Jeff Heid
Details
Social Sciences
Washington State University
2007 : 2011
Itron, Inc.
Information Security Specialist
Detecting compromised accounts using real-time data from latest data breaches via ThreatStream and cross-referencing with internal data via SQL query.
Forensic investigation of network traffic and Kerberos tickets via Kibana to detect indicators of compromise.
Data loss prevention (DLP) monitoring on endpoints, cloud shares, and email.
Phishing defense and remediation.
Coordinating investigations with other internal cyberdefense teams.
2019 : 2020
Expedia Group
Insider Threat Engineer
User & Entity Behavior Analytics (UEBA) using Exabeam Advanced Analytics to review behavioral histograms.
Threat hunting to monitor and investigate anomalous user and entity behavior and abnormal access.
Threat triage and whitelisting.
Account-takeover (ATO) defense, proactive monitoring and recovery of potentially-compromised accounts.
Virus and malware tracking and remediation through Cylance and FireAMP.
2019 : 2019
Expedia Group
Internal Threat Analyst
Managed corporate user accounts and permissions across diverse global testing and production systems and networks, including identity management systems, Microsoft applications suite, and global distribution systems.
Trained new technical support team members in processes, procedures, and systems.
Recognized with 5 awards for excellence in quality control.
Collaborated with Account Security team to maintain detailed compliance reporting and documentation in accordance with Sarbanes-Oxley, General Data Protection Regulation (GDPR), and industry protocols.
Prioritized, assigned, tracked, and resolved user service requests while providing excellent customer service, including time-sensitive account and access deactivations for terminated users.
Supported automation rollouts and bulk migrations for new domains; conducted User Acceptance Testing (UAT) via SQL query, provided bug reporting, and established end-user production accounts.
2017 : 2019
Expedia Group
Access Management Analyst
Administration of digital permissions on the corporate network via Active Directory, including creating, provisioning, and managing individual and group user accounts.
Developed and maintained instructional manuals and standard operating procedures for supported applications and tools.
Ensured data security in a global production environment through broad spectrum of management applications, including Sailpoint IIQ, Microsoft Admin Center, Microsoft Exchange, and System Center.
2016 : 2017
Expedia, Inc.
Access Management Rep Tier II
Skills
Access Control, Access Control Management, Active Directory, Adobe Analytics, Amadeus, C#, Cyber Defense, Cybersecurity Incident Response, Cyber Threat Hunting (CTH), Cyber Threat Intelligence (CTI), Data Security, DLP, Eureka, Identity & Access Management (IAM), Identity and Access Management (IAM), IIQ, Information Security, Information Technology, Insider Threat Detection, IQ Navigator, IT Security Operations, JIRA, Microsoft Excel, Microsoft Exchange, Microsoft Office, Microsoft Operating Systems, Microsoft Word, Network Security, Office 365, Omniture, Powershell, Remote Desktop Protocol (RDP), Sabre, Security Information and Event Management (SIEM), Security Management, Security Operations, ServiceNow, ServiceNow Administration, Tableau, Testing, Threat & Vulnerability Management, Threat Analysis, Triage, Troubleshooting, User Acceptance Testing, Workday, Worldspan
About
Experienced Cybersecurity Engineer and Identity & Access Management Analyst seeking to expand acquired knowledge and skills in security-based position. Strong understanding of data and technology security principles and requirements. Consistent history of excellence in quality control and customer service. Demonstrated ability to adapt to, learn, and master new technologies, processes, and procedures in fast-paced environments. Skilled in Cyber Threat Hunting, Network Security Monitoring tools, Security Operations, Data Loss Prevention, Security Information and Event Management (SIEM), and Endpoint and Cloud-based Protection.