Profiles search
Younis Dawit
Lead Cyber Security Analyst (DFIR) at Target
Orlando, FL, United States
Details
Experience:
Conducting in-depth analyses of security incidents and interpret, correlate and evaluate data to build a holistic picture of what occurred during the incident. Implement new processes and procedures identified by incident artifacts, and conduct research and development to ensure continuous improvements for monitoring, detection and response capabilities. Drive mission to protect Target by collaborating with our key stakeholders and business partners to develop new strategies for the Digital Forensics Team.
Key Responsibilities :
• Runs investigations on Windows, MacOS, and Linux systems to gather artifacts for various logs in order to build out a holistic picture of what occurred during an incident.
• Develops processes and procedures designed to help support the mission of the Cyber Fusion Center and Security at Target from investigation artifacts.
• Performs research and development of technologies used within Target to gain better visibility in our infrastructure.
• Works with internal engineering teams to implement features that will extend the capabilities for case data collection available for future investigations.
• Develops and implements security measures that protect the handling, storing, processing, and transmission of classified information and sensitive Personally Identifiable Information (PII).
• Provides maintenance support for the forensics labs and tooling used during investigations.
• Presents briefings and advises leadership on artifacts found during an investigation and related forensics issues including planning requirements, execution, regulatory guidance and enterprise coordination.
2021 : Present
Target
Lead Cybersecurity Analyst (Digital Forensics)
2020 : 2021
Target
Senior Cybersecurity Analyst (Insider Threat)
• Incident Triage Analysts create filters, data monitors, dashboards, and reports within monitoring utilities.
• Troubleshoot security monitoring devices to improve event correlation and performance.
• Develop and update procedures, and configure tools for Event Detection Analysts to use.
• Handle high and critical severity incidents as described in the operations playbook.
• Perform additional analysis of escalations from Event Detection analysts and reviews Level 1 tickets.
• Escalate high or critical severity level incidents to Incident Handlers.
• Acts as a participant during Cyber Hunt activities at the direction of one or more Target Incident Handlers
2020 : 2020
Target
Senior Cybersecurity Analyst
• Monitors SIEM and logging environments for security events and alerts to potential (or active) threats, intrusions, and/or compromises
• Responsible for understanding the global threat landscape through working with Target Cyber Threat Intel team to maintain awareness
• Assists with triage of service requests from customers and internal teams
• Escalates cybersecurity events according to Target’s Cyber Security Incident Response Plan
• Assists with containment of threats and remediation of environment during or after an incident
• Acts as a participant during Cyber Hunt activities at the direction of one or more Target Incident Handlers
• Documents event analysis and writes comprehensive reports of incident investigations
2019 : 2020
Target
Information Security Analyst
• Research and identify solutions to cellular tower performance issues
• Diagnose and troubleshoot technical issues, including account setup and network configuration
• Ask customers targeted questions to quickly understand the root of the problem
• Track computer system issues through to resolution, within agreed time limits
• Talk clients through a series of actions, either via phone, email or chat, until they’ve solved a technical issue
• Properly escalate unresolved issues to appropriate internal teams (e.g. Field Operations)
• Refer to internal database or external resources to provide accurate tech solutions
• Ensure all issues are properly logged
• Prioritize and manage several open issues at one time
• Prepare accurate and timely reports
• Reset Sprint Cellphone towers when necessary
2017 : 2019
Sprint
Technical Support Engineer
Key Responsibilities :
• Runs investigations on Windows, MacOS, and Linux systems to gather artifacts for various logs in order to build out a holistic picture of what occurred during an incident.
• Develops processes and procedures designed to help support the mission of the Cyber Fusion Center and Security at Target from investigation artifacts.
• Performs research and development of technologies used within Target to gain better visibility in our infrastructure.
• Works with internal engineering teams to implement features that will extend the capabilities for case data collection available for future investigations.
• Develops and implements security measures that protect the handling, storing, processing, and transmission of classified information and sensitive Personally Identifiable Information (PII).
• Provides maintenance support for the forensics labs and tooling used during investigations.
• Presents briefings and advises leadership on artifacts found during an investigation and related forensics issues including planning requirements, execution, regulatory guidance and enterprise coordination.
2021 : Present
Target
Lead Cybersecurity Analyst (Digital Forensics)
2020 : 2021
Target
Senior Cybersecurity Analyst (Insider Threat)
• Incident Triage Analysts create filters, data monitors, dashboards, and reports within monitoring utilities.
• Troubleshoot security monitoring devices to improve event correlation and performance.
• Develop and update procedures, and configure tools for Event Detection Analysts to use.
• Handle high and critical severity incidents as described in the operations playbook.
• Perform additional analysis of escalations from Event Detection analysts and reviews Level 1 tickets.
• Escalate high or critical severity level incidents to Incident Handlers.
• Acts as a participant during Cyber Hunt activities at the direction of one or more Target Incident Handlers
2020 : 2020
Target
Senior Cybersecurity Analyst
• Monitors SIEM and logging environments for security events and alerts to potential (or active) threats, intrusions, and/or compromises
• Responsible for understanding the global threat landscape through working with Target Cyber Threat Intel team to maintain awareness
• Assists with triage of service requests from customers and internal teams
• Escalates cybersecurity events according to Target’s Cyber Security Incident Response Plan
• Assists with containment of threats and remediation of environment during or after an incident
• Acts as a participant during Cyber Hunt activities at the direction of one or more Target Incident Handlers
• Documents event analysis and writes comprehensive reports of incident investigations
2019 : 2020
Target
Information Security Analyst
• Research and identify solutions to cellular tower performance issues
• Diagnose and troubleshoot technical issues, including account setup and network configuration
• Ask customers targeted questions to quickly understand the root of the problem
• Track computer system issues through to resolution, within agreed time limits
• Talk clients through a series of actions, either via phone, email or chat, until they’ve solved a technical issue
• Properly escalate unresolved issues to appropriate internal teams (e.g. Field Operations)
• Refer to internal database or external resources to provide accurate tech solutions
• Ensure all issues are properly logged
• Prioritize and manage several open issues at one time
• Prepare accurate and timely reports
• Reset Sprint Cellphone towers when necessary
2017 : 2019
Sprint
Technical Support Engineer
Company:
Target
Spoken Language:
English