Summary
Overview
Work history
Education
Skills
Certification
References
Tools
Timeline
Generic

Pelummy Martin

London, UK,United Kingdom

Summary

A highly dedicated and proactive Security Operations Centre (SOC) Analyst with years of progressive experience in cybersecurity operations, specializing in incident detection, analysis, and response. My expertise spans comprehensive log analysis, advanced security event correlation using leading SIEM platforms (Azure Sentinel, Splunk), and vulnerability management solutions.

I excel at leveraging cutting-edge security tooling and threat intelligence to identify and neutralize evolving cyber threats. As a committed team player, I bring strong leadership qualities and exceptional communication skills, consistently fostering positive cross-functional relationships. My passion lies in fortifying organizational security posture and contributing to a dynamic team focused on defending against modern cyber challenges

Overview

6
6
years of professional experience
4
4
years of post-secondary education
1
1
Certification

Work history

SOC ANALYST

LENDLEASE
06.2022 - 07.2024
  • Manage user access control, identity and access management (IAM) systems monitor, firewall network Intrusion, availability, and SIEM platforms to spot possible threats, weakness and signs of penetration.
  • Responsible for investigating events, analysing attack techniques, looking into cutting edges protection techniques and equipment, creating security guidelines, and recording procedures for the Security Operation Centre (SOC)
  • Help maintain and administer SecOps tooling (SIEM, EDR, SOAR etc)
  • Provide vulnerability insights, conduct cybersecurity risk assessments, and work with partners, suppliers, and internal departments to quickly find, evaluate, and fix security vulnerabilities.
  • Identify, monitor, analyze, and confront operational risks aimed at technology, such as but not limited to technology security (cybersecurity, cloud security, patch management, data protection/privacy, and identity access management).
  • Key achievement: Employer of the month award in Jun 2023.

Security Analyst

Sainsburys
06.2019 - 06.2022
  • Experience in malware analysis, threat intelligence
  • Detect and respond to malicious behaviour on cloud systems, SaaS, workstations, servers, and networks.
  • Run Qualys scan, create and implement remediation plans and run secondary Qualys reports confirming remediation. Provide threat intelligence of upcoming malware and attack threats.
  • Reviewing and responding to escalated security events
  • Proactively hunting threats within the environment
  • Maintaining knowledge of adversary tactics, techniques, and procedures (TTP)
  • Providing timely and relevant updates to appropriate stakeholders and decision-makers
  • Extensive use of Qualys scan to create and implement remediation plans.
  • Correlating data from multiple data sources to create a more accurate picture of cyber threats and vulnerabilities
  • Use of EDR (Carbon Black) & SIEM tools (Splunk)
  • Partake in on-call work closely with the SOC team to enhance incident response playbooks.
  • Monitor Symantec DLP alerts.
  • Regularly monitor various information security media and threat intelligence feeds to stay up to date on current network threats, attack methodologies and trends.
  • Manage phishing campaign alerts (Investigate and triage)

Cyber Security Analyst

Paddy Power
02.2018 - 06.2019
  • Maintaining a safe working environment
  • Incident management with SIEM AND EDR tools.
  • Monitoring, reacting to, investigating and responding to all real or perceived information security and cyber related events, issues, incidents, threat and attacks within desired time scales.
  • Determining the severity of alerts and security vulnerabilities, assessing potential impacts, recommending next steps, following through with risk treatment and mitigation.
  • Collaborate with IT teams to prioritize and remediate identified vulnerabilities.
  • Stay abreast of the latest security vulnerabilities, exploits, and mitigation strategies.
  • Document and report incident details, root causes, and remediation steps.
  • Work with IT teams to ensure compliance with security policies and standards.
  • Stay informed about emerging security threats and educate stakeholders on best practices.
  • Collaborate with cross-functional teams to implement and maintain security measures.
  • Vulnerability Management (Qualys)

Education

Bachelor of Science - Computing

Ladoke Akintola University
London
02.2000 - 02.2004

Skills

  • Endpoint protection platforms
  • Phishing identification
  • SIEM tools proficiency
  • Web application security
  • Cloud security fundamentals & principles
  • Threat intelligence
  • Ethical hacking knowledge
  • Malware analysis
  • Network protocol understanding
  • Log interpretation and analysis

Certification

  • Comptia Security+
  • Microsoft SC200

References

References available upon request.

Tools

  • SIEM: Azure Sentinel | Splunk
  • EDR: Microsoft Defender | Carbon Black
  • Cloud Platforms: AWS | Azure | GCP
  • DLP: McAfee DLP | Microsoft Purview
  • Vulnerability Management: Qualys | Nessus
  • Proxy: Zscaler | Cisco Umbrella
  • Sandboxing: Any.run | Secure Malware Analytics (formerly Threat Grid)
  • Ticketing & Workflow: ServiceNow | Jira |
  • OSINT & Threat Intelligence: VirusTotal | DomainTools | IP Analysis | Image Analysis
  • IAM: Azure AD PIM
  • Anti-Virus: Norton | Sophos

Timeline

SOC ANALYST

LENDLEASE
06.2022 - 07.2024

Security Analyst

Sainsburys
06.2019 - 06.2022

Cyber Security Analyst

Paddy Power
02.2018 - 06.2019

Bachelor of Science - Computing

Ladoke Akintola University
02.2000 - 02.2004
Pelummy Martin