SlideShare una empresa de Scribd logo
1 de 2
Thiago Cunha da Silva
Address: São Paulo - Brazil
Mobile Phone Number: +55(11)9 6859 5340
E-mail: thiagocunhasilva@hotmail.com
LinkedIn: https://br.linkedin.com/in/thiagocunhasilva
Summary
An experienced, disciplined, and highly motivated Security Analyst, who has worked with two big
consultancy companies that do consultancy for multinationals companies inside and outside of
Brazil.
An excellent Analyst who can perform in a stressful environment or conditions, individually and
also in the group, experience in data analysis, firewall rules creation, analysis DDoS traffic,
management of proxies, email security gateways, anti-virus, anti-DDoS, vulnerabilities scan, and
firewalls.
Highly accomplished with a verifiable track record in fields such as reports and delivery them
correctly on the date set, always checking the details and making improvements.
Professional Experience
Universo Online – UOL 2015 to present
Position: Information Security Analyst
• Analyze all traffic that is going to the client, checking ports and flags to confirm if is or isn’t
DDoS attack and if it attacks them to mitigate.
• Check the alerts that were created by SIEM, to validate all information in servers of clients
and others appliances that was generated alerts.
• Doing weekly or monthly reports explaining and giving details about events that occurred
during the period.
• Analyze incidents generated by Web Application Firewall, creating a block to different
types of services, ips and specific connections of every customer.
• Registering and configuring customers in vulnerabilities scans and creating weekly or
monthly reports.
• Checking phishing tanks and phishing traps, making takedowns to websites and looking
after brands of clients.
• Doing Kick-offs with customers, explaining how the service works and ending all doubts
before being deployed.
Arcon Informatica Ltda 2013 to 2014
Position: Incidents Analyst
• Managing firewalls, creating and deleting rules of the equipment.
• Analyzing environments, creating reports with improvements and checking Security
incidents.
• Managing Security e-mail gateways, updating repositories, checking phishing and
marketing e-mails.
• Creating weekly and monthly reports describing incidents about equipment used by clients.
• Managing proxy and network acceleration.
Arcon Informatica Ltda 2012 to 2013
Position: Monitoring Analyst
• Monitoring firewalls, proxies, e-mail security gateways, anti-virus and vulnerabilities scan.
• Checking updates and security patches.
• Analyzing security incidents by SIEM (Accelops), checking them and redirect to level 2.
Education
01/2010 – 12/2013 - University Nove de Julho – UNINOVE
Course: Computer Science
Status: Completed
Skills
Language, tools, and methodology:
PeakFlow (Arbor)/ Fortigate (Fortinet)/ Proxy SG (BlueCoat)
Vulnerabilities Scan (Symantec)/ Iron Port (Cisco)
Mcafee (Antivirus)/ BigIP (F5)/ SPLUNK (SIEM)/ Accelops (SIEM)
Checkpoint Firewall, Windows Server 2012, Windows 7, 8, 8.1 e 10
Language
• English
Level: Professional Work Experience
• German
Level: Elementary proficiency
• Portuguese
Native Speaker
Courses
• Compay Name: NETTS.
Course: Preparation course CCNA
Duration: 80 hours
• Company Name: Binário
Course: Peakflow
Content: Peakflow course
Duration: 8 hours
• Compay Name: Arcon
Course: IPTABLES
Duration: 5 hours
Miscellaneous
Interpersonal skills, Positive, Hardworking, Dynamic, Cooking, Reading, Travelling.
Volunteering causes cares about: Animal Welfare, Children, Education, Environment, Health,
Human Rights, Poverty Alleviation, and Social Services.

Más contenido relacionado

La actualidad más candente

Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...Edureka!
 
VAPT Services by prime
VAPT Services by primeVAPT Services by prime
VAPT Services by primePrime Infoserv
 
Casestudy us army military, Mile2
Casestudy us army military,  Mile2Casestudy us army military,  Mile2
Casestudy us army military, Mile2Rafael Seg
 
It security forensic
It security forensicIt security forensic
It security forensicRupesh Verma
 
Certied Ethical Hacker
Certied Ethical HackerCertied Ethical Hacker
Certied Ethical HackerKnowledgehut
 
Internal host-reputation-webinar
Internal host-reputation-webinarInternal host-reputation-webinar
Internal host-reputation-webinarLancope, Inc.
 
Types of Malware (CEH v11)
Types of Malware (CEH v11)Types of Malware (CEH v11)
Types of Malware (CEH v11)EC-Council
 
Penetration Testing Services
Penetration Testing ServicesPenetration Testing Services
Penetration Testing ServicesCyber 51 LLC
 
What's new in​ CEHv11?
What's new in​  CEHv11?What's new in​  CEHv11?
What's new in​ CEHv11?EC-Council
 
Most Common Application Level Attacks
Most Common Application Level AttacksMost Common Application Level Attacks
Most Common Application Level AttacksEC-Council
 
How to develop an AppSec culture in your project
How to develop an AppSec culture in your project How to develop an AppSec culture in your project
How to develop an AppSec culture in your project 99X Technology
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Securitysudip pudasaini
 
Vulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration TestingVulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration TestingYvonne Marambanyika
 

La actualidad más candente (20)

Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
 
VAPT Services by prime
VAPT Services by primeVAPT Services by prime
VAPT Services by prime
 
Casestudy us army military, Mile2
Casestudy us army military,  Mile2Casestudy us army military,  Mile2
Casestudy us army military, Mile2
 
It security forensic
It security forensicIt security forensic
It security forensic
 
Certied Ethical Hacker
Certied Ethical HackerCertied Ethical Hacker
Certied Ethical Hacker
 
Internal host-reputation-webinar
Internal host-reputation-webinarInternal host-reputation-webinar
Internal host-reputation-webinar
 
ankit resume
ankit resumeankit resume
ankit resume
 
Darryl T. Smith Resume (1)
Darryl T. Smith Resume (1)Darryl T. Smith Resume (1)
Darryl T. Smith Resume (1)
 
Updated Resume
Updated ResumeUpdated Resume
Updated Resume
 
Types of Malware (CEH v11)
Types of Malware (CEH v11)Types of Malware (CEH v11)
Types of Malware (CEH v11)
 
Brook Boswell
Brook BoswellBrook Boswell
Brook Boswell
 
edCeh brochure
edCeh brochureedCeh brochure
edCeh brochure
 
Application Threat Modeling
Application Threat ModelingApplication Threat Modeling
Application Threat Modeling
 
Penetration Testing Services
Penetration Testing ServicesPenetration Testing Services
Penetration Testing Services
 
What's new in​ CEHv11?
What's new in​  CEHv11?What's new in​  CEHv11?
What's new in​ CEHv11?
 
Presentation
PresentationPresentation
Presentation
 
Most Common Application Level Attacks
Most Common Application Level AttacksMost Common Application Level Attacks
Most Common Application Level Attacks
 
How to develop an AppSec culture in your project
How to develop an AppSec culture in your project How to develop an AppSec culture in your project
How to develop an AppSec culture in your project
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
 
Vulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration TestingVulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration Testing
 

Similar a CV -Thiago Cunha da Silva - UK

Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on itWSO2
 
Albert G Info systems resume
Albert G Info systems resumeAlbert G Info systems resume
Albert G Info systems resumeAlbert Gonzales
 
Noel_De_Leon_Alvior_CV
Noel_De_Leon_Alvior_CVNoel_De_Leon_Alvior_CV
Noel_De_Leon_Alvior_CVNoel Alvior
 
Security is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White PaperSecurity is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White PaperMohd Anwar Jamal Faiz
 
Advanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real WorldAdvanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real WorldCisco Canada
 
Stanley-Atilon-Ong
Stanley-Atilon-OngStanley-Atilon-Ong
Stanley-Atilon-OngStanley Ong
 
Mark Fambrough Résumé
Mark Fambrough RésuméMark Fambrough Résumé
Mark Fambrough RésuméMark Fambrough
 
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONSCYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONSSprintzeal
 
Nachaat Mohamed resume
Nachaat Mohamed resumeNachaat Mohamed resume
Nachaat Mohamed resumeNachaat
 
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 sucesuminas
 

Similar a CV -Thiago Cunha da Silva - UK (20)

Core.co.enterprise.deck.06.16.10
Core.co.enterprise.deck.06.16.10Core.co.enterprise.deck.06.16.10
Core.co.enterprise.deck.06.16.10
 
MarcEmmanuelACV
MarcEmmanuelACVMarcEmmanuelACV
MarcEmmanuelACV
 
Sherry d bailey resume
Sherry d bailey resumeSherry d bailey resume
Sherry d bailey resume
 
Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on it
 
Albert G Info systems resume
Albert G Info systems resumeAlbert G Info systems resume
Albert G Info systems resume
 
Hayat resume 1
Hayat resume 1Hayat resume 1
Hayat resume 1
 
Noel_De_Leon_Alvior_CV
Noel_De_Leon_Alvior_CVNoel_De_Leon_Alvior_CV
Noel_De_Leon_Alvior_CV
 
Security is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White PaperSecurity is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White Paper
 
S bailey resume
S bailey resumeS bailey resume
S bailey resume
 
Daddy Thwane. CV
Daddy Thwane. CVDaddy Thwane. CV
Daddy Thwane. CV
 
Advanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real WorldAdvanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real World
 
Cv english 3
Cv english 3Cv english 3
Cv english 3
 
Stanley-Atilon-Ong
Stanley-Atilon-OngStanley-Atilon-Ong
Stanley-Atilon-Ong
 
Ampioco, Morris John Louise G
Ampioco, Morris John Louise GAmpioco, Morris John Louise G
Ampioco, Morris John Louise G
 
Mark Fambrough Résumé
Mark Fambrough RésuméMark Fambrough Résumé
Mark Fambrough Résumé
 
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONSCYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
 
Building an AppSec Culture
Building an AppSec Culture Building an AppSec Culture
Building an AppSec Culture
 
Resume
ResumeResume
Resume
 
Nachaat Mohamed resume
Nachaat Mohamed resumeNachaat Mohamed resume
Nachaat Mohamed resume
 
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
 

CV -Thiago Cunha da Silva - UK

  • 1. Thiago Cunha da Silva Address: São Paulo - Brazil Mobile Phone Number: +55(11)9 6859 5340 E-mail: thiagocunhasilva@hotmail.com LinkedIn: https://br.linkedin.com/in/thiagocunhasilva Summary An experienced, disciplined, and highly motivated Security Analyst, who has worked with two big consultancy companies that do consultancy for multinationals companies inside and outside of Brazil. An excellent Analyst who can perform in a stressful environment or conditions, individually and also in the group, experience in data analysis, firewall rules creation, analysis DDoS traffic, management of proxies, email security gateways, anti-virus, anti-DDoS, vulnerabilities scan, and firewalls. Highly accomplished with a verifiable track record in fields such as reports and delivery them correctly on the date set, always checking the details and making improvements. Professional Experience Universo Online – UOL 2015 to present Position: Information Security Analyst • Analyze all traffic that is going to the client, checking ports and flags to confirm if is or isn’t DDoS attack and if it attacks them to mitigate. • Check the alerts that were created by SIEM, to validate all information in servers of clients and others appliances that was generated alerts. • Doing weekly or monthly reports explaining and giving details about events that occurred during the period. • Analyze incidents generated by Web Application Firewall, creating a block to different types of services, ips and specific connections of every customer. • Registering and configuring customers in vulnerabilities scans and creating weekly or monthly reports. • Checking phishing tanks and phishing traps, making takedowns to websites and looking after brands of clients. • Doing Kick-offs with customers, explaining how the service works and ending all doubts before being deployed. Arcon Informatica Ltda 2013 to 2014 Position: Incidents Analyst • Managing firewalls, creating and deleting rules of the equipment. • Analyzing environments, creating reports with improvements and checking Security incidents. • Managing Security e-mail gateways, updating repositories, checking phishing and marketing e-mails. • Creating weekly and monthly reports describing incidents about equipment used by clients. • Managing proxy and network acceleration.
  • 2. Arcon Informatica Ltda 2012 to 2013 Position: Monitoring Analyst • Monitoring firewalls, proxies, e-mail security gateways, anti-virus and vulnerabilities scan. • Checking updates and security patches. • Analyzing security incidents by SIEM (Accelops), checking them and redirect to level 2. Education 01/2010 – 12/2013 - University Nove de Julho – UNINOVE Course: Computer Science Status: Completed Skills Language, tools, and methodology: PeakFlow (Arbor)/ Fortigate (Fortinet)/ Proxy SG (BlueCoat) Vulnerabilities Scan (Symantec)/ Iron Port (Cisco) Mcafee (Antivirus)/ BigIP (F5)/ SPLUNK (SIEM)/ Accelops (SIEM) Checkpoint Firewall, Windows Server 2012, Windows 7, 8, 8.1 e 10 Language • English Level: Professional Work Experience • German Level: Elementary proficiency • Portuguese Native Speaker Courses • Compay Name: NETTS. Course: Preparation course CCNA Duration: 80 hours • Company Name: Binário Course: Peakflow Content: Peakflow course Duration: 8 hours • Compay Name: Arcon Course: IPTABLES Duration: 5 hours Miscellaneous Interpersonal skills, Positive, Hardworking, Dynamic, Cooking, Reading, Travelling. Volunteering causes cares about: Animal Welfare, Children, Education, Environment, Health, Human Rights, Poverty Alleviation, and Social Services.