Noah Geno

Noah Geno

Information Technology Security Analyst

Followers of Noah Geno87 followers
location of Noah GenoOklahoma City, Oklahoma, United States

Connect with Noah Geno to Send Message

Connect

Connect with Noah Geno to Send Message

Connect
  • Timeline

  • About me

    Cyber Security Analyst Associate | CompTIA CSAP | CompTIA CySA+| CompTIA Security+

  • Education

    • Texas A&M University

      2018 - 2022
      Bachelor of Science - BS Engineering

      Degree in Interdisciplinary Engineering, Minors in Computer Science and Electrical Engineering

  • Experience

    • E.J. REYNOLDS COMPANY

      Jul 2022 - Nov 2023
      Information Technology Security Analyst

      The primary duties of the IT Security Analyst at EJ Reynolds is to create, develop, and implement policies and procedures in compliance with NIST 800-171 and CMMC standards. Providing excellent end user support and advanced troubleshooting capabilities. IT Security Analyst must also be familiar TCP/IP protocol, as well as networking technologies including VLANs, VPNs, and Mesh Wifi. Analyst must also be able to provide education to end users about cyber hygiene and cybersecurity best practices. Must be familiar with common penetration testing tools such as Nmap, Wireshark, and Metasploit. Show less

    • Insight Global

      Nov 2023 - Feb 2024
      SOC Analyst

      Be a part of a security team supporting an Enterprise level unified communications program with facilities in all 50 states and territories Entry level security analyst supporting 24x7 security operations center (SOC) monitoring and incident response (IR), and assisting with building, auditing, and documenting secure IT infrastructure(s). Monitor and analyze Intrusion Detection Systems (IDS) and Security Information and Event Monitoring systems (SIEM) to identify security issues for remediation. Recognize suspicious/malicious intrusion attempts and compromises through reviews and analyses of relevant event detail and summary information. Assist in conducting investigations of information systems security violations and incidents, reporting as necessary to management. Prepare incident reports of analysis methodology and results. Communicate alerts to agencies regarding intrusions/ compromises/security or policy violations to/on their network infrastructure, applications, and operating systems. Assist in conducting security audits to ensure that systems are being operated securely, and information systems security policies and procedures are implemented as defined in security plans. Assist with identifying system vulnerabilities and system compliance with security and privacy regulations, laws, and contractual requirements through monitoring of vulnerability scanning devices, and tracking remediation actions. Assist with maintaining security documentation and periodic security reporting and metrics. Show less

    • General Dynamics Information Technology

      Feb 2024 - now
      Cyber Security Analyst Associate

      Investigates, analyzes, and responds to cyber incidents within a network environment or enclaveUses data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs) to analyze events that occur within their environments for the purposes of mitigating threatsInterprets, analyzes, and reports all events and anomalies in accordance with computer network directives, including initiating, responding, and reporting discovered eventsEvaluates, tests, recommends, coordinates, monitors, and maintains cybersecurity policies, procedures, and systems, including access management for hardware, firmware, and softwareEnsures that cybersecurity plans, controls, processes, standards, policies, and procedures are aligned with cybersecurity standardsIdentifies security risks and exposures, determines the causes of security violations and suggests procedures to halt future incidents and improve securityDevelops techniques and procedures for conducting cybersecurity risk assessments and compliance audits, the evaluation and testing of hardware, firmware and software for possible impact on system security, and the investigation and resolution of security incidents such as intrusion, frauds, attacks or leaks Show less

  • Licenses & Certifications