Yazeed Bayezid

Information Security Analyst - L2 at CyberStone
  • Claim this Profile
Contact Information
us****@****om
(386) 825-5501
Location
Jiddah, Makkah, Saudi Arabia, SA

Topline Score

Topline score feature will be out soon.

Bio

Generated by
Topline AI

You need to have a working account to view this content.
You need to have a working account to view this content.

Credentials

  • Splunk Core Certified Power User
    Splunk
    Aug, 2023
    - Nov, 2024
  • Splunk 7.x Fundamentals
    Splunk
    Jun, 2021
    - Nov, 2024
  • Oracle Certified Foundations Associate
    Oracle
    Dec, 2021
    - Nov, 2024
  • NSE Network Security Associate
    Fortinet
    May, 2021
    - Nov, 2024
  • Cisco Certified Network Associate Security (CCNA)
    Cisco
    Feb, 2021
    - Nov, 2024

Experience

    • United Arab Emirates
    • IT Services and IT Consulting
    • 1 - 100 Employee
    • Information Security Analyst - L2
      • May 2022 - Present

      Roles and Responsibilities:• Maintain health check of all centralized logs and suggest any tuning recommendation to application owner in order to provide to finest version of logs.• Basic of Threat hunting for suspicious activities in network and endpoint.• Providing help to IR team in extracting necessary logs and activities in order to reach a conclusion on each incident• Function as a technical escalation point for SOC analysts• Assist the Incident Response team in handling security incidents• Perform complex security investigations and root cause analysis• Ensure that all security events are properly documented/tracked to meet audit and legal requirements• Build/review SIEM use cases as per MITRE Framework• Mentor junior-level security analysts• Assist the SOC Manager in running day to day operations• Proper communication and escalation during an incident• Develop documentation in support of response processes and/or procedures Show less

    • Information Security Analyst - L1
      • Aug 2021 - May 2022

      Roles and Responsibilities:• Monitor alerts automatically generated by security systems.• Monitor threats and new attack techniques being disclosed in the wild.• Investigate events to determine if they are true events or false positives.• Communicate policies with end- users.• Create new ways to search for potentially suspicious events on systems.• Participate in projects to improve security monitoring toolkits as well as to improve defensive controls.• Provide different types of data to measure security and compliance. Show less

Education

  • Staffordshire University
    Bachelor's of Science with Honours, Cyber Security
    2019 - 2022

Community

You need to have a working account to view this content. Click here to join now