Information Security Analyst Resume
5.00/5 (Submit Your Rating)
Atlanta, GA
SUMMARY:
- Security Analyst with comprehensive knowledge and experience with online tools such as Confidential.
- Experience in ensuring the integrity of accounts and information across multiple networks.
- Maintained a secret clearance to ensure eligibility to deal with classified documents.
- Demonstrated successful communications and security in areas such as Confidential and companies.
- Provided support in responding to alerts, managing multiple events, and maintaining valuable intel with Incident Response team and Forensic Investigators.
- Seeking a professional environment in cyber security.
PROFESSIONAL EXPERIENCE:
Confidential, Atlanta, GA
Information Security Analyst
Responsibilities:
- Utilize third party vendors such as Proofpoint TAPs and Dell SecureWorks to investigate login failures, emails with malicious attachments, malicious links, escalated privileges, and infected devices reaching out to malicious domains.
- Utilize tools such as Carbon Black to determine if a machine successfully downloaded a malicious binary or process.
- Enhanced security by providing feedback on improving processes for security procedures and business continuity.
- Gathered and utilized threat intel such as IOC’s and hashes using tools such as Confidential, Confidential Threat Database, and InfoArmor.
- Assisted in phishing simulations and informing workers on how to approach a malicious document or email and who to contact if they should ever come across one.
- Lead SOC Analyst with phishing attempts on the network, utilizing and tuning Confidential triage tool, creating YARA rules and automated response recipes, creating regex strings, and providing remediation.
- Coordinated with other IT groups on mitigating risk and IP addresses of malicious domains.
- Conducted log analysis searches using Splunk and Kraken.
- Conducted dynamic analysis using Confidential WildFire and Cuckoo.
- Conducted analysis with credential stealing domains and mitigated the threat posed by the network and user.
- Assisted in training less experienced analyst on how to use tools such as Dell SecureWorks and Splunk.
Jr. Information Security Analyst
Responsibilities:
- Contributed and worked alongside a team of eight cyber security professionals/forensic investigators working with Intrusion Detection Systems (IDS) software.
- Observed and analyzed traffic from malicious actors in order to learn information and counter against such threats and activity.
- Monitored and analyzed a worldwide network for cyber security events and anomalies.
- Provided high - level analysis on security data and legitimacy of domains and files using online tools such as Confidential .
- Coordinated, implemented and maintained standard and procedures to protect the security and integrity of information systems and data.
- Provided daily detailed status updates on existing cyber security incidents to follow up with the client to ensure satisfactory resolution.
- Interacted with forensic analysts conducting threat analysis operations as well as numerous IT professionals performing various technical roles within the organization.
- Conveyed verbal reports to senior management on pending and concluded cyber incidents and managed opened tickets on new incidents.
- Continuously monitored, analyzed and identified security alert information from system logs as well as conveyed information to different ISOs worldwide on threats and anomalies sighted.
- Utilized Intrusion Detection/Prevention Systems (IPS/IDS) and Security Information and Event Management (SIEM).
Network Technician
Responsibilities:
- Install, deploy, support and maintain all encrypted devices and analyzed the systems to detect anomalies.
- Implemented DOD-5220.22M to ensure sensitive data and private information on the hard drive could not be recollected.
- Daily use of IPS/IDS to query updates, investigate anomalies, replay attacks, and deny or promote access.
- Explain technical terms, risk management, and communicate with technical and non-technical employees.
- Gave classes on cyber awareness training and how to avoid basic outside threats such as viruses, Trojans, worms, and as well as social engineering.
- Assist in the development of processes to maintain data integrity and encrypted communications between units