We provide IT Staff Augmentation Services!

Senior Information Security Data Analyst Resume

2.00/5 (Submit Your Rating)

Seattle, WA

SUMMARY

  • Proven ability as an Information Security professional and team leader to ensure corporate compliance through technical security planning, vulnerability analysis, risk mitigation, and information security programs for large multi - national companies.
  • Strong customer-facing skills and commitment to professionalism wif ability to maintain perspective when faced wif critical situations, a positive and people oriented person. Self-motivated, pleasantly aggressive, realistically ambitious wif high personal ethics, well organized and detail oriented, wif strong technical, problem-solving and analytical skills.

CORE COMPETENCIES

  • Windows, UNIX, Linux, Email, and mobile platforms.
  • SIEM infrastructure
  • SOX and PCI
  • SIEM, McAfee AntiVirus, IDS/IPS, DLP, Web Gateway and Proxy Appliances, and vulnerability scanners.

TECHNICAL SKILLS

  • C

PROFESSIONAL EXPERIENCE

Confidential, Seattle, WA

Senior Information Security Data Analyst

Responsibilities:

  • Led security incident response team in its assessment of impact severity and resolution efforts to correct breaches. Assisted IT wif investigation, documentation and reporting of all actual breaches of corporate security.
  • Monitored, evaluated and maintained standards, procedures, and guidelines to protect data, systems, networks, and databases from unauthorized users.
  • Managed corporate virus management program and security patching efforts across all managed objects in corporate environment.
  • Trained business unit managers, IT development team, and user community about risk factors and security controls.
  • Utilized Security Information and Event Management (SIEM), Intrusion Detection & Prevention (IDS / IPS), Data Loss Prevention (DLP), penetration testing, sniffers and malware analysis tools.
  • Participated in SOX and PCI compliance security management.
  • Created, tested and deployed new access control rules, signatures, and then validated results via post-deployment report wif an ability to evaluate the risk to the company and apply this methodology to active incidents/vulnerabilities.
  • Contributed to the documentation of root cause analysis, incident response activities and evidence collection including chain-of-custody leading to the creation of incident reports

We'd love your feedback!