Cyber Security Analyst Resume
SUMMARY
- He has over 7 years of experience in Cyber Security area.
- He is an effective problem - solving individual with experience in Cyber Security, Threat Intelligence and Forensics.
- I am currently working in the exciting area of Cyber Security, Threat Intelligence and Forensics which gives me the opportunity to practice safe security techniques to stop cyber security attacks.
- He is passionate about cyber security and protecting organizations’ security systems and technology seeking challenging positions in Cyber Security/Threat Intelligence/Forensics areas.
TECHNICAL SKILLS
Languages & Development Tools: C, C++, Python, SQL, Java, XML, Eclipse, Notepad++.
Operating Systems, Utilities & Virtualization Tools: Windows, Linux, Mac, iOS, Android, VMware, Oracle VM Virtual Box, Kali, Security Onion
Database Management Systems: Microsoft SQL server, MySQL, Cloudera, Oracle DB
Commercial Software: Microsoft Office, Adobe Photoshop, Adobe Illustrator, Arena Simulation software, Axure, etc.
PROFESSIONAL EXPERIENCE
Cyber Security Analyst
Confidential
Responsibilities:
- Reviewing list of events and responding to those events following documented handling procedures.
- Operating within multiple platforms (Antimalware, Application Whitelisting, DNS, IDS, IPS, Proxy, SIEM, and more) to enrich and provide additional context to events of interest.
- Continuously monitor, analyze and identify security alerts information from all security devices, collection techniques and designated system logs.
- Monitor SIEM and logging environments for security events and alerts to threats, intrusions, and/or compromises.
- Observe and analyze traffic to learn valuable lessons from known malicious actors and to determine countermeasures against such threats.
- Conducts analysis using a variety of tools and data sets to identify indicators of malicious activity on the network.
- Conduct base level analysis to determine the legitimacy of files, domains, and emails utilizing internal resources as well as external resources such as Virus Total, Threat Connect, Threat Crowd, URLVoid, IPVoid, Robtex etc. for malware analysis.
- Endpoint Forensics with Encase.
- Providing regular feedback to peer teams (Technical Operations and Engineering, Incident Response, and Security Analytics) on process improvements and automation of event handling.
- Provide input to daily Cyber Security Command Center briefings on event trends.
- Provide high level analysis on security data to identify significant activity.
- Proactively provide feedback on SOC operational processes and procedures
Adjunct Professor
Confidential, MN
Responsibilities:
- Developed curriculum and instructed mobile device security and forensics.
- Developed and Implemented assignments, hands-on labs and final exam.
- Created online access to the course.
- Acted as a mentor to the students.
- Extensive experience with Mobile forensics tools such as MSAB XRY, Cellebrite and Elcomsoft.
- Developed and implemented labs to conduct acquisition, verification and analysis of digital evidence.
Information Security Analyst
Confidential, MN
Responsibilities:
- Maintain endpoint security for over 3000 workstations and servers across multiple clients as a Managed Service Provider.
- Detection, prevention and response to threats against the enterprise.
- Communicated effectively to the teams within the organization with threats and vulnerabilities, latest trends and risks and the technical remediation action steps or plans.
- Worked directly with NOC to document exceptions, identify compensating controls, and remediation action plans accordingly.
- Worked directly with NOC to triage anti-virus alerts, review them and recommend best practices to remediate.
- Responds to information security-related questions and inquiries using established information security tools and procedures.
- Document all best practices and policies and publish in internal Knowledge Base.
- Provide strategic consulting services centered around information security products and services.
- Acts as a product specialist for Sophos endpoint protection products; oversee the client engagement, pricing and deployment of several endpoint products.
Research Assistant
Confidential, MN
Responsibilities:
- Designed and developed Mobile Device Forensics curriculum content, training materials, training modules, teaching aids, and manages all aspects of curriculum development programs with hands on labs.
- Design documents, student materials, presentation slides, instructor guides, lab instructions and exercise guides, assessments and certification questions, and course descriptions.
- Labs include certain challenging tasks like unlocking the phone or recovering passwords from other sources.
IT Technical Support
Confidential, MN
Responsibilities:
- Provided technical support and ensure proper maintenance of workstations, printers, and peripherals.
- Deployed new workstations and printers, installing operating systems, applications, and drivers, and configuring network properties and hardware.
- Supported disaster recovery plans, performing regular backups and creating images of workstations prior to upgrades.
- Installed and configured desktop applications. Provided AV Technical support and hardware setup.
- Created incident reports and provide on call technical assistance.
- Created documentation used for training and troubleshooting. Trained, mentored and provided clear and concise direction to new employees.
IT Security Administrator and Security Consultant
Confidential
Responsibilities:
- Administration of Security Infrastructure
- Authored information security policies and procedures
- Security & Configuration Assessments
- Implementations of UTM Devices
- Mentoring junior colleagues
- CERT Operations and Security Awareness
- Social Media, brand Protection and Cyber Fraud Monitoring
- Research, Analysis, Scoping and Mitigation of emerging Security Threats
- Authored SOC standard operating procedures (SOPs)
- Malware Behavior Analysis and Mitigation of APTs through FireEye
- DDoS monitoring and analysis through Arbor