We provide IT Staff Augmentation Services!

Cyber Security Analyst Resume

4.00/5 (Submit Your Rating)

Basking Ridge, NJ

SUMMARY:

  • A logical thinker with experience of 6+ years in the field of Cyber Security skilled with Incidence Response and Handling, Security Operation Centre(SOC), Firewall Operations, Risk Management, Malware Analysis, Intrusion Detection and Prevention System (IDS/IPS), Web Application Security, Unauthorized Access, Viruses and a wide range of Vulnerabilities and Threats.
  • Self - motivated and proactive leader with technical and exemplary communication skills. Exceptional ability to create, implement and improve IT standards, policies, and procedures.
  • Identified and evaluated potential threats and vulnerabilities.
  • Examined and evaluated computer software and hardware to uncover access attempts
  • Performed Penetration Testing for large enterprise networks
  • Capable of defining and monitoring risk management, compliance, and information security programs
  • Assisted with applications/tools including but not limited to SIEM, Wireshark, Intrusion detection Systems (IDS), Data loss prevention controls (DLP), e-mail gateway protection, VPN operations
  • Developed security documentation to include policies and procedures for the Vulnerability Assessment Team.
  • Ensured authorized access to files by revoking access, investigating unauthorized access
  • Assisted and supported Cyber Security Incident or Service Response Teams when necessary.
  • SOC Analysis, Log analysis, proactive monitoring and response to network and security incidents
  • In-depth understanding of TCP-IP concepts and packet capture review utilizing tools such as WireShark to investigate suspicious events and anomalies
  • Expertized on attacks like, XSS, SQL Injection, CSRF, PHP Injection etc.
  • Worked on DDOS mitigation and have good idea on different kind flood attacks
  • Production error monitoring and root cause analysis using SPLUNK.
  • Debugged Splunk related and integration issues.
  • Knowledge of LAN/WAN networking concepts - TCP/IP, routing and switching, OSI Layer, Packet Analysis, Logs, Endpoint and network protection, port and internet protocols and scripting languages.
  • Responsible for end to end security, ensuring that the confidentiality, integrity and availability is not breached, infected or compromised in anyway by outside malicious users.

TECHNICAL SKILLS:

SIEM Tools: QRadar, Splunk, McAfee ESM.

Vulnerability/ Malware Tools: Wireshark, IDApro, Nessus, Nmap

Intrusion Detection System (IDS): Snort, Sourcefire

Database: Oracle, DB2, MS SQL Server

Operating System: Windows, Unix, Linux

Languages: Python, PL/SQL, C/C++, VB.net, HTML, PHP, XML

Application: VMware, Service Now, TWS, MS Office Products

PROFESSIONAL EXPERIENCE:

Cyber Security Analyst

Confidential, Basking Ridge, NJ

  • Utilized Security Information and Event Management (SIEM), Data Loss Prevention (DLP), Intrusion Detection and Prevention (IDS / IPS), forensics, sniffers and malware analysis tools.
  • Worked in Security Incident and Event Monitoring SIEM platform - IBM Qradar, and Splunk.
  • Tested various threat vectors and present evidence of intent to create signatures/rules to mitigate specific threats.
  • Responded to system security related incidents and can quickly and effectively comprehend and understand a problem and take immediate corrective actions
  • Performed investigation, analysis, reporting and escalations of security events from multiple sources including events like intrusion detection, Firewall logs, Proxy Logs, Web servers.
  • Monitored and investigate SOC incidents and alerts with SourceFire
  • Report/Track the vulnerability reports periodically and submit the report to management.
  • Expertise in Vulnerability management, implementing, executing, and monitoring vulnerability scans using Nessus, Wireshark, IDApro
  • Analyzed the Malware through static and Dynamic analysis with tools.
  • Performed network risk assessments, vulnerability assessments, and penetration testing.
  • Evaluated and recommended security technology such as network and host based intrusion detection systems (IDS), virus protection capabilities, and virtual private network solutions.
  • Provided technical support services in code reviews and static analysis
  • Performed and developed procedures for system security audits, network penetration-test, and vulnerability assessments on OS, Server, Database, and other applications.
  • Reviewed security logs to ensure compliance with policies and procedures and identifies potential anomalies.
  • Utilized incident response use-case workflows to follow established and repeatable processes for triaging and escalating
  • Monitored events from Data Loss Prevention (DLP) and other information security tools.
  • Coordinating the development of advanced security signature or access control mechanisms that can be implemented on security systems such as intrusion prevention - detection systems, firewalls, routers or endpoint in response to new or observed threats within the enterprise
  • Evaluated firewall change requests and assess organizational risk
  • Verified that application software/network/system security controls are implemented as stated, documents deviations, and recommends required actions to correct those deviations
  • Applied principles of Secure SDLC and methodologies like Lean/Agile/XP, CI, Software and Product Security
  • Monitored the SOC critical systems and escalated issues to the SOC management and engineers of any global outage within the distributed systems that effects productivity
  • Acted as an Incident Handler to manage both major and minor security incidents within the defined Computer Security Incident Response process
  • Monitored incoming intrusion alerts utilizing Sourcefire, SNORT IDS and SPLUNK SIEM
  • Monitored security vulnerabilities by analyzing a variety of network and host-based security appliance logs and determining the correct remediation actions and escalation paths for each incident.
  • Performed Vulnerability assessment using Nessus scanner
  • Monitored and analyzed QRadar channels looking for any unusual activity, malicious executable code, obfuscated JavaScript, APT (Advance Persistent Threats), and virus/Trojans on customer's network
  • Monitored and analyze Intrusion Detection Systems (IDS) to identify security events via Snort/Sourcefire triggering on suspicious activity

Information Security Administrator

Confidential, Chicago, IL

  • Conducted penetration testing & Auditing of the organization network by using tools.
  • Perform Foot printing, Scanning, Sniffing and monitoring Network activities by using Open source & commercial tools like (Wireshark, Nmap).
  • Developed Vulnerability Scanning process for all environment builds, and on-going monthly scanning reporting using Nessus
  • Monitor and respond to ServiceNow tickets regarding security access requests.
  • Analyzed and remediated phishing emails, malware, and other suspicious activity confronting the network.
  • Reviewed system logs to identify and research suspicious activities.
  • Reviewed group policy security settings and user access to network resources and folders and assists administrators with testing group policy changes
  • Utilized Active Directory to create, edit, and maintain accounts
  • Utilized Unix based applications to provide end users with the proper access to the proper networks
  • Provided risk analysis, information assurance and IT project management using tools like SharePoint and RSAM
  • Monitored security status of networks and networking devices, responded to security incidents with appropriate levels of action. Coordinated with other IT teams to resolve incidents.
  • Led project to improve Access Control by moderating user access control of computers
  • Computed and encrypted data, installed firewalls, viruses and malwares software to protect internal data.
  • Assessed the quality and completeness of Information Security Program artifacts, such as program management plan, information security strategic and tactical plan, program risk assessment and management plan, risk register
  • Focused on Security monitoring and configuring networks tools and services.
  • Partnered with security analysts to maintain VPN Management Security Solution Director and closely monitored remote IDS sensors for reliable reporting of network intrusion attempts
  • Deployed and monitored a signature-based IDS combined with packet capture software to monitor for and investigate
  • Installed Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) intrusions
  • Set up security policies for end-users and provide continuous training to avoid computer virus penetration
  • Provided ongoing training on secure development practices to our Engineering teams.
  • Hunted for malicious network activity - inspect malicious software, such as Spyware, Trojans, Worms, Ransomware, Virus, Bots and other Intrusion.
  • Provided real-time cyber security monitoring - exam security trends, research threats and analyze security events that occur on the network and endpoints.
  • Analyzed web server, proxy, mail server logs for root cause analysis
  • Analyzed a variety of network and host-based security appliance logs (Firewalls, NIDS, HIDS, Sys Logs, etc.) to determine the correct remediation actions and escalation paths for each incident.
  • Categorized security events and raise necessary incidents after thorough quality check of the event.
  • Routinely monitored SOC infrastructure systems functionality, availability and followed emergency procedures while outage occurred.
  • Monitored various security tools (e.g. Splunk, Qradar) to identify potential incidents, network intrusions, and malware events, etc. to ensure confidentiality, integrity, and availability of services and information systems are protected
  • Responsible for filtering out Security events in Qradar SIEM and Investigating IDS Alerts.

Information Assurance Analyst

Confidential

  • Work with Information Assurance working groups, planning teams, etc. to support efforts in the review, application, and maintenance of IA policies and procedures.
  • Perform security analysis, ISS scans and risk/vulnerability assessments. Support the recording, retrieval, manipulation, analysis, and storing of test data
  • Monitoring firewalls, data encryption, and other security measures.
  • Reviewed violations of computer security procedures and discuss procedures with violators to ensure violations do not occur.
  • Conduct vulnerability assessment and remediation actions utilizing Nessus for vulnerability scans
  • Performed vulnerability/risk analyses of computer systems and applications during all phases of the system development life cycle (SDLC)
  • Participated in security team meetings and rendered other support to IT Security office, which included ensuring appropriate steps are taken to implement information security requirements for all IT systems.
  • Reviewed routine security audit logs (e.g., access control logs).
  • Performs technical security tasks such as penetration testing and evaluates and participates in technical infrastructure design and deployment.
  • Alerting, response, and mitigation of computer security incidents at TW and works closely with the incident response team
  • Worked closely with help desk and network operations, and provide adequate information required for incident resolution
  • Evaluated daily logs to ensure the data is in compliance with the company’s policy.
  • Assessed the vulnerability of IT systems to unauthorized access and supporting the use of network and encryption routines.

We'd love your feedback!