Angelo F Signature

Angelo Frammartino

Security Analyst | Access Control & Data Loss Prevention | Threat Monitoring & Response

With over three years of experience in incident response, vulnerability management, and SIEM-based threat analysis from my work at Apple Growth Partners, I helped raise the firm’s security compliance from 50 percent to 85 percent through malware remediation, alert investigation, and root cause analysis.

In my current role as a Security Analyst at The Timken Company, I focus on information security operations including threat detection, access control, data loss prevention, and security monitoring across the enterprise environment.

Outside of work, I continue building practical security tools, including The EntropyX Platform, my enterprise compression suite, identity governance platform and home network security application.

View My Work

About Me

Results-driven IT Analyst with over 3+ years of experience in incident response, vulnerability management, and enterprise security operations across multi-state environments. Currently serving as an IT Analyst at The Timken Company, focused on information security and security operations. Proven success in improving organizational security posture, having increased overall compliance and defense maturity from 50% to 85% at Apple Growth Partners. Recognized for efficient and proactive risk analysis and SIEM alert response, with a strong record of strengthening security frameworks and reducing risk across hybrid infrastructures.

Expertise in SIEM monitoring, risk management, malware analysis, privileged access management, and Microsoft 365 security operations. Experienced in managing enterprise-level threat detection, vulnerability assessment, and incident response workflows to ensure consistent protection across complex environments. Skilled in implementing and maintaining security controls through Microsoft Defender XDR, Intune, and Azure AD to strengthen endpoint protection and identity management. Adept at conducting proactive risk assessments, automating remediation processes, and improving overall security posture through data-driven analysis and continuous improvement. Certified in ISC2 SSCP, CompTIA SecurityX (CASP+), CySA+, Security+, and PenTest+, demonstrating a strong commitment to professional growth and cybersecurity excellence.

Security Operations

SIEM monitoring, incident response, threat detection, malware analysis

Vulnerability Management

Risk analysis, proactive assessments, patch management, security controls

Microsoft 365 Security

Defender XDR, Intune, Azure AD, Endpoint Manager, MDM

Privileged Access Management

BeyondTrust Bomgar, Delinea Secret Server, IAM solutions

Enterprise Protection

Multi-state security operations, hybrid infrastructure, compliance monitoring

Incident Response

Alert response, security workflows, automated remediation, continuous improvement

Identity Management

Azure AD, endpoint protection, identity security, authentication systems

Risk Management

Data-driven analysis, security posture improvement, defense maturity enhancement

Experience

IT AnalystCurrent

The Timken Company — North Canton, OH
2026 – Present

Support Engineer

Eide Bailly LLP — Akron, OH
06/2024 – 02/2026

Served as the primary local IT and end-user computing representative for the Great Lakes region, encompassing 5 offices across Ohio, Illinois, and Virginia. Managed laptop deployment, provisioning, and decommissioning for new hires and terminations.

Ensured vulnerability remediation and patch management for regional laptops and network devices. Managed Active Directory objects for seamless onboarding, access control, and inventory accuracy. Utilized BeyondTrust Bomgar for remote support, and leveraged Delinea Secret Server and Connection Manager to secure privileged access and monitor remote sessions. Used ServiceNow to manage incidents and user requests.

IT Support Specialist

Apple Growth Partners — Akron, OH
01/2022 – 06/2024

Acted as cybersecurity administrator, monitoring Microsoft Defender SIEM, responding to alerts, performing malware remediation and analysis, conducting root cause analysis, and producing executive documentation. Raised firm-wide security compliance from 50% to 85%.

Managed KnowBe4 cybersecurity awareness and training programs. Used FreshService to respond to helpdesk tickets and worked within a small team to maintain day-to-day applications. Deployed, provisioned, updated, and maintained user laptops across the firm.

IT Support Desk (Internship)

Crum and Forster Pet Insurance — Akron, OH
03/2021 – 11/2021

Responded to ServiceNow tickets with clear and effective end-user communication. Collaborated with a team of 8 and cross-departmental staff to resolve technical issues. Managed Active Directory objects on-prem and assisted users with account access. Set up, maintained, and decommissioned desk hardware for office users.

College of Business, Lab Assistant

The University of Akron — Akron, OH
08/2018 – 06/2021

Worked independently and collaboratively as part of a 7-member lab assistant team supporting five labs. Maintained up-to-date computer systems by implementing the latest security updates and best practices. Diagnosed and resolved PC issues, selecting and applying the most effective solutions.

Featured Projects

Security Posture Improvement - Apple Growth Partners

Improved organizational security posture from 50% to 85%. Implemented vulnerability remediation, patch management, and comprehensive security monitoring using Microsoft Defender XDR and KnowBe4.

Vulnerability Management Security Admin Defender XDR

Industrial Control Systems (ICS) Network

Designed and configured multi-subnet ICS environment with SCADA systems, DMZ, and corporate network using VLSM. Implemented firewall policies, static routing, and network segmentation for critical infrastructure protection.

SCADA VLSM Configuration Network Architecture ICS Security

Snort IDS Implementation & Rule Development

Installed and configured Snort on Kali Linux for intrusion detection. Created custom detection rules for phishing, unauthorized SMB access, port scanning, and malicious IP communication across multi-tier network architecture.

Snort Kali Linux IDS Rule Writing

Digital Forensics with Autopsy

Conducted forensic analysis on Kali Linux VM using Autopsy. Performed data source ingestion, configured hash lookup and encryption detection modules, and analyzed file systems to identify artifacts and deleted files.

Digital Forensics Autopsy Evidence Analysis

MITRE ATT&CK Threat Advisory

Developed comprehensive threat advisory documenting 12 MITRE ATT&CK tactics with techniques and mitigations. Covered initial access through impact stages including persistence, privilege escalation, and defense evasion strategies.

MITRE ATT&CK Threat Analysis Security Research

Network Tunneling & VPN Security Analysis

Analyzed tunneling protocols (GRE, PPTP, L2TP) and IPsec security mechanisms. Researched encapsulation techniques, authentication headers, and TLS improvements over SSL for secure network communications.

VPN IPsec Network Protocols