We provide IT Staff Augmentation Services!

Security Operations Center Analyst Resume

2.00/5 (Submit Your Rating)

Wilmington, DE

SUMMARY:

A seasoned, motivated I.T. Professional with years of experience, and a sincere desire to be a contributing team member.

TECHNICAL SKILLS:

Ticketing tools: Remedy Tracking System, CA Unicenter, Peregrin, Heat, Service Center, Pulse, Applix

Management/Monitoring Tools: Sitescope, Sitescan, Nagios, Brio suite, Cacti, Ehealth, Pulse, Symantec Security Incident Manager, Symantec Network Security Manager, Mcafee ePolicy Orchestrator, ArcSight, SCCM, Citrix management console, BES/Blackberry manager, RSA authentication manager, Rapid 7 nexpose security console, Proventia IPS, Metasploit, Nmap/Zenmap, Nessus

PROFESSIONAL EXPERIENCE:

Confidential

Security operations center Analyst

Responsibilities:

  • Review security logs for anomalies, patterns, and variants using ArcSight.
  • Monitor for security events in ArcSight.
  • Create event channels in ArcSight.
  • Add and remove store and component modules in ArcSight
  • Report on Potential vulnerabilities in computer technology.
  • Coordinate reporting to other teams and information gathering of risks.
  • Track down potential Exploits in computer systems.
  • Performs initial triage of all security events and in depth analysis of threats to the network as well as proactive security measures.
  • Security vulnerability scanning for web hosts, network devices, and all computer systems.
  • Write, review, edit, documents and procedures on processes. Standard operating procedures (SOP’s)

Confidential

Information technology SOC Analyst

Responsibilities:

  • Alert monitoring and analysis, Device Health investigation, event classifications and reporting through ArcSight.
  • Investigate and correlate events through ArcSight log monitoring.
  • Alert monitoring and investigation through Symantec SIMS.
  • Analyze and report all possible security breaches.
  • Security reporting to clients using investigative analysis
  • Performs initial triage of all security events and in depth analysis of threats to network monitors and devices as well as proactive security measures.

Confidential

Data Security Analyst

Responsibilities:

  • Create, modify, and delete end - user and system accounts for applications and operating platforms
  • Administration of user accounts in Active Directory (Accounts, User group adds, Enable/disable Accounts, Set Account expirations)
  • Administer security and access across multiple computing platforms.
  • Review log files for frequent occurrences. (account lock outs and login attempts)
  • Ensure proper authorization is received/issued/created for all access changes
  • Troubleshoot access issues including review of current access setups and working with end users, developers, and infrastructure staff to identify and correct issues.
  • Train new employees on process and procedures.
  • Write, review, edit, documents and procedures on processes.

Confidential, Wilmington, DE

Systems Access and Identity Management Administrator

Responsibilities:

  • Create, modify, and delete end-user and system accounts for applications and operating platforms
  • Ensure proper authorization is received/issued/created for all access changes
  • Administer security and access across multiple computing platforms.
  • Troubleshoot access issues including review of current access setups and working with end users, developers, and infrastructure staff to identify and correct issues.
  • Generate and distribute access reports, tracking reports, and completing access updates emanating from the reports.
  • Administration of user accounts in Active Directory (Accounts, User group adds, Enable/disable Accounts, Set Account expirations)
  • Exchange email/outlook Administration (Distribution list user adds, Outlook email setup, Contact Adds)

Confidential, Wilmington DE

Technical support Analyst

Responsibilities:

  • Monitors Production Systems including Servers, Network & Telephony Devices, File Transfer SLAs, and Web Applications with tools such as Site Scope, Nagios, Cacti, eHealth, and Control-M w/BIM to ensure high availability.
  • Performs initial triage to gather and analyze information about outages, problems, and leads associate through diagnostic procedures using various tools to determine source of error. (problem recognition, research, isolation, communication, resolution and follow-up)
  • Processes User Access Requests, Maintains Accounts & Resets Passwords for Microsoft Active Directory & Exchange, Citrix, UNIX (Debian, AIX, Solaris), Linux (Red Hat Enterprise), Oracle DBs, TSYS, PeopleSoft, and other Production & Barclays Proprietary Systems.
  • Administration of user accounts in Active Directory (Accounts, User group adds, Enable/disable Accounts, Set Account expirations)
  • Exchange email/outlook Administration (Distribution list user adds, Outlook email setup, Contact Adds)
  • Citrix Administration through Citrix Zenn App Access Management Console
  • RSA user administration through RSA Authentication Manager Control Panel
  • Blackberry Administration and troubleshooting through Blackberry Manager 4.0

Confidential, Newark, DE

Global Technical Support

Responsibilities:

  • Responds to phone inquiries with full technical support of all Confidential Banking Systems Maintains accurate problem call tracking in Peregrin ticketing system
  • Provides Troubleshooting and Administration of all the following issues:
  • Novell Netware
  • Windows Active directory (disable/enable Accounts, Reset passwords/unlock accounts)
  • Shared/network drives access trouble shooting and mapping
  • Mainframe access troubleshooting, (IBM AS400,ACF, RACF)

Confidential, New Castle, DE

Customer Account Executive/Advanced Products Technical Support Specialist

Responsibilities:

  • Provided 1st and 2nd level Helpdesk and Billing support and outstanding Customer Service to all cable, online and VoIP customers via phone and email while working in a 24/7 inbound support center.
  • This required knowledge of various flavors of Microsoft Windows and Macintosh Operating Systems, as well as basic Network Protocols, such as: TCP/IP, UDP, POP3, SMTP, HTML, HTTP(S), SSH, SSL, and many others.
  • Provided one-contact resolution to the customer whenever possible and maintained productivity and quality standards, escalating to field Technicians whenever needed.

We'd love your feedback!