Stephen Mensah


Location

New York City, NY
Accra, Ghana
Education
    Fordham University
    August 2022 - May 2024
    degree
    Master's
    major
    Computer and Information Systems Security
    University of Ghana
Work Experience
    Home Labs
    Cybersecurity Analyst
    November 2023 - present
    company
    Home Labs
    title
    Cybersecurity Analyst
    overview
    - Used Bash to examine user activity and file contents, manage, authenticate and authorize users and users groups - Developed Python functions and algorithms to automate various cybersecurity tasks, enhancing efficiency and responsiveness in the security operations workflow - Built search queries in Google Chronicle to analyze logs and investigate security events - Built robust detection rules in Splunk to proactively identify potential threats, trigger alerts, and conduct in-depth - Meticulously monitored network activities, using tcpdump to capture and analyze network packets, identifying and responding to potential malicious threats - Examined network logs and signatures with Suricata to detect, send alerts, and block suspicious network traffic
    Fordham University
    Graduate Assistant
    Bronx, NY, US
    February 2023 - present
    Polymorph Labs
    Product Security Manager
    Accra, GH
    September 2021 - August 2022
    University of Ghana Legon
    IT Support Officer
    Accra, GH
    August 2020 - August 2021
Skills
Agile MethodologyAlgorithmsAntivirus SoftwaresAuditing SkillsAutomationBash ShellCloud Computing SecurityCompTIA Security+Computer NetworksComputer SecurityCoordination SkillsEmployee OnboardingFinancial Data AnalysisFirewalls (Computer Science)Hard Work and DedicationIBM System IImmigrationImpact AnalysisIncident ManagementIncident ResponseInformation SciencesInformation TechnologyIntrusion Detection and PreventionIssue Tracking SystemsKnowledge of CampaignsLinuxLog FilesMetasploitMetricsNational Institute of Standards and TechnologyNessusNetwork SecurityNmapOpen Web Application SecurityOperational SystemsPhishingPolicy DevelopmentProject ManagementPython (Programming Language)Regulatory ComplianceResearch SkillsRisk AnalysisRoot Cause AnalysisSafety PrinciplesScrum MethodologySecurity AuditsSecurity AwarenessSecurity Information and Event ManagementSecurity ManagingSecurity PoliciesSelf MotivationSoftware SecuritySplunkSumo Logic (Software)TcpdumpTechnical SupportUser AuthenticationVulnerabilityVulnerability AnalysisWeb Application SecurityWireshark