We provide IT Staff Augmentation Services!

Cyber Security Analyst Resume

4.00/5 (Submit Your Rating)

CA

CAREER OBJECTIVE

Seeking a position within a security - aware, IT-minded company where I can provide in-depth expertise in the operation, analysis, optimization, and security of information technology systems. My goal is to ensure secure network management, fast problem resolution, and continue to develop in my field to be an asset to my company.

SUMMARY:

  • 10+ years Communications experience in complex and highly secure DOD information systems
  • Ability to provide technical assistance and training on switches, routers, signal communications, supported electronic equipment, satellite radios, and telecommunications equipment
  • Has installed, maintained, and troubleshot signal support equipment, host/client devices, radio and data distribution systems
  • In-depth knowledge of PC Hardware, desktop Operating Systems options and settings, and network functionality
  • Has set up and maintain a business sized network
  • Working knowledge of network security protocols and routing protocols
  • Can run, splice, polish, and terminate fiber optic, and Ethernet cables.

TECHNICAL SKILLS:

  • Microsoft Office Suite Unix
  • Microsoft Active Directory Red Hat Linux
  • Microsoft Server 2003/2008 Virtual Local Area Networks (Vlans)
  • Microsoft Operating Systems: XP/VISTA/7/8/10 Vi
  • LANdesk / SCCM Solaris System
  • Cisco Command Line Interface Qradar
  • Cisco Call Manager, Switches, and Routers Rapid 7

PROFESSIONAL EXPERIENCE:

Confidential, CA

Cyber Security Analyst

Responsibilities:

  • Analyze offenses generated in QRadar (SIEM) and determine course of action, whether to escalate as an attack or create Service Requests to other IT groups for resolution of misconfigured devices.
  • QRadar Admin work of Rule creation and changes to system rules to suite our environment. Maintain configuration logs of these changes.
  • Management of QRadar connected hosts for firmware and software upgrades issued by IBM for both appliances and VMs.
  • Part of process creation for offenses received in QRadar, as well as updating documentation and processes as changes arise.
  • Use of various methods including FireEye to clear websites for whitelisting, and then adding sites to defined categories (Cisco SMA)
  • Monitor tasks in LanDesk ticketing system for requests, including whitelisting, account lockout investigations in QRadar and device scanning in Rapid7.

Confidential, Sacramento, CA

Head of IT Services

Responsibilities:

  • Responsible for upkeep of all work stations, user account creation, user accounts.
  • Volunteer work

Confidential Cordova, CA

ISSO, Information System Security Officer

Responsibilities:

  • Perform weekly and monthly continuous monitoring checks (ref. Risk Management Framework) and physical security checks (closed area inspections, protected distribution system (PDS) checks)
  • Perform initial in-person training prior to closed area access, account creation, or special removable media permissions; track and document subsequent annual online refresher training and required forms verifying need to know (NTK), security classification guide training and/or removable media procedures and policies
  • Sanitize, image, and configure Windows 7 systems in accordance with DSS Baseline Technical Security Configuration Guide in preparation for classified use. (Ref. National Industrial Security Program Operating Manual (NISPOM) Chapter 8 and DD 254)
  • Closed area custodian and point of contact for two closed areas, six security containers (ref. Defense Security Service (DSS) and Industrial Security Field Operations (ISFO) Manual)
  • Install, maintain, and repair hardware and software issues for all workstations; perform routine hardware upgrades and software updates/upgrades as needed
  • Coordinate and deploy quarterly Security Patches for Multi-User Stand Alone (MUSA) and Peer to Peer (P2P) systems, as well as assist with Microsoft System Center Configuration Manager (SCCM) deployment for client/server systems .
  • Controlled user accounts with Microsoft Active Directory
  • Perform routine security audits, account creation/maintenance, operating system troubleshooting and repair for Linux (Red Hat Enterprise) and QNX systems (UNIX-like)
  • Active member of Incident Response Team; responsible for collecting hardware, performing local system scans/analysis, hardware sanitization as needed.

Confidential, Cordova, CA

Flex-tech, Service Center

Responsibilities:

  • Provided prompt initial response to all assigned service requests either in-person or remotely utilizing phone, remote tools (RDP, LANDesk Remote control)
  • Troubleshot the system problem and complete repair in a timely and efficient manner, insuring minimal recurrence of problem
  • Appropriately document all required information into the ticket tracking system

Confidential, Vallejo, CA

Corporal - MOS 88K - Communications Chief

Responsibilities:

  • Network administrator, System administrator, and maintainer for a Harbor Master Command and Control Center
  • Inventory includes: ~20 workstations, ~40 user accounts, ~4 VIOP phones

Confidential, Reno, NV

Specialist - MOS 25Q - Multichannel Transmission System Team Chief

Responsibilities:

  • Monitored the southern WAN of Afghanistan from the HUB via different SNMPc tools, BER,
  • Troubleshoot transmission problems, and network problems that hindered successful data
  • Installed, operated and maintained multichannel line-of-site and tropospheric scatter
  • Configured and maintained telecommunications equipment such as multiplexers, trunk group
  • Became familiar with Microsoft Server 2008
  • Maintained existed Cisco routers and switches via Command Line Interface

Confidential, Reno, NV

Specialist - MOS 25B - Network Administrator

Responsibilities:

  • Maintained a MAN sized network comprised of 3 routers, and 47 total switches over 3 levels of mandatory access control
  • Used a combination of Cat 5, fiber, and line of sight to establish communications for over 200 users
  • Setup up network printers, and workstations without DHCP over 3 levels of mandatory access control
  • Configured Cisco switches and routers using command line interface
  • Installed image of registered US Army version of Windows 7 to workstations
  • Installed and supported Microsoft Office 2007
  • Configured, Cisco Unified Communications Manager (CallManager) for about 50 VOIP phones
  • Maintained existing Cisco switches and routers

Confidential, Reno, NV

Call Center Dispatch Operator

Responsibilities:

  • Responsible for answering the call of clients then accurately entering the information into the ticketing system for the drivers to respond to the call
  • Solving client disputes if any arise

Confidential, Sacramento, CA

Multichannel Vehicular Radio Installer

Responsibilities:

  • Removed multi-channel radios from California’s state vehicles and replaced them with upgraded Motorola versions
  • Performed complete break-down and set-up of radios on an array of state vehicles
  • Safely wired many vehicles’ electrical systems to minimize the chance of shorts or electrical fire

Confidential, Sacramento, CA

Specialist - MOS 25U - Signal Communications Chief

Responsibilities:

  • Maintained communication and encryption devices on ground and in Blackhawk helicopters
  • Inventoried and distributed encrypted material to supported units
  • Destroyed encryption based on time and suspected security risks
  • Installed, configured, operated, and maintained tactical radios for Flight Operations to communicate with aircraft for tracking purposes.
  • Operated and maintained FBCB2 Blue Force Tracker (troop and vehicle movement tracker overlaid on a digital chart)
  • Provided helpdesk duties for Task Force (roughly 1000 end users) for unclassified and classified networks.
  • Worked as helpdesk and desktop support for Task Force where I supported operating systems: Windows XP, 7
  • Became familiar with Unix, Red Hat Linux, Solaris, Microsoft Server 2003, Microsoft Office Suite 2007
  • Escalated/checked privileges in Active Directory

We'd love your feedback!