Gurgen Stefanov

Cyber Security Analyst II at H.W. Kaufman Group
  • Claim this Profile
Contact Information
us****@****om
(386) 825-5501

Topline Score

Topline score feature will be out soon.

Bio

Generated by
Topline AI

You need to have a working account to view this content.
You need to have a working account to view this content.

Experience

    • United States
    • Financial Services
    • 100 - 200 Employee
    • Cyber Security Analyst II
      • May 2022 - Jul 2023

      Farmington Hills, Michigan, United States • Broad hands-on knowledge of SIEM, NGFW, IPS, EDR, DLP, data encryption, vulnerability management, email security, phishing training, and other industry - standard techniques and practices • Monitored security controls, intrusion detection events, and network traffic for unusual or suspicious activity, interpreted activity, and took responsive action • Provided resolutions to intrusion events, security incidents, and other threat indications, and provided warning information to… Show more • Broad hands-on knowledge of SIEM, NGFW, IPS, EDR, DLP, data encryption, vulnerability management, email security, phishing training, and other industry - standard techniques and practices • Monitored security controls, intrusion detection events, and network traffic for unusual or suspicious activity, interpreted activity, and took responsive action • Provided resolutions to intrusion events, security incidents, and other threat indications, and provided warning information to teams • Proactively recommended additional security solutions or enhancements to existing security solutions to improve overall enterprise security • Provided guidance to management on current cybersecurity threats and recommendations to protect corporate assets and brand image • Designed and executed vulnerability assessments, penetration tests, and security audits • Performed forensic investigations and e-Discovery searches as needed • Participated in risk assessments for new technologies and projects and recommended changes and improvements • Contributed to IT Risk Management function by identifying risks and participated in risk response planning • Closely collaborate with other teams on security and policy issues • Completed required security project diagrams and documented standard operating procedures and run books • Participated in development of security plans, risk assessment plans, business continuity plans, incident response plans, and cybersecurity policies and standards • Reported on security system activity and end user activity audits Show less

    • United States
    • Financial Services
    • 700 & Above Employee
    • Cyber Security Analyst l
      • Dec 2020 - May 2022

      Pontiac, Michigan, United States • Administered Mimecast Email Secure Gateway • Administered InsightVM and AppSec Consoles in Rapid7 as part of Threat and Vulnerability Management • Administered Forcepoint and performed daily tasks • Administered, set up alerts, and responded to those alerts in Splunk - Enterprise Security • Investigated incidents in Splunk ES • Reviewed reported Spam and Phishing emails • Reviewed network traffic in Palo Alto • Worked closely with other teams to understand the flow of… Show more • Administered Mimecast Email Secure Gateway • Administered InsightVM and AppSec Consoles in Rapid7 as part of Threat and Vulnerability Management • Administered Forcepoint and performed daily tasks • Administered, set up alerts, and responded to those alerts in Splunk - Enterprise Security • Investigated incidents in Splunk ES • Reviewed reported Spam and Phishing emails • Reviewed network traffic in Palo Alto • Worked closely with other teams to understand the flow of sensitive data between systems and applications • Monitored and analyzed threat intelligence sources and recommended appropriate actions • Reviewed and analyzed logs from a variety of sources • Monitored detection systems for signs of attack or unusual activity • Detected and analyzed suspicious or malicious events • Used penetration testing tools and techniques • Created documentation to assist with repeatable tasks and decision making • Created and maintained procedural documentations • Understood SIEM, forensics, malware analysis and incident handling • Mentored other Cyber Security Analysts • Provided on-call support on a rotating basis

    • Identity and Access Management Analyst II
      • Dec 2019 - Nov 2020

      Pontiac, Michigan, United States • Implemented and administered IdentityNow in Sailpoint • Created, edited and disabled user accounts in Active Directory and various applications • Oversaw identity and access management solutions and processes • Ensured required approvals are obtained before granting user access to requested resources • Participated in defining and implementing overall access and authorizations, security strategy, policies, and procedures • Developed policies and procedures for provisioning new… Show more • Implemented and administered IdentityNow in Sailpoint • Created, edited and disabled user accounts in Active Directory and various applications • Oversaw identity and access management solutions and processes • Ensured required approvals are obtained before granting user access to requested resources • Participated in defining and implementing overall access and authorizations, security strategy, policies, and procedures • Developed policies and procedures for provisioning new user accounts and resolved permission-related issues • Performed regular account audits and provided permission reporting in response to audit requests • Worked with department leaders to understand business requirements, information technology standards, information security policies, and other considerations that influence how identity and access solutions and services should perform and operate using a risk-based approach • Ensured identity and access services were performed according to defined processes and complied with applicable information security requirements • Served as Exchange Subject Matter Expert for Office 365, managing On-Prem, Cloud, and Hybrid environments

    • United States
    • Information Technology & Services
    • 300 - 400 Employee
    • Data Security Analyst II
      • Jan 2019 - Dec 2019

      Troy, Michigan, United States • Served as the SME for Identity & Access Management (IAM) tools, operational, strategic access and security control decisions • Served as Exchange Subject Matter Expert for Cloud Computing, managing Cloud, On-Prem and Hybrid environments • Evaluated information systems relevant to security, availability, processing, integrity, confidentiality and privacy • Enforced data privacy and security in keeping with HIPAA requirements, ISO and NIST standards • Managed current automation… Show more • Served as the SME for Identity & Access Management (IAM) tools, operational, strategic access and security control decisions • Served as Exchange Subject Matter Expert for Cloud Computing, managing Cloud, On-Prem and Hybrid environments • Evaluated information systems relevant to security, availability, processing, integrity, confidentiality and privacy • Enforced data privacy and security in keeping with HIPAA requirements, ISO and NIST standards • Managed current automation processes and developed Role-Based Security framework • Served as a lead security analyst for other data security analysts on the team • Responsible for creating Active Directory and Email accounts

    • Data Security Analyst I
      • Feb 2017 - Jan 2019

      Troy, Michigan, United States • Performed Identity and Access Management systems evaluation and created provisioning workflows and documentations • Audited information systems based on SSAE-16 SOC 2 and provided detailed reporting by documenting each process • Responsible for training of new employees on IT operational and IAM security processes and procedures • Managed and compiled the procedures for each customer provisioning and de-provisioning process • Responsible for creating Active Directory accounts… Show more • Performed Identity and Access Management systems evaluation and created provisioning workflows and documentations • Audited information systems based on SSAE-16 SOC 2 and provided detailed reporting by documenting each process • Responsible for training of new employees on IT operational and IAM security processes and procedures • Managed and compiled the procedures for each customer provisioning and de-provisioning process • Responsible for creating Active Directory accounts including security groups and DLs • Responsible for migration of mailboxes to cloud and back on-premises

    • IT Service Desk Analyst
      • Sep 2015 - Feb 2017

      Troy, Michigan, United States • Responded, diagnosed and resolved a range of hardware, software, and connectivity issues by troubleshooting over the phone • Checked each ticket that was documented and routed to the appropriate teams using the Remedy ticketing system • Reviewed incidents to identify problems in a customer’s environment, performing root cause analysis • Served as a Technical Problem Manager for each customer account and its employees • Upgraded additional software and hardware to meet customer… Show more • Responded, diagnosed and resolved a range of hardware, software, and connectivity issues by troubleshooting over the phone • Checked each ticket that was documented and routed to the appropriate teams using the Remedy ticketing system • Reviewed incidents to identify problems in a customer’s environment, performing root cause analysis • Served as a Technical Problem Manager for each customer account and its employees • Upgraded additional software and hardware to meet customer needs

    • IT Service Desk Internship
      • Jun 2015 - Aug 2015

      Troy, Michigan, United States • Provided first level support over the phone, documenting each call in Remedy ticketing system to meet SLA • Researched, resolved, and responded to questions received via phone and Email in a timely manner

Education

  • Walsh College
    Bachelor of Science (B.S.), Information Technology: Cyber Security concentration
    2017 - 2019
  • Oakland Community College
    Associate in Applied Science (A.A.S.), Computer Support Engineering Technology
    2014 - 2016

Community

You need to have a working account to view this content. Click here to join now