We provide IT Staff Augmentation Services!

Cyber Security Analyst Resume

2.00/5 (Submit Your Rating)

Tulsa, OklahomA


An Information Systems professional who has a background in Systems Administration, Security Engineering, and IT Security with Masters. I am always looking for opportunities to increase my Knowledge in the IT area. An Information Securityexpert with focus on Cyber security Splunk, continuous monitoring, access control and compliance. Performed IT and security risk assessments and audits on multiple companies and performed corporate risk analysisEntrusted with large volumes of sensitive information recognizing privacy and confidentiality requirements.


Splunk, Sentinel One, SIEM, Akamai, e Drive Encryption, McAfee, Imperva DAM, WIPS, Proxy, Crowd Strike, Data Pipe, DDos Analysis, Bot Detection NCDC, EVTK Tool, Bit9, Zscaler, Scansafe, FireEye, DNS logs, Shield Ticketing System, Service Now, Cireson, BlueCoat, Symantec DLP, Cisco IronPort, Nexpose, Coalfire.


Cyber Security Analyst

Confidential - Tulsa, Oklahoma


  • Maintains records of security monitoring and incident response activities, utilizing case management and ticketing technologies
  • Administrative duties monitoring Outlook email using Cisco IronPortsecurity
  • Monitoring ofsecurity events in the SIEM, as well as othersecurity feeds, and communications (email, phone, chat, and other communications.
  • Reviewed client mobile applications for security compliance, with a focus on malware and potentially harmful behavior.
  • Security incidents to provide management oversight to the incident process.
  • Perform tuning of theSecurity Incident and Event Manager (SIEM) filters and correlations to continuously improve monitoring
  • Triagesecurity alerts and events.
  • Manage IDS/IPS systems as well as handled incident response.
  • Discovered methods and implemented strategies to target specific networks, computer systems, specific hardware or software.

Information Security Analyst

Confidential, Wakefield, MA


  • Security operations, monitoring, incident response and investigation
  • Tuning and updating security tools including SIEM (McAfee ESM \ Nitro), IDS/IPS, DLP, Web Proxy.
  • Develop content and workflows as required.
  • Respond to incidents by analyzing digital evidence and ensure proper documentation and tracking
  • Provide intrusion detection expertise to support timely and effective decision making.

Cyber Security Analyst

Confidential, Beaverton, OR


  • Hands-on experience with Splunk dashboard development, created application dashboards monitoring, configuration of splunk as well as applications deployment and related technical add-ons.
  • Identify Proxy logs Using Splunk and Crowd Strike depending on the threat detected.
  • Identification of Phishing Emails on Nike s Network.
  • Conduct log analysis, proactive monitoring, mitigation, and response to network and security incident.
  • Provided continuous monitoring and interpretation of threats through use of intrusion detection systems, firewalls and other boundary protection devices, and any security incident management products deployed
  • Proactively monitor, identify, and remediate informationsecurity events and intrusions.
  • Responsible for the continuous surveillance, analysis, mitigation, remediation and incident management using the Confidential ’s suite of tools.
  • Perform log analysis utilizing Splunk and various othersecurity software and tools.
  • Worked on SailPoint IIQ for User access management procedures and policies.
  • Respond to security events and drive issues to closure while engaging all appropriate resources.
  • Create new Standard Operating Procedures while also maintaining and updating current ones as changes happen.
  • Stays current onsecurity technologies, trends, standards and best practices.
  • Perform log analysis and monitor and respond tosecurity events driving issues to closure engaging all appropriate resources.
  • Responsible for document preparation of NCDC daily Report.
  • Documentsecurity process and procedures
  • Perform actions using Bulk UPMID s Reset & Revoke tool.
  • Provide enforcement ofsecurity policies, standards and procedures.

Information Security Analyst

Confidential, ENGLEWOOD, CO


  • Performed real-time proactiveSecurity monitoring and reporting on variousSecurity enforcement systems
  • Provide Level 2 Operations support for end user resolution investigating RSA SIEM events to determine any true intrusions.
  • Identifying and remediating any threats and vulnerabilities as a Security Monitoring (SOC), Triage and Escalation to T2.
  • Documenting incident results and reporting details through ticketing system
  • Monitoring DDoS portals and alerting the team by reporting them using pager and opening the bridge call.
  • Performed Risk and security assessments, compliance management analysis
  • Providing half an hour updates on traffic by monitoring portals from ISP’s.
  • Triaging emails sent by internal users depending on the categories and responding to the customers after investigating the emails.
  • Researched and Supported Information Security Standards.
  • Subpoena requests, Credit Card Number Analysis to prevent fraud on external customers.
  • Provide Rotation 24/7 On Call support.
  • Formulated and configured Logger appliances and analyzed system anomalies.
  • Designed and developed Arc Sight architecture components and related upgrades.
  • Prepared system plans and executed Arc Sight architecture modifications.
  • Managed, upgraded and maintained operational data flows and Arc Sight platforms.
  • Maintained and modified hardware and software components, content and documentation.
  • Created and documented reports, rules, trends and Dashboard.
  • Analyzed Arc Sight and related tools and resolved IT security failures.
  • Provided guidance for equipment checks and supported processing of security requests.
  • Experience inNetwork Intrusion detection/Intrusion PreventionSystem and Firewalls.
  • UtilizeSecurity Information and Event Management (SIEM), Intrusion Detection & Prevention (IDS / IPS), Data Leakage Prevention (DLP), forensics, sniffers and malware analysis tools
  • Security Incident handling, SIEM (ESEM) using RSA Envision/Arc Sight products.
  • Excellent exposure to Database, VPN technologies, and Firewalls.

Security Operations Engineer



  • Analyzesystem logs and identify potential issues with computer systems.
  • Maintained and modified hardware and software components, content and documentation.
  • Initiated and integrated new technologies into existing data center environments.
  • Responsible for maintaining availability, reporting and communication of the SIEM between it, its event-sources and the endpoints.
  • Communicate and troubleshoot technical inquiries of co-workers and clients.
  • Research methods to improve security through encryption to maintain security of information.
  • Responsible for monitoring and, providing analysis in SIEM, IDS/IPS software tools.
  • Create and maintain high-quality documentation of all relevant specifications,systems, and procedures.
  • Assist in the development of processes to maintain business continuity and recovery standards for endpointsystems and networks.
  • Excellent exposure to Database, VPN technologies, and Firewalls.

We'd love your feedback!