Jakob Christensen
Email: jpchristensen27@gmail.com
Summary
Results-oriented cybersecurity professional with a proven ability to enhance organizational security postures through strategic planning, advanced threat detection, and risk mitigation. Extensive experience leveraging industry-leading SIEM, EDR, and SOAR tools to identify and remediate network, application, and endpoint vulnerabilities. Proficient in scripting languages including Python, PowerShell, and Bash to automate security processes and streamline incident response workflows. Committed to driving operational efficiency, continuous improvement, and staying ahead of emerging cyber threats in dynamic environments.
Experience
Cybersecurity Analyst, Tier 2 - Deepwatch (2024 - Present)
- Support incident handling processes across multiple platforms and security technologies including Windows, Linux and macOS
- Conduct research and indepth analysis using SIEM and SOAR technologies, Deepwatch proprietary tooling, and OSINT to validate suspicious events and identify TTPs and IOCs.
- Identified gaps in customer environments, data ingestion, or configuration errors, employing thoughtful planning to enhance telemetry quality.
- Collaborated with customers and leadership to surface and resolve concerns.
- Provided training and coaching to junior security analysts, promoting continuous learning and knowledge sharing.
- Leveraged expertise in Alert Triage, SOC Operations, and Defense in Depth (DiD) to contribute to collaborative projects for customer success.
Cybersecurity Analyst, Tier 2 - ReliaQuest (2022 - 2024)
- Created an efficient escalation template adopted across the SOC, enhancing response time to true positive events through consistent use.
- Served as a primary escalation point for Business Email Compromise (BEC) alerts, conducting detailed analysis to assess fidelity, implement effective remediation strategies, and collaborate with detection teams to enhance rule accuracy, reduce false positives, and address emerging attack techniques.
- Conducted log analysis, phishing email analysis, and malware analysis, utilizing creativity and analytical thinking to uncover insights.
- Applied knowledge of SOC procedures, Cyber Kill Chain, and Mitre ATT&CK framework to mitigate threats, running playbooks and providing thoughtful incident reports.
- Provided recommendations to customers on what actions they needed to take in response to threats/alerts.
- Offered actionable recommendations to customers in response to threats and alerts, demonstrating consistent attention to detail and comprehensive analysis.
- Analyzed and provided technical overviews of phishing emails reported by end users, collaborating with crossfunctional teams to refine detection rules for multiple EDRs and SIEMs, reducing false positives.
- Produce highquality written and verbal communications, delivering recommendations and findings to customer management in a timely and creative manner.
- Extensively utilized Splunk, Azure Sentinel, LogRhythm, QRadar, Google Chronicle, Sumo Logic, Exabeam, SentinelOne, CrowdStrike, Microsoft Defender, and Carbon Black for effective threat detection and response.
IT Help Desk - Houston Museum of Natural Science (2021 - 2022)
- Delivered comprehensive troubleshooting, installation, and maintenance support for diverse IT systems, demonstrating proficiency in resolving technologyrelated issues and enhancing overall IT functionality.
- Executed website updates to integrate current information on special exhibits and events, leveraging content management systems to improve online engagement and user experience.
- Managed network infrastructure by installing and removing network cabling, and configuring firewalls and switches, showcasing expertise in network setup and security protocols.
Education
Bachelor of Science in Computer Science - Northeastern State University
Cyebrsecurity Bootcamp - Rice University
Certifications
CompTia Security+ (2024 - 2027)
Splunk Core Ceritfied Power User (2023 - 2026)