We provide IT Staff Augmentation Services!

Information Assurance Analyst Resume

3.00/5 (Submit Your Rating)

SUMMARY:

  • Demonstrated experience in IT Governance security practices such as FISMA, NIST, and others. Experience with security tools and technology, and more. Seeking a position to utilize my technical and analytical skills in the field of cybersecurity.

TECHNICAL SKILLS:

Cyber Security Tools: Sourcefire, FireEye, ArcSight, WireShark, SplunkVulnerability Testing Tools: Nessus, AppScanSecurity Standards: FISMA, FIPS 199, 200.

EXPERIENCE:

Information Assurance Analyst

Confidential

  • Documentation review of System Security Plans, observation and reviewing the results of technical tests.
  • Conducted audit interviews, control testing for ( ) to create and produce Security Assessment and Risk Assessment.
  • Performed testing using a streamlined methodology and customized tools in addition to Nessus vulnerability scanning.
  • Coordinated Network Scanning Assessment efforts.
  • Assist scanning tools during the development process to help them meet security requirements in a rapid development environment.

Cyber Security Analyst

Confidential

  • Presenting vulnerability reports to vendors, application owner, and management in weekly meetings.
  • Performed vulnerability scans across the network to identify critical and high vulnerabilities. Also scanning web applications looking for cross - site scripting, or malware.
  • Analyzing the scans after completion to identify false positives in the findings, and summarizing the vulnerability scan data and importing them into a custom report.
  • Identifying threats and notifying application owners and vendors of vulnerabilities found on their network.
  • Updating and maintaining current SOP with the latest information, and procedures.

Security Analyst

Confidential

  • Documented security Incidents and event putting them into a custom report and sending them to their appropriate authority.
  • Monitored and reviewed correlated security events via ArcSight, Splunk, and other security tools.
  • Reviewed and analyzed IDS/IPS logs using Sourcefire, BRO IDS, and McAfee HIPS.
  • Conducted custom logs searches via Splunk to find malicious content on the network.
  • Made recommendations to management to block external threats at the firewall and proxy level.
  • Performed continuous monitoring to maintain security of the network,
  • Conducted investigations on suspicious emails that may have contained malware or possibly a phishing attack.
  • Preformed daily Malware scans to identify workstations with malicious files on them using Nessus.

We'd love your feedback!