Liam Barry

Jr. Security Analyst at Sedara
  • Claim this Profile
Contact Information
us****@****om
(386) 825-5501
Location
Clarence Center, New York, United States, US

Topline Score

Topline score feature will be out soon.

Bio

Generated by
Topline AI

You need to have a working account to view this content.
You need to have a working account to view this content.

Credentials

  • LogRhythm Platform Administrator
    LogRhythm
    Jul, 2023
    - Nov, 2024
  • LogRhythm Security Analyst
    LogRhythm
    Jul, 2023
    - Nov, 2024
  • Cybereason Certified Threat Analyst
    Cybereason
    Mar, 2023
    - Nov, 2024
  • Cybereason Certified Threat Hunter
    Cybereason
    Mar, 2023
    - Nov, 2024

Experience

    • United States
    • Computer and Network Security
    • 1 - 100 Employee
    • Jr. Security Analyst
      • Jun 2022 - Present

    • United States
    • Glass, Ceramics and Concrete Manufacturing
    • 700 & Above Employee
    • Cybersecurity Analyst Intern
      • May 2021 - Aug 2021

      Helped to implement a quarterly access review system for reviewing SharePoint site permissions. Worked with business units within Corning to help review and assign owners to SharePoint sites. Created excel user permission reports of SharePoint sites for business units to help enforce least privilege. Helped to implement a quarterly access review system for reviewing SharePoint site permissions. Worked with business units within Corning to help review and assign owners to SharePoint sites. Created excel user permission reports of SharePoint sites for business units to help enforce least privilege.

    • United States
    • Computer and Network Security
    • 1 - 100 Employee
    • Research Assistant
      • Sep 2020 - Apr 2021

      Worked on a scenario which an attacker exploited security issues on a network. Used Sysmon, OSQuery, Winlogbeat, Filebeat, Logstash, and Kibana to collect and monitor logs for windows and linux systems. Documented any attempts/intrusions into the network. Worked on a scenario which an attacker exploited security issues on a network. Used Sysmon, OSQuery, Winlogbeat, Filebeat, Logstash, and Kibana to collect and monitor logs for windows and linux systems. Documented any attempts/intrusions into the network.

    • United States
    • Computer and Network Security
    • 1 - 100 Employee
    • Research Assistant
      • Aug 2019 - Dec 2019

      Used rooted Android and Apple devices to extract information from apps on devices. Looked into what information IoT devices are gathering and information stored in their apps on these devices. Gathered data on possible security risks that devices like the Google Home, Google WiFi, and Facebook Portal have. Used rooted Android and Apple devices to extract information from apps on devices. Looked into what information IoT devices are gathering and information stored in their apps on these devices. Gathered data on possible security risks that devices like the Google Home, Google WiFi, and Facebook Portal have.

    • United States
    • Software Development
    • 700 & Above Employee
    • Scanner
      • Jun 2019 - Aug 2019

    • United States
    • Computer and Network Security
    • 1 - 100 Employee
    • Technical Intern
      • Sep 2018 - Dec 2018

      Leveraged Python to create a working script utilizing Nmap on a Raspberry Pi which would scan the network recording different open or closed ports and services running on the network. Leveraged Python to create a working script utilizing Nmap on a Raspberry Pi which would scan the network recording different open or closed ports and services running on the network.

Education

  • Champlain College
    Bachelor of Science - BS, Computer Networking & Cybersecuirty
    2018 - 2022

Community

You need to have a working account to view this content. Click here to join now