We provide IT Staff Augmentation Services!

Data Security Analyst Resume

Carrollton, TX


  • Cyber Security professional with proven expertise in implementing cyber security measure, troubleshooting network infrastructures and allocating staff resources.
  • Respectable record that includes recommending security improvements, evaluating and identifying vulnerabilities and improving overall system efficiency.
  • Impressive capacity to thrive in fast - paces environment while delivering quality results.
  • Spearheaded creation of new information-security department: Risk Assessment, Vulnerability, Penetration Testing and Security Engineering Services
  • Instrumental in developing and Implementing Business Continuity and Disaster Recovery Plans.
  • Deployed enterprise Data loss Prevention(DLP) to protect clients data
  • Re-designed VPN connections for remote users with improved security
  • Deployed honeypots across the network


  • Regulatory Compliance
  • Wireshark, Metasploit, Nmap
  • Threat modeling/intelligence
  • Nessus, IDS/IPS
  • Pen Tester
  • Snort/Cisco firewall, Sonicwall,
  • Firewall & Security Log Analysis
  • OpenVAS, Kali Linux
  • Intrusion Detection & Prevention
  • ESXi Virtual Server systems
  • FortiAnalyser, SIEM(Splunk, Radar)
  • Data Integrity / Disaster Recovery
  • McAfee ePolicy
  • Web applications vulnerability testing
  • Burp suite
  • Encryption
  • Windows, Linux OS
  • Active Directory
  • Forcepoint DLP
  • Identity access management
  • BlueCoat Proxy, Barracuda VPN


Data Security Analyst

Confidential, Carrollton, TX


  • Monitored Snort IDS alert system and update signature rules
  • Secured critical servers and Remote users access with 2FA authentication
  • Implement approved security policies that encompass configuration of users access and permissions across system
  • Regular monitoring of Active Directory security log for suspicious activities using fortiAnlyzer
  • Performed vulnerability assessment using Kali Linux and Nessus
  • Regularly test and deploy critical security updates on windows and Linux servers
  • Gather reports on targeted threats from all sources, including CVE and vendor publications
  • Captured and analyzed network traffic for any weaknesses using wireshark
  • Monitor users compliance with cyber security policies
  • Scanned the network using openVAS to maintain network security
  • Collaborate with high profile clients to thoroughly evaluate security risks and recommend cost-effective preventive measures
  • 24hrs monitoring of critical network devices and confirm compliance with acceptable Data Security Standards (DSS)
  • Improved corporate wifi security by implementing RADIUS authentication server
  • Testing in-house applications with Burb suite for security flaws
  • Monitor for insider threat with UBA
  • Test and document system behavior, Performance and security
  • Update inbound/outbound rules on Cisco firewall
  • URL blacklisting/whitelisting using BlueCoat proxy
  • Setup full system disk encryption using TrueCrypt and Bitlocker for remote users to secure company's data in compliance with HIPAA
  • Presented analysis findings both verbally and in written reports
  • Familiar with ISO, COBIT 5, NIST Cyber security Framework

Cyber Security Analyst

Confidential, Denton, TX


  • Performed vulnerability scanning and assessments
  • Configured and support security tools such as firewalls, enterprise Anti-virus software, patch management systems
  • Trained users in security awareness and procedures
  • Published PKI soft and hard certs used to authenticate smart card
  • Managed network intrusion detection and prevention systems
  • Deployed Webknight WAF to enhance web application security
  • Followed internal policy on change management, incident management and escalation
  • Deployed forcepoint DLP to secure critical data from exfiltration on corporate network
  • Analyzed several security logs using splunk
  • Configured and monitor remote users login via barracuda VPN
  • Followed ITIL process on incident, problem and change management.

System Security Administrator

Confidential, Houston, TX


  • Member internal security audit team and made policy recommendations
  • Test security control randomly for any weakness
  • Scanned network at regular interval using Nmap for open ports
  • Reverse engineered several email attachments captured by spam filter for suspicious contents
  • Installed and configured computer hardware, software and peripherals
  • Issued Internal/External PKI Certificates to users.
  • Monitored ESET endpoint database for high risk threat reports
  • Developed secure baseline for server 2003 and 2008R2
  • Regularly Audit Cisco ASA firewall rules to meet ever increasing network threat

Hire Now