We provide IT Staff Augmentation Services!

Lead Information Security Analyst Resume

Atlanta, GA

SUMMARY:

Multi - certified in Enterprise Information Security TechnologyInformation Security Specialist whose qualifications include a Secret Clearance, a degree in Computer Information Systems; CISSP, and Security+ designations; and intermediate/detailed knowledge of security tools, technologies and best practices. Nine years of experience in the Information Technology field, including technical and business practices. 3 years in the Information Security field.

TECHNICAL SKILLS:

Security Technologies: Checkpoint, Cuckoo, Kraken, IBM QRadar, RSA Archer, McAfee Agent, Fireeye, RiskVision, Wireshark, Netwitness, RSA Security Analytics.

Systems: Windows (all)

Networking: Firewalls, TCP/IP

Software: Microsoft Suite, Outlook, Active Directory, Oracle VM VirtualBox, VMWare

Hardware: HP Workstations, IBM PCs and Compatibles, Dell PCs and Compatibles, Gateway PCs and Compatibles

KEY SKILLS:

  • System Monitoring
  • Malware Investigation
  • Systems Analysis
  • Checkpoint Firewall
  • Vulnerability Assessments

IT EXPERIENCE:

Lead Information Security Analyst

Confidential, Atlanta, GA

Responsibilities:

  • Provide first level IDS monitoring, analysis and incident response to information security .
  • Alerts events using Netwitness and RSA Security Analytics.
  • Analyze network traffic and IDS alerts to assess, prioritize and differentiate between potential intrusion attempts and false alarms.
  • Use Riskvision to analysis, collect, classify, and manage multiple IT and non-IT incidents.
  • Use Fireeye to research alerts for false positives and true threats.
  • Tools: Riskvision, Fireeye, RSA, Netwittness, Stealthwatch

Information Security Analyst

Confidential, Atlanta, GA

Responsibilities:

  • Work daily in a SOC environment overseeing the daily security operations for Health and Human Services.
  • Conduct tier 1/2 IDS monitoring, analysis and incident response.
  • Analyze network traffic and IDS alerts to assess, prioritize and differentiate between potential intrusion attempts and false alarms.
  • Compose and send alert notifications.
  • Tools: Riskvision, Fireeye, RSA, Netwittness, Stealthwatch, WireShark

Information Security Analyst

Confidential, Atlanta, GA

Responsibilities:

  • Work daily in a SOC environment overseeing the daily security operations for Confidential network.
  • Identify, track and report on threats to company networks, assets, and data.
  • Respond to reports of security incidents, and engage the appropriate team members for handling support as needed.
  • Perform acquisition, and basic to moderate static/behavioral analysis, of malware specimens to determine the effects on internal systems at both the host and network level.
  • Executing routine tasks to further cyber investigations while maintaining integrity of evidence.
  • Tools Used: QRadar, RSA Archer, Cuckoo Sandbox, Kraken

Cyber Security /Infrastructure Engineer

Confidential, Atlanta, GA

Responsibilities:

  • Create rules, push policies, block malicious domain and IP addresses, and conduct IPS and IDS blade modifications.
  • Knowledge of computer operating systems, hardware configuration and inter-connecting components to troubleshoot, diagnose, correct or work around network failures and problems.
  • Constant monitoring of intrusion detection systems.
  • Create technical, detailed reports based on intrusions and events.
  • Analyze and evaluate anomalous network and system activity.
  • Tools used: McAfee Agent, CheckPoint, Remedy

Computer Technical Support Analyst

Confidential

Responsibilities:

  • Knowledge of computer operating systems, hardware configuration and inter-connecting components to troubleshoot, diagnose, correct or work around network failures and problems.
  • Provides technical, operations, and training support to users of company's personal computers either by telephone or on-site relative to desktop hardware and software packages
  • Installs software which includes various operating systems (Windows 95/98, NT, Novell, and Windows 2000), network software, application packages, and Enterprise Management components.
  • Knowledge to install, configure, troubleshoot hardware and software on personal computers with expertise in knowledge-based applications.
  • In-depth knowledge of latest versions of all diversified software applications utilized by Anniston Army Depot and tenant activities.
  • Able to modify systems by adding, altering or removing components or software in order to standardize or alter the purpose of the equipment to in corporate new features developed since the original manufacture date.

Hire Now