We provide IT Staff Augmentation Services!

Senior Security Analyst Resume

Greensboro, NC


  • Security - focused technical career with 20+ year track record of innovation and success
  • Technically sophisticated threat and vulnerability management technology analyst/engineer who has successfully assisted security departments with investigations in locating intrusions on systems and networks. Exceptional attention to detail and ability to navigate complex military/business issues. Focuses on compliance and ongoing reviews to mitigate risk. Leading edge threat management, incident response, and investigative skills
  • Risk Mitigation / Project Management / Threat Detection / Process Improvement / Employee Training


  • Windows (10/7/Vista/XP/98/95/3
  • Macintosh (7/8/9/10.X)
  • Citrix Thin Client
  • Linux desktop
  • Ubuntu
  • Red hat
  • Python
  • Ruby
  • Java
  • PHP
  • VB
  • UNIX
  • SQL 2000 and 2005 Management
  • Access
  • Oracle
  • Fox Pro
  • Borland Data Base Engine
  • Sybase
  • Dbase 2 & 3
  • Snort
  • Checkpoint
  • Symantec Endpoint Protection
  • NMAP
  • Wireshark
  • MS WSUS and SMS Servers
  • Cain and Able
  • John the Ripper
  • Kismet
  • Netstumbler
  • Cheops
  • S-Tools
  • PGP
  • McAfee Enterprise
  • SIFT
  • TCTK
  • Autopsy sniff
  • Encase
  • Knoppix
  • Helix
  • Hping2
  • Maltego
  • Metasploit
  • Tripwire
  • BASE
  • Net cat
  • Log Logic
  • Arc Site
  • Iron Port
  • Solar Winds Engineering Edition
  • Qualys Compliance and Network Scanning Tools
  • White Hat Application Scanning Tools
  • Nessus Vulnerability Scanner
  • RSA envision
  • Palo Alto Networks
  • Wildfire
  • Sourcefire VDC
  • FireEye
  • Trend Micro
  • Kali Linux
  • Microsoft Office
  • MS Project
  • Remedy
  • Symantec Ghost
  • UIU
  • Meeting Maker
  • Entrust
  • VMWare Fusion and Parallels
  • Autodesk Suite
  • RSA Archer
  • SolidWorks
  • MathCAD
  • Pro-E Application
  • PDM Link
  • PKI Infrastructure
  • Cloud Service Providers
  • Vormetric Encryption
  • Symantec DLP
  • Malwarebytes


Confidential, Peoria, IL

Threat & Vulnerability Management Technology Engineer/Analyst


  • Focused on the global review and mitigation of security threats, in addition to resolution management of processes. Communicated with stakeholders about identified risks and project status. Collaborated with teams to brainstorm and enhance opportunities for risk reduction. Tested and validated chosen configurations for maximum results.

Confidential, Greensboro, NC

Senior Security Analyst

  • Analyzed security risks in systems, appliances, while focusing on the delivery of improved alerting, and response processes. Performed cyber security threat analysis, tested critical business structure compliance, and performed forensic reviews. Assessed proposed solutions and mentored staff to ensure alignment with industry standard practices. Provided documentation and guidance for staff IT security awareness and educational training programs.

Confidential, Kennesaw, GA

Senior IT Security Analyst

  • Managed all aspects of corporate security policies, including procedure development and security architecture for cyber security processes. Analyzed cyber security threats, tested system penetration, and monitored control effectiveness. Performed vulnerability management and incident response in collaboration with forensics teams. Brought the corporation into compliance for PCI DSS, SSAE16, and EI3PA standards.


Senior IT Security Analyst

  • Member of team that analyzed gaps and issues related to a Federal Audit preparation (gap analysis). Reviewed and recommended remediation for all compliance of HIPAA security policies.


Senior IT Security Analyst / HIPAA Compliance Auditor

  • Managed and completed HIPAA compliance audit for NM DOH (WIC) as tasked. Audit completed on time and submitted documentation for acceptance to management according to contract terms.

Confidential,New Mexico

IT Support and Security Consultant/Manager

  • Delivered 365/24/7 support for the military facilities located in New Mexico. Documented the distance learning operations and infrastructure. Communicated regularly with the Department of Defense (DOD) and Army HQ. Provided IT Security oversight and review as tasked.

Confidential, Albuquerque, NM

IT Consultant (Security, Network, Hardware, & Software)

  • Provided 365/24/7 on-call support the company and its contracted organizations. Ensured that organizations complied with current government regulations for networks and security. Supported and resolved issues regarding software, network, and security issues and potential intrusions.

Hire Now