We provide IT Staff Augmentation Services!

Cyber Security Analyst Resume

Rockville, MD


  • Seeking to further my cybersecurity career by growing with a team where my acquired skills will be utilized for the betterment of the company.
  • Highly detail - oriented individual with exceptional organization skills, including ability to work independently or as part of multiple teams.
  • Strong organizational skills and ability to stay focused while managing multiple tasks concurrently
  • Ability to learn quickly
  • Strong problem solving and analytical skills
  • Good team player


  • IBM QRadar
  • Splunk
  • IPvoid.com
  • VirusTotal.com
  • Wireshark
  • MXToolbox.com
  • Any.run
  • Nmap
  • Nessus


  • Threat Hunting
  • Threat Intelligence
  • SOAR (IR Automation)
  • Malware Analysis
  • Forensics


Cyber Security ANALYST

Confidential, Rockville, MD


  • Improve the access monitoring activities by enabling the automated methods
  • Provide the reports regularly to stakeholders
  • Coordinate and post responses, provide related reporting and maintain procedure documents
  • Review the access violation reports and investigate possible exceptions; document controls; make recommendations
  • Retain and store the evidences
  • Identify, document and flag the incidents where investigation cannot be progressed further due to missing or insufficient information
  • Knowledge of the access monitoring tools (e.g. Cyber Ark, Power Broker etc.)

IT Helpdesk Support

Confidential, Upper Marlboro, MD


  • Perform security testing on proprietary software
  • Create, manage and delete user accounts for multiple systems in accordance with existing on-boarding and off-boarding procedures
  • Did password resets, set up security questions, and used remote tools.
  • Also, have excellent listening and communication skills to communicate technical information in non-technical terms to the users that called in.

IT Specialist

Confidential, Washington, DC


  • Diagnose, troubleshoot, and resolve hardware, software, or other network and system problems, and replace defective components when necessary.
  • Maintain and administer computer networks and related computing environments including computer hardware, systems software, applications software, and all configurations.
  • Provide first line telephone, e-mail and ticket routing services for security event notifications and incident response processes.


Hire Now