We provide IT Staff Augmentation Services!

Cybersecurity/iam Analyst Resume

3.00/5 (Submit Your Rating)

SUMMARY:

Investigative and solution focused Cybersecurity Analyst with diverse background focused in risk management, operational project success, and operational management.

SKILLS:

Threat Management - Environmental and Network reconnaissance and analysis

Vulnerability Management- Vulnerability Scan analysis and validation

Cyber Incidence Response- Threat data and behavior analysis

Security Architecture- Regulatory compliance, policies, controls, and procedures

Identity and Access Management- Enterprise Role Based Access Controls with Least Privilege and Access Exception

EXPERIENCE:

Confidential

Cybersecurity/IAM Analyst

Responsibilities:

  • Creating Enterprise IAM Architecture for Access Provsioning Automation and Role Based Access Control (RBAC) leading to Job Role Health implimenation
  • Subject Matter Expert of IBM Identity Governance and Intelligence (IGI) Security application Subject Matter Expert of Sarbanes-Oxley (SOX) Compliance control APD-3 Periodic Access Reviews (PAR) Lead and completed the operational implementation of Confidential IAM consolidation of audit controls (IGI).
  • The project is planned to increase from 40k reviews/quarterly to 500k over the next 2 years with no increase to operational costs.
  • Internalized ongoing outsourcing costs of IGI maintenance
  • Worked with internal and external audit groups to maintain industry best practices ensuring a 100% accuracy standard during audit cycles (6 quarterly cycles, 90 PARs completed with no audit gaps).

Confidential

Technical Risk Assessor

Responsibilities:

  • Primary Access Exception evaluator for 40,000 employees Resolved individual Access issues for uncommon requests and worked with managers to increase Business Unit Access Request autonomy.

Confidential

Network Administrator

Responsibilities:

  • Troubleshot business LAN connectivity and traffic
  • Used Wireshark, Snort, and IP blockers to control negative traffic and identification
  • Maintained technical controls and wireless network availability
  • Troubleshot business email and web servers to maintain availability

We'd love your feedback!