
Emma Overton
Senior Network Analyst

Connect with Emma Overton to Send Message
Connect
Connect with Emma Overton to Send Message
ConnectTimeline
About me
Senior Network Analyst at US Army
Education

Elastic
2023 -Elastic Threat Hunting with Kibana SIEM / Threat AnalysisThis course is designed for security analysts interested in using Kibana to hunt threats to their data and systems. You will start with an introduction to threat hunting, including how it’s different from other security analysis processes, and then move onto an introduction to the Elastic Stack and the powerful set of tools it offers. You will then learn essential Kibana features for analyzing security data, followed by an in-depth look at our network and host data sources, including… Show more This course is designed for security analysts interested in using Kibana to hunt threats to their data and systems. You will start with an introduction to threat hunting, including how it’s different from other security analysis processes, and then move onto an introduction to the Elastic Stack and the powerful set of tools it offers. You will then learn essential Kibana features for analyzing security data, followed by an in-depth look at our network and host data sources, including learning about ways to enrich them. You will then learn about threat hunting philosophy, workflow, models, techniques and how it can help improve the effectiveness of security operations center. All of this will then be followed by a guided hunt exercise to put your new skills to the test. Show less

Elastic
2022 -Elastic EndGame CoreElastic Endgame gives you the power to keep your endpoints safe from attack, as well as unparalleled visibility into any threat in your environment. This instructor-led course teaches you how to install, configure, and manage an Elastic Endgame solution. You will learn endpoint detection and response workflows as well as how to hunt using the platform. The coursework culminates with a full-day capture-the-flag exercise in which you will discover and capture flags, simulating tactics from… Show more Elastic Endgame gives you the power to keep your endpoints safe from attack, as well as unparalleled visibility into any threat in your environment. This instructor-led course teaches you how to install, configure, and manage an Elastic Endgame solution. You will learn endpoint detection and response workflows as well as how to hunt using the platform. The coursework culminates with a full-day capture-the-flag exercise in which you will discover and capture flags, simulating tactics from potential malicious activity. After completing this course, you will be able to keep your infrastructure safe from attacks, and have full visibility into how the attacks were initiated so they can be prevented in the future. Show less

DCITA - DCI
2019 - 2019Cyber/Computer Forensics and CounterterrorismDiscovery and Counter Infiltration. This course introduces the concepts of threat agents, threats, IOCs, sensors and remediation techniques for use in DCI hunt activity.

US Army- Cyber Center of Excellence
2019 - 2019Computer Science/Cyber WarfareThis course provides students with the offensive and defensive cyber operations strategies and tactics to defend networks, data and designated systems through targeting activities and capabilities. Students will be able to assess network risk and perform an impact analysis using defensive and offensive cyber risk methodologies.

US Navy- Joint Cyber Analysis Course (JCAC)
2018 - 2019Computer Science/Cyber WarfareThis course provides students with the security, knowledge and skills necessary to support, defend, perform offensive attacks and target networks in various cyber security roles. Through research, instruction and lab work, students engage in performing target mapping, enumeration, systems security, network hardening, intrusion detection, digital forensics and malicious software analysis.

SANS Technology Institute
-Cloud Security Essentials - SEC 488Skills Covered:-Identify the risks of the various services offered by cloud service providers (CSPs)-Select the appropriate security controls for a given cloud network security architecture-Evaluate CSPs based on their documentation, security controls, and audit reports-Leverage cloud logging capabilities to establish accountability for events that occur in the cloud environment-Identify the risks and risk control ownership based on the deployment models and service delivery… Show more Skills Covered:-Identify the risks of the various services offered by cloud service providers (CSPs)-Select the appropriate security controls for a given cloud network security architecture-Evaluate CSPs based on their documentation, security controls, and audit reports-Leverage cloud logging capabilities to establish accountability for events that occur in the cloud environment-Identify the risks and risk control ownership based on the deployment models and service delivery models of the various products offered by cloud service providers (CSPs).-Evaluate the trustworthiness of CSPs based on their security documentation, service features, third-party attestations, and position in the global cloud ecosystem.-Secure access to the consoles used to access the CSP environments.-Implement network security controls that are native to both AWS and Azure. Show less

SANS Technology Institute
2022 -FOR509: Enterprise Cloud Forensics and Incident Response Cloud Forensics and Incident ResponseActivities and Societies: Cloud Infrastructure and IR data sources Microsoft 365 and Graph API Investigations Azure Incident Response AWS Incident Response Google Workspace Investigations GCP Incident Response This class is primarily a log analysis class to help examiners come up to speed quickly with cloud based investigation techniques. It's critical to know which logs are available in the cloud, whether they are turned on by default, and how to interpret the meaning of the events they contain.

University of Central Florida
2023 - 2024Master of Science in Digital Forensics Computer and Information Sciences 3.5Computer Forensics, Emerging Cyber Threats, Mobile Forensics and Security, Software and Malware Vulnerability Analysis, Cyber Crime, Operating Systems and File System Forensics

University of Maryland Global Campus
2019 - 2022Bachelor of Science - BS Computer Networks and Cybersecurity
The Johns Hopkins University
2024 - 2026Master of Science - MS Intelligence Analysis
Experience

US Army
Jan 2018 - nowSenior Network Analyst
Licenses & Certifications
- View certificate

Foundations of Operationalizing MITRE ATT&CK
AttackIQOct 2022 - View certificate

Azure Data Fundamentals
MicrosoftJul 2022 - View certificate

CompTIA Cloud Essentials+ Certification
CompTIAMay 2021 - View certificate

Azure Fundamentals
MicrosoftJul 2022 - View certificate

Academy Accreditation - Databricks Lakehouse Fundamentals
DatabricksJul 2022 - View certificate

CompTIA Security+
CompTIAFeb 2020 - View certificate

Splunk Core Certified User
SplunkNov 2019 - View certificate

Splunk Core Certified Power User
SplunkDec 2019
Recommendations

Muayad aljaser, pmp®, prince2®, rmp®
Project Manager | National Housing CompanyRiyadh, Saudi Arabia
Caroline kabel-kotler, do, faap
Owner/Director at LINKS Pediatric and Adolescent Behavioral HealthCastle Rock, Colorado, United States
Hanna fadhila
Tender Manager at Sulmara | Survey & Tender SpecialistBandung, West Java, Indonesia
Arul busyro
Head of Division HR & LegalJakarta, Jakarta, Indonesia
Angela clayton, cpa icd.d
Interim President & CEO at Infrastructure OntarioToronto, Ontario, Canada
Brianna gray
Flight Attendant at EmiratesDubai, Dubai, United Arab Emirates
Anirudh mehta
Experienced Banker Excelling in Portfolio Management and Nurturing New-Client Growth.Delhi, India
Rose moore,ccs-p,cmco,cmc
Certified Coder-Auditor/ConsultantColonial Heights, Virginia, United States
Jim penrose
Turf ManagerGravenhurst, Ontario, Canada
Rebecca flaim
Project Manager at EquifaxCumming, Georgia, United States
Mayank bhardwaj
Data Analyst | Vichara | Ex-MercerDelhi, India
Srikanth tekumalla
HRBP at Swastik Foods P ltd., Corporate HR FMCG/ RetailHyderabad, Telangana, India
Hakan göktuğ torun
Electrical-Electronics Engineering Student at TOBB ETUÇankaya, Ankara, Türkiye
Aline tay
Finance ProfessionalSingapore, Singapore
Thierno barry
Graduate with Bachelor of Science in Computer Info SystemsBronx, New York, United States
Laura howells-barby
Senior Product ManagerLondon, England, United Kingdom
Nouamane ait oufqir
IT | Developer | TraderMarrakesh, Marrakesh-Safi, Morocco
Robert moses ceng
Principal Engineer | Defence & AerospaceGreater Swansea Area
Christian tønder
Facility Manager at Topsoe SOEC Power-to-X, Herning | Energimanagement | Veteran | VVS-installatørIkast, Central Denmark Region, Denmark
Jordan lind
Customer Success | Education Specialist | Software DeveloperLongmont, Colorado, United States
...