Edem Gonyoe

Edem Gonyoe

Followers of Edem Gonyoe177 followers
location of Edem GonyoeHampton, Virginia, United States

Connect with Edem Gonyoe to Send Message

Connect

Connect with Edem Gonyoe to Send Message

Connect
  • Timeline

  • About me

    Cyber Security Specialist | Top Secret SCI Cleared | C|EH | Splunk Core Certified Power User | Sec+

  • Education

    • University of Maryland Global Campus

      2019 - 2022
      Bachelor of Science - BS Computer Networks and Cybersecurity 3.9
  • Experience

    • United States Air Force

      May 2017 - Jun 2023

      Responsible for multi-department IT operations, including all training, workforce deployment, force employment recommendations, and exercise planning and execution. Coordinated all major incidents: relaying incident information and ensuring high-priority coordination and communication as needed. Ensured all customer issues, incidents, and problems are first documented and then escalated, when necessary, within the ticketing system to reach a resolution within customer contractual timelines with a high level of satisfaction. Supported the development, accumulation, and delivery of required metrics/reports as needed. Sanitized user accounts and computer stockpiles to mitigate classified message incidents/spillages. Coordinated server sanitization to avert mission stoppage Show less Responsible for testing hardware, solving technical issues, maintaining equipment inventories, and handling documentation. Provided helpdesk support to end-users with hardware, software, and network issues. Implemented compliance with technical data, documents, instructions, standard operating procedures, and work standards. Enforced safety standards to prevent mishaps. Provided configuration support and troubleshooting functions for company owned mobile devices. Ensured mobile devices are operating and maintained within the Blackberry Enterprise environment Show less Installed, assembled, and configured computers, monitors, voice/video equipment, and network peripheral device. Updated lower-level IT subject matter experts (SMEs) with any new software or hardware requirements/updates. Coordinated and planned work requirements with other departments and base agencies. Inspected completed jobs to ensure quality and compliance with policies and regulations. Conducted regular maintenance and troubleshooting; administered operating systems, configured networks. Installed, operated, and maintained commercial off-the-shelf (COTS) equipment. Reviewed all building plans and proposals to ensure DoD communications requirements and standards are met Show less

      • Information Systems Technology Manager

        Dec 2021 - Jun 2023
      • Information Systems Technology Specialist

        Jun 2021 - Dec 2021
      • Information Systems Technology Specialist

        May 2017 - May 2021
    • Syntelligent Analytics Solutions

      May 2023 - now
      Information Technology Specialist

      Provide technical and administrative support to Intelligence, Surveillance and Reconnaissance end-users. Support in various forms, including in-person, telephone, and email interaction. Install system infrastructure in support of operation and maintenance functions. Document support activity in designed ticketing or tracking system.

    • CyberNowLabs

      Aug 2023 - now
      Cyber Security Analyst

      • Conducts Log Analysis on Splunk Enterprise Security and IBM QRadar SIEM solutions and provides recommendations to the technical teams via the Jira ticketing system.• Monitors and analyzes SIEM alerts through Splunk Enterprise Security and IBM QRadar; and identifies security anomalies for investigation and remediation.• Analyzes malicious incidents using SentinelOne and CrowdStrike EDR solutions, identifies indicators of compromise, and prepares incident reports on the impact and scope of these activities using IBM QRadar SOAR.• Conducts analysis activities to determine the legitimacy of files, domains, and emails using OSINT resources such as Virus Total, Cyber Chef, and Hybrid Analysis.• Analyzes phishing incidents using Proofpoint Email Security and documents incidents using IBM QRadar SOAR.• Familiar with various tools such as Tenable Nessus and analyzing PCAP files using Wireshark.• Familiar with the fundamentals of network and information security, network technology and tools, identity and access management, and risk management. Show less

  • Licenses & Certifications