Profiles search
William J.
Lead Information Security Analyst at Vista Equity Partners, CISSP
Georgetown, TX, United States
Details
Experience:
2022 : Present
Vista Equity Partners
Lead information Security Analyst
Very proud to be a new member of the team at Vista Equity Partners!
2020 :
Vista Equity Partners
Information Security Analyst
2019 : 2019
Farm Credit Bank of Texas
Security Analyst
• Investigate Security events using Splunk
• Use RSA Netwitness and Palo Alto to collect Packet captures
• Analyze PCAP’s using Wireshark to verify alert validity
• Conduct endpoint analysis using CrowdStrike and CyberReason
• Neutralize email-based threats using Proofpoint, TRAP, and TAP
• Use Threat Grid to inspect potential malware inside of a sandbox
• Scan for, and remove threats using McAfee EPO and CrowdStrike
• Organize daily workload among Level 1 & 2 Analysts
• Lead shift hand off in an active SOC environment
• Take ownership of handed off tasks and escalations from Level 1
2017 : 2019
Sirius Computer Solutions
Information Security Analyst 2
While at Multiplan my daily tasks included performing threat hunting using Qradar and Splunk. When
alerts were generated by the SIEM's or Secureworks, I was responsible for the investigation and validation of the attack. Once the attack was validated I would assign it to the appropriate team with my recommendations for remediation. I assisted with using Nexpose to perform vulnerability assessments. In addition to the duties above I also compiled and maintained a list of assets for use with Splunk on-boarding. During my employment at Multiplan I became a certified Splunk User.
2016 : 2017
MultiPlan
Information Security Analyst
Vista Equity Partners
Lead information Security Analyst
Very proud to be a new member of the team at Vista Equity Partners!
2020 :
Vista Equity Partners
Information Security Analyst
2019 : 2019
Farm Credit Bank of Texas
Security Analyst
• Investigate Security events using Splunk
• Use RSA Netwitness and Palo Alto to collect Packet captures
• Analyze PCAP’s using Wireshark to verify alert validity
• Conduct endpoint analysis using CrowdStrike and CyberReason
• Neutralize email-based threats using Proofpoint, TRAP, and TAP
• Use Threat Grid to inspect potential malware inside of a sandbox
• Scan for, and remove threats using McAfee EPO and CrowdStrike
• Organize daily workload among Level 1 & 2 Analysts
• Lead shift hand off in an active SOC environment
• Take ownership of handed off tasks and escalations from Level 1
2017 : 2019
Sirius Computer Solutions
Information Security Analyst 2
While at Multiplan my daily tasks included performing threat hunting using Qradar and Splunk. When
alerts were generated by the SIEM's or Secureworks, I was responsible for the investigation and validation of the attack. Once the attack was validated I would assign it to the appropriate team with my recommendations for remediation. I assisted with using Nexpose to perform vulnerability assessments. In addition to the duties above I also compiled and maintained a list of assets for use with Splunk on-boarding. During my employment at Multiplan I became a certified Splunk User.
2016 : 2017
MultiPlan
Information Security Analyst
Company:
Vista Equity Partners