Summary
Overview
Work History
Education
Skills
Certification
Timeline
Generic

Emmanuel ST JOUR

Cybersecurity Analyst
Montreal,

Summary

Cybersecurity professional with thorough understanding of threat landscapes and defensive measures. Recognized for ability to quickly identify security breaches and implement timely solutions. Highly collaborative, known for working effectively within teams and adapting to evolving security challenges, bringing strong analytical and problem-solving skills to table.

Overview

8
8
years of professional experience
1
1
Certification
3
3
Languages

Work History

Senior SOC Analyst

KPMG
11.2024 - Current
  • 24/7 Real-Time Monitoring: Proactively monitored and analyzed security events across 70+ MDR clients, using SIEM and related tools, ensuring continuous surveillance of critical infrastructure and sensitive assets.
  • Incident Triage and Classification: Performed initial triage and classification of incoming alerts by correlating data across multiple security layers, effectively filtering out false positives and escalating legitimate threats to Tier 3 and DFIR security teams with comprehensive context.
  • Threat Detection and Response: Successfully detected and responded to various cyber threats including malware infections, phishing campaigns, brute-force login attempts, and lateral movement attempts etc, all within established SLA thresholds.
  • Advanced Log Analysis: Conducted in-depth review and correlation of logs from diverse sources such as firewalls, antivirus/EDR platforms network appliances to identify security anomalies and determine root cause.
  • Runbook and SOP Adherence: Executed incident response procedures in alignment with established runbook and standard operating procedures (SOPs) for common incidents, ensuring prompt containment, eradication, and recovery for low to moderate complexity issues.
  • Security Tool Optimization: Collaborated with senior security engineers and use case developers to refine detection logic, adjust rule sensitivity, and calibrate alert thresholds, which led to a measurable decrease in alert fatigue and false-positive rates.

SOC Analyst Tier 1

Atkins Realis Formerly SNC Lavalin
07.2023 - 11.2024
  • 24/7 Real-Time Monitoring: Proactively monitored and analyzed security events across the organization using Elastic SIEM and related tools, ensuring continuous surveillance of critical infrastructure and sensitive assets.
  • Incident Triage and Classification: Performed initial triage and classification of incoming alerts by correlating data across multiple security layers, effectively filtering out false positives and escalating legitimate threats to Tier 2 and Tier 3 security teams with comprehensive context.
  • Threat Detection and Response: Successfully detected and responded to various cyber threats including malware infections, phishing campaigns, brute-force login attempts, and lateral movement attempts, all within established SLA thresholds.
  • Advanced Log Analysis: Conducted in-depth review and correlation of logs from diverse sources such as firewalls, antivirus/EDR platforms network appliances to identify security anomalies and determine root cause.
  • Runbook and SOP Adherence: Executed incident response procedures in alignment with established runbooks and standard operating procedures (SOPs) for common incidents, ensuring prompt containment, eradication, and recovery for low to moderate complexity issues.
  • Security Tool Optimization: Collaborated with senior security engineers and use case developers to refine detection logic, adjust rule sensitivity, and calibrate alert thresholds, which led to a measurable decrease in alert fatigue and false-positive rates.
  • Threat Intelligence Integration: Utilized open-source and commercial threat intelligence platforms to enrich incident context, correlate with known indicators of compromise (IOCs), and proactively identify emerging threats.
  • Cross-Functional Collaboration: Worked with Legal, HR, and Compliance teams for policies requirement and during high-impact incidents such as data breaches, insider threats, or forensic investigations. Assisted in evidence collection, supported regulatory response efforts, and ensured adherence to privacy, labor, and reporting requirements.

DLP Specialist

KPMG
06.2021 - 07.2023
  • DLP Solution Implementation: Lead the end-to-end implementation of Data Loss Prevention (DLP) technologies, including the design, configuration, and deployment of DLP agents and policies across endpoints. Ensure alignment with business requirements, compliance mandates, and security standards.
  • Policy Creation and Management: Develop, customize, and manage granular DLP policies and rule sets tailored to organizational needs, regulatory requirements. Continuously tune policies based on false positives and negatives and threat intelligence to improve accuracy and effectiveness.
  • Data Classification and Discovery: Collaborate with data owners, compliance teams, and business units to identify and classify sensitive data based on confidentiality levels and business impact.
  • DLP Alert Monitoring and Incident Response: Monitor real-time DLP events and alerts using centralized dashboards and SIEM integrations. Triage alerts to distinguish true incidents from benign activity. Conduct detailed investigations of potential data exfiltration events, generate incident reports, and escalate to the appropriate teams. Provide support during breach containment and root cause analysis.
  • Cross-Functional Collaboration: Worked with Legal, HR, and Compliance teams for policies requirements and during high-impact incidents such as data breaches, insider threats, or forensic investigations. Assisted in evidence collection, supported regulatory response efforts, and ensured adherence to privacy, labor, and reporting requirements.
  • User Awareness and Training: Design and deliver targeted training sessions and awareness campaigns to educate employees and contractors on the importance of data security. Demonstrate proper handling of sensitive data, use of DLP tools, and recognition of risky behavior. Collaborate with HR and legal departments to enforce security policies and track adherence.

Security Engineer

Axos Bank
04.2019 - 06.2021
  • Endpoint Protection Implementation: Responsible for Designing, deploying, and maintaining endpoint security solutions, including EDR and DLP.
  • Threat Detection and Response: Monitor and analyze endpoint alerts to identify, investigate, and respond to security incidents.
  • Policy Development: Created and enforced endpoint security policies to protect against malware, ransomware, and other threats.
  • DLP Management: Design, configure, and deploy DLP solutions across endpoints, networks, and cloud environments to safeguard sensitive data.
  • Implemented necessary controls and procedures to protect information system assets from intentional or inadvertent modification, disclosure or destruction.
  • Security Tools Management: To Manage and optimize endpoint security tools, including regular updates and troubleshooting, working with vendors.
  • Incident Response Support: Collaborated with the SOC team during investigations, providing endpoint-specific insights and forensic analysis.
  • Vulnerability Management: I was responsible to Identify and remediate endpoint vulnerabilities, ensuring compliance with industry standards.
  • Evaluated emerging technologies for their potential impact on organizational security posture, recommending appropriate solutions as needed.
  • User Training: Designed and implemented employee awareness campaigns, raising the level of security consciousness within the organization and reducing incidents related to human error.
  • Reporting: Responsible to Generate detailed reports on endpoint security performance, incidents, and compliance metrics for upper management.

Security Analyst

Inter MG
07.2017 - 12.2019
  • Provided insights on emerging security technologies, influencing strategic decisions and enhancing overall cybersecurity posture.
  • Managed security tools and systems, optimizing performance and ensuring timely updates to safeguard sensitive information.
  • Developed and maintained detailed documentation on security processes, facilitating knowledge transfer and ensuring consistency in procedures.
  • Participated in tabletop exercises simulating cyberattacks, leading to better preparedness for real-world incidents.
  • Performed risk analyses to identify appropriate security countermeasures.
  • Educated employees on cybersecurity awareness through training sessions, significantly reducing instances of human error-related breaches.

Education

Master's degree - Cybersecurity

UNIVERSIDAD AUTONOMA DE GUADALAJARA
Online
09-2026

Bachelor of Science - Information Technology Engineering

UNIVERSIDAD TECNOLOGICA DE AGUASCALIENTES
Aguascalientes
05.2001 -

Skills

For Endpoint Security: CrowdStrike, McAfee ePO, Carbon Black, SEP

undefined

Certification

CompTIA Security+

Timeline

Senior SOC Analyst

KPMG
11.2024 - Current

SOC Analyst Tier 1

Atkins Realis Formerly SNC Lavalin
07.2023 - 11.2024

DLP Specialist

KPMG
06.2021 - 07.2023

Security Engineer

Axos Bank
04.2019 - 06.2021

Security Analyst

Inter MG
07.2017 - 12.2019

Bachelor of Science - Information Technology Engineering

UNIVERSIDAD TECNOLOGICA DE AGUASCALIENTES
05.2001 -

Master's degree - Cybersecurity

UNIVERSIDAD AUTONOMA DE GUADALAJARA
Emmanuel ST JOURCybersecurity Analyst