Information Assurance Analyst Resume
3.00/5 (Submit Your Rating)
SUMMARY:
- Demonstrated experience in IT Governance security practices such as FISMA, NIST, and others. Experience with security tools and technology, and more. Seeking a position to utilize my technical and analytical skills in the field of cybersecurity.
TECHNICAL SKILLS:
Cyber Security Tools: Sourcefire, FireEye, ArcSight, WireShark, SplunkVulnerability Testing Tools: Nessus, AppScanSecurity Standards: FISMA, FIPS 199, 200.
EXPERIENCE:
Information Assurance Analyst
Confidential
- Documentation review of System Security Plans, observation and reviewing the results of technical tests.
- Conducted audit interviews, control testing for ( ) to create and produce Security Assessment and Risk Assessment.
- Performed testing using a streamlined methodology and customized tools in addition to Nessus vulnerability scanning.
- Coordinated Network Scanning Assessment efforts.
- Assist scanning tools during the development process to help them meet security requirements in a rapid development environment.
Cyber Security Analyst
Confidential
- Presenting vulnerability reports to vendors, application owner, and management in weekly meetings.
- Performed vulnerability scans across the network to identify critical and high vulnerabilities. Also scanning web applications looking for cross - site scripting, or malware.
- Analyzing the scans after completion to identify false positives in the findings, and summarizing the vulnerability scan data and importing them into a custom report.
- Identifying threats and notifying application owners and vendors of vulnerabilities found on their network.
- Updating and maintaining current SOP with the latest information, and procedures.
Security Analyst
Confidential
- Documented security Incidents and event putting them into a custom report and sending them to their appropriate authority.
- Monitored and reviewed correlated security events via ArcSight, Splunk, and other security tools.
- Reviewed and analyzed IDS/IPS logs using Sourcefire, BRO IDS, and McAfee HIPS.
- Conducted custom logs searches via Splunk to find malicious content on the network.
- Made recommendations to management to block external threats at the firewall and proxy level.
- Performed continuous monitoring to maintain security of the network,
- Conducted investigations on suspicious emails that may have contained malware or possibly a phishing attack.
- Preformed daily Malware scans to identify workstations with malicious files on them using Nessus.
