We provide IT Staff Augmentation Services!

Cyber Security Analyst Resume

5.00/5 (Submit Your Rating)

Tulsa, OklahomA

SUMMARY:

  • An Information Systems professional who has a background in Security Engineering, and IT Security with Masters.
  • I am always looking for opportunities to increase my Knowledge in the IT area. An Information Security expert with focus on Cyber security Splunk, continuous monitoring, access control and compliance.
  • Performed IT and security risk assessments and audits on multiple companies and performed corporate risk analysis Entrusted with large volumes of sensitive information recognizing privacy and confidentiality requirements.

TECHNICALSKILLS:

  • Splunk
  • Sentinel One
  • SIEM
  • Akamai incident management e Drive Encryption
  • McAfee
  • Imperva DAM
  • WIPS
  • Proxy
  • Crowd Strike
  • Data Pipe
  • DDos Analysis
  • Bot Detection NCDC
  • EVTK Tool
  • Bit9
  • Zscaler
  • Scansafe
  • FireEye
  • DNS logs
  • Shield Ticketing System
  • Service Now
  • PaloAlto Firewalls
  • Cireson
  • BlueCoat
  • Symantec DLP
  • Cisco IronPort
  • Nexpose.

PROFESSIONAL EXPERIENCE:

Cyber Security Analyst

Confidential - Tulsa, Oklahoma

  • Maintains records of security monitoring and incident response activities, utilizing case management and ticketing technologies
  • Administrative duties monitoring Outlook email using Cisco IronPort security
  • Monitoring of security events in the SIEM, as well as other security feeds, and communications (email, phone, chat, and other communications.
  • Reviewed client mobile applications for security compliance, with a focus on malware and potentially harmful behavior.
  • Security incidents to provide management oversight to the incident process.
  • Perform tuning of the Security Incident and Event Manager (SIEM) filters and correlations to continuously improve monitoring
  • Triage security alerts and events.
  • Manage IDS/IPS systems as well as handled incident response.
  • Discovered methods and implemented strategies to target specific networks, computer systems, specific hardware or software.

Information Security Analyst

Confidential - Wakefield,MA

  • Security operations, monitoring, incident response and investigation
  • Tuning and updating security tools including SIEM (McAfee ESM \ Nitro), IDS/IPS, DLP, Web Proxy.
  • Develop content and workflows as required.
  • Respond to incidents by analyzing digital evidence and ensure proper documentation and tracking
  • Provide intrusion detection expertise to support timely and effective decision making.

Cyber Security Analyst

Confidential, Beaverton, OR

  • Proactively monitor, identify, and remediate information security events and intrusions.
  • Identify Proxy logs Using Splunk and Crowd Strike depending on the threat detected.
  • Identification of Phishing Emails on Nike s Network.
  • Conduct log analysis, proactive monitoring, mitigation, and response to network and security incident.
  • Provided continuous monitoring and interpretation of threats through use of intrusion detection systems, firewalls and other boundary protection devices, and any security incident management products deployed
  • Responsible for the continuous surveillance, analysis, mitigation, remediation and incident management using the Confidential ’s suite of tools.
  • Perform log analysis utilizing Splunk and various other security software and tools.
  • Worked on SailPoint IIQ for User access management procedures and policies.
  • Respond to security events and drive issues to closure while engaging all appropriate resources.
  • Create new Standard Operating Procedures while also maintaining and updating current ones as changes happen.
  • Stays current on security technologies, trends, standards and best practices.
  • Perform log analysis and monitor and respond to security events driving issues to closure engaging all appropriate resources.
  • Responsible for document preparation of NCDC daily Report.
  • Document security process and procedures
  • Perform actions using Bulk UPMID s Reset & Revoke tool.
  • Provide enforcement of security policies, standards and procedures.

Information Security Analyst

Confidential -ENGLEWOOD,CO

  • Performed real-time proactive Security monitoring and reporting on various Security enforcement systems, such as NITRO (SIEM) , Anti-virus, Internet content filtering/reporting, malware code prevention, Firewalls, IDS & IPS , Web Security , Anti-spam, etc.
  • Provide Level 2 Operations support for end user resolution investigating RSA SIEM events to determine any true intrusions.
  • Identifying and remediating any threats and vulnerabilities as a Security Monitoring (SOC), Triage and Escalation to T2.
  • Documenting incident results and reporting details through ticketing system
  • Monitoring DDoS portals and alerting the team by reporting them using pager and opening the bridge call.
  • Performed Risk and security assessments, compliance management analysis
  • Providing half an hour updates on traffic by monitoring portals from ISP’s.
  • Triaging emails sent by internal users depending on the categories and responding to the customers after investigating the emails.
  • Researched and Supported Information Security Standards.
  • Provide Rotation 24/7 On Call support.
  • Formulated and configured Logger appliances and analyzed system anomalies.
  • Managed, upgraded and maintained operational data flows and Arc Sight platforms.
  • Maintained and modified hardware and software components, content and documentation.
  • Created and documented reports, rules, trends and Dashboard.
  • Analyzed ArcSight and related tools and resolved IT security failures.
  • Provided guidance for equipment checks and supported processing of security requests.
  • Experience in Network Intrusion detection/Intrusion Prevention System and Firewalls.
  • Utilize Security Information and Event Management (SIEM), Intrusion Detection & Prevention (IDS / IPS), Data Leakage Prevention (DLP), forensics, sniffers and malware analysis tools
  • Security Incident handling, SIEM using RSA Envision/Arc Sight products.
  • Excellent exposure to Database, VPN technologies, and Firewalls.

Security Operations Engineer

Confidential

  • Analyze system logs and identify potential issues with computer systems .
  • Maintained and modified hardware and software components, content and documentation.
  • Initiated and integrated new technologies into existing data center environments.
  • Responsible for maintaining availability, reporting and communication of the SIEM between it, its event-sources and the endpoints .
  • Communicate and troubleshoot technical inquiries of co-workers and clients.
  • Research methods to improve security through encryption to maintain security of information.
  • Responsible for monitoring and, providing analysis in SIEM, IDS/IPS software tools.
  • Create and maintain high-quality documentation of all relevant specifications, systems , and procedures.
  • Assist in the development of processes to maintain business continuity and recovery standards for endpoint systems and networks.
  • Excellent exposure to Database, VPN technologies, and Firewalls.

We'd love your feedback!