Information Systems Analyst Resume
3.00/5 (Submit Your Rating)
Springfield, IL
EMPLOYMENT HISTORY:
Confidential, Springfield, IL
Information Systems Analyst
Responsibilities:
- Responsible for overall agency IT security administration, specifically mainframe RACF/TSO/MVS, security and administration.
- Develop, institute and maintain RACF security policies and procedures.
- Assist in developing security procedures documentation and protocols.
- Use of z/OS operator commands for mainframe administration.
- Develop, institute and maintain Network and cloud computing security policies, approval processes and procedures.
- Develop, maintain test and institute Disaster Recovery documentation and procedures.
- Develop, maintain test and institute Business Continuity Plan documentation and procedures.
- Provide technical expertise and security guidance for agency - wide enterprise network security defense-in-depth strategies.
- Assist in security audit findings documentation, verification and resolution.
- Responsible for implementing and monitoring IDS/IPS. Ensuring that Confidential security framework is in line with Confidential standards.
- Detect intrusions across multiple platforms (UNIX, windows, ios, DNS, web, databases etc.) to allow for fact and knowledge based monitoring of the enterprise network and systems security devices.
- Analyze IT network system anomalies to successfully identify, classify, and handle advanced intrusions.
- Utilize enterprise SEIM (Security Event and Incident Management) platform and its related integration and correlation features.
- Monitor network/ mainframe Firewall traffic. Analyze IT operating systems to identify weaknesses or misconfigurations and proposing corrective actions through change management.
- Responsible for keeping white/black list up to date. Responsible for updating, definitions, signatures and certifications;
- Responsible for penetration testing, coordinate and assist in gray box testing.
- Assist in Cisco router/switch fail over testing. Investigate IT system security violations and incidents for documenting to higher authorities.
- Perform system forensics of operating systems to gather evidence of intrusions to assist law enforcement.
- Prepare summary reports for all security incidents to senior management.
- Participate in forums with software/hardware/security vendors, vulnerability researchers, sponsors and other stakeholders to keep senior leaders abreast of changes.
- Participate in IT security professional forums.
- Create and document correspondence such as word documents; excel spreadsheets, emails and PowerPoint documents to communicate with internal and external customers. Identify and stay abreast of latest hacker tools to provide effective counter network defense services in ordered to detect, respond and counter the attacks.
- Resolve design deficiencies which could impair system security and availability.
- Develop IT recommendations to ensure system compliance meet local, state and federal laws and statues for IT security requirements.
Confidential, Creve Coeur, MO
Security Operation Center Analyst
Responsibilities:
- As a SOC Analyst I was responsible for 24x7x365 Security Operations Center support and monitoring customer networks using security tools, assessing threats, and risks involving client infrastructure, and providing first tier response to security incidents for managed services customers.
- As a SOC Analyst I also provided firewall change management and change control services. I was responsible for following standard operating procedures for detecting, classifying, and reporting incidents.
- I was required to utilize commercial and OpenSource tools to quickly analyze, detect, and respond to cyber security incidents and quickly respond on time to sensitive incidents.
- Provide dedicated monitoring and analysis of cyber security events (triage). Events of Interest (EOI) handling and escalation.
- Processing incident communications to include initial reporting, follow-ups, requests for information and resolution activity.
- Analyzed security threats for managed services customer networks.
- Processed change requests for managed firewall / unified threat management (UTM) customers.
- Provided remote support to customers for incident response.
