We provide IT Staff Augmentation Services!

Cyber Security Analyst Resume

2.00/5 (Submit Your Rating)

GA

SUMMARY:

  • Experience and demonstrated success implementing and maintaining IT infrastructure that improved business functionality with positive impacts. Skilled Information Security Administrator with expertise in risk management unauthorized access and a wide range of vulnerabilities scanning and threats. Experience as Security Analyst, Privacy and Data Protection, RMF, Security Management & Operations, Vulnerability scanning, Security testing, Penetration testing.
  • Experience in vulnerability assessment and penetration testing using various tools like Burp Suite, Dir - Buster, OWASP ZAP proxy, NMAP, Nessus, HP Fortify, IBM App Scan enterprise, Kali Linux, Metasploit
  • Conducted periodic scans and on demand scan as and when new network devices are introduced, or configurations are updated in the windows servers with Qualys Guard
  • Responsible for setting up configuration files in Splunk.
  • Huge knowledge of managing information assurance evaluation tests.
  • Performed vulnerability scans using HP Web Inspect, IBM App Scan, Qualys Guard, Retina, Nessus, Burp Suite, and Metasploit auxiliary modules.
  • Sound knowledge and industry experience in Vulnerability Assessment and Penetration.
  • Testing on web-based application; Mobile based application and Infrastructure penetration testing.
  • Conducted penetration testing and security tests and formulated scripts to test systems.
  • Worked extensively on Splunk Enterprise and Splunk Cloud, having

    experience in Installation, developing Splunk alerts and Dashboards for analyzing application related data as per the business requirement.

  • Assist developers in remediating issues with Security Assessments with respect to OWASP standards.
  • Providing fixes & filtering false findings for the vulnerabilities reported in the scan reports. Adding new vulnerabilities to the Vulnerability Database for various platforms with proper exploits.
  • Responsible for setting up configuration files in Splunk.
  • Good team player with excellent analytical, inter-personal, communication & written skills, problem-solving and trouble-shooting capabilities. Highly motivated and can adapt to work in any new environment.
  • Wide knowledge in Vulnerability Assessment and Penetration Testing (V.A.P.T.) Experience on web applications.
  • Remarkable experience in Manual and Automation web application Penetration Testing.
  • Good understanding of attack scenarios and common vulnerabilities.
  • Ability to analyze test results and suggest mitigations for security problems.
  • Handled documentation and reporting.
  • Experience in Create and Manage Splunk DB connects Identities, Database Connections, Database Inputs, Outputs, lookups, access controls.
  • Hands on experience on different Vulnerability Assessment and Penetration Testing (V.A.P.T.) tools.
  • Knowledge in analyzing False positive and False negative report, and Manual Verification.

PROFESSIONAL EXPERIENCE:

Confidential, GA

Cyber Security Analyst

  • Use LogRhythm tool to identify threats and patterns for security incident response.
  • Tune LogRhythm AI Engine rules to create better alerting, establish security baselines for con gurations to tune out unnecessary alerts.
  • Identify, analyze and document network signals, malware behaviors and threat reports related to trends and developments in adversary tactics, techniques and procedures (TTPs).
  • Build/improve tools for analyzing malware, identifying threats and tracking adversaries.
  • Provide clear, actionable and structured intelligence to product and security teams. Assist in ensuring corporate and production systems are safeguarded.
  • Own the analysis efforts of one or more threat actors, and serve as a subject matter expert on how those actors might affect Google and our users.
  • Identify personal and team priorities, and work on assignments with minimal supervision while maintaining quality and deadlines.
  • Monitor threats and alerts affecting customer networks and triage responses to remediate the alerts.
  • Create vulnerability reports using CVEs and devise plans to patch or x affected devices.
  • Monitoring and analyzing network traffic, Intrusion Detection Systems (IDS), security events and logs.
  • Prioritizing and differentiating between potential intrusion attempts and false alarms.
  • Creating and tracking security investigations for resolution.
  • Composing security alert notifications and other communications.
  • Advising incident responders in the steps to take to investigate and resolve computer security incidents.

Confidential, Catonsville, MD

Cyber Security Analyst

  • Monitored system logs, SIEM tools and network traffic for unusual or suspicious activity. Interpret such activity and make recommendations for resolution.
  • Excellent communication skills. Ability to work with the most to least computer literates.
  • Performing regular penetration testing and vulnerabilityassessment/remediation using Nessus, IBM app scan and Metasploit.
  • Detected/Analyzed and reported out DLP Suspicious Incidents for end-users.
  • Responsible for troubleshooting various indexing issues by analyzing Splunk logs such as splunkd.log, metrics.log ingested as internal index.
  • Administer and maintain end user accounts, permissions, and access rights.
  • Developed and maintain documentation for security systems and procedures.
  • Monitored the security and information technology infrastructure, including hardware, software, and to protect the confidentiality, integrity and availability of systems.
  • Managing Palo alto appliance for IPS, URL filtering, Anti-Virus, DLP, Malware, Denial of service and vulnerability protection
  • Experience in setting up dashboards for senior management and production support- required to use Splunk.
  • Implementing New Policy and Modifying exciting Policy's to reduce the false Positives

    In DLP.

  • Daily activities included installation, upgrades, troubleshooting, configuration, migrating user profiles and data, maintaining third party software applications, servers and workstations.
  • Managed and facilitated information security related projects.
  • Conducting periodic vulnerability scans of systems, wireless and network devices.
  • Meeting respective Business OU to fetch also find existing documents and rewrite the

    New content and Phrases in existing Rules in DLP

  • Created Dashboard on custom Visualization to use the custom app of Splunk
  • Responded to computer security incidents and coordinate efforts to provide timely updates to multiple business units during response.
  • Meeting respective Business OU to fetch also find existing documents and rewrite the

    New content and Phrases in existing Rules in DLP

  • Performed regular penetration and vulnerability assessment and review using Qualys, Nmap, Nessus, Metasploit and other tools.

Confidential, Bethesda, MD

Jr. Cyber Security Analyst

  • Performed Vulnerability assessment on multiple web applications
  • Information gathering, scanning using security testing tools.
  • Responsible for Data Loss Prevention (DLP) configurations, monitoring activity, Air Defense configurations and threat detections
  • Identifying the vulnerability and documenting it and helping the developer to remediate the vulnerabilities.
  • Analyze the performance and Security impact for IOS vulnerabilities for network

    devices and give recommendations

  • Re-scan the application for Confirmatory Assessment.
  • Conduct Black box security testing.
  • Maintained and managed assigned systems, Splunk related issues and administrators.
  • Meeting respective Business OU to fetch also find existing documents and rewrite the

    New content and Phrases in existing Rules in DLP

  • Conduct Manual and automated security testing of applications.
  • Generating reports based on vulnerability assessments and presenting them to client.
  • Retesting after vulnerability mitigation.
  • Developed workflows and procedures for email monitoring in support of the Data Loss Prevention (DLP) program.

Data Entry Clerk

Confidential

  • Handle the tasks of medical coding and medical billing.
  • Perform responsibilities of accounting and entering financial data of insurance and clients on MS Excel.
  • Responsible for providing administrative support by handling patients, Insurance queries and concerns.
  • Compiled statistical information for special reports.
  • Created monthly reports for record and closed terminated records. Verified and logged in deadlines for responding to daily inquiries.
  • Verified that information in the computer system was up to date and accurate.
  • Responsible for preparing and entering patient medical report in the system.

We'd love your feedback!