Summary
Overview
Work History
Education
Timeline
Generic

Faris Abu-Sneneh

Montreal,Quebec

Summary

Skilled Cybersecurity Analyst with expertise in network analysis, incident response, and system monitoring. Strong background in mathematics, statistics, and military training, with Security+ certification and advanced cybersecurity course completions.

Overview

6
6
years of professional experience

Work History

Cybersecurity Analyst

Self-employed
04.2023 - Current
  • Utilized Sysinternals and Sysmon in lab environments to monitor system activities, identify malicious processes, and generate Windows event logs for analysis.
  • Analyzed system security with Osquery, creating SQL-based queries to gather endpoint data and detect suspicious behavior across Windows and Linux environments.
  • Deployed Wazuh for endpoint monitoring and threat detection, configuring custom rules for log correlation and alert generation.
  • Implemented and managed Snort as an intrusion detection system (IDS), analyzing network traffic for signs of attacks and creating custom signatures to detect suspicious behavior.
  • Used Zeek and Network Miner for deep network traffic analysis, focusing on detecting abnormal patterns and identifying potential malicious activity within project setups.
  • Conducted packet analysis using Wireshark and TShark in network forensics projects, identifying anomalous network traffic and extracting evidence of potential attacks.
  • Investigated suspicious files and malware behavior with YARA rules, applying signature-based detection to identify malware in project environments.
  • Utilized Brim for enhanced network traffic analysis, examining logs from Zeek to detect intrusion attempts and other malicious activities.
  • Employed the MITRE ATT&CK framework during simulated security incidents to map adversary tactics, techniques, and procedures (TTPs), improving response strategies.
  • Integrated threat intelligence platforms such as OpenCTI and MISP in projects to enrich incident data and correlate indicators of compromise (IOCs).
  • Configured and used the ELK stack (Elasticsearch, Logstash, Kibana) for log aggregation and real-time monitoring, visualizing security data and creating actionable insights.
  • Investigated digital forensics cases using Autopsy, Redline, and KAPE, focusing on identifying artifacts of compromise on Windows and Linux systems.
  • Applied Volatility and Velociraptor for memory forensics projects, detecting malware and analyzing volatile data to uncover rootkits and malicious processes.
  • Used The Hive Project for incident response management, organizing security alerts, analyzing indicators, and documenting the steps taken during simulated security incidents.
  • Conducted malware analysis in labs, applying fundamental techniques such as static and dynamic analysis to understand malicious code behavior and extract IOCs.
  • Performed phishing analysis by analyzing email headers, attachments, and URLs to detect phishing attempts and identify social engineering attack vectors.
  • Managed and audited Windows Active Directory environments in projects, ensuring proper permissions, group policies, and identifying privilege escalation attempts.
  • Conducted log and endpoint analysis with Splunk, creating dashboards to monitor security events and respond to suspicious activities across networked environments.
  • Engaged in Linux and Windows forensics projects, collecting and analyzing artifacts from compromised systems to reconstruct attack timelines and detect data breaches.

Artillery and Drone Operator

Canadian Armed Forces
01.2020 - 01.2023
  • Ensured Secure Communications: Implemented encryption and secure protocols for drone data transmission
  • Monitored Cyber Threats: Analyzed and addressed cybersecurity threats to drone systems and networks
  • Managed Access Controls: Controlled user permissions to secure drone operations and data access
  • Maintained System Integrity: Applied updates and patches to protect drone hardware and software from vulnerabilities.

Quality Assurance Analyst

Keyword Studios
05.2018 - 12.2019
  • Execute Test Cases: Perform tests to verify software functionality and identify defects
  • Document Bugs: Record and track issues found during testing for resolution
  • Develop Automation Scripts: Create and maintain automated tests to enhance efficiency
  • Collaborate with Teams: Work with developers and stakeholders to ensure software meets requirements
  • Review Requirements: Analyze requirements and design test plans to ensure comprehensive coverage.

Education

Bachelor's degree - Mathematics and Statistics

Concordia University
Montreal, Quebec

Security+ -

CompTIA
03.2024

Timeline

Cybersecurity Analyst

Self-employed
04.2023 - Current

Artillery and Drone Operator

Canadian Armed Forces
01.2020 - 01.2023

Quality Assurance Analyst

Keyword Studios
05.2018 - 12.2019

Bachelor's degree - Mathematics and Statistics

Concordia University

Security+ -

CompTIA
Faris Abu-Sneneh