Frederick Alonge

Frederick Alonge

North York, Ontario, Canada
347 followers 339 connections

About

Enthusiastic and success-driven IT professional with over 4 years of experience in IT…

Activity

Join now to see all activity

Experience

Education

  • Seneca Polytechnic Graphic

    Seneca College

    -

    Project Leadership, Systems Development, Quality Assurance, Risk Assessment, Project Control

  • -

    Authentication and Access Control, Security Architecture, Information Security, Ethical Hacking, IT Security Forensics, Mobile Application Security Assessment

  • -

Licenses & Certifications

Projects

  • Malicious Document Analysis

    -

    -Examined malicious documents to identify hidden indicators of compromise (IOCs) for threat intelligence.

    -Implemented both static & dynamic analyses to examine the documents’ nature and contents, and understand their behaviors and capabilities.

    -Consulted the MITRE ATT&CK framework to understand the strategies adopted by threat actor.

    -Highlighted effective defense strategies to defend against macro malware and mitigate potential attacks.

    -Other tools used include…

    -Examined malicious documents to identify hidden indicators of compromise (IOCs) for threat intelligence.

    -Implemented both static & dynamic analyses to examine the documents’ nature and contents, and understand their behaviors and capabilities.

    -Consulted the MITRE ATT&CK framework to understand the strategies adopted by threat actor.

    -Highlighted effective defense strategies to defend against macro malware and mitigate potential attacks.

    -Other tools used include Exiftool, Oletools, Virustotal, Joe Security Sandbox and CyberChef

  • Penetration Testing - Eternal Blue

    -

    -Deployed Kali Linux and hacked into a Windows machine, leveraging eternal blue vulnerability.

    -Utilized Metasploit to exploit flaw, escalate privileges and retrieve sensitive system files.

  • Phishing Email Analysis

    -

    -Checked the content of the email for anything uncharacteristic of the supposed sender.

    -Conducted email header analysis to identify indicators of compromise and potential threats.

    -Applied security controls to mitigate associated risks.

    -Tools used include PowerShell, HashCalc, Mozilla Thunderbird, VirusTotal and AbuseIPDB.

  • Security Operations Center (SOC) Lab

    -

    -Created a home lab setup on VMware, configuring Windows Server 2019 with client machines and administering AD user accounts and group policies.

    -Automated user account creation through PowerShell scripting, improving efficiency in user management.

    -Implemented Sophos EDR for threat detection and integrated Sumo Logic for log analysis.

    -Conducted vulnerability assessments with Nessus, applied necessary patches, and monitored for compliance.

    -Deployed advanced…

    -Created a home lab setup on VMware, configuring Windows Server 2019 with client machines and administering AD user accounts and group policies.

    -Automated user account creation through PowerShell scripting, improving efficiency in user management.

    -Implemented Sophos EDR for threat detection and integrated Sumo Logic for log analysis.

    -Conducted vulnerability assessments with Nessus, applied necessary patches, and monitored for compliance.

    -Deployed advanced security policies in Microsoft Defender to safeguard users from phishing, spam, and malware.

More activity by Frederick

View Frederick’s full profile

  • See who you know in common
  • Get introduced
  • Contact Frederick directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Frederick Alonge

Add new skills with these courses