Analyst, IT Security Resume Samples

4.7 (79 votes) for Analyst, IT Security Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the analyst, it security job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
JF
J Funk
Jovanny
Funk
12750 Hauck Curve
New York
NY
+1 (555) 168 8022
12750 Hauck Curve
New York
NY
Phone
p +1 (555) 168 8022
Experience Experience
Dallas, TX
Analyst, IT Security
Dallas, TX
Auer, Stokes and Cummings
Dallas, TX
Analyst, IT Security
  • Remotely manage client devices and correct problems
  • Remediate account provisioning and identity issues related to failures in the provisioning systems
  • 1) Business unit monitoring & reporting of the information & security risks
  • Penetration Testing (Support and fix)
  • Direct provisioning of AD or Unix access in source systems
  • Security Monitoring (Infra & Apps)
  • Provide input for IT Risk and Control Reporting
Houston, TX
Technical Analyst IT Security Application Support
Houston, TX
Franecki-Gutmann
Houston, TX
Technical Analyst IT Security Application Support
  • Providing regular reports, request/incident statistics to management
  • Management reporting and dashboards
  • High severity incident management and resolution, in line with business service level agreements
  • Proactive incident & problem management
  • Provide on-call cover for support during non-business hours
  • Performance and functionality troubleshooting/remediation
  • Escalation to and on-going liaison with vendor support for any issues which cannot be remediated internally
present
San Francisco, CA
Senior Analyst, IT Security
San Francisco, CA
Prosacco, Bailey and Purdy
present
San Francisco, CA
Senior Analyst, IT Security
present
  • Troubleshooting access issues across multiples systems and groups to deliver customers access
  • Provisioning and de-provisioning of access
  • Technical & Business Impact Risk Assessments
  • Create and maintain documentation, both internal and customer facing
  • Provide troubleshooting support to day-to-day operational and support functions, including monitoring and maintaining a ticket queue
  • Escalation contact for the iDevice Engineering team, and for Management escalations
  • Remotely assist with basic technical support related the management and monitoring of customer security devices; this support will include, but not be limited to, assisting customers with the replacement of defective security devices, setting up read-only accounts to 3rd party management consoles, modifying customer portal account views, etc
Education Education
Bachelor’s Degree in Information Technology Related Discipline
Bachelor’s Degree in Information Technology Related Discipline
The University of Kansas
Bachelor’s Degree in Information Technology Related Discipline
Skills Skills
  • Professionally and courteously answer client phone calls and email by
  • Exhibits strong interpersonal and executive communication skills in English
  • Demonstrates good negotiation & relationship-building skills
  • Demonstrate excellent communication and client care skills by documenting all analysis work and communications within a ticketing system
  • Anticipates problems, identifies solutions and addresses issues creatively
  • Manages time effectively – plans, prioritizes, and achieves goals
  • Escalates issues early and manages customer expectations effectively
  • Delivers assignments on time or early
  • Take ownership of and troubleshoot tickets generated by the health monitoring system. Tickets consist of alerts for unreachable devices, devices not reporting events, and miscellaneous hardware and software failures
  • Resolve problems introduced into client networks including, but not limited to, broken VLAN settings, broken span port settings, changed IP addresses, duplicated IP addresses, changed access control lists, and incorrect NATs
Create a Resume in Minutes

15 Analyst, IT Security resume templates

1

Assoc Analyst, IT Security Resume Examples & Samples

  • Perform quality control of identity and access management requests to ensure procedures are followed
  • Provide guidance to business partners and staff regarding documentation and process requirements
  • Perform ongoing quality reviews – identifies risks and problem areas and recommends standards, polices, and procedures to correct incident findings
  • Create and/or maintain documented identity and access quality control processes and procedures in accordance with company policy and best practices
  • Identify and recommend improvements to overall user access request processes
  • Act as a liaison between IAM Management and Analysts to proactively assess security controls gaps
  • Work closely with IT and Compliance groups to develop plans for ongoing monitoring of security access and user activity to proactively identify and mitigate security risks
  • Consistently participate and contribute to projects as needed
  • 1-2 years of experience years’ experience in a security-related function; specialized training or at least one (1) years additional experience may substitute for a degree
  • Knowledge of role-based access control concepts
  • Possess project management skills with attention to prioritization, a high degree of accuracy, and attention to detail
  • Comfortable with presenting and working with senior level management
  • CISA Certification Preferred
2

Senior Analyst, IT Security Operations Resume Examples & Samples

  • Develop operational procedures for security controls/technologies, vulnerability scanning and incident response
  • Maintain current knowledge of information security trends, threats and responses
  • Recognize and identify potential threats to Time Warner Corporate’s networks and systems
  • Review and respond to escalations and alerts that may result from security threats
  • Hands-on management of SIEM tools, processes, and Enterprise Log Management
  • Adhere to and improve upon company policies and procedures on incident management, malware analysis, forensics analysis and use of information security tools
  • Minimum 2-5 years in IT Security
  • CISSP, GCIA, GCIH
  • Expertise in SIEM, log management, and log analysis
  • Expertise in EnCase Forensics Tool
  • Experience with QualysGuard and Symantec DLP
  • Superior problem solving and analytical skills
  • Excellent interpersonal, written, and verbal skills
3

Analyst, IT Security Resume Examples & Samples

  • Security Awareness – relevant for Technical and Operational ORM Guidelines
  • Vulnerability Assessment
  • Penetration Testing (Support and fix)
  • Platform Security
  • Security Monitoring (Infra & Apps)
  • User access management
  • IT Sourcing
  • Implementation of relevant ORM Policies and Standards including on-going compliance
  • Technical & Business Impact Risk Assessments
  • Test controls
  • Evaluate any residual risks
  • A degree in Information Technology related discipline
  • At least 5-8 years of working experience in IT Security or related field, preferably in a banking environment
  • Ability to recognize underlying risks and to identify procedural/policy/standard compliance issues
  • Project management and coordination skills
  • Professional Certifications such as CISSP/CISA will be an advantage
4

Senior Analyst, IT Security Resume Examples & Samples

  • Responsible to implement regional IT Security strategy and roadmap
  • Ensure that the Bank’s and relevant regulatory procedures and controls are adhered to
  • Cyber Security incident response plan and forensic investigation
  • Cyber Security Awareness – relevant for Technical and Operational ORM Guidelines
  • Cybercrime threat intelligence gathering, analysis and correlation from internal and external threat intelligence to create a comprehensive view of the threat landscape
  • Implementation of IT and Security Controls with respect to
  • Vulnerability Assessment
  • Patch management (evaluation and reporting)
  • Penetration Testing (Red and Blue team exercise)
  • Platform Security
  • Security Monitoring (Infra & Apps)
  • External Connections Review
  • Develops detailed controls
  • Implement controls
  • Ensure that KPIs and SLAs for the teams are delivered with quality and on a timely basis
  • Responsible to remediate any performance issue in the team and delivery
  • Good command of spoken and written English
  • Ability to work independently and has an eye for detail
  • Professional Certifications such as CISSP/CISA/CISM/GCIH will be an advantage
5

Senior Analyst It-security Systems Resume Examples & Samples

  • Perform, document and assist in security software maintenance tasks for security system platforms
  • Provide application support for issues, modifications, and enhance requests from the security operation center
  • Manage and audit user access to security system platforms
  • Maintain engagement with business and IT partners
  • Perform system health assessment for security system platforms, and perform necessary steps to remediate issues
  • Serve as a liaison between security and business units for security system related projects
  • Coordinate with IT department network or infrastructure changes that may affect system performance or behavior
  • Perform security system configuration changes to align with requirements set forth by senior leadership
  • Determine, design and implement solutions to security system usability, interface and performance challenges
  • Manage security vendor relationships and provide oversight to security related service requests
  • Manage service request queue in JIRA, maintain JIRA databases
  • Proactively build security IT knowledge to provide solutions
  • Utilize best practices to improve products and services. Apply and verify compliance to standards as defined within the Management Model
  • Minimum Associates Degree in Information Technology or Security Systems related discipline
  • Minimum 3 years’ experience in an IT or Security Systems related position
  • Basic understanding/knowledge of Access Control Systems
  • Basic understanding/knowledge of IP based Video Systems
  • Basic knowledge of Networking concepts and fundamentals
6

Lead Analyst It-security Vulnerability Assessment Analyst Resume Examples & Samples

  • Perform technical application and infrastructure security vulnerability assessments across a wide range of IT/OT systems, including applications, wireless and wired networks, web services, mobile applications, thick clients, Cloud solutions, etc
  • Work with the Business to effectively communicate the risks of identified vulnerabilities and help remediate identified security vulnerabilities
  • Develop/refine necessary governance documentation (policies, standards, guidelines) for all security vulnerability assessment processes
  • Collaborate with various teams (IT, Development, QA, etc.) to help ensure designs and implementations meet specified security standards
7

Senior Analyst, IT Security Risk Management Resume Examples & Samples

  • 5+ years of combined risk management, risk consulting, and information security work experience
  • 3+ years of experience in delivering IT Security risk assessments, solutions, risk mitigation recommendations for a global company
  • 3+ years’ related experience in IT Audit, IT Security, Application Development, Network Engineering, Database Administration, Middleware, Operating systems (UNIX, Linux, Windows), and have demonstrated experience with cloud security, mobile security, and IoT technologies. Security technologies such as cyber security & threat management , vulnerability management scanners, mobile security, DLP, next generation firewalls, IDS/IPS, End Point Protection (AV & AM), FIM, security scanners, secure web applications, secure web filtering and others
8

Technical Analyst IT Security Application Support Resume Examples & Samples

  • High severity incident management and resolution, in line with business service level agreements
  • Escalation to and on-going liaison with vendor support for any issues which cannot be remediated internally
  • Providing regular reports, request/incident statistics to management
  • Managing the scheduled changes required across a Production environment, such as infrastructure and application patching and upgrades and the regular DR testing of these critical business services and supporting technologies
  • Level1/Level2 support tasks
  • Management reporting and dashboards
  • Managing high-severity production incidents and issues
  • Keeping the application ‘lights-on - live&#8217
  • Maintaining SLA’s
  • Problem and incident triage/troubleshooting
  • Performance and functionality troubleshooting/remediation
  • Ownership and implementation of DR plans/testing and maintaining CMDB records
  • Supporting new builds
  • Contributing to product roadmaps, future strategy
  • Vendor liaison
  • Proactive incident & problem management
  • Data consistency and time synchronization monitoring
  • Provide on-call cover for support during non-business hours
  • Support/on-board new applications to consume IT Security services
  • Support/on-board SSO service for FIL customers
  • BSc/BA in Computer Science, Engineering, Information Systems and/or equivalent formal training or experience
  • Proven experience and longevity in Information Technology supporting complex projects
  • Significant experience with integration, migration and communication issues among applications, databases and technology platforms
  • Broad understanding of the following technologies and their inter-operability (Unix, Linux, Windows, Oracle, SQL Server, WebSphere, TPC/IP, SAN Storage, Server Virtualization, Cisco network & voice hardware & OS, etc.)
  • Ability to research, recommend and be accountable for alternative actions for problem resolution engaging the appropriate internal or external subject matter experts
  • Thorough understanding of Disaster Recovery and contingency planning requirements
  • Very strong hands-on experience with leading Infrastructure security technologies such as Identity & Access Management security technologies such as NetIQ eDirectory & Identity Manager, NetIQ Access Manager and Access Governance system preferred
  • Experience and strong understanding of federation and SSO mechanisms
  • Experience working with SAML
  • Experience working with Web Services (SOAP, REST)
  • LDAP skills (Novell eDir) would be an advantage
  • UNIX SA and Windows SA skills required
  • Database and SQL skills preferred
  • Understanding of highly available application architectures, including network and application load balancing and failover
  • Experience of working in similar production application support role
  • Structured and methodical in problem solving
  • Strong communication skills and flexible team player
9

Senior Analyst IT Security Resume Examples & Samples

  • List the specific functions which must be performed in order to fulfill the purpose of your position as descried above
  • Performs on-going monitoring to determine if the IT internal controls are functioning effectively and efficiently, and retains the associated compliance evidence
  • Present methods for effective and efficient testing of controls and drives continuous improvement efforts
  • Assist in determining appropriate IT internal control specifications within various operating systems, database management systems and applications and their associated maintenance processes that when combined together, comply with various government-mandated regulations (e.g., Sarbanes-Oxley Act, HIPAA, Digital Millennium Copyright Act, etc.)
  • Collaborates with rest of Compliance Office team, Internal Auditors, External Auditors and key personnel to provide Management Validations
  • Understands and determines the conformity of operating unit internal control practices with corporate policies, standards and procedures
  • Aligns the IT Compliance Program efforts with the Eaton Business System and drives on-going continuous improvement efforts to ensure continued compliance while maximizing enterprise-wide efficiencies and reducing auditors’ direct labor costs
  • Maintains a working knowledge of both financial and IT “auditing” processes, objectives, techniques, statistical sampling methods, etc
  • Performs assigned tasks with supervision
  • Assists in developing logical, practical, and documented IT internal control solutions as new technologies are developed and implemented
  • Written and verbal communications must be clear, concise, and effective
  • Participates in various business unit and corporate IT management staff meetings
  • Provides IT Compliance Office program training as appropriate
  • BS/BA Computer Science or related Computer Science or Information Technology degree Finance with an accounting/business minor from an accredited college or university
  • Two to four plus years public accounting and/or industry audit and process experience
  • Multi-lingual skills are a plus
  • Is familiar with the COSO internal control framework and general information system audit standards and techniques
  • High level of experience with computer based systems. Experience with Microsoft Windows operating system
  • Approximately 10% travel
  • Wide/Local Area Network control specifications
  • Various operating systems (Unix, OS/400, Mainframe, Windows or Active Directory)
  • Application Software Packages (MfgPro, Mapics, JDEdwards, SAP or Oracle)
  • Keeping current with constantly changing computer technology, evolving regulations and the lack of associated standard interpretations of such regulations
  • Diverse information system environments (e.g., different ERPs/MRPs, operating systems, etc.)
  • Describe five or six critical end-results which your position is expected to accomplish
  • Compliance with various government regulations (e.g., SOX)
  • Internal Control related business process improvements that translates into reduced external audit time and fees associated with the regulatory compliance assessments
  • Identifying business unit and industry internal control “best practices”, and leveraging them across the enterprise
  • Trains cross-functional teams regarding regulatory compliance aspects
  • Presents periodic progress and new developments to the IT Compliance team
  • Oracle Financials (AP, Fixed Assets, GL) and HR
  • Payroll Systems
  • Accounts Receivable Systems
  • Business Unit ERP systems
10

Analyst, IT Security Resume Examples & Samples

  • 3-5+ years of experience in Information Technology that directly aligns with the specific responsibilities for this position
  • Extensive experience in addressing web application security issues, such as those outlined in OWASP Top 10
  • Knowledge of application security throughout the software development lifecycle
  • Experience developing secure coding practices for ASP.Net and J2EE applications
  • Experience in securing an application’s integration with relational database management systems such as Oracle, MS SQL Server, etc
  • Experience with security dynamic analysis tools such as IBM AppScan, HP Security Center, HP Webinspect, Portswigger BurpSuite, Fiddler, and OWASP ZAP
  • Demonstrated experience designing application firewall rules in such tools as Citrix NetScaler, Imperva, F5 ASM, iRules, and/or Apache ModSecurity, as compensating controls to protect Web applications
  • Working knowledge and understanding of regulatory compliance concerns, data protection and industry standard security and risk frameworks
  • Prior financial services experience preferred
11

Analyst, IT Security Response Technology Resume Examples & Samples

  • Administer more complex requests and questions received via phone, e-mail, or an internal ticketing system in a timely and detail-oriented fashion in order to resolve a multitude of cyber security related situations
  • Analyze, escalate, and assist in remediation of technology related issues and outages using vendor specifications
  • Configure tools in accordance to device owners policies and specifications
  • Create detailed operational processes and procedures for analyzing, escalating, and assisting in the remediation issues and outages
  • Maintain availability of security technologies, such as IDS/IPS, DLP, syslog, vulnerability scanners
  • 3 - 5+ Years Experience with one or more of the following technologies: IPS, DLP, content filtering, malware detection, vulnerability management. (Required)
  • 3 - 5+ Years Information Security related experience, in areas such as: security operations, incident analysis, incident handling, and vulnerability management or testing, system patching, log analysis, intrusion detection, or firewall administration. (Required)
  • Knowledge of how cyber-threats propagate, trigger, hide, and communicate
  • Malware analysis & reverse engineering skills are a plus
  • Willingness to research existing known and unknown cyber threats and have the skills to envision the ever-evolving threat landscape
  • An understanding of IT security concepts with an emphasis on detection, digital forensics and response are a plus
  • An understanding of security technology hardware and software including preventative, detective, and reporting tools are a plus
12

Analyst, IT Security Distribution Resume Examples & Samples

  • Administers more complex requests and questions received via phone, e-mail, or an internal ticketing system in a timely and detail-oriented fashion in order to resolve a multitude of cyber security related situations
  • Analyzes, escalates, and assists in the remediation of more complex security related issues affecting data confidentiality, integrity, or availability
  • Develops detailed operational processes and procedures for analyzing, escalating, and resolving security related issues
  • Works with a wide array of host and network based security technologies, such as Firewall, IDS/IPS, Anti-Virus, and Whole Disk Encryption solutions
  • 3 - 5+ Years of Information Technology related experience, in areas such as: Server/Workstation OS Support, Business Application Support, Security/Functional System Patching, or Systems Management/Monitoring. (Required)
13

Lead Analyst It-security Systems Resume Examples & Samples

  • Perform, manage and appropriately document work activities relating to projects, sub-projects, or processes. For projects: plan, design, and build high quality Security software solutions in accordance with Security project management standards. For operations and application maintenance and support: plan and lead Security activities required to manage service level agreements. Assist others in planning and prioritizing work and work schedule
  • Assist in creation of documentation for products and services. Use best practices to improve products and services provided to business unit partners, and monitor adherence within Team/Group to standards as defined within the Management Model
  • Maintain and enhance engagement with business and Security and IT partners and other stakeholders
  • Establish positive team environment by proactively assisting and training less experienced personnel. Provide performance and development feedback as required
  • Maintain technical knowledge and business acumen within own discipline or function
  • Utilizes understanding of customers business needs to determine requirements
  • Applies technical expertise to plan, design, build or support required products and processes
  • Helps other team members learn appropriate theories, practices and principles that relate to their skill set portfolio
  • As assigned, manage budget for area of responsibility
  • Expected to work under minimal supervision
14

Senior Analyst It-security Systems Resume Examples & Samples

  • Perform, document and assist in planning work activities relating to projects, sub-projects, or processes. For Projects: analyze requirements, then design, build, and test Security software solutions in accordance with Networked Security Systems and project management standards. For operations/application maintenance: enhance, maintain or support existing Security products and processes to the defined service level agreement
  • Maintain engagement with business and Security and IT partners
  • Assist less experienced personnel
  • Proactively build business/Se knowledge to provide solutions
15

Analyst, IT Security Risk Assessment Resume Examples & Samples

  • Clearly and professionally communicate information security risks associated with external party services to Lincoln business unit personnel and business leaders
  • Determine information security risk profiles for various vendor and business partner services using questionnaires and knowledge of Lincoln policy and relevant industry best practices and standards
  • Determine the priority and scope of each request from external parties for information concerning Lincolns information security practices
  • Recommend solutions to eliminate, reduce, or mitigate risk, and communicate said solutions to both external parties and internal business stakeholders
  • Record pertinent documentation and communications for all assessments in Lincolns online information technology (IT) governance, risk, and compliance platform
  • Report status of engagements to Information Security management, project managers, and other business stakeholders as appropriate
  • Respond to incoming requests from external parties for information concerning Lincolns information security practices by providing appropriately scoped and accurate information in a timely and professionally written manner
  • Review and assess external party information security controls to ensure they meet or exceed Lincolns information security risk management requirements for the services to be provided
  • 3 - 5+ Years of experience in information systems/IT, IT audit, information security, information risk management, or enterprise privacy that directly aligns with the specific responsibilities for this position.(Required)
  • Possession and continual application of the following character traits: dependability, integrity, decisiveness, tact, courage, enthusiasm, and sound judgement
  • Working knowledge of common information security concepts, practices, and technologies
  • General knowledge of industry standard security frameworks, including the NIST Cybersecurity Framework
  • General knowledge and understanding of regulatory compliance mandates concerning data protection, including HIPAA, GLBA, and various state laws and regulations
  • Basic knowledge of IT audit and assessment concepts and practices
  • Industry certification preferred, including but not necessarily limited to CISSP, CISM, CISA, or CRISC
  • Prior insurance or financial services experience preferred
16

It-analyst, IT Security Resume Examples & Samples

  • Develop and implement standards and operating procedures
  • Maintain proper change management documentation for all hardware and software modifications
  • Participate in the Cyber Incident Response Team (CIRT)
  • Perform all required operational maintenance and troubleshooting of supported security assets
  • Perform daily backup and recovery operations for the supported security assets
  • Participate in disaster recovery planning, development, exercises, and actual events
  • Other duties as assigned**
17

Senior Analyst, IT Security Response Tech Resume Examples & Samples

  • Administers complex requests and questions received via phone, e-mail, or an internal ticketing system in a timely and detail-oriented fashion in order to resolve a multitude of cyber security related situations
  • Analyzes, escalates, and remediates complex technology related issues and outages using vendor specifications
  • Configures security tools in accordance to device owners policies and specifications
  • Determines and recommends the most appropriate response to identified complex security issues by assessing impact and prioritization
  • Determines complex best practices and suggests how to improve current security practices, technologies, and tools
  • Maintains availability of security technologies, such as IDS/IPS, DLP, syslog, vulnerability scanners
  • Provides management and internal stakeholders with risk assessments and security briefings to advise them of critical issues that may affect security objectives
  • Recognizes and identifies potential areas where existing policies and procedures require change and creates detailed operational processes and procedures for analyzing, escalating, and assisting in the remediation issues and outages
  • Serves as a mentor and shares knowledge with junior and/or peer team members
  • 5 - 7+ Years Experience with one or more of the following technologies: IPS, DLP, content filtering, malware detection, vulnerability management. (Required)
  • 5 - 7+ Years Information Security related experience, in areas such as: security operations, incident analysis, incident handling, and vulnerability management or testing, system patching, log analysis, intrusion detection, or firewall administration. (Required)
  • Knowledge of Splunk or other similar technologies is important
  • Familiarity with scripting / programming (Python, Perl, C, etc.)
18

Analyst IT Security Operations Resume Examples & Samples

  • Assists in the design, development and implementation of security tools
  • Assists with security-related software and firmware (e.g., endpoint, vulnerability scanners, firewalls, IPS/IDS, DNS, proxy etc.) to maintain security and service continuity
  • Enforces security policies and procedures by administering and monitoring security profiles, reviews security violation reports and investigates possible security exceptions, updates and maintains and documents security controls
  • Responds to service issues, problems, and critical situations to support resolution and minimize downtime
  • Involved in the evaluation of products and/or procedures to enhance productivity and effectiveness
  • Bachelors in Computer Science
  • Three (3) years information technology experience
  • Three (3) years information security experience
  • Demonstrates fundamental understanding of common security device functions, such as IDS/IPS, Network and Host-based firewalls, DLP (Data Leakage Protection), encryption, endpoint
  • Able to work collaboratively during an incident from possible attack activities, such as scans, man in the middle, sniffing, DoS, DDoS, worms, Trojans, viruses, etc
  • Willingness and aptitude to develop in-depth knowledge of network and endpoint security technologies and products (such as firewalls, Network IDS, scanners) and continuously improve these skills
  • Able to articulate technical processes, both oral and written, to different audiences and varying levels of complexity
19

Senior Analyst, IT Security Response Tech Resume Examples & Samples

  • 5 7+ Years Experience with one or more of the following technologies: IPS, DLP, content filtering, malware detection, vulnerability management. (Required)
  • 5 7+ Years Information Security related experience, in areas such as: security operations, incident analysis, incident handling, and vulnerability management or testing, system patching, log analysis, intrusion detection, or firewall administration. (Required)
  • Extensive knowledge of log gathering and event analysis
  • Extensive experience in issue management and resolution
  • Experience leading monitoring and response operations
  • Ability to work in a highly collaborative team environment
  • Ability to effectively communicate with peers and all levels of management
  • In depth knowledge of TCP/IP, computer networking, and applications
  • Ability to define and monitor complex processes and procedures
  • Experience in training and mentoring colleagues
  • Advanced Splunk knowledge (Desired)
  • Knowledge of IPS, AV, WAF, DLP, SEIM, Proxy (Desired)
20

Analyst IT Security Resume Examples & Samples

  • Identify and track issues, assess impact, andexecute resolution
  • Ensure effective integration managementthroughout the life cycle of projects
  • Develop training requirements and plans
  • Assist in preparation of Disaster Recoveryplanning and testing
  • Track and monitor the detection and remediationof security vulnerabilities within applications, hosts, and infrastructure
  • Track and ensure adequate and timely resolutionsof all audit and risk assessment findings relating to security
  • Develop IT controls monitoring programs toensure compliance-related risks are mitigated
  • Perform compliance checks
  • Setup and operationalize issues & correctiveaction plans
  • Develop and define metrics
  • Moderate the annual review and update of globaland IT policies
  • Dashboard updating & reporting
  • Support and facilitate regulatory complianceinitiatives e.g. PCI, HIPPA, SOX
  • Participate in annual security awarenesscampaign
  • Bachelor’s Degree in Information Technology,Computer Science, or related curriculum
  • CISA or CISSP preferred
  • 3 to 5 years of related experience
  • Familiarity with IT solution delivery processes
  • Extremely detail and controls oriented
  • Ability to communicate effectively at all levelswith sponsors, vendors, and project team members
  • Demonstrate strong word processing,presentation, and reporting skills
  • Excellent communication, listening, andfacilitation skills
  • Excellent time management and relatedorganizational skills, including appropriate sense of urgency, a proactiveapproach, and a suitable ability to anticipate and manage project lifecycleevents, issues and obstacles
  • Familiar with, and able to apply,generally-accepted security methods, concepts, and techniques
21

Senior Analyst, IT Security Resume Examples & Samples

  • Collaborates with internal and external stakeholders to performance IT Security audits, manage responses, and remediate deficiencies
  • Escalates and communicates identified complex cyber security risks to management as needed
  • Evaluates and communicates risks associated with audit findings identified for other Information Technology teams
  • Manages and/or participates in information security risk management efforts, including statutorily mandated HIPAA risk analyses and implementation of the National Institute of Standards and Technology (NIST) Cybersecurity Framework
  • Obtains input from Lincolns Privacy Office, Law department, and management to interpret legislation and regulations as appropriate before making internal/external statements or providing information that could impact the corporation
  • Provides consultation on information security awareness and access validation efforts
  • Provides direction and guidance as needed to Information Security personnel and the larger I.T. organization concerning legislative, statutory, and Lincoln policy requirements
  • 5 7+ Years of experience in IT Security that directly aligns with the specific responsibilities for this position.(Required)
22

Senior Analyst, IT Security Operations Resume Examples & Samples

  • Analyse IT security alerts (NIDS, HIDS, DLP, Web, etc.)
  • Respond to security incidents and perform digital investigation
  • Improve our detection capability by creating dashboards, alerts and correlation rules on our SIEM
  • Improve our detection and response capability by automating and developing tools
  • Review network access requests (firewall, proxy)
  • Administrate security systems (antimalware, NIDS, HIDS, SIEM, etc)
  • Good knowledge of Linux and Windows
  • 2 years of relevant experience with IT security operations or penetration testing
  • MS in Computer Science or equivalent practical experience
  • English working proficiency (written and spoken)
  • Relevant experience looking at security alerts, analysis and response
  • Log management and SIEM (open-source)
  • Programming experience in Python or Shell scripting
  • Penetration Testing, web security
  • Worked in DevOps / E-Commerce environment
23

Analyst, IT Security Resume Examples & Samples

  • Drafts IT general controls, information security and risk management policies, procedures and standards to support company objectives. Develops and provides training for global IT staff in IT general controls and other key processes
  • Identifies, assesses and evaluates security risks, provides recommendations for remediation, suggests treatment options
  • Provides technical assistance in the selection, configuration, and maintenance of security software, utilities and hardware of routine to moderate complexity
  • Assists in the development of technical security standards to support policies including assisting in creating and coordinating monitoring standards and incident investigation procedures
  • Performs periodic infrastructure and application security assessments of routine to moderate complexity and reviews for evidence of vulnerability or compromise and assists in or facilitates the implementation of resolution. Monitors and enforces compliance with security policies, standards and guidelines. Tracks resolution of findings and prepare reports
  • Responds to and reports on IT security incidents of routine to moderate complexity, providing initial assessment of impact severity and types of incidents being addressed. Coordinates resolution efforts with Information Security leadership team for critical or serious incidents
  • Supports daily operations of information security systems and applications. Collects metrics and prepares operational reports
  • Supports IT projects and provides expertise as appropriate
  • Keeps abreast of current risks, security issues, threats, protection strategies, and regulatory developments
  • 3+ years of experience in information security
  • Candidates must demonstrate technical expertise in at least one of the following areas: network security, operating system security, database security, ethical hacking or security architecture
  • Candidates should have deep knowledge and hands-on skills in the following areas: firewalls, proxy servers, remote access, intrusion detection systems, wireless, encryption, antivirus, DLP, security and risk assessments, content management, and identity management
  • Exhibits strong interpersonal and executive communication skills in English
  • Demonstrates good negotiation & relationship-building skills
  • Adapts to change – is flexible
  • Delivers assignments on time or early
  • Manages time effectively – plans, prioritizes, and achieves goals
  • Escalates issues early and manages customer expectations effectively
  • Anticipates problems, identifies solutions and addresses issues creatively
24

Senior Analyst, IT Security Resume Examples & Samples

  • Provisioning and de-provisioning of access
  • Direct provisioning of AD or Unix access in source systems
  • Deescalate and manage customer related escalations
  • Performs a variety of tasks and would be ready to work extra hours in some emergency situations
25

Senior Analyst, IT Security Resume Examples & Samples

  • Establish and maintain access to our corporate trading application
  • Perform technical analysis and troubleshoot application entitlement issues
  • Prepare, perform and present IT risk assessments, with recommendations to management both verbally and written
  • Evaluate the efficiency and effectiveness of IT Security processes and controls in place ensuring confidentiality, integrity, and availability of data
  • Possess and maintain technical expertise in IT Security of areas in which responsible, keeping abreast of industry security trends and developments
  • Coordinate and monitor the effectiveness of the security awareness-training program
  • Assist in the development of innovative and creative ideas to formulate risk mitigation and remediation plans and approaches to ensure compliance with various regulatory bodies
  • Monitoring, detecting, preventing and responding to system security incidents & intrusion
  • Formulating & Implementing network security policies and procedures
  • Monitoring security advisory groups to ensure all necessary network security updates, patches and preventive measures are in place
26

Senior Analyst, IT Security Resume Examples & Samples

  • Collaborate with internal teams to ensure efficient service delivery
  • Provide mentorship of team members and the Cyber Threat Operations Center
  • Escalation contact for the iDevice Engineering team, and for Management escalations
  • Top notch operational support to internal teams and external customers
  • Responsible for the integrity and functionality of the field of deployed proprietary devices
  • Provide troubleshooting support to day-to-day operational and support functions, including monitoring and maintaining a ticket queue
  • Create and maintain documentation, both internal and customer facing
27

Senior Analyst, IT Security Resume Examples & Samples

  • Interpret and implement customer change requests on managed security device platforms, primarily firewalls and IDS/IDP devices
  • Meet service level agreements related to device change implementation
  • Remotely access and manage devices at various global customer locations from a security operations center-
  • 6-8 years of relevant experience or equivalent combination of education and work experience: undergraduate degree and 2-4 years of relevant experience, graduate degree and 0-2 years of relevant experience
  • Hands on experience with one or more of the following firewall platforms or technologies
  • Hands on experience with one or more of the following IDS/IPS platforms
28

Senior Analyst IT Security Vulnerability Management Resume Examples & Samples

  • Conduct and manage vulnerability analysis scanning
  • Assist with developing the vulnerability management team and processes to handle identifying vulnerabilities and tracking their remediation to better protect the United network
  • Act as a key resource for teams in the remediation of vulnerabilities discovered by Vulnerability Management
  • Ensure regular scanning and review of assets and applications to identify network, configuration, and application vulnerabilities
  • Utilize a system for consistent tracking and review of open vulnerabilities and gathering of metrics on the program
  • At least three years of experience in information technology
  • Effective Program Management skills
  • Knowledge of basic vulnerability management fundamentals
  • Expertise in relationship building with partners
  • Ability to lead by example and influence change
  • Understanding of complex project timelines
  • Good understanding of Information Security standards, frameworks, and best practices
  • Experience working with IT infrastructure and development teams
29

Senior Analyst, IT Security Resume Examples & Samples

  • Identify, report and resolve security violations
  • Analyze and assess security incidents and escalate to appropriate internal teams for additional assistance
  • Operate, configure and troubleshoot network intrusion detection devices and other security systems
  • Perform vulnerability/risk analysis of computer systems and applications as directed