• Implemented the CylanceProtect antivirus solution for a client consisting of over 5,000 endpoints. Required developing a project plan, interfacing with stakeholders to facilitate requirements and buy-in, integrating with the SOC team’s SIEM (Splunk), and establishing single-sign on to the management console over the span of nine months.
• Authored SDLC documentation for CylancePROTECT’s implementation as well as the operational runbook used by the SOC team after implementation.
• Coordinated with the SOC on alert investigation and incident response for potentially high-impact events.
• Presented three informational lunch and learn sessions for a client to educate the employees on various cybersecurity topics such as phishing, social engineering tactics, and general best practices for technology use.
• Designed and distributed cybersecurity awareness posters to over 250 branch locations for a particular client.
• Managed a list of blacklisted and whitelisted domains in the Cisco ESA Firewall to reduce the average employee’s spam
from dozens of emails per day to only one a week while maintaining communication with business partners.
• Simultaneously managed client-responsibilities and projects while attending internal EY meetings and assisting in the pursuit of new engagements.
2017 : 2019
EY
Cybersecurity Consultant
10-Week Summer Internship Program :
Performed Anti-Spoofing and Recipient Email Verification data analysis to define a Sender Policy Framework for an eventual Domain-based Message Authentication, Reporting, and Conformance system implementation covering 50,000+ employees.
Automated and increased efficiency of analysis through identification of common patterns, Microsoft Access SQL queries, Microsoft Excel functions, and Shell scripting
Gained experience with various security tools such as enVision, FireEye, enCase, Proofpoint, and Blue Coat ProxyClient
Presented slideshows about cryptography and the internship program to senior management at the conclusion of the summer
Evaluated various endpoint security products as well as determined cloud computing best practices for security
2016 : 2016
AIG
Technology Analyst
Company:
ZeniMax Media
About
Cybersecurity professional with wide and varied experience in information technology and securing network infrastructure. Numerous consulting projects have provided experience with incident response, technology implementation, endpoint protection, project management, and training and awareness while balancing both client and firm commitments. During free time, developed skills in Python, ethical hacking, Linux, and other cybersecurity domains in order to further develop skillset.