Cyber Security Analyst Resume
4.00/5 (Submit Your Rating)
Fort Washington, MarylanD
SUMMARY:
Highly motivated, results - oriented Cyber Security Professional with educational and simulated experiences in: monitoring, auditing, intrusion detection and prevention, and penetration testing. Fast-learner skilled in use of technical tools and organizational practices such as training, access control, vulnerability assessment, policy management, evidence collection, and disaster recovery and business continuity.
TECHNICAL SKILLS:
- Training and Instruction
- Network Penetration Testing
- Software/Hardware Installation
- Data Analysis
- Program Management
- Intrusion Detection
- Malware Analysis
- CIA Triad
- Network Security
- Security and Threat
- Cyber Intelligence
RELEVANT EXPERIENCE:
Cyber Security Analyst
Confidential, Fort Washington, Maryland
Responsibilities:
- Conducted research, analysis and evaluation of cyber security operations; used Federal Information Security Modernization Act, Security Technical Implementation Guides, and additional governmental guides to ensure security controls were properly implemented to protect agency against threats and vulnerabilities to avoid attacks.
- Applied Confidential 800-53 security controls to write and revise cyber policies, Standard Operating Procedures, and Plan of Action and Milestones.
- Performed vulnerability scans with Vulnerator and Nessus; devised reports to support findings.
- Effectively described technically complex material to a non-technical audience.
- Worked independently and managed multiple projects with competing priorities and tight deadlines.
- Developed, revised, and updated various types of technical communication products, namely technical manuals, standard operating procedures, work instructions, diagrams, plans, guides, and reports that were effected with the infrastructure upgrade.
- Maintained and updated records to ensure policies met information security engineering and compliance standards and regulations.
- Applied technical writing standards to technical communication products; performed analysis and synthesis of information from multiple sources, including diagrams, technical information from existing documentation, consultations with engineers and subject matter experts to develop technical communication products.
- Worked effectively within a collaborative environment with a diverse population.
Intern
Confidential, Oxon Hill, Maryland
Responsibilities:
- Analyzed personal privacy issues related to various personal and business-related cybersecurity scenarios and recommended policy changes for 3 organizations within the same industry that enabled each organization to (a) use sensitive customer information to increase business advantage and profitability, and (b) also protect customer personal information to avoid possible privacy or liability issues.
- Worked collaboratively with teammates to construct a company cybersecurity policy that considered all aspects of the human factor and its role in developing successful policy controls.
- Utilized cryptographic techniques and simple and modern ciphers, including Data Encryption Standard (DES), Caesar, and Vigenère.
- Designed business contingency and continuity plans/revisions based on simulated organizational deficiencies and system intrusions.
- Utilized network security techniques, monitoring, auditing, intrusion detection and prevention, and ethical penetration testing.
- Applied the basic procedures and technologies for conducting successful forensic examinations of digital media storage devices and computer networks.
Student
Confidential, Adelphi, Maryland
Responsibilities:
- Completed simulated labs to gain in experience in the use of cyber tools including Autopsy, Wireshark, Snort, Encase, Nmap, and Nessus.
- Developed a proposal for building a computer forensic laboratory in which physical, legal and technical requirements as well as a budget with startup and maintenance costs over a three-year period were presented to a company.
- Performed software security risk assessment as part of a team project utilizing the “iTrust” database application.
- Used Snort and Wireshark to perform intrusion detection and created rules that generated alerts.
- Scanned target networks and identified vulnerabilities through the use of Nmap and Nessus.
- Applied the measures and techniques used in detecting and countering data leakage and web security incidents.
- Completed a full dead-box forensic analysis of “seized suspect media” with Autopsy.
- Employed data preservation methods, including chain of custody, in order to maintain integrity of data.
- Utilized Adepto imaging program in Helix live CD to generate log of forensic analysis.
- Updated business contingency and continuity plans with teammates to reflect organizational needs after tests and evaluation of system failures in a simulated environment.
- Used Encase to examine and recover deleted files.