Allen Baylis
Sr. Information Security Analyst
As a dedicated cybersecurity professional with many years of experience, I am passionate about safeguarding digital assets and ensuring the integrity of information systems. My expertise spans threat analysis, risk management, and incident response, enabling me to develop robust security frameworks that protect organizations from evolving cyber threats. I hold relevant certifications, which have equipped me with the latest tools and methodologies to combat cyber risks effectively. My background includes working with cross-functional teams to implement security policies, conduct vulnerability assessments, and provide security training for employees—empowering them to be the first line of defense against cyber threats. I thrive in dynamic environments where I can leverage my analytical skills to identify potential security breaches and develop proactive strategies to mitigate risks. My approach is rooted in continuous learning and staying abreast of the latest trends in cybersecurity, ensuring that I remain at the forefront of this rapidly changing landscape.I am always eager to connect with fellow professionals and share insights on best practices in cybersecurity. Let’s work together to create a safer digital world.
NETWORK:
• Experienced in providing support in IP routing, switching, virtualization, security, wireless solutions for small and medium size businesses, large enterprise and service providers.
SECURITY :
• Experienced in information security management, technology risk management and design.
• Experienced end-to-end cloud systems with security.
• Understanding of end-to-end information security incident management processes and best practice.
• Knowledge of Security Compliance Frameworks such as CSA CCM, NIST 800-53 or ISO27001 and in particular FedRAMP
• Experience working and querying SIEM tools or other log-based data
• Experience in engineering event detection & response tuning
• Knowledge of MITRE ATT&CK framework and general adversarial / defensive
• Experience in developing detections for attacker tactics, techniques, and procedures (TTPs)
• Experienced performing vulnerability assessment for SAST, DAST and SCA findings and lead the teams towards remediation.
TOOLS :
Splunk, ELK, ArcSite, QRadar, AlienVault/ OSSIM. Graylog, Metasploit, Nmap, Nessus, OpenVAS, SQLMap, John the Ripper, Hashcat, Nikto, Aircrack-ng, Wireshark, ZAP, BurpSuite, Snort, SentinelOne , Crowdstrike, Dirb
PROJECT MANAGEMENT :
• Excellent communicator; leverage technical, business and financial acumen to communicate effectively with client and respective teams.