We provide IT Staff Augmentation Services!

Cyber Security Analyst Resume

2.00/5 (Submit Your Rating)

SUMMARY:

  • Over 8 years of experience in Information Technology services supporting security initiatives for government and commercial customers.
  • Work experience encompasses threat analysis, incident response, network surveillance, Data mining, Risk Management Framework (RMF), National Institute of Technology (NIST), System Development Life Cycle (SDLC), Information security documents, developing and promulgating Security Assessment Plans (SAP) and Security Assessment Reports (SARs).

PROFESSIONAL EXPERIENCE:

Confidential

Cyber Security Analyst

  • Apply appropriate information security control for Federal Information System based on NIST 800 - 37 rev1, SP 800-53, FIPS 199, FIPS 200, and NIST SP 800-53A R4
  • Assess security controls and develop security assessment report (SAR)
  • Support A&A activities (Categorize, Selection, Implement, Assessment, Authorize, Monitor) according to the A&A project plan.
  • Review authorization documentation for completeness and accuracy for compliance.
  • Facilitate Security Control Assessment (SCA) and monitor activities.
  • Executed examine, interview, and test procedures in accordance with NIST SP 800-53A Revision 4.
  • Ensure cyber security policies are adhered to and that required controls are implemented.
  • Validated information system security plans to ensure NIST control requirements are met.
  • Assist team members with proper artifact collection and detail to client’s examples of artifacts that will satisfy assessment requirements.
  • Review security logs to ensure compliance with policies and procedures and identifies potential anomalies.
  • Update and review A&A Packages to include Core Docs, Policy & Procedures, Operations and .Maintenance Artifacts, SSP, SAR, FIPS 200, FIPS 199, and POA&M.
  • Collect Operation and Maintenance artifacts on an ongoing basis so that Security Control Assessment (SCA) is seamless.
  • Upload supporting documentations into the Sharepoint, Google Docs, and IACS (Xacter360).
  • Manage vulnerabilities with the aid of Nessus vulnerability Scanners to detect potential risks on a single or multiple assets across the enterprise network.

Confidential

Information Security Analyst

  • Ensure proper system categorization using NIST 800-60 and FIPS 199; implement appropriate security controls for information system based on NIST 800-53 rev 4 and FIPS 200.
  • Conduct security assessment interviews to determine the Security posture of the System and to
  • Perform kick Off Meetings
  • Apply appropriate information security control for Federal Information system based on NIST 800-37 Rev 4
  • Facilitate Security Control Assessment (SCA) and monitor activities.
  • Develop a Security Assessment Report (SAR) in the completion of the Security Test and Evaluation (ST&E) questionnaire using NIST SP 800-53A required to maintain Company Authorization To Operate (ATO), the Risk Assessment, System Security Plans, and System Categorization.
  • Reviewing, maintaining, and ensuring all assessment and authorization (A&A) documentation is included in the system security package.
  • Perform information security risk assessments and assist with the internal auditing of information security processes. Assessed threats, risks, and vulnerabilities from emerging security issues and also identified mitigation requirements.
  • Work with system owners to develop, test, and train on contingency plans and incident response plans.
  • Tests, assess, and document security control effectiveness. Collect evidence, interview personnel, and examine records to evaluate effectiveness of controls.
  • Review and update remediation on plan of action and milestones (POA&Ms), in organization’s Xacter 360. Work with system administrators to resolve POA&Ms, gathering artifacts and creating mitigation memos, residual risk memos and corrective action plans to assist in the closure of the POA&M.

TECHNICAL SKILLS

  • Microsoft Office Suite
  • IACS 360
  • Adobe
  • Qualified Typist (70wpm)
  • Nessus Vulnerability Scanner (SC-5)
  • MS Project
  • Windows (10,8,7, Vista, XP) Linux
  • FEDRAMP\
  • Intro to Oracle,
  • SQL+
  • BTI 7000
  • BTI & Ciena DWDM’s (Demultiplexer/Multiplexer)
  • Lucent DMX, Lambda Unite & Lambda Extend Switches
  • Adtran Advisor Management System
  • MS Office Suite: Excel, Word, Outlook, Power Point, Visio
  • VPN (Virtual Private Network) Access
  • NETFLEX
  • Hekimian REACT Circuit Testing GUI
  • SONET Optical Transport
  • VOIP
  • WaveStar

We'd love your feedback!