We provide IT Staff Augmentation Services!

Cyber Security Analyst Resume

Irving, TexaS


  • Over 5 years of experience in Cyber Security/Information Security Analysis with the following know - how:
  • Working knowledge of Security Operations Center (SOC)/Network Operations Center (NOC).
  • Advances knowledge of Security Standards/Guidelines such as FISMA, SOX, PCI, GLBA, AND HIPAA
  • Experience in the detection, response, mitigation, and/or reporting of cyber threats.
  • Working knowledge of Intrusion detection/protection systems.
  • Knowledge and understanding of network devices, and secure architectures.
  • Advanced knowledge of network protocols and system log analysis.
  • Experience analyzing log files and correlating security related events.
  • Knowledge of Data Loss Prevention monitoring.
  • Knowledge of Threat Monitoring Procedures.
  • Knowledge of incident investigation and response.
  • Knowledge of networking fundamentals (OSI Model, TCP/IP, DNS, HTTP, SMTP).
  • Knowledge of the following security-related technologies: IPS, IDS, SIEM, firewalls, DNS, encryption, HIDS, NIDS, proxies, network packet analyzers, malware analysis, and forensic tools.


IDS and IPS: Snort, Sourcefire, Tipping Point, and Suricata.

Vulnerability Assessment: Qualys, ISS Scanner, and Nmap

SIEM: EventLog Analyzer, Solar Winds, and Splunk

Forensic/Malware: Encase, FireEye Helix, NetWitness, and FTK

Network Sniffers: Wireshark, Ethereal and Tcpdump

Firewall: Juniper, Checkpoint, Palo Alto

Encryption: PGP, PKI and X.509


Confidential, Irving, Texas

Cyber Security Analyst


  • Ensures that Security control Standards such as PCI, HIPAA, FISMA, and SOX are implemented.
  • Prioritizes, and analyzes security threats, incidents and key metrics.
  • Maintains security documentation including the incident response plan and security logging & monitoring Standards.
  • Periodically conducts a complete review of each system's audits and monitor corrective actions until all actions are closed.
  • Analyzes potential cyber threats from a variety of intakes taking appropriate response actions to include threat containment and/or escalation.
  • Monitors and reviews events using a security incidence and events monitoring (SIEM) Console to identify trends, attacks, and potential threats.
  • Responsible for monitoring network security events and alerts.
  • Investigates security incidents and aiding in the incident response process.
  • Develops detailed reports on security investigations.
  • Makes improvements and suggestions to advance the overall security processes in place.
  • Recommends remediation and mitigation solutions based on vulnerability discoveries.
  • Determining true threats, false positives and network system misconfigurations and provide solutions to issues detected in a timely manner.
  • Monitors network for potential compromise, intrusion, deficiency, significant event or threat to the security posture and security baseline.
  • Updates and maintains standard operating procedures and other technical documentation.

Confidential, Atlanta, Georgia

Cyber Security Analyst


  • Monitored, identified, and analyzed security risks to determine impact on the organization
  • Maintained and updated business continuity plan and related policies and procedures.
  • Analyzed variety of network and host-based security appliance logs (Firewalls, NIDS, HIDS, Sys Logs, to determine the correct remediation actions and escalation paths for each incident.
  • Monitored and review events using a security incidence and events monitoring (SIEM) Console to identify trends, attacks, and potential threats.
  • Identified malicious or anomalous activity based on event data from firewalls, IDS, and other sources.
  • Performed analysis of network security needs and contributes to design, integration, and installation of hardware and software.
  • Maintained, performed and updated the cyber security and IT risk assessment process.
  • Reviewed, analyzed and interpreted cyber-alerts and events from various systems to identify cyber intrusions or data loss.
  • Performed analysis on phishing emails and associated malware.
  • Evaluated health and management of Anti-Virus, Anti-Malware.
  • Ensures that Security control Standards such as PCI, HIPAA, FISMA, and SOX are implemented.
  • Adhered to all corporate security policies and standards as they relate to job duties.

Hire Now