Analyst, Cyber Security Resume Samples

4.8 (95 votes) for Analyst, Cyber Security Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the analyst, cyber security job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
AC
A Conroy
Antonio
Conroy
94863 Margret Viaduct
New York
NY
+1 (555) 329 7314
94863 Margret Viaduct
New York
NY
Phone
p +1 (555) 329 7314
Experience Experience
Los Angeles, CA
Analyst, Cyber Security
Los Angeles, CA
Ullrich, Okuneva and Bartoletti
Los Angeles, CA
Analyst, Cyber Security
  • Performs a variety of tasks and would be ready to work extra hours in some emergency situations
  • Develop internal processes and standards for threat intelligence workflow
  • Deescalate and manage customer related escalations
  • Ensure all Service Management procedures are being followed and SLA’s met
  • Develop mitigation and countermeasure strategies from collected threat intelligence
  • Maintain and help develop operational procedures for the team to use in daily operation
  • Translate complex information sets into concise labels to assist incident response efficacy
Boston, MA
Cyber Security Monitoring Analyst
Boston, MA
McDermott, Beer and Davis
Boston, MA
Cyber Security Monitoring Analyst
  • Working knowledge of Intrusion Detection/Prevention Systems and rule/signature writing
  • Provide liaison to other agency cyber threat analysis entities such as intra-agency and inter-agency Cyber Threat Working Groups
  • Analyze and report cyber threats as well as assist in deterring, identifying, monitoring, investigating and analyzing computer network intrusions
  • Provide support in the detection, response, mitigation, and reporting of cyber threats affecting client networks
  • Assist in producing status reports and briefs to senior leadership; provide analysis for correlated information sources
  • Extensive knowledge of networking principles
  • Populate and maintain an intrusions database, and provide data analysis support; analyze data from sensors, network security devices and applications using the security information event management systems, log servers, application interfaces and device consoles provided
present
Los Angeles, CA
Senior Research Analyst, Cyber Security Team
Los Angeles, CA
Glover and Sons
present
Los Angeles, CA
Senior Research Analyst, Cyber Security Team
present
  • Synthesising and presenting complex data,
  • Working with the ISFs design and publications team to produce reports with compelling infographics and layout
  • Writing high quality research reports (varying in length up to 60 pages), executive summaries and product launch materials,
  • Ensuring high level of engagement with ISF Members using the ISFs online collaboration platform,
  • Leading weekly or biweekly quality circle discussions with colleagues to develop insights and thought leadership,
  • Synthesising research data to develop relevant and practical methodologies, processes and solutions,
  • Engaging directly with ISF Members and a broad range of information security and risk management experts to develop and validate insights,
Education Education
Bachelor’s Degree in Computer Science
Bachelor’s Degree in Computer Science
Tulane University
Bachelor’s Degree in Computer Science
Skills Skills
  • Good fundamental IT security Knowledge
  • Basic ITIL knowledge
  • Ability to prioritize and coordinate multiple projects simultaneously
  • Ability to describe complex technical systems or principals in non-technical terms
  • Highlycollaborative ethic and experience working in global teams/organizations
  • Basic understanding of IAM systems including UNIX, Active Directory and provisioning systems
  • Excellent written and verbal communication skills to organize, maintain, and deliver responses to customer and upper management
  • Organizational skills
  • Results driven
  • Report operational status of queue, SLA and other metrics
Create a Resume in Minutes

15 Analyst, Cyber Security resume templates

1

Malware Analyst Cyber Security Investigations Resume Examples & Samples

  • Demonstrating a deep understanding of high-tech investigation skills, techniques and tools necessary for conducting live forensics on critical systems, and being able to produce detailed analysis of the root cause of any incidents
  • Conducting reverse engineering on malware and other suspicious code, and producing a detailed report of the findings
  • Masters Degree in Engineering, Computer Science or other Technology related fields a major plus
  • Prefer 7+ years experience working in cybercrime investigation, malware reverse engineering and other related fields with a combination of both public and private sector experience preferred
  • A proven track record in malware reverse engineering, mobile malware, memory forensics and network forensics
  • Ability to analyze assembly-level code on multiple platforms (x86, x64, ARM, etc)
  • Ability to reverse both user-mode and kernel-mode software Ability to create Indicators of Compromise (IOCs) as an output of reverse engineering efforts
  • Ability to create and analyze network protocols throughout all layers of the network stack
  • Experience with investigating large data compromise events, working with consultants to mitigate risk to data compromise and investigating insider threats incidents
  • Knowledge of reverse engineering best practices and industry standard methodologies
  • Demonstrated experience automating malware analysis (sample acquisition, identification, automated dynamic analysis, etc.)
  • Familiarity with common cryptography algorithms
  • Broad knowledge in a variety of programming languages (C/C++, Java, x86 Assembly, JavaScript, etc.)
  • Experience defeating anti-reversing tools and techniques (packers, obfuscation, encryption, etc.)
  • Familiarity with standard software used in reverse engineering (IDA, WinDbg, VMWare, etc.)
  • Able to work either independently or in a team to conduct reverse engineering
  • Strong attention to detail in conducting malware analysis combined with an ability to accurately record full documentation in support of the investigation
  • Detailed knowledge of current international best practices in the high tech investigation and forensics arena
  • Ability to communicate with other industry professionals to ensure solid partnerships with key external stakeholders to ensure that the analysis process remains at a word class level
2

Senior Research Analyst, Cyber Security Team Resume Examples & Samples

  • Project managing the research project process from initiation to completion
  • Conducting primary research with Members, e.g., interviews, online discussions, workshops and surveys,
  • Conducting secondary (desktop) research to clarify information security business problems and identify potential responses,
  • Synthesising and presenting complex data,
  • Engaging directly with ISF Members and a broad range of information security and risk management experts to develop and validate insights,
  • Synthesising research data to develop relevant and practical methodologies, processes and solutions,
  • Leading weekly or biweekly quality circle discussions with colleagues to develop insights and thought leadership,
  • Ensuring high level of engagement with ISF Members using the ISFs online collaboration platform,
  • Reporting weekly to the project management office on the project status, budget and risks,
  • Writing high quality research reports (varying in length up to 60 pages), executive summaries and product launch materials,
  • Working with the ISFs design and publications team to produce reports with compelling infographics and layout
  • Creating complementary deliverables to core reports (e.g., case studies, assessment tools),
  • Developing and delivering education and training on research topics, using webcasts, webinars and at industry events (e.g., presentation at ISF regional Chapter meetings and the annual ISF Congress)
  • Peer review research outputs relating to other research projects,
  • Present at ISF Chapter meetings (at various international cities around the globe),
  • Assist with the development and maintenance of the catalogue of research and tools products, including the Information Risk Analysis Methodology 2 (IRAM2) and the Standard of Good Practice for Information Security (SoGP),
  • Assist with account management of the ISF Members around the world,
  • Execute other duties that support the ISFs business objectives (such as sales support)
  • Quantitative and qualitative data collection and synthesis
  • Experience designing and conducting interviews, surveys and workshops to gather data
  • Strong facilitation skills, able to lead large groups to develop and challenge ideas
  • Experience analysing qualitative and quantitative data to identify key findings
  • Ability to translate research findings into practical insights and recommendations
  • Structuring and writing research reports
  • Experience writing substantial reports with logical structure leading to a conclusion
  • Exceptional logical reasoning skills and ability to structure arguments based on evidence
  • Exceptional writing skills, able to present arguments in a clear and compelling manner
  • Engagement with clients
  • Experience engaging with senior managers and/or executives
  • Strong verbal skills, with the ability to present complex ideas in a clear and simple way
  • Experience working with or in large complex organisations
  • Self-starter with experience initiating projects and successfully delivering through to completion
  • Tenacious, with the ability to identify and pursue solutions through to a successful conclusion - delivering to time, cost and quality,
  • Experience identifying delivery risks and resolving issues
  • Team working and collaboration
  • Capable of taking initiative to solve problems with peers
  • Experience leading delivery work in a multi-disciplinary team
3

Cyber Security Project Analyst Resume Examples & Samples

  • Cyber security project portfolio management which include the development of processes & reporting to consistently & efficiently manage the project portfolio as well as accurately report on the status of the project portfolio
  • Monitor projects and report progress to the Cybersecurity Project Portfolio manager and other various stakeholders
  • Improve existing project management lifecycle process & tools by identifying inefficiencies and recommending solutions
  • Ensure all project managers adhere to the project management lifecycle
  • Establish controls as needed to ensure project management quality
  • Develop crisp, clear status reporting for both pipeline and active projects. Work across various IT and business groups to ensure that status reporting is as comprehensive as possible
  • Partners with finance team & product management team to ensure all teams are aligned on cross-functional processes
  • Establish and cultivate working relationships with project sponsors, business stakeholders, technology, operations, and others as needed
  • BA/BS degree required (advanced degrees, other certifications a plus)
  • Minimum 3 years of project management experience (IT project management / information security project management experience a plus)
  • Excellent Excel, PowerPoint, & SharePoint skills
  • Organized, process-oriented, & detail-oriented with a structured/analytical approach to problem solving
  • Proven track record of delivering results on projects and operational execution
  • Team player with ability to build strong cross-business relationships
  • Excellent written and verbal communication skills with proven ability to work with various audiences, especially senior management
  • Must be comfortable with ambiguity and change in a fast-paced environment
  • Self-motivated individual that demonstrates initiative with proven flexibility, adaptability, and reliability
  • Familiarity with cyber security & information security technology is preferred
  • Formal project management training or desire for project management training is preferred
4

Global Cyber Security Cyber Defense Center Analyst Resume Examples & Samples

  • 2+ years’ experience of one of the following
  • Network operations or engineering
  • System administration on Unix, Linux, or Windows
  • Troubleshooting, Tier-2 support
  • “General” technical skills, includes TCP/IP knowledge, networking and security product experience
  • Willingness to acquire in-depth knowledge of network- and host security technologies and products (such as firewalls, network IDS, scanners) and continuously improve these skills
  • Demonstrated ability to work in a team environment, able to train and coach other team members
  • 1-2 years of information security related experience, in areas such as: security operations, incident analysis, incident handling, and vulnerability management or testing, system patching, log analysis, intrusion detection, or security device administration
  • Relevant technical and industry certifications are a plus, e.g. GIAC certifications
5

Cyber Security Geopolitical Intelligence Analyst Threat Intelligence Associate Resume Examples & Samples

  • Review and update indicators to prepare and produce cyber risk index
  • Conduct deep dive analysis of global cyber events as they relate to geopolitical currents
  • Regularly develop and produce written strategic intelligence reports constructed from country level analysis of developing cyber events and norms
  • Contribute to briefing materials and read books for Threat Intelligence team’s briefings on global cyber events and counter-threat concerns to JPMC internal country and business leads
  • Develop risk reports on countries based on geopolitical currents Engage with internal and external partners to ready the firm for future risks Data mine and forecast geopolitical issues
  • Network and build relationships with JPMC’s line of businesses and obtain requirements and feedback from JPMC consumers; and
  • Participate with JPMC representatives at industry forums and conferences
  • Significant prior experience in data mining and geopolitical analysis
  • Experience specific to global cyber threats
  • Experience in a large, mission-critical environment
  • Previous overall global intelligence operations or related government experience
  • Conversant understanding of national and international cyber security issues
  • Ability to apply knowledge of global historical geopolitical and cyber events and their national level responses to inform JPMC Cyber Security strategies quickly, clearly and effectively
  • Ability to conduct deep level research in international cyber threat issues and develop draft papers and presentation materials for internal distribution and briefings, and interest in doing so on a daily basis
  • Very strong written and verbal communication skills; ability to understand complex problems while formally presenting them simplistically
  • Bachelor’s degree in international relations, economics, politics, or related field or equivalent experience
  • Intelligence Community experience and/or 3+ years experience at an international institution conducting cyber or security/intelligence related work
  • Understanding of the role of government and non-government entities involved in cyber security
  • Working knowledge of global threats to international cyber security, and conversant in the tools, tactics, and procedures used by cyber adversaries
  • Advanced degree or proficiency in international relations, economics, politics, or related field or equivalent experience, particularly in Europe and the Middles East
6

Cyber Security Policy Analyst Resume Examples & Samples

  • The Cyber Security Policy Analyst will be tasked to support the Global Cyber Strategy Team
  • Evaluate cyber policy and policy developments, domestic and international, to include (but not limited to) cyber legislation and regulation
  • Responsible for understanding developing cyber policy, analyzing potential impacts and providing updates/recommendations to leadership
  • Proven experience leading and collaborating on high visibility projects in a large organization
  • Ability to support and liaise with business process owners to incorporate cybersecurity products and provisions into their processes
  • Must be able to understand and decision problems that involve trade-offs between security, regulation, cost containment and timeliness
7

Cyber Security Response Analyst Resume Examples & Samples

  • 2+ years experience in a security related field
  • 3+ years experience in infrastructure development/operations
  • Sound understanding of TCP/IP and networking concepts
  • Experience with a SIEM to review system log files, data correlation, and analysis (i.e. firewall, network flow, IDS, system logs)
  • Knowledge of servers, clients, various computer peripherals, network and/or storage technologies
  • Ability to follow detailed process and procedure documentation
  • Requires personal flexibility with limited travel and day-to-day work schedule; may could require significant overtime in the event of a global or critical incident
  • Demonstrate high level of independent initiative, drive for results, quality methods and integrity
  • Thorough knowledge of multiple operating systems specifically Linux and Windows
  • CISSP, ENCE, CCNA and/or GIAC certifications
  • Understanding of network and storage infrastructure
  • Scripting abilities (something like PERL, Python or VB)
  • The distance between imagination and …. Creation. It can be measured in years of innovation, or in moments of brilliance. And, it can be a road you start traveling right now. When you join Ford Motor Company, your journey begins. You become part of a team that is already leading the way, with ingenious solutions and attainable products – and it is always ready to go further
8

IT Corporate Information Security Cyber Threat Analyst Resume Examples & Samples

  • Assist in escalated computer security incidents and cyber investigations including computer forensics, network forensics, root cause analysis and malware analysis
  • Act as coordinator in the event of escalated cyber threats/incidents for Tier 1 analysts
  • Execute on appropriate mitigation strategies for identified threats
  • Participate in threat hunting activities to proactively search for threats in the enterprise environment
  • Participate in the creation and maintenance of use cases for recurring investigation/incident triggers in support of the 24/7 Cyber Threat Operations and Cyber Threat Management program
  • Participate in the creation and maintenance of playbooks used in response for investigation/incident triggers in support of 24/7 Cyber Threat Operations and Cyber Threat Management program
  • Interface with other teams in Information Security (e.g. network operations, Cyber Threat Operations Center (CTOC), vulnerability management) along with information and liability risk officers and technology management to help guide cyber security strategy
  • Work with team members to enhance and enrich security monitoring tools with contextual information
  • Provide mentoring for junior level analysts
  • Deliver cyber intelligence services and material to information technology and business leaders
  • Identify new threat tactics, techniques and procedures used by cyber threat actors
  • Publish actionable threat intelligence for business and technology management
  • Bachelor’s degree in Computer Science or related field or equivalent education and related training
  • Broad knowledge of general IT with a focus area in two or more of the following areas: operating systems, networking, computer programing, web development or database administration
  • Demonstrated advanced knowledge of cyber security operations with a focus area in two or more of the following: attack surface management, Security Operations Center (SOC) operations, Intrusion Detection/Intrusion Prevention Systems (IDS/IPS), Security Information and Event Management (SIEM) use, threats (including Advanced Persistent Threat (APT), insider) vulnerabilities, and exploits; incident response, investigations and remediation
  • Foundational knowledge of processes, procedures and methods to research, analyze and disseminate threat intelligence information
  • Ability to lead and persuade individuals and small teams on ideas, concepts and opportunities
  • Consistent history of delivering on commitments
  • Knowledge of the incident handling procedures and intrusion analysis models
  • Ability to work independently with limited supervision
  • Proven communication skills, both written and verbal, to both business and technology audiences
  • Five years of experience
  • Industry certifications in cyber security and forensics, such as Certified Ethical Hacker (CEH), GIAC Security Essentials (GSEC), Cisco Certified Network Associate (CCNA), GIAC Certified Intrusion Analyst (GCIA), GIAC Certified Incident Handler (GCIH), Certified Information Systems Security Professional (CISSP), Security + and other related credentials
  • Security Operations Center (SOC) or Network Operations Center (NOC) experience
9

Cyber Security Forensic Analyst Resume Examples & Samples

  • Prior experience conducting collection and preservation of electronic evidence in a corporate environment
  • Ability to assess scope and conduct preliminary high tech investigations including evidence collection and writing clear and concise investigative reports
  • Preferably familiar with EnCase with experience working with a broad variety of computer forensic hardware and software tools
  • Knowledge of current international best practices in the high tech investigation and forensics arena
10

Global Cyber Security Digital Forensics Analyst Resume Examples & Samples

  • Preserve network and host-based digital evidence in an industry accepted forensically sound manner
  • Perform host-based digital forensics on Microsoft Windows based systems and other operating systems as necessary
  • Utilize industry standard tools to preserve mobile devices
  • 8+ years of experience working in the computer forensics, cybercrime investigation and other related fields with a combination of both public and private sector experience preferred
  • A proven track record in digital forensics, electronic evidence collection, log file analysis, and email review
  • Ability to independently assess scope of forensic requests, effectively completes required digital forensic analysis, and writes clear and concise reports for the intended audience
  • Experience conducting senior level digital forensics examinations on Windows operating systems using industry standard forensic tools (preferably familiar with EnCase, FTK and X-Ways forensic suites)
  • Recent formal digital forensics training
  • Familiarity of international data privacy laws and required clearances for APAC and EMEA countries
11

IT Corporate Information Security Cyber Threat Analyst Resume Examples & Samples

  • Develop tactical and strategic cyber intelligence from acquired threat intelligence and technical indicators from external and internal sources
  • Proactively engage in threat hunting activities for threats in the enterprise environment
  • Broad knowledge of general IT with mastery of one or more of the following areas: operating systems, networking, computer programing, web development or database administration
  • Demonstrated advanced knowledge of cyber security operations with mastery of one or more of the following: attack surface management, Security Operations Center (SOC) operations, Intrusion Detection/Intrusion Prevention Systems (IDS/IPS), Security Information and Event Management (SIEM) use, threats (including Advanced Persistent Threat (APT), insider), vulnerabilities, and exploits; incident response, investigations and remediation
  • Experience with systems for automated threat intelligence sharing using industry standard protocols, such as Structured Threat Information Expression (STIX) and Trusted Automated Exchange of Indication Information (TAXII)
  • Advanced knowledge of processes, procedures and methods to research, analyze and disseminate threat intelligence information
  • Ability to lead and persuade individuals and large teams on ideas, concepts and opportunities
  • Ten years of experience
  • Industry certifications in networking, such as Cisco Certified Network Associate (CCNA), Certified Wireless Network Administrator (CWNA) and/or Net+
12

Cyber Security Monitoring Analyst Resume Examples & Samples

  • Analyze information from variable sources; leverage various toolsets to gain awareness of potentially suspicious activity
  • Investigate, document events and escalate to incidents as needed
  • Document infrastructure
  • Utilize forensic resources to understand event impacts and generate incident reports
  • Monitor and investigate network and system events to preemptively determine attack
  • Performs other duties as requested
13

Cyber Security Ops Analyst Resume Examples & Samples

  • Key individual contributor role with accountability for performing systems and network information analysis of data loss prevention incidents to the network infrastructure, datacenter servers, workstations, and more in a fast-paced, highly technical environment
  • Ensure protection of networks, systems and applications by enforcement of DLP security policy and through use of systematic DLP event analysis
  • Monitor DLP information security alerts though the use of available DLP tools to respond, triage, and escalate as needed
  • Analyze event/alert patterns to properly interpret and prioritize threats through the use of available DLP tools and other data protection devices
  • Identify trends and drive requirements aimed at improving and enhancing existing data loss prevention detection policies
  • Provide support to projects that enhance reporting, workflow, change/incident/problem management
  • Interface with clients in the strategic design process to translate security and business requirements to improve the efficiency of daily tasks, monitoring, and processes with innovative ideas
  • This position is M-F standard business hours
  • 3-5+ years work experience on a Security Technical Services and/or Support Operations team preferred
  • Candidate will exhibit a history of reliability and strong decision making skills due the trust imparted in them as a DLP analyst
  • DLP Information Security related monitoring experience strongly desired
  • Candidate must possess strong analytical skills to identify complex security issues and respond at the same level with a technical understanding of when to escalate impacting security events
  • Experience operating and administrating Security Information and Event Management platforms and/or Intrusion Detection/Prevention platforms a plus
  • Possesses functional knowledge and administrative experience on Windows, Mac and UNIX/Linux Platforms
  • Working knowledge of IP network designs and security fundamentals, including firewalls, routers and ACLs
  • Awareness of PCI/CISP programs, Security and Operations framework certification preferred. Advanced degree, continuing education, certifications (e.g. CISSP, BS degree in CS or a related field) considered a plus though not required
  • Must possess requisite oral communication and writing skills
  • Must be self-motivated and capable of independent work while operating in a geographically and culturally diverse peer group
14

Cyber Security Program Analyst Resume Examples & Samples

  • Support the effort to provide cybersecurity and risk management expertise for various initiatives and programs
  • Provide planning, documentation, logistics, and execution support for public/private cyber security and risk management meetings and events
  • Research, review and report various best practices, industry cyber security developments, standards, and guidelines
  • Coordinate with internal and external partners to assess stakeholder needs and increase program congruency
  • Ability to obtain and maintain an active clearance
  • A Bachelor’s degree with 3 years’ experience in Program Analysis
  • Experience supporting government agencies. Experience with Department of Energy, energy sector organizations, or energy sector associations a plus
  • Any course work in Cyber Security, and interest in pursuing any of the following certifications: CISA, CISSP, CISM, Security +, PMP
  • Understanding of energy sector cyber security and critical infrastructure protection best practices
  • Experience developing or analyzing public policy
  • Program or project management
  • Aptitude for working autonomously and prioritizing
  • Ability to multitask and prioritize according to changing circumstances
  • Strong analytical, problem solving and decision making capabilities
  • Team player with the ability to work in a fast paced environment workload to achieve goals
15

Cyber Security / Intelligence Threat Analyst Resume Examples & Samples

  • Support internal systems to model and analyze active threats against company assets
  • Gather, analyze, correlate, or evaluate information from a variety of resources
  • Research new and emerging threats to gain insight into the evolving threat landscape
  • Develop defense plans or tactics, using intelligence and other information
  • Prioritize and identify security risks, threats and vulnerabilities of networks, systems, applications and new technology initiatives
  • Prepare comprehensive written reports, presentations, maps, or charts based on research, collection, and analysis of intelligence data
  • Bachelor’s degree in a related field or equivalent experience
  • 2-3 years of experience working in information security analysis roles
  • Familiarity with cyber threats, defenses, motivations and techniques
  • Strong understanding of threat analysis and enterprise level, mitigation strategies
  • Working knowledge of how malicious code operates and how technical vulnerabilities are exploited
  • Some knowledge of operating systems and networking technologies in general
  • Knowledge of databases, query design, and how to analyze data thus obtained
  • Proven ability to translate complex information sets into specific recommendations that can be actioned and enhance security posture
  • Experienced with security event and vulnerability management platforms
16

Analyst, Cyber Security Resume Examples & Samples

  • Plan and size new security appliances
  • Augment existing network as per traffic growth
  • Define alarming and support tools
  • Implement deployment processes with Operations
  • Prepare work orders and project debriefing
  • Process firewall requests
  • Document network changes
  • Recommend Network Security improvement
  • Bachelor degree in computer/electrical Engineering, or an equivalent combination of education and work experience
  • 2 year relevant experience in IP security
  • IP Network experience (Backbone)
  • Adaptability to partially integrated software tools
  • Preferred Qualifications/Competencies
  • Practical wireless field experience
  • GSEC - GIAC Security Essentials Certification
  • Firewall certifications (Checkpoint and/or Juniper)
17

Cyber Security Identity & Access Management Analyst Resume Examples & Samples

  • Work closely with technology and business leaders to build processes that can be levered across the enterprise as well as build and maintain identity and access security governance, policies and processes
  • Bachelor's degree in computer science or a related discipline, or equivalent work experience required, 6-8 years of experience in information security or related technology experience required, experience in the securities or financial services industry is a plus
  • Experience in identity and access management
  • Furthers the firm’s culture and values
18

Cyber Security Vulnerability Management Ethical Hack Analyst Resume Examples & Samples

  • Perform internal and external penetration tests
  • Perform onsite security testing including social engineering, and wireless
  • Perform vulnerability scans
  • Assist in the development of in-house testing tools and processes
  • Working knowledge with commercial and open source tools such as Appscan, Metasploit, Qualys, Nmap, Burp Suite, Kali Linux, and Nessus
  • Demonstrated report writing capabilities and strong communication skills
19

Cyber Security Fusion Centre Engagement Analyst Resume Examples & Samples

  • 2+ years of working in or with security operations, network operations or cyber security fusion center
  • Exceptional written and verbal communication and presentation skills to internal and external customers
  • Demonstrated ability to produce written products on a reoccurring basis by working with cross-functional and cross-enterprise teams
  • Demonstrated ability to successfully collaborate on information technology related topics with multiple teams in a variety of locations
  • Hands-on crisis management experience, cyber security related crisis management a plus
  • Understanding or competency in deliberate crisis management planning
  • Strong understanding of the tools and sources available to conduct cyber security alerting, analysis and enhanced situational awareness
20

Cyber Security APT Hunt Analyst Resume Examples & Samples

  • Analysis of network data (e.g., packets, logs) and endpoint data (e.g., logs, malicious artifacts) in both structured and unstructured methods
  • Designing and performing Red Team style exercises to validate security controls are properly configured and alerting to hostile actor activity
  • Analysis of malware (executables, scripts, documents) to determine indicators of compromise, and create signatures for future detection of similar samples
  • Conducting exercises to simulate attacks and gauge responsiveness of processes and procedures
  • 10-12 years of experience in information security or related technology experience required, experience in the securities or financial services industry is a plus
  • A US Government Security Clearance is a plus, but is not required
21

Cyber Security Onboarding Operations Analyst Resume Examples & Samples

  • Drive the timely collection of security collaterals and operational data related with onboarding Predix catalog tile services
  • Assist with process collateral creation/updates, including but not limited to presentations, workflow diagrams, webpages, etc
  • Assist in user story documentation, task management, project dashboard metrics creation and updates, and the follow-ups of various project action items
  • Assist in cross-functional data collection and processing for operational metrics related with onboarding projects
  • Assist in curating and documenting requirements for various product and platform security projects
  • Bachelor’s Degree from an accredited college or university with a degree in a STEM major
  • 3+ years’ experience in operations and/or business / system analysis type positions
  • Flexible and able to work with people from various geographies across the organization
  • High attention to detail and proven ability to manage multiple, competing priorities simultaneously
  • Team player, able to navigate in a matrix environment and roll up one's sleeves to get the job done
  • Familiarity with Agile methodologies
  • Demonstrated customer focus and experience releasing products and programs to market
  • Thrives in a high energy, highly ambiguous environment where tactical and strategic activities are expected to be driven in parallel
22

Cyber Security Triage Incident Analyst Resume Examples & Samples

  • Analyze security events, incidents and problems to provide recommendations on action
  • Perform the activities necessary for the immediate, short-term resolution of incidents to minimize production down time and risk exposure
  • Provide support to ensure rapid resolution of incidents
  • Maintain a communicative relationship with clients and management to provide information throughout the incident, problem, and change management cycles
  • Provide comprehensive and accurate information to Incident Response Manager for case reporting
  • Perform audit and analysis functions of client data
  • Maintain highest level of technical skills via ongoing training and certification
  • Participation in after hours on-call rotation
  • 2+ Years of experience in information security, especially in security operations or incident management role
  • Undergraduate degree, preferably in computer science, math or engineering
  • Certifications in cyber security such as GIAC, CEH
  • An ability to communicate technical issues to diverse audiences, orally and in writing, in an easily-understood, authoritative, and actionable manner
  • Continuous and collaborative learning mindset and commitment
  • Knowledge of organization structure and the business-to-customer relationships
  • Ability to deal with the stress of diverging interests within the same immediate time frame
  • Methodical, tenacious and creative approach to problem-solving
  • Experience with security incident and event management systems
  • Working knowledge of computer operating systems, network topologies and protocols, and security tools such as firewalls, IDS/IPS, A/V, anti-spam, proxies, content management, server and network device hardening, etc
  • An ability to work well under pressure while maintaining a professional image and approach
  • An ability to communicate technical issues to diverse audiences in an easily-understood, authoritative, and actionable manner
  • A team-focused mentality
  • Excellent interpersonal skills and strong verbal and written communication
  • Solid customer orientation and service mindset
23

Cyber Security Functions & Engagement Team Analyst Resume Examples & Samples

  • Prepare, present, and execute CSFC cyber security demonstrations and presentations to senior level Citi internal leaders and external clients
  • Prepare and host the daily global CSFC coordination meeting and call
  • Assist with the compiling and editing the CSFC daily summary report
  • Respond to questions and queries sent to the CSFC mailbox
  • Monitor a variety of Citi security reports for additional fusion team analysis and investigation
  • Maintain close coordination and integration with Citi and external cyber security teams on “non-intelligence operational matters” to enhance CSFC situational awareness and reporting to partners
  • Work Citi Intelligence Center CSFC Coordinator on intelligence collection tasking in support of ongoing threat collection plans
  • Actively monitor and research news reports on cyber threats with a direct or indirect impact to the Citi brand, region business operations, technology infrastructure and client trust
  • Participate in the CSFC crisis drills representing the CSFC Functions and Engagement teams
  • Apply judgment to ascertain the impact of an attack and develop threat trends to develop mitigation techniques and countermeasures that can prevent future attacks
  • Liaison with external partners to build greater situational awareness for the Cyber Security Fusion Center and its partners
  • Maintain the daily function and upkeep of the CSFC Video Display Wall
  • Experience in cyber or information security, direct experience with a crisis management or operations center a plus
  • Proven ability to present to large groups and senior leaders on cyber security topics
  • Exceptional writing skills with a particular ability to be succinct
  • Possesses the ability to review information to determine its significance, validate its accuracy and assess its reliability to technical and non-technical audiences
  • Should have some knowledge of the following areas
  • Extremist Groups and Cyber Terrorists
  • Distributed Denial of Service attacks
  • Advanced Persistent Threat
  • Malware and Mobile Threats
  • Emerging Threats
  • Social Engineering
  • Insider Threats
  • Third Party Risks/Threats
  • Data Leakage Threats
24

Cyber Security Assessment Analyst Resume Examples & Samples

  • E-authentication Questionnaire
  • System Security Plan (SSP)
  • Security Test and Evaluation (ST&E) Plan
  • Plan of Action and Milestones (POA&M)
  • Certification Summary
  • Annual Assessments
25

Senior Cyber Security Assessment Analyst Resume Examples & Samples

  • Privacy Impact Assessment (PIA)
  • Disaster Recovery Plan, Disaster Recovery Test Results
  • Security Assessment Report (SAR)
  • Accreditation Letter
  • Quarterly Reporting Formats
  • Federal Information Processing Standard (FIPS) 199 Assessment
26

IT Corporate Information Security Cyber Threat Analyst Resume Examples & Samples

  • Perform data analysis and troubleshooting on security data ingestion issues reported by production support and other teams
  • Develop solutions and recommendations for improving data integrity issues. Analyze data issues and work with development teams for problem resolutions. Identify problematic areas and conduct research to determine the best course of action to correct the data, identify, analyze and interpret trends and patterns in complex datasets
  • Conduct cyber investigations for escalated and challenging computer security incidents using computer forensics, network forensics, root cause analysis and malware analysis
  • Develop dynamic and static dashboards or views to enhance risk awareness and internal intelligence availability for incident identification, investigation, and remediation
  • Adhere to all policies and standards, as well as regulatory requirements regarding reporting and escalations.. Work with team members to enhance and enrich security monitoring tools with contextual information
  • . Familiarization of the different components of an Information Security Program to understand how to successfully correlate disparate logs and cyber related data to accurately identify trends, behavior baselines, and outliers that represent possible risks
  • Strong analytical, organizational and problem-solving skills as well as strong interpersonal skills with the ability to work with management, peers and Information Security staff members
27

Cyber Security Encryption Systems Analyst Resume Examples & Samples

  • Contribute to Cybersecurity initiatives on information protection including data encryption, centralized key management, and database monitoring
  • Consults with other IT areas and the businesses and provides professional support for major components of the company's information security infrastructure
  • Contributes to the development and implementation of security architecture, standards, procedures and guidelines for multiple platforms
  • Consults with the business and operational infrastructure personnel regarding new and existing technologies
  • Ensures that all significant security concerns are addressed
  • Recommends course of action to mitigate risk and ensures that appropriate standards are established and published
  • Good understanding of security concepts
  • Experience with Unix / Linux operating systems
  • Familiarity with database systems (Oracle, MS SQL)
  • NET and C# development experience desirable (but not required)
28

Principal Analyst, Cyber Threat Security Resume Examples & Samples

  • Ability to understand the business requirements as well as provide a proposal of the appropriate security resolution to computer threats
  • Broad understanding of the business processes supported across all team’s environments
  • Ability to lead customer/remediation meeting(s) for project definitions, needs assessments and design reviews that impact all areas of a team’s systems
  • Drives architectural security consensus with the team while maintaining awareness with other teams
  • Collaborate with Privacy and Legal departments for eDiscovery requests
29

Cyber Security Exam Analyst Resume Examples & Samples

  • Experience with Compliance elements of vendor management, and familiarity with FRB's SR 13-19
  • Experience working with Projects
  • Ability to conduct work flows, use systems to extract data and proficient at MS Excel
  • Ability to work in a structured environment and maintain an aggressive timeline for completion of a project
30

Cyber Security SME / Analyst Resume Examples & Samples

  • Experience with computing design concepts and implementation
  • Experience with identifying new technologies and assessing their technical and performance characteristics
  • Experience with risk analysis and management, information security engineering, systems testing and analysis, and IT infrastructure
  • Experience with working in the intelligence community
  • Experience in an overseas environment
  • Experience with conducting technical analysis
  • Experience with Cybersecurity related to the intelligence community's policies and procedures
  • Experience with enterprise and the sponsor's partner's networks and systems
  • Experience with writing technical documents addressing complex and sensitive issues
  • Experience with communicating to Cybersecurity management across organizations
  • BA degree in Science, Mathematics, or Engineering
31

Senior Cyber Security Defense Analyst Resume Examples & Samples

  • Perform threat and vulnerability assessment and provide subject matter expertise on appropriate threat mitigation
  • Identify intrusion activity by leveraging alert data from multiple sensors and systems and determine priority for response
  • Leverage threat intelligence e.g. FSISAC, NCFTA while actively monitoring critical financial services infrastructure
  • Assess the impact of potentially malicious traffic on company network and infrastructure
  • Perform in-depth analysis in support of network monitoring and incident response operations
  • Perform live incident response (reactive and proactive incident management) by identifying and remediating malicious applications and infrastructure components
  • Collaborate with other Information Security and IT team members to develop and implement innovative strategies for monitoring and preventing attacks
  • Develop appropriate metrics (key risk and performance indicators) to measure the monitoring program and related process
  • Develop/Monitor basic IDS/IPS rules to identify and/or prevent malicious activity
  • Develop and test new correlation content and use cases using SIEM filters, rules, data monitors, active lists, and session lists
  • Conduct research of emerging security threats
  • Propose additional components and techniques that could be used to proactively detect and prevent malicious activity
  • Provide other services as a key member of the Cyber Security Operations Team
  • Security review and administration of changes to networks, servers and end point devices in collaboration with network operations
  • Security sensor policies for IDS/IPS, Firewalls, web security gateway, logging
  • Continuous Control Monitoring including Baseline Security - Configuration monitoring
  • Must have experience in SOC/NOC environment
  • Deep experience with cyber security in the domains of cyber threat intelligence and analysis, security monitoring and Incident Response for a cloud-based services environment
  • Familiarity with latest security vulnerabilities, advisories, incidents, penetration techniques, understanding of attacks, and determination of countermeasures
  • Strong knowledge of networking fundamentals such as TCP/IP and basic packet analysis
  • Candidate must have a working knowledge of network engineering and local and wide area (LAN/WAN) technologies and topologies
  • Must have experience with security and monitoring tools (i.e. ? Log management, e.g. Splunk, Firewall management, e.g. Fortinet, IDS/IPS, SIEM, etc...)
  • Knowledge and experience in Windows / Linux Operating Systems, baseline security configurations, audit, forensics, Patch Management for these OSs
  • Experience developing Standard Operating Procedures (SOPs), job aids, and hands-on training materials
  • Ability to manage multiple priorities ? projects, deliverables, and stakeholders
  • Industry Certification desired, e.g. CISSP, CISM Certification etc
32

Cyber Security Vulnerability Analyst Resume Examples & Samples

  • 2+ years of experience with day-to-day operations and usage of vulnerability tools and solutions, including crafting audit and scan policies and vulnerability mitigation strategies
  • Experience with creating weekly reporting metrics for management showing threat posture of the environment
  • Experience with vulnerability scanning tools, including Tenable and Nessus
33

Cyber Security & IT Policy Analyst Resume Examples & Samples

  • Help represent the National Lab IT and cyber security policies and performance to the Department of Energy
  • Facilitate the development of issues briefs and strategies to address legislative and policy changes at the Federal and Departmental level
  • Coordinate with peers at the National Laboratories to leverage policy efforts effectively
  • Represent broad DOE interests and concerns beyond the National Laboratories to achieve optimal policy outcomes across the Department of Energy
  • Develop strategic partnerships such as multi-agency frameworks and networks for collaborative programs and initiatives
  • Written and Verbal Communication Skills
  • Understanding of Technical Concepts
  • Experience or Advanced Degree
  • Minimum of twelve years experience which may include
  • A bachelor’s degree or applicable advanced degree (MPP/MPA, JD, MBA, PhD)
  • Cumulative education and experience (e.g. policy, administration, computing, management, law)
  • Experience developing strategic partnerships such as multi-agency frameworks and networks for collaborative programs. Ability to champion large-scale operational initiatives from conceptualization through completion
34

Cyber Security Engineer Analyst Resume Examples & Samples

  • Degree or equivalent experience
  • Must have 4 years of professional experience
  • Must have 3 years of related experience
  • Demonstrate a record supporting computer network defense at the enterprise and regional level
  • Experience with Cybersecurity tools such as Blue scope tool set or equivalent; Qtip, ACAS
  • Working knowledge to conduct incident and event analysis utilizing such tools as the ArcSight SIEM
  • Must have active Secret with the ability to obtain a Top Secret clearance
  • Must have CASP or equivalent certification
  • Must have DoD 8570 Computing Environment certification IAT II
  • Excellent communication skills both oral and written
  • Must be team oriented
  • Able to meet overseas medical deployment qualifications
  • Willing to travel with the military to locations throughout Southwest Asia, as required, to support the military customer at their location(s) via military air/land convoy
  • Ability to lift and carry 50 lbs
  • Ability to work in a bivouac environment
  • Willing to travel to overseas locations for a 1 year unaccompanied deployment
  • Ability to maintain a professional and courteous manner in difficult situations
  • Must have an Active Secret Clearance
35

Cyber Security Engineer Analyst Resume Examples & Samples

  • Must have 6 years of professional experience
  • Must have 5 years applicable experience in the field of Information Assurance and information technology
  • Experience with DIACAP and the C&A process
  • Experience working RFI and RFP responses
  • Experience using various operating systems, including Windows, Unix and/or Linux
  • Experience with various network security applications and techniques, including firewalls, intrusion detection systems, virtual private networks, encryption techniques and disaster recovery systems
  • Experience in incident response and remediation
  • Must have ability and willingness to work flexible hours
  • Must have a CISSP or equivalent certification
  • Active DOD Top Secret clearance
  • Experience working on US Government cyber security programs
  • Industry certification: CISM, GIAC, PMP or other
36

Princ Analyst Cyber Security Cnd-sp Incident Response Resume Examples & Samples

  • Responsible for a team providing analysis and triage of network anomalies that should be considered Events of Interest (EOI). Will provide basic assessment of the anomaly; designate it as an EOI and coordinate response with CND response team
  • Responsible for assuring the escalating of EOIs to Responders in a timely manner; with all required information to ensure the response team may act upon it accordingly
  • Must have an expert level understanding of networks at a packet level. Must be able to analyze packet captures at the expert level
  • Must be an expert at using CND tools to detect network attack; these tools are
  • Requires DoD 8570: IAT III and CND-SP Specialty: CND-IR
37

Analyst, Cyber Security Resume Examples & Samples

  • Develop internal processes and standards for threat intelligence workflow
  • Drive the normalization, correlation, and integration of internal and subscription threat intelligence source
  • Produce actionable intelligence in the form of reports, notifications, alerts, and briefings
  • Support production of signatures and Security Operations Center sets based on internal and externally sourced data and information
  • Drive research innovation and continuous coverage of malicious activity in underground and deep-web forums Support development of custom intelligence research tools
  • Lead research into intelligence analysis, including analytic tradecraft, and demonstrate critical thinking skills
  • Translate complex information sets into concise labels to assist incident response efficacy
  • Present new research to at conferences and at meetings as desired
  • Develop mitigation and countermeasure strategies from collected threat intelligence
38

Csfc Core Team Cyber Security Technical Analyst Resume Examples & Samples

  • Conduct research using multiple data sources, perform analysis and disseminate findings to both technical and non-technical consumers throughout Citi
  • Initiate the trend analysis based on available data to identify anomalies
  • Report on the continuous evolution of Cyber Security policy trends and issues, and review new requirements
  • Cyber crime
  • Hacktivism
  • APTs and TTPs
  • Host/Network-based intrusion detection
  • Symetric and Public Key Encryption
39

Cyber Security Vulnerability Analyst Resume Examples & Samples

  • Intermediate level of relevant work experience required with 3-5 years of experience
  • Possess knowledge, experience and understanding of vulnerability management framework and process application
  • Possess advanced knowledge related to administration, operation, and application of vulnerability scanning technologies
  • Detect, identify, and assess network vulnerabilities and system vulnerabilities based on cyber security vulnerability reporting cycles
  • Characterize the risk associated with identified vulnerabilities based on the threat impact for a single or combined number of vulnerabilities
  • Provide mitigation recommendations on how to eliminate or reduce risk factors based on architectural, network, hardware, firmware, and software configuration approaches
  • Prioritize vulnerability finding notification based on the criticality (risk) score of a single or multiple composite vulnerabilities
  • Coordinate with organizational and system stakeholders by tracking and reporting periodic (i.e. daily, weekly, etc.…) vulnerability analysis and vulnerability assessment results
  • Perform system administration of vulnerability management systems that are used to perform automated and manual assessment methodologies, practices, and remediation
  • Test, implement, and deploy the most recent vulnerability scanner configurations to increase the accuracy and improve analysis capabilities of vulnerability management technologies
  • Research and present recommendations and approaches to enhance vulnerability remediation techniques
  • Documented processes and operational processes, based on best practices to assist in the remediation of vulnerabilities
  • Conduct troubleshooting of vulnerability system errors and assist or conduct repairs to return the vulnerability scanning system to service
  • Develop and compose vulnerability management system standard operating procedure documentation using best practices
  • Partner with colleagues to support Cummins project goals and objectives for safe and secure operations
40

Cyber Security Engineer Analyst Resume Examples & Samples

  • Must have 3 years applicable experience in the field of Information Assurance, Cybersecurity and information technology
  • Experience with RMF and the A&A process
  • Ability to think independently and develop solutions to diverse cyber security scenarios
  • Minimum CASP certification (for an E03)
41

Cyber Security Monitoring Analyst Resume Examples & Samples

  • Populate and maintain an intrusions database, and provide data analysis support; analyze data from sensors, network security devices and applications using the security information event management systems, log servers, application interfaces and device consoles provided
  • Identify anomalous and malicious activity
  • Provide liaison to other agency cyber threat analysis entities such as intra-agency and inter-agency Cyber Threat Working Groups
  • Experience with Security Information Management Tools (ArcSight, NetWitness, RSA Security Analytics)
  • CISSP and/or SANS/GIAC Certification (equivalent to two year experience)
42

Cyber Security Monitoring Analyst Resume Examples & Samples

  • Senior Monitoring Analysts must provide recommendations based on best practice and experience to develop processes that will enhance efficiencies needed to perform the above
  • Any other duties as requested by the Contracting Officer Representative and SOC management
  • Experience network security analysis, using intrusion detection systems
43

Cyber Security Program Analyst Resume Examples & Samples

  • Any course work in Cybersecurity or Certifications
  • Understanding of Energy sector stakeholders
  • Interest in pursuing any of the following certifications: CISA, CISSP, CISM, Security +, PMP
44

Senior Analyst Cyber Security SOC Resume Examples & Samples

  • Quickly determine which alerts escalated to you from a Level 2 SOC Analyst need immediate action and which alerts to wait and watch
  • Monitor, evaluate, and assist with the maintenance of assigned security systems in accordance with industry best practices to safeguard internal information systems and databases
  • Maintain an expert understanding of vulnerabilities, response, and mitigation strategies used to support cyber security operations
  • Responsible to provide metrics and reports on data as assigned
  • Bachelor's degree in MIS or similar technical program or acceptable industry and work experience
  • At least three years’ experience identifying and responding to alerts and anomalous activity
  • 5+ years’ experience configuring and working with information technology systems
  • 2+ years of Security Operations Center experience
  • Ability to quickly ascertain the nature of alerts, events, or incidents brought to your attention and calmly formulate and communicate a plan for response
  • Must be able to work collaboratively with the global team. This position will work with Level 1 and Level 2 analysts, Information Technology, business units, and with various levels of management regularly
  • Demonstrate ability to create and write concise reports
  • Ability to prepare and present information to Senior Management
  • Expert understanding of network protocols, network devices, multiple operating systems, websites, databases, applications and operating systems
  • Expert technical knowledge of mainstream operating systems and a wide range of security technologies, such as network security appliances, anti-malware solutions, automated policy compliance tools, and desktop security tools
  • Experience using, configuring, installing, and tuning information security applications and appliances
  • Hands-on experience with McAfee security suite or similar
  • Hands-on experience with industry best practice surveillance tools for networks, hosts, databases, applications and operating systems
  • Expert understanding of encryption technologies and their configuration
  • Expert understanding of cyber threats and the associated tactics, techniques, and procedures used to infiltrate computer networks
  • Thorough understanding of alerts from many different security and network sources with the ability to quickly ascertain their relevance and actionable steps
  • Working knowledge of one of the following platforms is preferred: IBM iSeries, Linux, or MS Windows
  • Mentor and assist team members when necessary. Be able to work in a collaborative team environment
  • Ability to communicate effectively in a positive/upbeat fashion utilizing English, both in oral and written form
  • Have interpersonal skills with focused attention to guest needs to deal effectively with all business contacts
  • Provide off-hours support on an infrequent, but as needed basis. (Potential shifts may run 24/7 due to the need of the business.)
45

Cyber Security Functions & Engagement Team Analyst Resume Examples & Samples

  • Proven presentation and communication skills
  • Proven writing skills
  • Prepare, present, and execute CSFC Demos and presentations to Senior level Citi internal and external clients
  • Prepare and host the daily brief call
  • Assist with the compiling and editing the daily summary report
  • Respond to questions and queries sent to the CSFC Mailbox
  • Monitoring of SIRTs, PII breaches, CSIS investigations, and other operational events for additional fusion team analysis and investigation
  • Maintains close coordination and integration with teams such as SIM, ADV2, SOC, GCC, OEM, FS-ISAC, MS-ISAC, as well as, local information sharing consortium or groups and government entities on “non-intelligence operational matters” to enhance CSFC situational awareness and reporting to partners
  • Work with daily with internal Citi teams, such as, the CIC Intelligence Coordinator on intelligence collection tasking in support of ongoing threat collection plans
  • Track, monitor, and provide updates to the summary reports
  • Responsible for the daily function and upkeep of the CSFC Video Display Wall
  • Experience in managing a high profile cyber-incident or event
  • Should be a subject matter expert in one or more of the following areas
46

Cyber Security Forensic Analyst Resume Examples & Samples

  • Conduct incident response activities, including advanced investigation (forensic, malware analyses, root cause analysis, etc.) to investigate potential intrusions and develop remediation guidance
  • Perform the activities necessary for the immediate, short-term rapid resolution of incidents to minimize risk exposure and production down-time
  • Documenting event analysis and writing comprehensive reports of incident investigations
  • Assist with the deployment and maintenance of security sensors and tools
  • Monitor security sensors and review logs to identify intrusions
  • Review and process threat intel reports
  • Assist with developing and implementing detection use cases
  • Participate in on-call rotation for after-hours security and/or engineering issues
  • Assist with security assessment reports & provide recommendations
  • 2+ Experience working in a forensics capacity
  • Ability to perform packet analysis & malware detection
  • Thorough understanding of fundamental security and network concepts (Operating systems, intrusion/detection, TCP/IP, Firewalls, End-Point Detection, forensic tools, etc.)
  • Experience with Reverse Engineering malware, both static and dynamic analysis
  • Experience with IDA or OllyDbg
  • Familiarity with assembly code on 32/64 bit platforms is preferred
  • Previous experience generating custom YARA rules
  • Experience with enterprise SIEM or ELK Stack
  • Prefer BS in Engineering, Computer Science, Information Security, or Information Systems or equivalent work experience
  • Security certifications (e.g. Security+, Network+, GCIA, GCIH, CISSP, GREM, CEH, or similar certification desirable)
47

Analyst, Cyber Security Resume Examples & Samples

  • Ensure all Service Management procedures are being followed and SLA’s met
  • Shift – Wednesday - Sunday 8:00 – 5:00
  • Basic understanding of IAM systems including UNIX, Active Directory and provisioning systems
  • Ability to describe complex technical systems or principals in non-technical terms
48

Cyber Security Response Analyst Resume Examples & Samples

  • Formal incident response efforts - coordinated responses to intrusions or exploits
  • Provide data and analysis in support of regular metric reporting
  • Continuously identify and incorporate IT security improvement opportunities
  • Bachelor degree
  • 2+ years’ experience in a security field
  • Bachelor degree in computer related field
  • CISSP, ENCE, CCNA and/or GIAC credentials
  • Thorough knowledge of Information Security including malware, emerging threats, attacks, and vulnerability management
49

Senior Analyst Cyber Security Vulnerability Management Resume Examples & Samples

  • Conduct scans of Hyatt’s IT infrastructure to detect cyber security vulnerabilities, and arrange fixes with the appropriate teams for identified issues
  • Perform regular “red team” exercises, acting as a malicious attacker would to identify novel and unique vulnerabilities and ensure they are remediated
  • Select and visit specific Hyatt hotels to identify cyber security vulnerabilities on-site and produce meaningful reporting for all findings
  • Conduct vulnerability assessments of new applications and act as an advisory resource to their developers to help ensure the creation of secure code
  • Provide analytical support to the Cyber Security Operations team during investigations of attacker activity to help them understand malware behaviors and attack methods
  • At least five years of experience with vulnerability assessment or penetration testing is preferred; however any combination of experience, education, and certification that demonstrates the candidate can be successful in the position is acceptable
  • Familiarity with common security testing tools and tool sets such as Kali, Burp Suite, Metasploit, and Core Impact is required
  • Expertise with vulnerability scanning tools like Nessus, Nexpose, and Qualys is required
  • Understanding of attacker behaviors and skillsets is required
50

Cyber Security Policy Analyst Resume Examples & Samples

  • Research, recommend, develop, maintain, and update domestic and overseas cybersecurity policies, to include use of new and emerging technology (e.g. WiFi, cloud, mobile devices), software, hardware, and other IT-related systems (e.g. VoIP, Building Automation Systems)
  • Examine incoming requests for exceptions to policy and draft recommended decision memorandum to include requisite mitigation strategies
  • Coordinate clearances of all draft cybersecurity policies and memorandum with DoS stakeholders
  • Participate in intra-agency policy working groups (e.g. WiFi) and provide cybersecurity policy subject matter expertise
  • Provide support for the review and coordination for National level classified and unclassified cyber and communications security policies and guidelines
  • Respond to cables, memos, emails and phone inquiries regarding security policies and standards
  • Help maintain the contents of the Frequently Asked Questions (FAQ) web page and web portal website
  • Maintain databases for tracking incoming and outgoing policy documents, policy inquiries, exception requests
  • Provide status reports as required. Prepare contract deliverables to include Trend Analysis reports, Quarterly Status Reports, etc
  • Bachelor’s degree in IT or related field with 3+ years of work experience or MA in the same fields combined with 1+ year of work experience
  • Experience in researching, developing, writing, and editing cybersecurity policies, best practices, standards, processes and procedures
  • Experience in research and analysis of information system issues and trends, and research and development in a technical discipline/field
  • Excellent written and verbal communication skills; strong organizational skills; research, analysis, and writing skills
  • Strong customer service and interpersonal skills to effectively relate to agency and customer needs; ability to build working relationships with leaders and key stakeholders
  • Some experience with the creation of IT security requirements, technical security safeguards, countermeasures, risk management, contingency planning, and data communications networking
  • Ability to work independently and as part of a team; ability to take initiative with minimal direction and to solve problems
  • Knowledge of, and experience with, current Federal security standards (e.g., FISMA/NIST, DOD, and CNSS)
  • Familiarity with the Department of State’s mission is preferred and work with global policies is preferred
  • CISSP is preferred