We provide IT Staff Augmentation Services!

Senior Cyber Security Analyst Resume

0/5 (Submit Your Rating)

Nw, DC

OBJECTIVE:

  • Seeking positions that will utilize my knowledge and skills in computer networking, network security and engineering to enhance professional growth

SUMMARY:

  • Network administration and vulnerability management experience. The ability to pen test all computer networks and systems. Ability to scan, monitor, assess, and defend enterprise information systems and networks (web sites, applications, databases, data centers and servers, networks, desktops, and other endpoints) in a SOC environment. Ability to detect, validate, contain, remediate, and communicate computer - based security events and incidents such as malware infections, potential compromise, Distributed Denial of Service (DDoS), etc.
  • Experience in project management and an excellent team motivator. Good verbal and listening skills, good customer service provider, fast learning, and the ability to brainstorm. Good products development experience to support information technology governance, control, and assurance, risk, and cyber security. Experience researching on information system controls and the critical role they play in organizations.
  • The ability to prevent all types of phishing attacks including Spear phishing by conducting, continuously refreshing, and performing security awareness among employees.
  • Experience using DLP tools, Antivirus and endpoint security tools to intercept and block malicious processes as they are executed on a user’s device. The ability to use penetration testing tools to compromise vulnerable systems and help discover employees or systems susceptible to exploits. Familiar with Forescout ICS Patrol and Forecourt eye Inspect. Used burp suite for dynamic application security testing, web application scanning and to intercept traffic. Used burp suite to pen test web application. Brute force form fields and input fields to test for vulnerabilities.
  • Experience with SIEM and UEBA tools to ensure the organization has the means to rapidly collect data about security incidents, identify what is going on and notify security staff. Ability to configures, monitor, audit, and troubleshoot applications, networks, and systems in all environments. Experience writing technical and system design specs and documentations for SMEs and developers. Experience writing reports such as SAR, SOPs, checklist, security policies and the Business Impact Analysis (BIA)
  • Experience managing Insider Threat Program and execution. Experience with all tactics, techniques, and procedures associated with malicious insider risk activity such as espionage, sabotage, intellectual property theft, and workplace violence. Experience applying IT infrastructure and applications policies to ensure efficiency, reliability, confidentiality, and integrity. Apply IT systems engineering principles to reduce errors and improve performance of the IT systems.
  • Experience working with NIST 800 Series, FISMA implementation of the Risk Management Framework (RMF), ISO 27001/27032, SANS top 20, NISPOM, FedRAMP, HIPPA, and PCI CSS to pass and maintain compliance.

TECHNICAL SKILLS:

Connectivity & Hardware: Cisco 2500, 2600, 3500, Catalyst 1900, 2900, 4500, R/S 6000, Firewalls, Routers, Switches, Wireless, T1, Ethernet, Fast Ethernet, Gigabit Ethernet, FDDI, Cable/DSL Modem, Analog Dialup, and installing network cabling.

Protocols: TCP, IP, ICMP, IGMP, NetBEUI, PPP, NFS, NetBIOS, VLAN, WLAN, 802.11x, 802.1x, NAT, VPN, FTP, BGP, RIPV2, OSPF, ARP.

Operating Systems and Enterprise Applications: Windows Server, Exchange, Trend Micro Antivirus, ISA firewall, Cisco ASA, Proxy Server, UNIX, Linux (Red hat and Ubuntu servers), Mac, VM Ware, Terminal Server.

Technologies and Tools: RAID, UPS, Active Directory, DNS, DHCP, RISRemote Desktop, IIS, VPN, L2TPScanning/Vulnerability/Penetration Testing Tools: Nessus, Retina, OpenVAS, Wireshark, Tenable SC, Cain and Abel, Kali Linux, Nmap, Burp suite, etc.

Programming and Database Desktop Technologies: Shell scripting, PowerShell scripting, PL/SQL, C/C++, Java, Visual Basic .NET, HTML/XHTML, Python and ASP.

Desktop Technologies: Window 10, MS Word, Excel, Access, Visio, Power Point, Front Page, Internet Explorer, Mozilla Firefox, and Microsoft project.

SIEM Products: Splunk, Solar winds Event Manager, and McAfee Enterprise Security Manager.

Information Security standards: FISMA implementation of the Risk Management Framework (RMF), NIST 800 Series, DFARS (Defense Federal Acquisition Regulation Supplement), Health Insurance Portability and Accountability Act (HIPAA), ISO 27701 the requirements for a PIMS (privacy information management system), ISO 27032 the international standard offering guidance on cybersecurity management, and NISP (NISPOM).

PROFESSIONAL EXPERIENCE:

Confidential

Senior Cyber Security Analyst

Responsibilities:

  • Develop documents to help maintain an effective set of policies, procedures, and work instructions (consistent with program guidelines (NIST R5 (IA-Pre -program)). Interface with management and employees to determine appropriate policy, procedure, and work instruction requirements.
  • Perform research and review documents to identify gaps in documentation. Remain current on policies and procedures for all business areas.
  • Assist with the development of documentation requirements for new and/or changing business processes. Analyze the effectiveness of documentation and recommend improvement opportunities to management.
  • Prepare the distribution of policy update, brief, or manual, as well as the procedures by which to introduce such changes. Support the introduction of company policies internally.

Confidential, NW DC

Senior Cyber Security Analyst (Team Lead)

Responsibilities:

  • Perform basic risk discovery, assessment, remediation, and handling of common and complex issue types, and reporting suspicious activities. Perform threat and risk assessment to protect possible insider threat in the organization. Identify policy violations, among a variety of other duties related to insider threat. Experience writing, testing, and deploying UAM signatures and identify trends and patterns in the data. Familiarity with risk scoring and threat analysis tools Experience with User and Entity Behavior Analytics and Data Loss Prevention (DLP) security controls
  • Experience implementing FISMA Risk Management Framework (RMF), FedRAMP, HIPPA, and PCI CSS for vulnerability mitigation and remediation. Experience creating vulnerability policies, POAM documents, SAR, and Authorization to Operate (ATO) packages.
  • An in-depth knowledge and experience with vulnerability scanning tools (network and web application) and risk mediation activities such as Nessus, Retina, Wireshark, and OpenVAS.
  • Essential Duties and Responsibilities: Analyze vulnerability assessment and penetration test data to identify technical risks to the organization. Support the identification and impact classification for new vulnerabilities identified in the client's environment including insider threat.
  • Monitor, scan, and test computer networks to ensure safeguards are in place to protect sensitive information and proprietary data from cyber criminals and insiders. Monitors and manages network traffic with Security Information Event Management (SIEM) tools such as Splunk, snorts and Event log Analyzer.
  • Assist in identification and reduction of vulnerabilities at enterprise level. Support leadership to identify capability gaps in vulnerability management services. Conduct analysis and aggregation of vulnerability data from various sources. Maintain knowledge of current vulnerability security trends and clearly communicate them to the client. Research all vulnerabilities and provides remediation. Generate tracking reports to display vulnerability status. Respond to Cyber-attack excellently by proactive planning, assessment, and reporting.
  • Performs vulnerability assessments, penetration testing (Network, Web Application, and Server) and social engineering activities to protect network and defend attacks from all angles including insiders. Implement software such as firewalls, IDS and IPS to protect computer networks. Plan and carry out security measures to protect the organization's computer networks and systems. Stay ahead of hackers and the increasing cyber security threats.
  • Experience performing duties and special functions in planning and organizing hardware, software, and information management requirements to maintain pace with emergent technology and cyber requirements. Ability to deliver oral and written presentations, and proposals to senior management and procurement officials on project statuses, requirements, budgets, technical support, systems, application, and other related issues.

Confidential

Adjunct Professor (Part time)

Responsibilities:

  • Prepare students for security plus and other related s. Experience teaching cyber security courses and any computer related course at the private and government institutions including the following key subjects:
  • Vulnerability management/Analysis: Introduction to vulnerability management tools, vulnerability analysis, assessment and tracking, vulnerability research and remediation, and the effects of false positives and false negatives.
  • Operating Systems: introduction to all operating systems including LINUX, UNIX, and Windows. Use virtual environment to demonstrate functionality and to enhance hand-on learning.
  • Networking: Experience in all networking concepts, including attacks and defense, monitoring, troubleshooting, and connectivity. Good understanding of network layers and protocols.
  • System Administration: Knowledge of all important tools and programming used on the network. Good understanding of all web applications and servers including IDS/IPS and Firewalls.

Confidential, Gaithersburg, Maryland

Security Specialist Lead

Responsibilities:

  • Respond to incidents, investigate violations, and recommend enhancements to potential security gaps. Stay one step ahead of hackers and constantly researching data, learning about new technologies and gathering information on the latest risks. Analyze data to spot trends. Create tools to support research efforts. Mitigate threats by gathering information and developing plans. Monitor networks for security breaches. Train users on security protocols. Develop best practices and security standards, create and test disaster recovery procedures to keep IT running in the event of a security breach or disasters.
  • Monitor computer networks for security threats, identify compromised machines and report on security measures taken to address the threats. Analyze security risks and develop response procedures. Developing and testing software deployment tools, firewalls, and intrusion detection systems. Performs penetration testing, evaluate, recommend, and implement other security devices. Install computer security software, conduct regular security audits, prepare security status reports, educate users on computer security, create security documentation for users, assist in disaster recovery and gather evidence regarding cyber security issues.

Confidential, Greenbelt, Maryland

Team lead (Network admin)

Responsibilities:

  • Monitor computer networks for security threats or unauthorized users to identify compromised machines and report on security measures taken to address threats. Analyze security risks and develop response procedures. Developing and testing software deployment tools, firewalls, and intrusion detection systems. Performs penetration testing, evaluate, recommend, and implement other security devices. The ability to Install and configure computer security software, conducting regular security audits, preparing security status reports, educating users on computer security, creating security documentation for users, assisting in disaster recovery, and gathering evidence regarding cybercrimes.
  • Ability to provide technical support to users and systems upgrades on windows and Linux platforms. Maintain system security plans and performs system hardening as required.
  • Good understanding of security procedures and computer networking. Familiar with EMC Networker and a variety of third-party applications, including Putty, SharePoint, SSH, FTP, syslog, SNMP, VPN, trouble ticketing system/s, VNC, Client OpenView, Nagios, Solarwinds, and ZenOSS

Confidential

IT Manager/ Security Specialist. Gaithersburg, Maryland

Responsibilities:

  • Monitor computer networks for security threats, identify compromised machines and report on security measures taken to address threats. Analyze security risks and develop response procedures. Develop and test software deployment tools, firewalls, and intrusion detection systems. Performs penetration testing, evaluate, recommend, and implement other security devices. Installing computer security software, conducting regular security audits, preparing security status reports, educating users on computer security, creating security documentation for users, assisting in disaster recovery, and gathering evidence regarding cyber crimes

We'd love your feedback!