Victor is a proficient Cybersecurity Engineer with extensive knowledge of hardware, software, networking, and security frameworks and technologies. With a SysAdmin background, he has worked as a technical lead for a Microsoft Partner on Security and Compliance, Mail Flow, Azure, and Exchange Online/Hybrid. Victor is also skilled in customer engagements, project continuity/management, and supervising dev teams.
Worked on the setup of a mini forensics lab with an automated malware analysis lab (Cuckoo Sandbox).
Handled ISO 270001 and ISO 20000 reviews and re-certifications, as well as SOC and SIEM reviews.
Managed behavioral and threat analytics, White Box penetration tests, and dynamic/stress testing, as well as the addition of more layers to the Defense-in-Depth architecture.
Worked for a startup cybersecurity company that provides threat intelligence reports/vulnerability assessments, penetration testing, and bug bounty hunting.
Performed penetration tests on the client’s infrastructure and security awareness presentations and worked on SIEM design and implementation and server and firewall hardening.
Handled vulnerability scanning and threat assessment reports, report writing for Blue and Red Team engagements, social engineering, and information harvesting.
Mentored support engineers by developing their technical acumen, case maintenance, and customer interaction skills.
Created procedures to provide step-by-step documentation of troubleshooting workflow infrastructure.
Provided modern support to Microsoft customers in Exchange Online/Hybrid configuration, Identity and Access Management, Security and Compliance, Advanced Threat Protection, Migrations, Azure VM/Resource provisioning, and Windows Server.
VECTR is a tool that facilitates tracking of red and blue team testing activities to measure detection and prevention capabilities across different attack scenarios. It provides the ability to create assessment groups consisting of a collection of Campaigns and supporting Test Cases to simulate adversary threats. Campaigns can be broad and span activity across the kill chain, from initial compromise to privilege escalation and lateral movement and so on, or can be narrow in scope to focus on specific detection layers, tools, and infrastructure.
Automated Malware Sandbox (Cuckoo Malware Analysis) is a platform that performs dynamic/automated malware analysis. The sandbox is made up of one management console and two sandbox environments (Windows/Linux) for malware analysis.
Worked on SIEM (Security Information and Event Management) with Azure Sentinel, Exabeam, and ArcSight. SIEM tools are an important part of the data security ecosystem, aggregating data from multiple systems and analyzing the data to catch abnormal behavior or potential cyberattacks.
Education
Master's Degree, Cybersecurity
Robert Gordon University - Aberdeen, UK
2022 - 2023 (1 year)
Microsoft Certified: Security, Compliance, and Identity Fundamentals
International Cyber Security Institute (ICSI) - UK
2020 - 2021 (1 year)
Palo Alto Networks Academy Cybersecurity Foundation; Technical Support Fundamentals; Usable Security
Coursera
2020 - 2020
CompTIA Security+Certified Security Professional; Networking Foundations: Networking Basics; Office 365: Implement Identities for SSO; Windows Server 2016: Active Directory Federation Services; Windows Server 2016: Installation and Configuration