Summary
Overview
Work History
Education
Skills
Certification
Timeline
Generic

Anthony Salinas

Incident Response Analyst
Oxnard

Summary

Determined, detail-oriented Incident Response Analyst with 8 years' work experience in Information Technology, 5+ years' work experience focused in Cyber Security and 6 years' school experience within the field. A confident understanding of network and security infrastructure. Dependable and passionate about building team connections.

Overview

10
10
years of professional experience
2
2
Certifications
1
1
Language

Work History

Incident Response Analyst

Asceris
01.2024 - Current
  • Assisted with IR lead and counsel to conduct IR investigations
  • Perform host and network-based forensics across Windows, Mac, and Azure environments.
  • Performed M365 BEC investigations and Proactive risk assessments for clients.
  • Triage and assess incidents for clients, determining Digital Forensics and Incident Response (DFIR) objectives and level of effort required to meet these objectives
  • Provide comprehensive and articulate reports, recommendations, and findings to clients and legal counsel, through both written and verbal communication channels.
  • Contribute to creation of internal guidelines, playbooks, and knowledge base materials

Cyber Defense Analyst II

Arctic Wolf
01.2022 - 01.2024
  • Manage, Detect, and Respond for clients using EDR software.
  • Provided threat hunts for possible vulnerabilities, persistence, and obfuscated commands.
  • Investigated windows event logs using Eric Zimmerman Tool EvtxECmd.
  • Prevented active threats by isolating endpoints and notifying the DFIR case team.
  • Communicated and assisted the DFIR department in investigations.
  • Analyzed possible malicious files using sandbox environments.
  • Investigated possible phishing emails, documented and notified clients of malicious links, file hashes and email senders.
  • Used OSINT tools MxToolbox, Virustotal, urlscan.io, AbuseIPDB, CyberChef, InfoByIP, and Shodan.

Cyber Defense Analyst

Tetra Defense
04.2021 - 01.2022
  • Manage, Detect, and Respond for clients sing EDR software.
  • Threat hunted for possible vulnerabilities, reconnaissance, persistence, malicious executions, exfiltration, and command and control.
  • Analyzed possible malicious files using sandbox environments.
  • Investigated possible phishing emails, documented and notified clients of malicious links, files hashes, and email senders.
  • Used OSINT tools consisting of MxToolbox, Virustotal, urlscan.io, AbuseIPDB, CyberChef, InfoByIP, and Shodan.
  • Communicated and assisted DFIR department in investigations.

Dedicated SOC Analyst

Novacoast
08.2020 - 04.2021
  • Detect, monitor, and analyze high priority clients using SIEM software.
  • Analyze data using endpoint protection platform (EPP) and secure malware analytics sandbox environment.
  • Investigated and prevented phishing emails using email protection software.
  • Used OSINT tools for analysis.
  • Communicated with SOC leads and network engineers to provide better workflow.

SOC Analyst

Novacoast
03.2020 - 08.2020
  • Detection, monitoring, analysis, and resolution of security incidents for clientele using SIEM software.
  • Reported to SOC II's for tuning alarms.
  • Assessed incoming threats and developed resolutions for clients.

Remote Support Technician

Skyriver IT
01.2019 - 10.2019
  • Perform user management through Active Directory and Azure AD.
  • Managed office 365 accounts, mapped drives, VPN's and security groups.
  • Remotely installed Microsoft Enterprise software, Adobe Creative Cloud, and printers.
  • Created onboarding and off-boarding procedures.
  • Performed documentation on troubleshooting solutions.

Cleaning Technician Supervisor

Orkopina Cleaning Services
06.2018 - 06.2019
  • Helped senior management with logistics scheduling.
  • Managed inventory for supplies and applied cleaning equipment repairs.
  • Held client confidentiality and OSHA standards.
  • Delivered quality customer service to address urgent needs and cleaning requests.
  • Implemented IT resolutions for management.
  • Worked alongside other cleaners to complete jobs in corporate office buildings.

Desktop Support Technician Lead

RE/MAX
06.2015 - 12.2016
  • Assured performance and uptime of networks, computers, and telecommunications.
  • Supported and manged switches, routers, servers, firewalls, printers, phone systems, CCTV, security system key fob, VPNs, and host machines.
  • Worked directly with vendors and service providers.
  • Identified negative hardware performance trends and common issues afflicting systems, reporting findings for remediation.
  • Provided troubleshooting and problem solving for all end users.
  • Performed OS installations, virus identification and removal, data backups, data transfers, data recovery, and computer builds.

Education

Master of Science - Cyber Security Operations

University of San Diego
San Diego, CA
05.2001 -

Bachelor of Science - Cyber Forensics & Information Security

Robert Morris University
Moon Township, PA
05.2001 -

Skills

Active Directory

Carbon Black

Cisco Threat Grid

Cofense Triage

Crowdstrike

Eric Zimmerman's Tools

FTK

LogRhythm

M365 Admin Console

Recorded Future Enterprise Sandbox

SentinelOne

Splunk

Certification

SOC Core Skills | John Strand

Timeline

Incident Response Analyst

Asceris
01.2024 - Current

Cyber Defense Analyst II

Arctic Wolf
01.2022 - 01.2024

SOC Core Skills | John Strand

09-2021

Cyber Defense Analyst

Tetra Defense
04.2021 - 01.2022

Dedicated SOC Analyst

Novacoast
08.2020 - 04.2021

SOC Analyst

Novacoast
03.2020 - 08.2020

Mobile Forensics & Security

04-2019

Remote Support Technician

Skyriver IT
01.2019 - 10.2019

Cleaning Technician Supervisor

Orkopina Cleaning Services
06.2018 - 06.2019

Desktop Support Technician Lead

RE/MAX
06.2015 - 12.2016

Master of Science - Cyber Security Operations

University of San Diego
05.2001 -

Bachelor of Science - Cyber Forensics & Information Security

Robert Morris University
05.2001 -
Anthony SalinasIncident Response Analyst