Cyber Security Analyst Resume
3.00/5 (Submit Your Rating)
Irving, TexaS
SUMMARY:
- Over 5 years of experience in Cyber Security/Information Security Analysis with the following know - how:
- Working knowledge of Security Operations Center (SOC)/Network Operations Center (NOC).
- Advances knowledge of Security Standards/Guidelines such as FISMA, SOX, PCI, GLBA, AND HIPAA
- Experience in the detection, response, mitigation, and/or reporting of cyber threats.
- Working knowledge of Intrusion detection/protection systems.
- Knowledge and understanding of network devices, and secure architectures.
- Advanced knowledge of network protocols and system log analysis.
- Experience analyzing log files and correlating security related events.
- Knowledge of Data Loss Prevention monitoring.
- Knowledge of Threat Monitoring Procedures.
- Knowledge of incident investigation and response.
- Knowledge of networking fundamentals (OSI Model, TCP/IP, DNS, HTTP, SMTP).
- Knowledge of the following security-related technologies: IPS, IDS, SIEM, firewalls, DNS, encryption, HIDS, NIDS, proxies, network packet analyzers, malware analysis, and forensic tools.
TECHNICAL SKILLS:
IDS and IPS: Snort, Sourcefire, Tipping Point, and Suricata.
Vulnerability Assessment: Qualys, ISS Scanner, and Nmap
SIEM: EventLog Analyzer, Solar Winds, and Splunk
Forensic/Malware: Encase, FireEye Helix, NetWitness, and FTK
Network Sniffers: Wireshark, Ethereal and Tcpdump
Firewall: Juniper, Checkpoint, Palo Alto
Encryption: PGP, PKI and X.509
PROFESSIONAL EXPERIENCE:
Confidential, Irving, Texas
Cyber Security Analyst
Responsibilities:
- Ensures that Security control Standards such as PCI, HIPAA, FISMA, and SOX are implemented.
- Prioritizes, and analyzes security threats, incidents and key metrics.
- Maintains security documentation including the incident response plan and security logging & monitoring Standards.
- Periodically conducts a complete review of each system's audits and monitor corrective actions until all actions are closed.
- Analyzes potential cyber threats from a variety of intakes taking appropriate response actions to include threat containment and/or escalation.
- Monitors and reviews events using a security incidence and events monitoring (SIEM) Console to identify trends, attacks, and potential threats.
- Responsible for monitoring network security events and alerts.
- Investigates security incidents and aiding in the incident response process.
- Develops detailed reports on security investigations.
- Makes improvements and suggestions to advance the overall security processes in place.
- Recommends remediation and mitigation solutions based on vulnerability discoveries.
- Determining true threats, false positives and network system misconfigurations and provide solutions to issues detected in a timely manner.
- Monitors network for potential compromise, intrusion, deficiency, significant event or threat to the security posture and security baseline.
- Updates and maintains standard operating procedures and other technical documentation.
Confidential, Atlanta, Georgia
Cyber Security Analyst
Responsibilities:
- Monitored, identified, and analyzed security risks to determine impact on the organization
- Maintained and updated business continuity plan and related policies and procedures.
- Analyzed variety of network and host-based security appliance logs (Firewalls, NIDS, HIDS, Sys Logs, to determine the correct remediation actions and escalation paths for each incident.
- Monitored and review events using a security incidence and events monitoring (SIEM) Console to identify trends, attacks, and potential threats.
- Identified malicious or anomalous activity based on event data from firewalls, IDS, and other sources.
- Performed analysis of network security needs and contributes to design, integration, and installation of hardware and software.
- Maintained, performed and updated the cyber security and IT risk assessment process.
- Reviewed, analyzed and interpreted cyber-alerts and events from various systems to identify cyber intrusions or data loss.
- Performed analysis on phishing emails and associated malware.
- Evaluated health and management of Anti-Virus, Anti-Malware.
- Ensures that Security control Standards such as PCI, HIPAA, FISMA, and SOX are implemented.
- Adhered to all corporate security policies and standards as they relate to job duties.