Profiles search
Sarkis Kamberian
Cyber Security Analyst @ ITP (Security+)
North Glendale, CA, United States
Details
Experience:
Security Administration : Establish and maintain compliance and monitoring standards, Firewall administration and configuration, Install, configure, and maintain security tool sets. Implemented Advanced Threat Protection and Group Policy rules based on Microsoft Security Recommendations. Implemented, monitored, evaluated and recommended IT security measures and programs in accordance with ISD policies, procedures and standards.Compiled and validated security related statistical data and prepared reports. Defined, updated and enforced enterprise level security policies and procedures. Documented network data flows and access controls.
Monitoring : log analysis on Windows/Windows server, Mac and Linux operating systems. Used email filters to analyze, flag, and respond to potentially malicious emails. Created specific protocols that audit file changes such as updates, deletions, additions and moves. Analyzed system outages, alerts, and reports of abnormal system behavior due to suspected security related events such as viruses and hacker intrusions. Monitored current vulnerability security alerts to patched applications and systems.
Threat Hunting : Proactively searched for unidentified vulnerabilities with Microsoft Sentinel and Wazuh SIEM Stack. Performed risk analysis to identify any security issues that could lead to lost or stolen data. Analyzed security data from computing and network devices to identify potential threats and vulnerabilities.
Incident Response : Protect, monitor, update and respond to incidents on various servers—both hardware and cloud-based. Investigated suspicious behavior and triage incidents. Identified and documented security breaches and damage caused by breaches. Took appropriate action to prevent future cyber compromise.
Vulnerability Management : Monitored digital assets and Conducted risk assessments and tracked and reported remediation efforts. Worked with manager to utilize best practices in ATP, EDR/XDR, and SIEM.
2023 : Present
Information Technology Partners
Information Security Analyst
All the responsibilities in the IT administrator role along with :
Policy enforcement : Validated that all users in the company follow security best practices by sending out weekly newsletters and articles about security. Tested effectiveness of material by implementing phishing campaigns and logged a 20% decrease on links clicked within phishing emails. Revamped outdated onboarding and offboarding policies to minimize privileges of new employees and properly disable/revoke access from terminated employees.
Supervision : Monitored the work of team members to ensure that the quality of work maintained satisfactory levels. Delegated more responsibilities to team members to enhance their knowledge and growth, while observing and correcting mistakes. This allowed incoming tickets to be resolved 15% faster.
Training : Ensured that team members were comfortable with the latest tools and responsibilities by teaching them how to perform their new tasks. Closely monitored their progress and tracked their efficiency.
2022 : 2023
GotPrint
Information Technology Team Lead
Active Directory : Create, modify, and maintain Active Directory group policies, and security permissions. Worked with other functional IT areas to ensure that IT best practices, policies and procedures are practiced. Administration of user accounts (new user accounts, security, etc.).
Security : Monitored network traffic for rogue access points and quarantined emails to minimize attack vectors. Isolated compromised machines and followed our standard operating procedures to dispose of them. Maintained antivirus software (ESET, Kaspersky) and ensured most recent versions of Windows, macOS and Linux were installed on all clients. Configured RAID with our servers to ensure data redundancy in case of any cyber attack or corrupted file events.
Network management : Ensure the accessibility and availability of network resources (Servers, Firewalls, Wireless, E-mail systems, VPN appliances, etc.) is maintained. Maintain and manage Company’s local (LAN) and wide (WAN) area networks.
Internal Support : Act as a single point of contact for phone calls and emails from GotPrint employees and partners. Provide level 1 and level 2 supports and work with IT outsourced partner for level 3 support as appropriate. Ensure that Company’s systems continue to be effective and efficient. Demonstrate positive relationships with end users while responding to IT tickets and requests. Maintain and support Company’s telecommunication systems. Provide systems training and on-going end-user software support.
Configuration : Work with outsourced IT partner to perform and manage system upgrades including service packs, patches, hot fixes and security configurations. Stay abreast of technological developments to Assist in all audits and maintain compliance.
2021 : 2023
GotPrint
Information Technology Administrator
Technical support : Provided technical support for over 52,000 devices to Detroit Public Schools Community District. Diagnosed and repaired faults in Windows, MAC, and Linux operating systems. Resolved internal network issues. Installed and configured hardware and software for various operating systems. Spoke to customers over phone, text and email to quickly get to the root of their problem.
Data Security : Wiped, crushed and stored thousands of hard drives compliant with the following international standards/laws : HIPAA, US Department of Defense 5220.22 M, US Army AR380-19, US Air Force 502, German VIST, Russian GOST p50739-9, Canadian OPS-II, HMG IS5 Baseline/Enhanced, Navso P-5329-26, NCSC-TG-025 & NSA 130-2. Researched data security policies to implement throughout the organization for internal and remote workers.
IT Refurbishment : Repaired 800 broken laptops, desktops, monitors and All-in-One computers and put them up for sale on our eBay store.
Internal IT : Provided technical assistance and support to internal computer systems, hardware, and software. Ran internal queries and diagnostic programs to isolate problems to determine and implement solutions. Wrote Standard Operating Procedures (SOPs) for new users to properly use our systems, computers and technology.
Customer Service : Helped customers of all ages with complaints, and questions regarding their devices. Provided troubleshooting steps with easy to follow instructions.
2020 : 2021
human-I-T
Information Technology Specialist
Configuration : Arranged 10 honeypots on Linux/UNIX, Windows, Mac and FreeBSD operating systems with virtualization software to enhance cyber deception.
Penetration Testing : Tested the authenticity of over 40 honeypots for clients. Attacked each operating system to see if the honeypots offered reasonable deception. Aided in providing lures and false credentials to strengthen authenticity.
Networking/Server set up : Configured 30 computers with FTP, SSH, DNS, SMTP and SMB servers and set up their networking accordingly.
Troubleshooting : Fixed issues on over 20 computers when setting up the operating systems or when configuring the honeypots. Analyzed configuration problems and started with the most general problems in order to narrow down the cause.
Research : Gathered data on various types of services, lures and credentials that are common to attack by hackers. Had to present the data in a concise and easy to understand format. Also had to communicate with my colleagues on how to set up honeypots with that information.
2019 : 2020
illuria security
Information Technology Specialist
Monitoring : log analysis on Windows/Windows server, Mac and Linux operating systems. Used email filters to analyze, flag, and respond to potentially malicious emails. Created specific protocols that audit file changes such as updates, deletions, additions and moves. Analyzed system outages, alerts, and reports of abnormal system behavior due to suspected security related events such as viruses and hacker intrusions. Monitored current vulnerability security alerts to patched applications and systems.
Threat Hunting : Proactively searched for unidentified vulnerabilities with Microsoft Sentinel and Wazuh SIEM Stack. Performed risk analysis to identify any security issues that could lead to lost or stolen data. Analyzed security data from computing and network devices to identify potential threats and vulnerabilities.
Incident Response : Protect, monitor, update and respond to incidents on various servers—both hardware and cloud-based. Investigated suspicious behavior and triage incidents. Identified and documented security breaches and damage caused by breaches. Took appropriate action to prevent future cyber compromise.
Vulnerability Management : Monitored digital assets and Conducted risk assessments and tracked and reported remediation efforts. Worked with manager to utilize best practices in ATP, EDR/XDR, and SIEM.
2023 : Present
Information Technology Partners
Information Security Analyst
All the responsibilities in the IT administrator role along with :
Policy enforcement : Validated that all users in the company follow security best practices by sending out weekly newsletters and articles about security. Tested effectiveness of material by implementing phishing campaigns and logged a 20% decrease on links clicked within phishing emails. Revamped outdated onboarding and offboarding policies to minimize privileges of new employees and properly disable/revoke access from terminated employees.
Supervision : Monitored the work of team members to ensure that the quality of work maintained satisfactory levels. Delegated more responsibilities to team members to enhance their knowledge and growth, while observing and correcting mistakes. This allowed incoming tickets to be resolved 15% faster.
Training : Ensured that team members were comfortable with the latest tools and responsibilities by teaching them how to perform their new tasks. Closely monitored their progress and tracked their efficiency.
2022 : 2023
GotPrint
Information Technology Team Lead
Active Directory : Create, modify, and maintain Active Directory group policies, and security permissions. Worked with other functional IT areas to ensure that IT best practices, policies and procedures are practiced. Administration of user accounts (new user accounts, security, etc.).
Security : Monitored network traffic for rogue access points and quarantined emails to minimize attack vectors. Isolated compromised machines and followed our standard operating procedures to dispose of them. Maintained antivirus software (ESET, Kaspersky) and ensured most recent versions of Windows, macOS and Linux were installed on all clients. Configured RAID with our servers to ensure data redundancy in case of any cyber attack or corrupted file events.
Network management : Ensure the accessibility and availability of network resources (Servers, Firewalls, Wireless, E-mail systems, VPN appliances, etc.) is maintained. Maintain and manage Company’s local (LAN) and wide (WAN) area networks.
Internal Support : Act as a single point of contact for phone calls and emails from GotPrint employees and partners. Provide level 1 and level 2 supports and work with IT outsourced partner for level 3 support as appropriate. Ensure that Company’s systems continue to be effective and efficient. Demonstrate positive relationships with end users while responding to IT tickets and requests. Maintain and support Company’s telecommunication systems. Provide systems training and on-going end-user software support.
Configuration : Work with outsourced IT partner to perform and manage system upgrades including service packs, patches, hot fixes and security configurations. Stay abreast of technological developments to Assist in all audits and maintain compliance.
2021 : 2023
GotPrint
Information Technology Administrator
Technical support : Provided technical support for over 52,000 devices to Detroit Public Schools Community District. Diagnosed and repaired faults in Windows, MAC, and Linux operating systems. Resolved internal network issues. Installed and configured hardware and software for various operating systems. Spoke to customers over phone, text and email to quickly get to the root of their problem.
Data Security : Wiped, crushed and stored thousands of hard drives compliant with the following international standards/laws : HIPAA, US Department of Defense 5220.22 M, US Army AR380-19, US Air Force 502, German VIST, Russian GOST p50739-9, Canadian OPS-II, HMG IS5 Baseline/Enhanced, Navso P-5329-26, NCSC-TG-025 & NSA 130-2. Researched data security policies to implement throughout the organization for internal and remote workers.
IT Refurbishment : Repaired 800 broken laptops, desktops, monitors and All-in-One computers and put them up for sale on our eBay store.
Internal IT : Provided technical assistance and support to internal computer systems, hardware, and software. Ran internal queries and diagnostic programs to isolate problems to determine and implement solutions. Wrote Standard Operating Procedures (SOPs) for new users to properly use our systems, computers and technology.
Customer Service : Helped customers of all ages with complaints, and questions regarding their devices. Provided troubleshooting steps with easy to follow instructions.
2020 : 2021
human-I-T
Information Technology Specialist
Configuration : Arranged 10 honeypots on Linux/UNIX, Windows, Mac and FreeBSD operating systems with virtualization software to enhance cyber deception.
Penetration Testing : Tested the authenticity of over 40 honeypots for clients. Attacked each operating system to see if the honeypots offered reasonable deception. Aided in providing lures and false credentials to strengthen authenticity.
Networking/Server set up : Configured 30 computers with FTP, SSH, DNS, SMTP and SMB servers and set up their networking accordingly.
Troubleshooting : Fixed issues on over 20 computers when setting up the operating systems or when configuring the honeypots. Analyzed configuration problems and started with the most general problems in order to narrow down the cause.
Research : Gathered data on various types of services, lures and credentials that are common to attack by hackers. Had to present the data in a concise and easy to understand format. Also had to communicate with my colleagues on how to set up honeypots with that information.
2019 : 2020
illuria security
Information Technology Specialist
Company:
Information Technology Partners
Spoken Language:
Armenian, English, Russian
About
I'm a cyber security professional with 4 years of experience in IT. I'm currently working for a Managed service security provider that provides security services to over 50 clients. I have practical experience in virtualization software, all major operating systems, IT networking, network security and incident response. I'm always looking to grow and enhance my knowledge in the security field by studying and taking certifications.