We provide IT Staff Augmentation Services!

Sr. Cybersecurity Analyst Resume

4.00/5 (Submit Your Rating)

Far Hills, NJ

SUMMARY

  • 7+ Years of IT experience involving systems security, digital forensics, database administration, and computing platforms, including AIX, Linux, OSX, and Windows environments.
  • Experience with forensic analysis techniques. Including traditional disk image analysis, memory analysis, and malware analysis.
  • Monitored security controls post - authorization to ensure continuous compliance with the security requirements.
  • Conducted penetration tests on systems and applications using automated and manual techniques with tools such as Metasploit, BurpSuite, Kali Linux, and other open source tools as needed and report the findings.
  • Provided technical analyses and courses of action in response to emerging and persistent cyber threats.
  • Assembled different types of windows-based evidence and performed live analysis and analyze volatile and nonvolatile data.
  • Provided immediate onsite and remote support for digital forensics and worked closely with incident response team in collecting the evidence.
  • Identifying the critical, High, Medium, Low vulnerabilities in the applications based on OWASP and SANS and prioritizing them based on the criticality.
  • Investigated possible network attacks such as DDOS, DOS, DNS attacks, and server exploitations.
  • Maintain chain of custody on all evidence collected and follow procedure for securing evidence.
  • Perform web application and network penetration tests.
  • Manage firewall security by establishing and enforcing policies, defining and monitoring access using Akamai and Palo Alto firewalls.
  • Experience with computer networking and network traffic analysis
  • Experience with application analysis tools, and vulnerability scanners (burpsuite, Qualys, appscan, etc.)
  • Configured rapid prototype testing. And integration of new upgraded equipment hardware solutions to evaluate all system enhancements.
  • Develop a comprehensive test plan and conduct DR tests that include coordinated recoveries with data centers; develop reports and action plans.
  • Application security assessment techniques and their relative merits, including: SAST, DAST and manual assessment.
  • Assist in documenting remedial action to address deficiencies in the information security policies.
  • Demonstrated ability to work on multiple projects simultaneously and to work in a highly dynamic, rapidly changing environment.
  • Excellent communication capabilities and being able to work independently with minimal or no guidance.
  • Provide 24x7 on-call support for databases supporting mission-critical applications and off-hours maintenance.
  • Possesses experience in leading the project and mentoring the team when required.

TECHNICAL SKILLS

RDBMS: DB2 V 9.5/9.7/10.1/10.5/11 , SQL Server 2008, 2012, 2016, Oracle 10g/11g/12c.

Operating Systems: Linux, Windows, MacOS, and UNIX

Core Competencies: System Architecture Design, Network Security, System Security, Linux Administration, Cybersecurity, Hardware, Project Management Configuration Management, Information Assurance, Digital Forensics, Malware Forensics, System Troubleshooting, Risk Management, Vulnerability Evaluation.

Languages: Python, C, C++, Java, Ruby Shell Scripting language

Tools: FTK Imager, Autopsy, ImDisk, EnCase, X-Ways Forensics, Wireshark, Helix, Nmap, OpenVAS, SolarWinds, CyberArk, AppDynamics, Retina Network Security Scanner, Nessus, Neustar, ForeScout, Volatility, AppScan, hashmyfiles, Zabbix, ArcSight, Trend Micro, etc.

PROFESSIONAL EXPERIENCE

Confidential, Far Hills, NJ

Sr. Cybersecurity analyst

Responsibilities:

  • Performed risk assessments to ensure corporate compliance.
  • Applied knowledge of tactics, techniques, and procedures associated with advanced threats.
  • Conducted onsite penetration tests from an insider threat perspective.
  • Performed host, network, and web application penetration tests using different tools.
  • Performed malware analysis in support of incident analysis and response.
  • Manage system information security architecture, design, installation, operational planning, and risk remediation activities on servers/systems, ensuring all systems installed according to schedule.
  • Proficient in administering, engineering, and supporting various cybersecurity controls and technologies.
  • Design and build an end-to-end enterprise application security program which includes both a centralized and decentralized model for application testing, code scanning, issue tracking, issue remediation, key metrics, application logging, and SIEM onboarding.
  • Tested the Application using Black box Testing Techniques.
  • Performed vulnerability testing, application security and penetration testing against various technologies like Ajax, Flash and Web services.
  • Recovered deleted user data and files using forensic tools like Autopsy.
  • Conduct manual penetration testing with the support of the penetration testers within the team.
  • Discovered and communicated cross-site scripting vulnerabilities.
  • Developed, managed and executed business continuity and crisis management drills and exercises
  • Configured, setup and installed agents on Trend Micro, Deep Security, ArcSight, Nessus and monitored events on Deep security and AWS consoles.
  • Standardize and implement Splunk Universal Forwarder deployment, configuration and maintenance in Linux and Windows platforms.
  • Examine assets to determine if vulnerabilities exist and if vulnerabilities are found proposes remediation strategies that can be applied to mitigate them.
  • Performed networking and forensic analysis of compromised systems.
  • Create Vulnerability Assessment report detailing exposures that were identified, rate the severity of the system, and suggestions to mitigate any exposures and testing known vulnerabilities.
  • Performed policies and procedures regarding the chain of custody practice.
  • Flexibility to adjust to multiple demands, shifting priorities, ambiguity, and rapid change.

Confidential, Austin, TX

Cybersecurity analyst

Responsibilities:

  • Created and implemented company-wide security policies, including establishing standard procedures for the department.
  • Created written reports, detailing assessment findings, and recommendations.
  • Tested and assessed the vulnerability of systems utilizing multiple programs, analyzing results to track and manage repairs.
  • Managed encryption and key management in Azure Cloud environments.
  • Proposed remediation strategies for remediating system vulnerabilities.
  • Provides reports to management regarding network security status and makes recommendations for the adoption of new policies, standards, and procedures.
  • Experience of undertaking both automated and manual application Penetration Testing assessments within Agile environments.
  • Performed application security and penetration testing using Rational Appscan.
  • Configured database security, backup, recovery, and archiving data and system conversion and migration, third-party products.
  • Experience analyzing packet data and log data using RSA security Analytics.
  • Developed Black Box security test environments and conducted tests as part of a team for precautionary measures.
  • Manage updates and configure alert responses for all database systems, ensuring optimal security and backup.
  • Created and improved documentation for critical infrastructure and to assist in knowledge transfers to teammates and new hires.

Confidential

Systems and Security Administrative support

Responsibilities:

  • Handling requests over phone, e-mail, and ticketing system.
  • Diagnosed and resolved technical issues, helped in troubleshooting the University servers.
  • Assisting with the user’s laptop/desktop set up and configuration of a new and existing user account using active directory and SCCM.
  • Configuration and Managing of Servers and Workstations (Server 2008, 2008 R2 and Server 2012, 2012 R2)
  • Perform Active Directory administration, including account creation/deletion and the troubleshooting of accounts.
  • Provided level II and III helpdesk support as needed to the staff of more than 500, solving 100% technical issues.

We'd love your feedback!