We provide IT Staff Augmentation Services!

Information Security Analyst Resume

Niwot, CO

SUMMARY:

Information Security Professional with experience in the retail & financial sector. Also has a strong academic background in Information Assurance and Network Security.

TECHNICAL SKILLS:

  • ADFS
  • DLP
  • Elementary level Java, Ruby on Rails & Python
  • Elementary malware analysis
  • Endpoint triage and remediation
  • Group Policy design & deployment
  • IPS/IDS
  • Kali/Linux
  • MacOS
  • Metasploit
  • Network Security Monitoring/ forensics w/ Wireshark, Security Onion etc.
  • Phishing analysis & remediation
  • SIEM
  • Vulnerability Management

PROFESSIONAL EXPERIENCE:

Confidential

Information Security Analyst, Niwot, CO

Responsibilities:

  • Re - onboarding and configuration of SIEM including correlation rules, building blocks and threshold levels
  • Created new playbooks for several types of security incidents
  • Supported 24x7 situational awareness and on-call for security systems
  • Triaging and remediation of infected endpoints and servers
  • Identified and remediated network attacks and compromises

Environment: Windows 7/10, Mac OS, Unix, Windows Server, IBM QRadar, Palo Alto, Cybereason, Symantec, Trend Micro, MimeCast, Office365, Azure, ServiceNow, Lansweeper, SolarWinds, Nexpose

Confidential

Cyber Security Analyst, Portland, OR

Responsibilities:

  • Supported 24x7 situational awareness and monitoring of security systems
  • Triaging and remediation of infected endpoints & servers
  • Identified and remediated enterprise-wide phishing, spear phishing and ATOs
  • Identified and mitigated numerous web application attacks
  • Identified and remediated network attacks and compromises
  • Supported new product launches by conducting network analysis/bot mitigation
  • Processed employee terminations and instances of lost or stolen enterprise hardware
  • Supported Incident Response by performing front line analysis of incoming attacks and hunting for new IOCs

Environment: Windows 7/10, Mac OS, Windows Server, Cisco switches, routers and firewalls, SentinelOne, CrowdStrike Falcon, Trend Micro, MalwareBytes, ProofPoint TAP & TRAP, OWA/365, Okta, SailPoint IIQ, ActiveRoles, CyberArk, Demisto, JIRA, Confluence, ServiceNow, Akamai, DataPipe, ZScaler, SolarWinds, Nexpose, SplunkCloud, Imperva, Casper, AirWatch

Confidential

Security Operations Analyst, Troy, MI

Responsibilities:

  • Monitoring and configuration of cybersecurity systems including host/network based intrusion detection, endpoint/server anti-virus, DLP, vulnerability scanning, web content filtering, email firewall, SIEM and user analytics.
  • Primary security incident responder responsible for conducting triage, memory, network and hard disk forensic analysis.
  • Using open source tools, deployed and managed an internal phishing campaign bank-wide.
  • Contributed to the development and management of a data loss prevention program.
  • Developed and managed to metrics for phishing and social engineering along with email threats and vulnerabilities.

Environment: Windows 7/10, Windows Server 2008, 2012, 2012 R2, Red Hat Linux 5, 6, 7, CentOS 5, 6, 7, SUSE, AIX, Cisco switches, routers and firewalls.

Confidential

VoIP Technical Migration Specialist, Southfield, MI

Responsibilities:

  • Worked with customers to analyze and transition customer accounts from one software platform to a new solution.
  • Designed and transferred data and system functions to a new platform, configured VoIP device provisioning files.
  • Provided technical support to customers, answered a variety of technical questions about our service and trained end users on the new platform.

Confidential

Technical Deployment Assistant, Chicago, IL

Responsibilities:

  • Assisted in the receiving process of computers, imaged computers with OS and software and deployed and tested computers/peripherals.
  • Supported data transfers for staff and faculty, provided hardware and software support for various departments.
  • Generated reports of received and returned computer inventory, created reports for current stock, organized lease return shipments.

Hire Now