It Business Analyst Resume
2.00/5 (Submit Your Rating)
St Louis, MissourI
SUMMARY:
- Demonstrate deep knowledge of Information Security policies, Role Based Access Control, and ITIL Framework.
- Train entry - level personnel on wide-range of company specific security administration procedures.
- Process and track problem incidents with multiple ticketing systems with 90% first-call resolution
- Administer Exchange Management Console to maintain database of user’s membership to mailboxes and distribution groups while updating PowerShell scripts to maintain updated policies with the correct format.
- Knowledge of security goals, risk assessment, business continuity, cryptography and attacks on systems
- Strong analytical skills, attention to detail, and a passion for adapting to ever-changing technologies
- Comprehensive knowledge of networking concepts, troubleshooting networks, and methods of securing networks
TECHNICAL SKILLS:
- Windows Server applications (AD, EMC, DNS, DHCP)
- Desktop Maintenance Experience
- SharePoint/Livelink Administration
- Mainframe and LAN security tools (ID Archive, Hyena, Quest Reporter, RACF/Top Secret/ACF2)
- Ticketing Request Systems (BMC, ServiceNow, CA)
- Linux/AIX/UNIX
- IDM Products (RSA, Oracle, Courion, CA, and eDirectory)
PROFESSIONAL EXPERIENCE:
IT Business Analyst
Confidential, St. Louis, Missouri
Responsibilities:
- Researched and gathered user access reports for audit compliance; adhering to PCI, ISO, NIST, HIPAA, SOX, and SOC1
- Implemented new policies via bi-weekly Change Advisory Board meetings after review to comply with ITIL standards
- Conducted risk assessments for RACF and Active Directory environments to implement improved policies
- Assisted in clean-up projects for AD and RACF to include orphan accounts, generic accounts, and excessive access
- Coordinated with multiple teams to resolve access issues while complying with company Standard Operating Procedures
- Created department PowerShell scripts to accommodate for the lack of a SIEM/AD Reporting tool increasing efficiency
- Updated security documentation with improved procedures keeping record of procedures for compliance of audits
IT Security Analyst
Confidential, Madison, Wisconsin
Responsibilities:
- Created and assigned 150+ security access requests daily to adhere to SLA requirements for business continuity
- Answered and routed security questions to appropriate team ensuring timely resolutions for company SLAs
- Completed 50+ daily security access requests for end users ensuring a secure environment with least-privilege access
- Updated security documentation with improved procedures keeping record of practices for compliance of audits
- Audited users’ security access to verify compliance with procedures and adhere to least privilege access
IT Security Analyst
Confidential, Milwaukee, Wisconsin
Responsibilities:
- Created job specific access to create roles within Courion aligning with company-specific position codes
- Analyzed multiple users’ system access to determine least-privilege access for role definitions
- Worked on a time-sensitive project to rollout role-based access for 3200+ defined job codes with 5-person team
IAM Operations Analyst
Confidential, Milwaukee, Wisconsin
Responsibilities:
- Provisioned Active Directory accounts for 80+ health-care clients. Ensure proper RBAC standards to comply with HIPAA and requirements requested from clients’ IT management team. Modified roles with needed security groups.
- Adjusted client’s Role Based Access Control policies ensuring least privilege access for health-care professionals
- Collaborated with engineers in maintaining a virtualized Citrix-based environment, including XenApp client app
Associate Operations Analyst
Confidential, Appleton, Wisconsin
Responsibilities:
- Analyzed job specific access to create roles within Oracle Identity Manager aligning with the RBAC model
- Monitored 8000+ enterprise users’ system access through Access and Identity Management collaboration tools
- Implemented File and permission management protocols through Group Policy Objects securing the environment
- Oversaw expedited rollout of company tax software to 4400 corporate/field users w/ little management oversight
- Completed access reviews on transferred employees ensuring least-privilege access, including annual audits
- Streamlined termination and hiring process of employees reducing provisioning process by 33%
- Utilized Quest Reporter in an extended Active Directory cleanup and reorganization, reducing AD structure and improving server performance; setup monthly email reports to access approvers increasing awareness
- Part of team implementation of Sharepoint to replace Livelink in corporate file hosting network
- Provisioned mass amounts of new Microsoft 365 accounts for new company roll-out creating cloud availability
Information Security Intern
Confidential, Appleton, Wisconsin
Responsibilities:
- Employed Mainframe security tools to secure access to required company datasets and files
- Monitored 8000+ enterprise users’ system access through Access and Identity Management collaboration tools
- Completed access reviews on transferred employees ensuring least-privilege access, including annual audits
- Oversaw termination and hiring process of employees ensuring an efficient provisioning process
Cryptologic Language Analyst
Confidential
Responsibilities:
- Held a Top Secret Clearance with Special Background Investigation - Currently inactive
- Managed the accountability, operations, and training of a team of 10 subordinates on a 24/7 operations floor
- Presented very technical and time-critical data to an audience of varying backgrounds, to include base leadership
- Transcribed 90 intel files; exploiting 110 political/economic intel items to reveal target’s techniques and procedures