Angelo Frammartino

Cybersecurity Engineer | Security Operations & Incident Response | Vulnerability Management & Risk Analysis

Specializing in enterprise security solutions, SIEM monitoring, and privileged access management across multi-state environments

View My Work

About Me

Results-driven Cybersecurity Engineer with over 3+ years of experience in incident response, vulnerability management, and enterprise security operations across multi-state environments. Currently serving as the regional IT security representative for four offices at Eide Bailly LLP. Proven success in improving organizational security posture, having increased overall compliance and defense maturity from 50% to 85% at Apple Growth Partners. Recognized for efficient and proactive risk analysis and SIEM alert response, with a strong record of strengthening security frameworks and reducing risk across hybrid infrastructures.

Expertise in SIEM monitoring, risk management, malware analysis, privileged access management, and Microsoft 365 security operations. Experienced in managing enterprise-level threat detection, vulnerability assessment, and incident response workflows to ensure consistent protection across complex environments. Skilled in implementing and maintaining security controls through Microsoft Defender XDR, Intune, and Azure AD to strengthen endpoint protection and identity management. Adept at conducting proactive risk assessments, automating remediation processes, and improving overall security posture through data-driven analysis and continuous improvement. Certified in ISC2 SSCP, CompTIA SecurityX (CASP+), CySA+, Security+, and PenTest+, demonstrating a strong commitment to professional growth and cybersecurity excellence.

Security Operations

SIEM monitoring, incident response, threat detection, malware analysis

Vulnerability Management

Risk analysis, proactive assessments, patch management, security controls

Microsoft 365 Security

Defender XDR, Intune, Azure AD, Endpoint Manager, MDM

Privileged Access Management

BeyondTrust Bomgar, Delinea Secret Server, IAM solutions

Enterprise Protection

Multi-state security operations, hybrid infrastructure, compliance monitoring

Incident Response

Alert response, security workflows, automated remediation, continuous improvement

Identity Management

Azure AD, endpoint protection, identity security, authentication systems

Risk Management

Data-driven analysis, security posture improvement, defense maturity enhancement

Featured Projects

Security Posture Improvement - Apple Growth Partners

Improved organizational security posture from 50% to 85%. Implemented vulnerability remediation, patch management, and comprehensive security monitoring using Microsoft Defender XDR and KnowBe4.

Vulnerability Management Security Admin Defender XDR

Industrial Control Systems (ICS) Network

Designed and configured multi-subnet ICS environment with SCADA systems, DMZ, and corporate network using VLSM. Implemented firewall policies, static routing, and network segmentation for critical infrastructure protection.

SCADA Network Architecture ICS Security

Snort IDS Implementation & Rule Development

Installed and configured Snort on Kali Linux for intrusion detection. Created custom detection rules for phishing, unauthorized SMB access, port scanning, and malicious IP communication across multi-tier network architecture.

Snort IDS Rule Writing

Digital Forensics with Autopsy

Conducted forensic analysis on Kali Linux VM using Autopsy. Performed data source ingestion, configured hash lookup and encryption detection modules, and analyzed file systems to identify artifacts and deleted files.

Digital Forensics Autopsy Evidence Analysis

MITRE ATT&CK Threat Advisory

Developed comprehensive threat advisory documenting 12 MITRE ATT&CK tactics with techniques and mitigations. Covered initial access through impact stages including persistence, privilege escalation, and defense evasion strategies.

MITRE ATT&CK Threat Analysis Security Research

Network Tunneling & VPN Security Analysis

Analyzed tunneling protocols (GRE, PPTP, L2TP) and IPsec security mechanisms. Researched encapsulation techniques, authentication headers, and TLS improvements over SSL for secure network communications.

VPN IPsec Network Protocols