We provide IT Staff Augmentation Services!

Cyber Security Analyst- Resume

2.00/5 (Submit Your Rating)

Jacksonville, FL

SUMMARY

  • Seeking a challenging position and strive for excellence with dedication, proactive approach, positive attitude and passion towards the work dat will fully utilize my logical and reasoning abilities in the best possible way for the fulfillment of the organizational goals.
  • IT security specialist with a passion and talent for aligning security architecture, plans, controls, processes, policies and procedures with security standards and operational goals. Extensive experience working in mixed Windows/Linux, database and virtualized/physical server environments, extensive experience in application support. Strong exposure to developing and testing security architectures of cloud - based systems with more TEMPthan 3 years of success in a variety of computer operating systems and applications. Astute, versatile and result oriented professionalwho is eager to contribute in a team-oriented environment and to work toward business objectives.

CORE COMPETENCIES

  • Computer and network Security
  • System Procurement, Mgt & Maintenance
  • Structured Query Language (SQL)
  • Computer and Network Security
  • Windows active directory
  • Group policy Management
  • Outstanding Verbal and Writing Skills
  • Back-up and Recovery Infrastructure
  • Hardware and Software Troubleshooting
  • Network Troubleshooting and Deployment
  • TCP/IP Protocols
  • Data Loss Prevention and SIEM

TECHNICAL SKILLS

  • Management of hardware, software, network infrastructures, maintenance, procurement and installation.
  • LAN, WLAN, WAN Design, Implementation, Deployment, Installation of network devices, support and upgrade, Data Multiplexing.
  • In-depth Knowledge Managing IDS & IPS
  • Database Support: RDBMS, ORDMBS, PL/SQL and SQL.
  • Operating System: All flavors of Windows, Apple Macintosh and Linux Basics.

PROFESSIONAL EXPERIENCE

Confidential, Jacksonville FL

Cyber Security Analyst-

Responsibilities:

  • Wrote standard operating procedures, guidelines, systems documentation and other technical documentation.
  • Worked closely with the SOC Watch and Cyber Threat Intelligence groups, quickly answering ad-hoc questions to support their missions.
  • Maintained backups of Cybersecurity systems and ensured resiliency.
  • Monitored Network traffic and system log analysis.
  • Identified Insider threats and worked on APT detection.
  • In-depth Knowledge of DLP/IDS/IPS Technologies.
  • Directly involved in the Investigation, tracking and resolution of threats and vulnerabilities.
  • Composed security alert notifications.
  • Advised incident responders/ other teams on threats.
  • Recommended and implemented technological and architectural upgrades/modifications to agency's guidelines.
  • Directly involved in the Use of pftop to analyze network traffic.
  • Good working understanding of Service Level Agreement (SLA),ISA,BPA,PII,PTA,BIA
  • Interface with IT Operations, special programs, and other groups to ensure their projects integrate the necessary Cybersecurity controls and technologies.
  • Installed, configured and maintained IDS sensors (Snort, SourceFire, Suricata, Bro, NTOP)
  • Installed, configured, and maintained Host based defenses (McAfee ePO)
  • Installed, configured, and maintained Security Orchestration Automation Response (SOAR) technologies
  • Installed, configured, and maintained vulnerability scanning solutions (Nessus)
  • Installed, configured, and maintained enterprise firewalls.
  • Installed, configured, and maintained SIEM solutions.

Confidential

Cyber Security Analyst

Responsibilities:

  • Virtually eliminated threats from malware, advanced persistent threats and security breaches
  • Manage SIEM user accounts (create, delete, modify)
  • Assist with client transition and onboarding by serving as the primary point of contact for ManagedSecurity Service clients
  • AssistedCyber SecurityEngineers in performing root cause analysis, future prevention, risk mitigation on critical securityincidents.
  • Authored security architecture design documentation and standard operating procedures.
  • Trained 150 end users on security processes, procedures and risks via the company’s first security education program, which is being rolled out companywide.
  • Introduced use of security metrics to mitigate vulnerability by analyzing historical threats, addressing risks/gaps/violations and implementing improved protocols.
  • Developed and implemented online security procedures.
  • Updated security software to prevent database security threats.
  • Provided management support for security capital projects, including working with security vendors and local Facility Security Coordinators to manage all aspects of capital replacements, enhancements, and repairs at all facilities where an integrated solution TEMPhas been deployed to limit.
  • Liaison with the Physical Security Support Team to resolve issues.
  • Researched, analyzed and understood log sources utilized for the purpose of security monitoring, particularlysecurity and networking devices (such as firewalls, routers, anti-virus products, proxies, and operating systems).

Confidential, Jacksonville FL

Systems Administrator

Responsibilities:

  • Analyzing system logs and identifying potential issues with computer systems.
  • Installing and configuring new hardware and software
  • Troubleshooting any reported problem.
  • Installed, configured, and routinely upgraded end-user’s software and hardware.
  • Installed and configured HyperV.
  • Managed Active Directory creating objects, groups, giving permissions to approved users to access the network.
  • Assessed all calls and made sure the resolution time met or exceeded company standards
  • Experience in installing, configuring and managing infrastructure using VMware technologies viz. ESXi, vSphere 5.0, vCenter.
  • Experience in configuring DRS, HA, vMotion, storage vMotion, virtual networking, cloning, deploying VM's from templates and automating VMware environment.
  • Installed and configured software and hardware
  • Managed network servers and technology tools.
  • Set up accounts and workstations.
  • Monitored performance and maintained systems according to requirements
  • Troubleshoot issues and outages.
  • Ensure security through access controls, backups and firewalls.
  • Upgraded systems with new releases and models.
  • Developed expertise to train staff on new technologies.
  • Experienced in Virtual Server Administration, WINS, DNS, DHCP and Patch Management on Microsoft Windows Servers.
  • Experience in Designing, Installing, Configuring, Administrating and Troubleshooting VMware Virtual Desktop Infrastructure (VDI) Environment.
  • Excellent skills in patching and hardening
  • Managed File server, DHCP, Active Directory in Windows Server 2012 R2
  • Created new users
  • Resetting user passwords
  • Locked/unlocked user account
  • Extensively worked with Active Directory Services, IIS Servers, DNS, and DHCP.
  • Performed Life Cycle Management for ESXi hosts.
  • Troubleshooting UCS hardware if the Hosts are disconnected in the Vcenter

Confidential

IT Support Specialist

Responsibilities:

  • Accountable for building, configuring, troubleshooting and repairing computer systems.
  • Resolving internal user’s and external client’s desktop and laptop issues for several clients.
  • Hardware Installation and Upgrades - Motherboards, Processors, RAM, Graphics cards, Sound cards, Modems (wireless a/b/g; dial-up, high-speed), Parallel cards, and Full System Builds.
  • Configured and Maintained customized imagines for each client and internal user utilizing Ghost Software.
  • Gained extensive noledge of all computer models including Compaq, HP, Sony, Acer, Dell and IBM.
  • Software Installation and Upgrades - All applications of: Adobe, MS Office, MS Works, Utilities, Virus scanners (Norton, Panda, McAfee, Kaspersky 5.0), Spyware (Web-root, Trend Micro, McAfee, Zero, Lavasoft) and Diagnostic tools, Driver Updates.
  • Managed file servers, DHCP, active directory in Windows 2012 R2 and software development through SCCM
  • Accountable for desktop, printers, ink, scanners procurement and deployment to clients.
  • Data Back-up and Recovery - Restored data, OS, files, images, MP3, documents, drivers, and configurations.
  • Operating System Installation and Upgrades – Windows (’95, ’98, 2000, Server 2003, Server 2004, XP Home, XP Media Center, XP Pro, XP Media Center 2005).
  • Audited all incoming desktops and laptops, including damage inspection, complete hardware reformatting and troubleshooting, reconditioning and hardware/software installation and upgrade.
  • Responsible for repairing and testing of all incoming damaged systems/laptops.
  • Proven expertise in supporting and troubleshooting hardware, software and LAN issues.
  • Delivery out-standing customer service with genuine commitment to quality and customer satisfaction.
  • Successfully completed the infrastructure for more TEMPthan 150 PC with all required software’s.
  • Proper coordinating with Customer Support team for a smooth function of customer services.

We'd love your feedback!