We provide IT Staff Augmentation Services!

Security Operations Analyst Resume

5.00/5 (Submit Your Rating)

Washington, DC

SUMMARY:

  • Cyber Security analyst with more than 3 years’ experience in Information Technology.
  • Developed strong analytical skills and a broad range of computer expertise.
  • I am team oriented with the ability to develop and execute ideas and initiatives.
  • Hands - on experience leading all stages of system development efforts, including requirements definition, design, testing, and support. Interested in a company or institution that offers a consistently positive atmosphere to learn new technologies and implement them.

TECHNICAL SKILLS:

Operating Syst e m s: W indows Operating systems 7, 8 and 10, Mac OS, Basic Unix- Based System ( L inux ), Sha r ePoint.

Securi t y T e chno l og i es: F i reE ye, HP A rcS i ght E S M, Sourcef i re, RSA S ecur i ty A na l y ti c s, W i r esha r k, TCPDump, Snor t, Sp l unk, McA fee ePoli cy O rches t rat o r, Imper va S ecure Sphere (WAF), N e tw ork A ccess C on t r ol Coun t e r ACT ( N A C) McA f ee Web G a teway, A c t i ve T ru s t, R ed S ea l, Conso le ( M A M), IBM AppScan, Encase and FTK, Tenable Security Centre, Cisco IronPort, MS Exchange, Mail Filtering. Vulnerability Scanning/Assessments, Symantec EndPoint Protection

PROFESSIONAL EXPERIENCE:

Confidential, Washington, DC

Security Operations Analyst

Responsibilities:
  • Conducted dynamic packet analysis of traffic by using Wireshark and collecting threat intelligence to ensure secure data transmission between classified systems.
  • Conducted log analysis using Splunk to collects and indexes log machine data from various source of user’s machine
  • Performed malware analysis within the Security Operations Center (SOC) environment for Identifying indicators of compromise
  • Prepared br i ef ings and repor ts of ana l ys is methodo logy and re s u lt s.
  • G enera ted end- o f - s h i ft r epo rts for documen t a t i on and know l edge t rans fer to s ubsequent ana l ys ts on du t y.
  • Com municates a l e rts to agencies regarding i n tr usi ons and comprom ises to the ir net work i n fr a s t ruc ture, appl ica t ions and ope r a ting s y stem s.
  • R ecogn i z ed po ten ti a l, succe s sfu l, and unsucces s ful i n t rus ion a ttempts and compro m i ses thorough rev iews and ana l yses of re levant event de t a il and sum mary i n f o r m a tion.
  • Performed prel i m inary fo r ens ic eva l uati ons of i n t e r nal sys tems.
  • T a s ks o t her anal y s ts and d i rec ts ef f or ts to ana l yze the I DS and rem ed i a te secur ity i s sues f ound.
  • T ra ined i ncom ing ana l ys ts in ro l es and r e s pons i b ili t i e s.
  • Communi ca t es a ler ts to agenc i es reg a r d ing i n tr u s ions and comprom i s es to t he ir ne tw o rk i nf r as t ruc t u r e, app lica tions and opera t ing systems. A ss i s ts w i th i m p l e ment a tion of coun ter -measures or m it i ga t ing con t ro l s.
  • G enera ted end- o f - s h i ft r epo rts for documen t a t i on and know l edge t rans fer to s ubsequent ana l ys ts on du t y.
  • E va l ua ted f i rewall change reques ts and assess o r gan i za tional r is k.
  • E n s ures t he integ rity and pro t ec t i on of ne t w o r k s, s ys t e m s, and app li ca t i ons by t echn i cal en f orcement of or gan i z a t i onal secur ity policies, t hrough moni tor ing of vulnerab i l ity s cann ing dev ices.
  • Perfor med pe r i od ic and on- demand sys tem aud i ts and v u l ne r ab ili ty asses s men t s, i nc l ud ing u s er accoun ts, app lica tion acces s, f ile system and ex t ernal Web i n teg rity scans to de t e r m i ne compliance.
  • Conducted ne t w o rk asse ss m en t s, t r aff ic ana l ys is ut i l i z ing PC AP, I DS and craf t ed sen s or ou tput
  • Conti nuous ly mon i t or ing and perfo r m ing rea l - t i me i nc ident handl ing to ti mely t r i age a l er ts
  • G enera ted and u t i l i zes a tt ack si gna t u r es, t ac tics, techn iques and procedures to a id in iden ti f ica tion of anomaly and zero day attacks.

Confidential,Rockville,MD

Incident Response/Forensic Engineer

Responsibilities:
  • Coordinated remediation actions as necessary and performing initial analysis, identification and documentation of network intrusions.
  • Handled incidence escalations as necessary between other analysts.
  • Performed basic malware analysis and forensic analysis of network activity, disks, and memory
  • Interpreted incoming incident reports, prioritizing them, and relate them to ongoing incidents and trends
  • Conducted triage and analyzed threats/vulnerability alerts to determine current impacts affecting the company’s information assets.
  • Initiated incident handling procedures to isolate and investigate potential information system compromises.
  • Logged incidents into the Information Security Incident Management System and assist in generating weekly reports based on security incidents.
  • Developed network baseline; maintains up-to-date signature levels; reports anomalies as required by Agency security.
  • Identified various events boundaries and assisted in configuration of Splunk to apply custom metadata to incoming events.
  • Analyzed U.S Certs indicators of compromise (IOCs) to recognize attacks from various area network area
  • Research and recommends forensic tools to 2nd level analyst for improvement of productivity and accuracy of investigations.
  • Executed processes within all activities within the security Incident response lifecycle that includes detection, triage, analysis, containment, and recovery
  • Periodically scans for vulnerabilities using Tenable Security Center tool in accordance with implemented organizational policy and report findings in accordance with established procedures.
  • Conducted security audit log analysis for Agency systems. Logs from firewalls, Intrusion Detection Systems (IDS), operating systems, RSA Analytics and other security appliances.
  • Provided advice for suspected risks as well as recommended mitigating techniques and corrective actions.
  • Provided technical guidance and assistance to others involved in the investigation to ensure precautions are taken to prevent data and equipment damage.
  • Drafted technical manuals, security operation plans (SOPs), installation manuals, installation progress updates, and incident response plans in order to enhance system security documentation
  • Monitored ARCSIGHT Console for events that are generated due to correlation of the events.
  • Enforce IT processes to ensure consistent, well-integrated application structures in full compliance with the company’s procedures

Confidential, Washington D.C

Forensic and Data Analyst

Responsibilities:
  • Identified vulnerabilities, recommend corrective measures and ensure the adequacy of existing information security controls.
  • Performed security research, analysis and design for all client computing systems
  • Use information technology tools and systems to track and report on work activities
  • Recognized for outstanding quality of customer service with numerous customer-support awards and personal commendation from clients.
  • Performed various special projects and assignments related to information technology/security
  • Conduct computer forensics examination and analysis techniques by using Encase and FTK in order to properly preserve electronic and digital evidence, so that it may be presented in a court of law
  • Provide custody of equipment used in crimes, including computers, thumb drives, CDs and DVDs, backup tapes, smartphones and digital cameras
  • Generate files by using imaging software to copy data and disks
  • Exploitation of file recovery programs to search for and restore deleted data
  • Maintains the chain of custody for evidence
  • Handle event incidents and tracking of system activities
  • Created company policies and procedures governing corporate security, email and Internet usage, access control, and incident response.
  • Utilized Security Information and Event Management (SIEM), Intrusion Detection & Prevention (IDS / IPS), Data Leakage Prevention (DLP), forensics, sniffers and malware analysis tools.
  • Assist with managing, updating, and identifying business requirements for the applicable tools used in the approval process
  • Identified weaknesses in fielded configurations while performing system requirement analysis and design modifications

We'd love your feedback!