Summary
Overview
Work History
Education
Skills
Certification
Timeline
Generic

Marvin Valerio

Costa Rica

Summary

Adept at driving technological advancements and optimizing AI and cybersecurity measures, I have leveraged my analytical and interpersonal skills at IBM and now Sumo Logic to significantly enhance security postures, also I help customer migrate smoothly from difficult environments to our vendor, always understanding the importance of being there for them. My expertise in AI and data analytics, combined with a proven track record of fostering client relationships and spearheading successful migrations, underscores my ability to deliver impactful results in dynamic environments.

Overview

8
8
years of professional experience
1
1
Certification

Work History

Senior Technical Account Engineer

Sumo Logic
06.2024 - Current
  • To be the trusted technical advisor for migrations from old vendors to our vendor.
  • Excellent skills in Data and AI. For example, I have guided our clients in adapting to our copilot, where the adoption of our clients with our technologies has advanced through AI with our Copilot that interacts with the LLMs.
  • It is here where clients, with guidance and advice, understand the power of AI.
  • Responsible for visiting clients, to provide adoption and migration strategies, and to establish that important connection with clients.Established strong working relationships with clients through exceptional communication skills, fostering trust and collaboration.
  • Wrote, reviewed and edited technical document in accordance with template requirements.
  • Developed positive working relationships with stakeholders to effectively coordinate work activities.
  • Achieved successful project outcomes by maintaining accurate documentation and meeting strict deadlines.

Senior Security Architect - SOC

IBM
07.2023 - Current

As a Senior Security Architect within our Security Operations Center (SOC), you will play a pivotal role in fortifying our organization's cybersecurity posture. Your responsibilities will encompass a wide range of tasks aimed at integrating cutting-edge technologies, optimizing the effectiveness of existing tools such as EDRs and SIEMs, and acting as a trusted advisor to executive leadership. Here's a detailed breakdown of your key responsibilities:

1. Technology Integration:

  • Identify, evaluate, and integrate emerging cybersecurity technologies to enhance our defensive capabilities.
  • Collaborate with cross-functional teams to implement innovative solutions that address evolving threat landscapes.
  • Ensure seamless integration of new tools into existing security infrastructure, minimizing disruption while maximizing effectiveness.

2. Enhancing Current Technologies:

  • Lead efforts to mature and fine-tune existing security technologies, including EDRs, SIEMs, and other SOC tools.
  • Develop and implement strategies to optimize the detection, analysis, and response capabilities of these tools.
  • Continuously monitor and fine-tune configurations to adapt to evolving threats and vulnerabilities.

3. Incident Response Leadership:

  • Serve as a subject matter expert in incident response, leading high-impact investigations and coordinating response efforts.
  • Develop and maintain incident response playbooks and workflows, ensuring rapid and effective response to security incidents.
  • Collaborate with incident response teams to refine and streamline processes for mitigation and recovery.

4. Advisory Role:

  • Act as a trusted advisor to executive leadership, translating complex technical concepts into actionable insights and business decisions.
  • Provide regular reports and briefings on the organization's cybersecurity posture, emerging threats, and risk mitigation strategies.
  • Influence strategic decisions by offering expert guidance on cybersecurity investments and priorities.

5. Security Architecture Design:

  • Collaborate with the architecture team to design and evolve the organization's security architecture.
  • Develop comprehensive security blueprints that encompass network, endpoint, and cloud security.
  • Ensure alignment with industry best practices and compliance requirements.

6. Training and Development:

  • Mentor and train junior security staff, fostering a culture of continuous learning and skill development.
  • Stay current with cybersecurity trends, certifications, and industry standards, sharing knowledge with the team.

7. Compliance and Risk Management:

  • Work closely with compliance teams to ensure adherence to regulatory requirements and industry standards.
  • Perform risk assessments, identify vulnerabilities, and recommend mitigation strategies.

Security Solutions Architect Lead

IBM
02.2023 - 06.2023

Works with Solutions Architect and other team members of project during design and development stage. Provide security solutions expertise to Project. Participate in project meetings, vendor meetings, etc. Participate in epic grooming, review security controls and provide approvals. If requested, work with App Owner and Enterprise Architects to finalize the data classification, review data elements list and review ( e.g., Pentest, DAST and SAST) Perform Threat Modleing - Complete a use-case for each security control. (Model each control) Develop security architecture diagram, sequence diagram based on Policies, Standards etc approved format with complete data flows, complete systems, complete networks and complete applications. Assist the project to submit the information needed. Answer each question in the Baseline requirement questionnaire with evidences. Attach relevant documents. Work with Security architect to address security risk. Work with Security Authority to get final approval. Include the security architecture diagram and security risks associated.

XFTM Security Optimization Consultant

IBM
01.2022 - 02.2023

The XFTM Security Optimization Engineer delivers in-depth, expert-level reporting, analysis and recommendations to optimize the full-spectrum of the customer’s XFTM platforms. By driving XFTM platform optimization, the Security Optimization Engineer advances the customer’s security posture by reducing threat detection, response, and recovery cycle times.

Responsibilities:

  • Produce detailed, technical reports that apply data analytics, subject matter expertise, and industry best practices to assess XFTM platform effectiveness and provide specific and actionable recommendations for improvement.
  • Present XFTM platform effectiveness reports to internal and external XFTM account stakeholders including, but not limited to, customers, Associate Partners, Delivery Project Executives, Security Service Account Managers, Blue Squad Leaders, Security Correlation Engineers, and Consultants.
  • Advise internal and external XFTM account stakeholders on the implementation of recommendations delivered through XFTM platform effectiveness reports.
  • Leverage XFTM tooling to collect, curate, and analyze the data required to produce XFTM platform effectiveness reports.
  • Advise accelerated SIEM tuning initiatives with technical analysis and recommendations for tuning priorities and actions.
  • Conduct XFTM SCE Quality Assurance reviews for new XFTM accounts.

Security Correlation Engineer

IBM
04.2020 - 01.2022
  • SIEM Security Correlation Engineer creates, modifies and tunes the system rules to adjust the specifications of alerts and incidents. SIEM Security Correlation Engineer will work with customer's designated personnel to provide continual correlation rule tuning, incident classification and prioritization recommendations, report query adjustments, and various other configuration activities in order to help customer fully optimize the SIEM system capabilities as well as the audit and logging features of the event and log sources.
  • As part of this role, the engineer will be in charge of creating rules for the data sources with which the client is feeding their SIEM , for example IPS, EDRs, IAM platform, etc. It will also be in charge of creating rules for Zero Day attacks, new vulnerabilities and new Ransomware campaigns and types of Malware.

Cyber Security Analyst

IBM
04.2017 - 04.2020
  • Analyze events, flows, alerts and advance analysis of Potential Security incidents.
    Correlate events and find tuning opportunities to have a healthy environment on customer’s console.
    Work with customers during crisis times to help mitigate the crisis and better client security posture to ensure crisis does not occur again.
    Make recommendations to clients about increasing security.
    Analyze traffic trends across customer base for large trends.
    Report Security Events and make customer escalations based on traffic analysis.
    Work with client to help remediate and answer questions regarding security events.
    Identify trends in traffic and make recommendations to clients based on trends.
    Make recommendation to clients to improve security posture.
    Develop and deliver customer presentation regarding security and enhancing their security posture.
    Work with Vendors and R&D teams to address new threats.
    Stay abreast of current and upcoming threats.
    Participate in regular meetings with teams to determine appropriate actions required to address new developing Security Threats.
    Work on complex customer maintenance windows and projects .
    Work with customers during crisis times to help mitigate the crisis and better client security posture to ensure crisis does not occur again.
    Make recommendations to clients about increasing security.
    Analyze traffic trends across customer base for large trends.
    Create Security Events and make customer escalations based on traffic analysis.
    Work with client to help remediate and answer questions regarding security events.
    Identify trends in traffic and make recommendations to clients based on trends.
    Participate in Client calls to tune security policy to client need.
    Make recommendation to clients to improve security posture.
    Support and Drive Vision.
    Mentor other analysts.

PTP Analyst

IBM
06.2016 - 04.2017
  • Quickly learned new skills and applied them to daily tasks, improving efficiency and productivity.
  • Carried out day-day-day duties accurately and efficiently.
  • Demonstrated respect, friendliness and willingness to help wherever needed.
  • Worked flexible hours; night, weekend, and holiday shifts.

Education

Associate of Science - Cybersecurity Specialty

LEAD University
San Jose
05.2019

Skills

  • Self-Motivated
  • Flexible and Adaptable
  • Multitasking Abilities
  • Analytical and Critical Thinking
  • Planning and Coordination
  • Interpersonal Communication
  • Organization and Time Management
  • Written Communication
  • Attention to Detail
  • Teamwork and Collaboration
  • Decision-Making
  • Dependable and Responsible
  • Active Listening
  • Excellent Communication
  • Problem-Solving

Certification

  • CISSP - Certified Information Systems Security Professional
  • IBM Certified Associate Administrator - IBM QRadar
  • IBM Cloud Security Engineer Specialty
  • IBM DevSecOps Specialty
  • IBM Certified Professional Developer - Cloud v5
  • Certificate of Cloud Security Knowledge (CCSK)
  • First Patent File (Cybersecurity invention for IBM)
  • CompTIA Security+ Ce Certification
  • CertiProf - Cyber Security Foundation Professional Certificate
  • Splunk Enterprise Certified Admin
  • Certified Ethical Hacker (CEH)
  • CompTIA Advanced Security Practitioner (CASP+) Certification


IBM Badges:

- IBM Cloud Kubernetes

- IBM DevSecOps Explorer - Security & Automation for DevOps

- IBM Cloud DevSecOps Essentials

- IBM DevSecOps Explorer

- Cloud Architect Concepts

- Security and Automation for DevOps

- Trustworthy AI and AI Ethics

- IBM Security Zero Trust Principle

- Cloud Core

- IBM Agile Explorer

- Think Like a Hacker

- IBM Security Services Specialist Level 1 and 2

- Enterprise Design Thinking Practitioner

  • Books:

- Practical Cloud Security Chris Dotson

- Threat Modeling Book

  • Courses:

- Threat Modeling Security

- Agile development and continuous delivery

- IBM Certified Advocate - Cloud

- AWS security engineering

Timeline

Senior Technical Account Engineer

Sumo Logic
06.2024 - Current

Senior Security Architect - SOC

IBM
07.2023 - Current

Security Solutions Architect Lead

IBM
02.2023 - 06.2023

XFTM Security Optimization Consultant

IBM
01.2022 - 02.2023

Security Correlation Engineer

IBM
04.2020 - 01.2022

Cyber Security Analyst

IBM
04.2017 - 04.2020

PTP Analyst

IBM
06.2016 - 04.2017

Associate of Science - Cybersecurity Specialty

LEAD University
Marvin Valerio