Emma Overton

Emma Overton

Senior Network Analyst

Followers of Emma Overton175 followers
location of Emma OvertonGreater Augusta Area

Connect with Emma Overton to Send Message

Connect

Connect with Emma Overton to Send Message

Connect
  • Timeline

  • About me

    Senior Network Analyst at US Army

  • Education

    • Elastic

      2023 -
      Elastic Threat Hunting with Kibana SIEM / Threat Analysis

      This course is designed for security analysts interested in using Kibana to hunt threats to their data and systems. You will start with an introduction to threat hunting, including how it’s different from other security analysis processes, and then move onto an introduction to the Elastic Stack and the powerful set of tools it offers. You will then learn essential Kibana features for analyzing security data, followed by an in-depth look at our network and host data sources, including… Show more This course is designed for security analysts interested in using Kibana to hunt threats to their data and systems. You will start with an introduction to threat hunting, including how it’s different from other security analysis processes, and then move onto an introduction to the Elastic Stack and the powerful set of tools it offers. You will then learn essential Kibana features for analyzing security data, followed by an in-depth look at our network and host data sources, including learning about ways to enrich them. You will then learn about threat hunting philosophy, workflow, models, techniques and how it can help improve the effectiveness of security operations center. All of this will then be followed by a guided hunt exercise to put your new skills to the test. Show less

    • Elastic

      2022 -
      Elastic EndGame Core

      Elastic Endgame gives you the power to keep your endpoints safe from attack, as well as unparalleled visibility into any threat in your environment. This instructor-led course teaches you how to install, configure, and manage an Elastic Endgame solution. You will learn endpoint detection and response workflows as well as how to hunt using the platform. The coursework culminates with a full-day capture-the-flag exercise in which you will discover and capture flags, simulating tactics from… Show more Elastic Endgame gives you the power to keep your endpoints safe from attack, as well as unparalleled visibility into any threat in your environment. This instructor-led course teaches you how to install, configure, and manage an Elastic Endgame solution. You will learn endpoint detection and response workflows as well as how to hunt using the platform. The coursework culminates with a full-day capture-the-flag exercise in which you will discover and capture flags, simulating tactics from potential malicious activity. After completing this course, you will be able to keep your infrastructure safe from attacks, and have full visibility into how the attacks were initiated so they can be prevented in the future. Show less

    • DCITA - DCI

      2019 - 2019
      Cyber/Computer Forensics and Counterterrorism

      Discovery and Counter Infiltration. This course introduces the concepts of threat agents, threats, IOCs, sensors and remediation techniques for use in DCI hunt activity.

    • US Army- Cyber Center of Excellence

      2019 - 2019
      Computer Science/Cyber Warfare

      This course provides students with the offensive and defensive cyber operations strategies and tactics to defend networks, data and designated systems through targeting activities and capabilities. Students will be able to assess network risk and perform an impact analysis using defensive and offensive cyber risk methodologies.

    • US Navy- Joint Cyber Analysis Course (JCAC)

      2018 - 2019
      Computer Science/Cyber Warfare

      This course provides students with the security, knowledge and skills necessary to support, defend, perform offensive attacks and target networks in various cyber security roles. Through research, instruction and lab work, students engage in performing target mapping, enumeration, systems security, network hardening, intrusion detection, digital forensics and malicious software analysis.

    • SANS Technology Institute

      -
      Cloud Security Essentials - SEC 488

      Skills Covered:-Identify the risks of the various services offered by cloud service providers (CSPs)-Select the appropriate security controls for a given cloud network security architecture-Evaluate CSPs based on their documentation, security controls, and audit reports-Leverage cloud logging capabilities to establish accountability for events that occur in the cloud environment-Identify the risks and risk control ownership based on the deployment models and service delivery… Show more Skills Covered:-Identify the risks of the various services offered by cloud service providers (CSPs)-Select the appropriate security controls for a given cloud network security architecture-Evaluate CSPs based on their documentation, security controls, and audit reports-Leverage cloud logging capabilities to establish accountability for events that occur in the cloud environment-Identify the risks and risk control ownership based on the deployment models and service delivery models of the various products offered by cloud service providers (CSPs).-Evaluate the trustworthiness of CSPs based on their security documentation, service features, third-party attestations, and position in the global cloud ecosystem.-Secure access to the consoles used to access the CSP environments.-Implement network security controls that are native to both AWS and Azure. Show less

    • SANS Technology Institute

      2022 -
      FOR509: Enterprise Cloud Forensics and Incident Response Cloud Forensics and Incident Response

      Activities and Societies: Cloud Infrastructure and IR data sources Microsoft 365 and Graph API Investigations Azure Incident Response AWS Incident Response Google Workspace Investigations GCP Incident Response This class is primarily a log analysis class to help examiners come up to speed quickly with cloud based investigation techniques. It's critical to know which logs are available in the cloud, whether they are turned on by default, and how to interpret the meaning of the events they contain.

    • University of Central Florida

      2023 - 2024
      Master of Science in Digital Forensics Computer and Information Sciences 3.5

      Computer Forensics, Emerging Cyber Threats, Mobile Forensics and Security, Software and Malware Vulnerability Analysis, Cyber Crime, Operating Systems and File System Forensics

    • University of Maryland Global Campus

      2019 - 2022
      Bachelor of Science - BS Computer Networks and Cybersecurity
    • The Johns Hopkins University

      2024 - 2026
      Master of Science - MS Intelligence Analysis
  • Experience

    • US Army

      Jan 2018 - now
      Senior Network Analyst
  • Licenses & Certifications