Computer Systems Security Analyst Resume Samples

4.7 (115 votes) for Computer Systems Security Analyst Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the computer systems security analyst job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
WA
W Abshire
Waldo
Abshire
272 Hills Tunnel
Boston
MA
+1 (555) 247 2733
272 Hills Tunnel
Boston
MA
Phone
p +1 (555) 247 2733
Experience Experience
Houston, TX
Computer Systems Security Analyst
Houston, TX
Stamm and Sons
Houston, TX
Computer Systems Security Analyst
  • Preparing security plans and related documentation
  • Interprets assessment results to identify vulnerabilities and verify system hardening
  • Participates in a wide range of security issues including architectures, firewalls, electronic data traffic, and network access
  • Conducting briefings
  • Assist the component with staying on track with Core Controls and A-123 control assessment schedules
  • Based on the risk profile of the analyzed systems, develop and document a Plan of Action and Milestones (POA&M) for mitigating those risks
  • Involved in a wide range of compliance issues including architectures, firewalls, electronic data traffic, and network access
Phoenix, AZ
Isso / Computer Systems Security Analyst
Phoenix, AZ
Kirlin-O'Hara
Phoenix, AZ
Isso / Computer Systems Security Analyst
  • Identifies IA vulnerabilities resulting from a departure from the implementation plan or that were not apparent during testing
  • Provides design and planning guidance for the testing security designs, newly released equipment software and operating systems for security vulnerabilities
  • Supporting formal security testing and preparation
  • Supporting executive management reporting of internal control issues and status
  • Provide oversight to all IA personnel monitoring/managing firewalls and intrusion detection systems and end-point security systems
  • Planning and executing a self audit strategy to assess control effectiveness
  • Monitoring and reporting on the control environment
present
Phoenix, AZ
Computer Systems Security Analyst Senior
Phoenix, AZ
Lynch-Raynor
present
Phoenix, AZ
Computer Systems Security Analyst Senior
present
  • Establish and maintain a strong working relationship with all team members
  • Troubleshoot and analyze problems with SCCM and GPO configuration
  • Leidos is a global leader in the integration and application of information, technology and systems working to solve the world’s toughest challenges in the civil, health, defense, intelligence and homeland security markets. The company’s 33,000 diverse employees support vital missions for government and commercial customers in 30 countries. Headquartered in Reston, Virginia, Leidos reported annual revenues of approximately $10 billion for the fiscal year ended January 1, 2016 after giving effect to the recently completed combination of Leidos with Lockheed Martin's Information Systems & Global Solutions business (IS&GS). For more information, visit www.Leidos.com. The company’s diverse employees support vital missions for government and commercial customers. Qualified women, minorities, individuals with disabilities and protected veterans are encouraged to apply. Leidos is an Equal Opportunity Employer
  • Analyze, troubleshoot, and investigate cyber security related issues
  • Participates in RFP security-related technical proposal responses activities including designing, evaluating and writing solutions
  • Identify IA vulnerabilities resulting from a departure from the implementation plan or that were not apparent during testing
  • Support the control assessment, reporting and monitoring processes using the Cyber Security and Assessment Management (CSAM) system
Education Education
Bachelor’s Degree in Science With
Bachelor’s Degree in Science With
San Diego State University
Bachelor’s Degree in Science With
Skills Skills
  • Ability to perform basic scripting tasks with Splunk to automate repeatable processes using Python, Ruby, PowerShell, Perl, etc
  • ICD 503, JSIG and JFAN knowledgeable
  • Strong working knowledge with NIST Special Publications and the NIST SP 800-37 SA using CSAM system
  • Strong working knowledge working with software package DBProtect
  • Attention to detail with an ability to handle multiple tasks
  • Possess solid knowledge of different kinds of system configurations and software compatibility
  • Certified Information Systems Security Professional (CISSP)
  • Good communication skills in order to interact with various levels of government customers
  • Knowledge of servers, IP routing protocols and database implementations
  • Knowledge of SQL, data analytics, Splunk (SPL, other SIEM tools, XML, US-CERT/SOC cybersecurity metrics
Create a Resume in Minutes

3 Computer Systems Security Analyst resume templates

1

Computer Systems Security Analyst Resume Examples & Samples

  • Monitoring and reporting on the control environment
  • Planning and executing a self audit strategy to assess control effectiveness
  • Coordinating periodic SOX system access reviews
  • Monitoring sensitive access
  • Focal point for internal and external ITGC audits
  • Liaison between audit and technical resources for data requests, management responses, and tracking action items to completion
  • Supporting executive management reporting of internal control issues and status
  • Managing compliance and audit tools, including system strategy and roadmap, configuration, system security profiles, process analysis and improvements, upgrade/patch application testing, customer report specifications, maintenance of end user documentation and training, and issue management
  • Bachelor's degree in Computer Science, Accounting, Business, Finance, Computer Security, Information Technology, or related field plus 9 years of related experience; 7 years with a Master's degree
  • Strong SAP security background
  • Strong knowledge of major GRC system (ControlPanelGRC, SAP GRC, etc.)
  • Strong understanding of Information Technology general controls
  • Understanding of core IT management processes (Change Management, System Development Lifecycle, Information Security, IT Operations, etc.)
  • Basic understanding of business functions and processes, including the financial reporting process
  • Working knowledge of IT best practices and controls including ITIL, CMMI, COBIT, Sarbanes Oxley, and COSO
  • IT Audit Experience
  • Controls Certification (CISA, CISM, CPA, etc.)
  • Strong facilitation and interviewing skills, technical skills, risk and control awareness, diagnostic, and analytical skills
  • Proficient in analyzing requirements
  • Excellent team player and team-based problem solving skills
  • Excellent interpersonal and oral, written communication skills
  • Ability to translate complex technical information across all levels of the organization
  • Strong attention to detail which ensures that customer requirements are met and that a high quality standard is achieved
2

Computer Systems Security Analyst Resume Examples & Samples

  • Works onsite with SSA technical teams and leadership to build relationships and find ways to leverage and maximize technical investment recommendations
  • Participates in RFP security-related technical proposal responses activities including designing, evaluating and writing solutions
  • Demonstrates technology to SSA stakeholders to highlight innovative ways to exploit and integrate technology within the current SSA Enterprise Architecture
  • Executes strategy and approach to support customer security infrastructure and development environments, including transition to Cloud environments
  • Demonstrates the use of encryption technology, penetration and vulnerability analysis of various security technologies, and information technology security research
  • Evaluates potential security products, technical solutions, and capacity requirements to meet business needs and recommends changes to mitigate risk
  • Provides design and planning guidance for the testing security designs, newly released equipment software and operating systems for security vulnerabilities
  • Provides technical support to internal and external customers on security problems and opportunities
  • Demonstrates strong oral and written communication skills, with the ability to communicate technical topics to management and non-technical audiences, as well as interfaces with customers
  • Understand the role for HIPAA compliance and be able to execute that role in an effective manner
  • Bachelor’s degree in Computer Science, Computer Information Systems, or a related field and 9 years of experience in a System Engineering discipline, or 13 years of experience will satisfy degree and experience requirements
  • 7 or more years of hands-on Information Assurance / Security job experience
  • Must have and maintain one or more of the following certifications: CAP, GSLC, GSEC,
  • Knowledge of and experience with network security control systems (e.g. firewalls, anti-virus, intrusion detection, wireless, proxy server, VPN, TACACS, RADIUS, ACLs, IPSEC, 802.1x, audits, log files)
  • Knowledge of Cloud based security
  • Knowledge of SQL, data analytics, Splunk (SPL, other SIEM tools, XML, US-CERT/SOC cybersecurity metrics
  • Knowledge of servers, IP routing protocols and database implementations
  • Experience working in or supporting a large government agency
3

Computer Systems Security Analyst Resume Examples & Samples

  • Certification and Accreditation (C&A) experience
  • Assesses and mitigates system security threats/risks
  • Performs system certification and accreditation planning and testing and liaison activities
  • Performs security engineering analysis, risk analysis, and vulnerability studies on systems and applications under development
  • Information Assurance tests
  • IV&V Systems Scans
  • Documents written
  • Security Concept of Operations (SCONOPS)
4

Computer Systems Security Analyst Resume Examples & Samples

  • Design, test, and implement of state-of-the-art secure operating systems, networks, and database products
  • Evaluating current or emerging technologies (account for cost, portability, compatibility, and/or usability), conducting risk assessments, provide recommendations for application designs involved in a wide range of security issues including architectures, firewalls, electronic data traffic, and network access
  • Use encryption technology, penetration and vulnerability analysis of various security technologies and information technology security research with the tools and products provided
  • Prepare security reports to the agency. Meet performance measures and monitor and analyze metrics to identify and implement corrections to vulnerabilities
  • Possess a minimum of 8-10 years of relevant technical experience, such as Computer Science, Software Engineering, information security fundamentals or general IT
  • Proficiency using MS Office Suite is desired
  • Experience writing and executing high level plans and programs is preferred
  • Possess solid knowledge of different kinds of system configurations and software compatibility
  • BA/BS in Computer Science or related science field preferred
5

Computer Systems Security Analyst Resume Examples & Samples

  • Bachelor's degree and 2 years Security related experience
  • Knowledge of security requirements, technical knowledge of various operating systems and government information systems regulations
  • Skills in leadership, team building and customer service
  • IAM Level 1 Certification: Security+ CE, GSLC, CAP or equivalent
  • Current Secret clearance with the ability to obtain Special Program Access
  • Bachelor's degree in Information Systems Security, Computer Security or Information Systems
  • IAM II Certification: CISSP, CISM or GSLC
6

Computer Systems Security Analyst Resume Examples & Samples

  • Minimum of 2 years’ experience with a Bachelor's degree; 0 years with a MS
  • Current active TS/SCI clearance
  • Experience with both Windows and RHEL
7

Computer Systems Security Analyst Resume Examples & Samples

  • Bachelor degree and 2+ years’ experience, Masters and 0 years
  • Knowledge of the Risk Management Framework
  • Experience implementing and assessing DoD information systems security controls
8

Computer Systems Security Analyst Resume Examples & Samples

  • Develop and coordinate all authorization documentation associated with the DOJ processes including the Systems Categorization, Systems Security Plan, and Systems risk assessment
  • Act on the behalf of the Information System Security Officer (ISSO) to the supported component
  • Support the control assessment, reporting and monitoring processes using the Cyber Security and Assessment Management (CSAM) system
  • Assist the component with staying on track with Core Controls and A-123 control assessment schedules
  • Based on the risk profile of the analyzed systems, develop and document a Plan of Action and Milestones (POA&M) for mitigating those risks
  • Assist the components with decisions that affect security of their systems and networks
  • Facilitate preparations for the tri-annual Security Assessment and Authorization (SA&A) component's Information System
  • Conduct assessments of information systems security requirements, evaluate current security posture and recommend priorities for remediation
  • Review existing SA&A documentation, Security Assessment Report and security infrastructure (i.e. IDS, firewalls, vulnerability scan tools, etc.)
  • Assess NIST 800-53, Rev 4. Controls and document results in DOJ CSAM repository
  • Review and conduct NIST-based Self Assessments, identifying any weaknesses which need to be addressed, and developing a POA&M for each of those weaknesses based on industry best practices
  • Design and development of Initial Privacy Assessment (IPA) and Privacy Impact Assessments (PIAs) for each major Federal Government IT Systems
  • Conduct OMB A-123 security assessments of Federal Government IT Systems
  • 8 years' experience performing systems security assessments, preparing system security documentation, and/or performing security upgrades for live networks, desktop systems, servers, and enterprise data bases leading to successful certification and accreditation or security authorization of such systems
  • 8 years' experience assessing and enhancing IT systems security policies and procedures in response to the regulatory requirements associated with Federal and International standards
  • 8 years' IT Security experience with extensive knowledge in security regulations and security assessments having developed numerous security C&A (or SA&A) and ATO on a range of systems including classified systems
  • Strong working knowledge with NIST Special Publications and the NIST SP 800-37 SA using CSAM system
  • Active Secret clearance (not interim) is required to start but a Top Secret clearance will be needed
  • 8 years' experience and a Bachelors in Science in Information Technology or Cyber Security
  • Experience with DISA STIG configuration requirements
  • Certified Information Systems Auditor (CISA) certification
  • Experience with Department of Justice information systems
  • Experience with the use of the DOJ CSAM application
  • Security Tool experience (e.g. Splunk, FoundStone, Nessus/Tenable, DBProtect, AppDetective, Tivoli/BigFix, Sharepoint, Guardium, WebInspect)
9

Computer Systems Security Analyst Resume Examples & Samples

  • Bachelor's degree and 5 years of DoD Information Systems Security experience
  • Bachelor's or Master's degree with a technical emphasis (e.g. Information Systems,
  • Information Technology, Computer Science, EE)
10

Computer Systems Security Analyst Senior Resume Examples & Samples

  • Must possess an industry recognized information security certification for 8570 Compliance (CompTIA Security+CE - the CompTIA CE enrollment must be current)
  • Hands-on experience with vulnerability scanning, experience using ACAS and SCAP vulnerability management tools
  • Familiar with network security, network troubleshooting, security architectures, and TCP/IP
  • Knowledge of DoD Cybersecurity regulations, C&A, DIACAP and DISA guidelines
  • Experience with of DISA STIG analysis and remediation recommendations
  • Analyze, troubleshoot, and investigate cyber security related issues
  • Apply IT security principles and practices and the ability to evaluate the effectiveness and efficiency of existing security control measures
  • Troubleshoot and analyze problems with SCCM and GPO configuration
  • Evaluate systems using vulnerability scanners (ACAS and SCAP scanning tools) and manual techniques to verify system security settings and configurations
  • Maintain and update relevant system and process documentation and develop ad-hoc reports as needed
  • Establish and maintain a strong working relationship with all team members
  • Successfully manage time and technical responsibilities, set accurate expectations and meet deliverable deadlines while working in a team and information sharing environment
11

Computer Systems Security Analyst Resume Examples & Samples

  • Bachelor’s degree (S.T.E.M) Science; Technology; Engineering and/ or Math) and 10 years of relevant experience; 7 years of relevant experience with a master's degree
  • IAM Level-3 Certification
  • TS/SCI required to start
  • Current CI polygraph, or ability to pass CI polygraph if required for position
12

Computer Systems Security Analyst Resume Examples & Samples

  • Current Top Secret/SCI and current CI polygraph, or ability to pass CI polygraph if required for position
  • Bachelor's or master's degree with a technical emphasis on (e.g. Information Systems, Information Technology, Computer Science, EE)
  • Experience with security hardening, assessment and reporting tools (SCAP, ACAS, HBSS, Nessus, XACTA)CISSP
13

Computer Systems Security Analyst Resume Examples & Samples

  • Support, monitor, test, and troubleshoot hardware and software IA problems pertaining to the NE
  • Perform IA related support functions including installation, configuration, troubleshooting, assistance, and/or training, in response to agency requirements for the NE
  • Analyze patterns of non-compliance and take appropriate administrative or programmatic actions to minimize security risks and insider threats. Manage accounts, network rights, and access to NE systems and equipment
  • Analyze system performance for potential security problems. Assess the performance of IA security controls within the NE
  • Configure, optimize, and test network servers, hubs, routers, and switches to ensure they comply with security policy, procedures, and technical requirements
  • Install perimeter defense systems including intrusion detection systems, firewalls, grid sensors, etc., and enhance rule sets to block sources of malicious traffic
  • Implement applicable patches including IAVAs, IAVBs, and TAs for their NE
  • Bachelor's degree in Science and 2 Years of relevant work experience; 0 Years with masters. An equivalent combination of education/experience will be considered
  • Bachelor's or master's degree with a technical emphasis (e.g. Information Systems, Information Technology, Computer Science, EE)
14

Computer Systems Security Analyst Resume Examples & Samples

  • Bachelor's degree (In one of the qualifying fields of Science, Technology, Engineering, or Mathematics) with 2 years of experience performing Information Systems Security duties
  • DoD 8570 IAM Level I Certification (Security+ CE, CAP, or GSLC)
  • DoD 8570 IAM Level III Certification (GSLC, CISM, or CISSP)
  • DoD 8570 IAT Level I Certification (A+ CE, Network+ CE, SSCP, or CCNA-Security)
  • 3 - 5 years of experience performing Information Systems Security duties
15

Computer Systems Security Analyst Resume Examples & Samples

  • Bachelor's degree in one of the qualifying fields of Science, Technology, Engineering, or Mathematics with a minimum of 9 years of experience performing Information Systems Security duties; 7 years of relevant experience with a master's degree
  • Master's degree in one of the qualifying fields of Science, Technology, Engineering, or Mathematics
  • In addition to DoD 8570 IAM Level III, one of the following IAT Level I Certifications (A+ CE, Network+ CE, SSCP, or CCNA-Security)
  • 11 - 20 years of experience performing Information Systems Security duties
16

Computer Systems Security Analyst Resume Examples & Samples

  • Bachelor’s degree with 2 years of relevant work experience; 0 years of relevant work experience with a master's degree
  • Current Top Secret or Secret clearance
  • CISSP or am IAM Level II certifcation (CISSP, CISM, GSLC, CASP CE, CAP)
17

Computer Systems Security Analyst Resume Examples & Samples

  • Must pass Mission Qualification training or similar and obtain Mission Ready certification within 3-months of obtaining in-class instruction
  • Must possess or obtain IAT Level III approved certification within 6-months of hire date
  • Firm understanding of network ports, protocols, services, and network equipment
  • Minimum of Bachelors with 5 years’ experience or Associates with 7 years’ experience in supporting cyber operations – degrees focused on Information Technology (IT)
  • Must have firm understanding of basic Linux and Windows Command Line tools
  • Must be willing to obtain additional certifications related to equipment or network capabilities used to support DCO
  • Self-motivated with minimal supervision required
  • Experience or familiarity with military training methodologies or Air Force Stan/Eval and training programs
  • Highly desirable are former Air Force Instructors, military instructors, and/or IT instructors
  • Familiar with DoD Security Policies
18

Computer Systems Security Analyst Resume Examples & Samples

  • Media handling
  • File transfers
  • Incident reporting
  • Hardware registration and tracking
  • Conducting briefings
  • Excellent oral and written communication skills and be able to communicate effectively to internal and external customers
  • Bachelor's degree and a minimum of 5 years experience performing Information Systems Security duties; 3 years of experience with a master's degree
19

Computer Systems Security Analyst Resume Examples & Samples

  • Bachelor's degree with a minimum of 2 years experience performing Information Systems Security duties; 0 years of experience with a master's degree
  • DoD 8570 IAM Level I Certification (Security+ CE, CAP, or GSLC) within 6 months of start date
  • Bachelor's degree with a minimum of 5 years experience performing Information Systems Security duties; 3 years of experience performing Information Systems Security duties with a master's degree
20

Computer Systems Security Analyst Resume Examples & Samples

  • Perform IA related support functions including troubleshooting, assistance, and/or training, in response to agency requirements for the NE
  • With the assistance of the ISSM, ensures systems are accredited under the implmentation of the Risk Management Framework (RMF) as directed by the Joint SAP Implementation Guide (JSIG)
  • Assess access control lists on routers, firewalls, and other network devices
  • Bachelor’s degree with 9 years of relevant experience; 7 years of relevant experience with a master's degree
21

Computer Systems Security Analyst Resume Examples & Samples

  • Bachelor’s degree in science and 9 years of relevant experience; 7 years with a master's degree. An equivalent combination of education/experience will be considered
  • IAM Level-1 Certification (CAP, GSLC or Security + CE
  • Current Top Secret level security clearance with SCI
22

Computer Systems Security Analyst Resume Examples & Samples

  • 8570 IAM Level-1 Certification (CAP, GSLC or Security + CE)
  • Current Secret Clearance required
  • Bachelors or master's degree with a technical emphasis (e.g. Information Systems, Information Technology, Computer Science, EE). Experience with security hardening, assessment and reporting tools (SCAP, ACAS, HBSS, Nessus, XACTA)
23

Computer Systems Security Analyst Resume Examples & Samples

  • Weekly Information Systems Security Audits – Collect and review audit logs/reports, evaluate for any errors in the collected logs, identify any security threats that occurred during the week, document the review, report to management if any anomalies were discovered. Identification of security threats requires the individual to understand the system being reviewed and to perform analysis of the data being audited
  • Security Configuration Management - Evaluate all inbound and outbound hardware to their respective restricted security boundaries. Coordinate with vendors to obtain Letters of Volatility (LOV) for each specific hardware make and model. Obtaining an LOV requires the individual to identify and evaluate many different types of memory. The individual must analyze the information provided by the vendor and confirm that the information provided relevant for the memory component and meets government compliance requirements. Coordinate with requesting Engineers/IT the completion of required entry/exit forms. Coordinate with IT appropriate sanitization steps have been completed prior to exit. Maintain System Security Plan documentation to accurately reflect approved changes
  • System Security Plan Documentation - The employee is asked to evaluate vulnerabilities, mitigation techniques, and document residual risk. Additional problems include using Visio software to accurately represent floor layouts, network diagrams, and elevation diagrams. The employee also has to ensure existing processes and procedures they are following are accurately depicted in the documentation, identify any deltas and coordinate changes as necessary
  • A DoD IAM Level I Certification (CAP, GSLC, or Security+ CE)
24

Computer Systems Security Analyst Resume Examples & Samples

  • Bachelor's degree with a minimum of 5 years experience performing Information Systems Security duties; 3 years of experience with a master's degree
  • DoD 8570 IAM Level II Certification Security+
  • Current Secret Clearance & SSBI within 5 years of periodic reinvestigation
  • IAM III Certification: CISSP, CISM or GSLC
  • Active Top Secret security clearance
25

Computer Systems Security Analyst Resume Examples & Samples

  • Evaluate system security plan documentation
  • DoD 8570 IAM I Certification (i.e. Security +) within 6 months of hire
  • Current DoD 8570 IAM I Certification (i.e. Security +)
26

Computer Systems Security Analyst Resume Examples & Samples

  • Develop and maintain a formal IS security program and policies for classified systems under their purview
  • Manage all Risk Management Framewortk (RMF) activities in accordance with ICD 503/JSIG/DOD
  • Manage all IA related support functions including installation, configuration, troubleshooting, assistance, and/or training, in response to customer requirements for the NE
  • Provide oversight and guidance of IA personnel performing system analysis looking for patterns of non-compliance; ensure appropriate administrative or programmatic actions which minimize security risks and insider threats. Manage account processes, network rights, and access to Computing Environment (CE), NE systems and equipment
  • Manage the remediation/mitigation of security violations to determine if the Network Environment (NE) has been breached, asses the impact, and preserve the evidence
  • Provide oversight and guidance ensuring systems are properly configured, optimized, and tested ensuring all policy and technical requirements are met
  • Provide oversight to all ISSOs under their purview to ensure they follow established IS policies and procedures
  • Manage all IA related processes and procedures in the development of and implementation of access control lists on routers, firewalls, CE, printing devices, and other network devices
  • Assess the performance of IA security controls within the NE
  • Develop and implement and effective IS security education, training, and awareness program
  • Manage, maintain, and execute the IS continuous monitoring plan
  • Perform control validation and remediation validation of network servers, routers, and switches to ensure they comply with security policy, procedures, and technical requirements
  • Evaluate potential IA security risk and take appropriate corrective and recovery action
  • Ensure that hardware, software, data and facility resources are archived, sanitized, or disposed of in a manner consistent with system security plans and requirements
  • Ensure IA personnel perform system audits to assess security related factors within the NE
  • Design, manage, and provide continuous monitoring of all defensive systems including intrusion detection systems, firewalls, grid sensors, etc., and enhance rule sets to block sources or malicious traffic
  • Provide oversight and guidance of IA personnel implementing applicable patching oversight and validation of all security related updates including IAVAs, IAVBs, TAs, for their NE
  • Adhere to IS security laws and regulations to support functional operations for the NE. Implement response actions in reactions to security incidents
  • Assume the ISSO responsibilities in the absence of an ISSO
  • Support Security Test and Evaluation (Part of the RMF Process)
  • Provide oversight to all IA personnel monitoring/managing firewalls and intrusion detection systems and end-point security systems
  • Bachelor’s degree and 9 years of relevant experience or 7 years of relevant experience with a master's degree
  • Current Active Top Secret clearance
27

Computer Systems Security Analyst Resume Examples & Samples

  • Design, engineer, configure and administer Splunk content
  • Assist in the proper operation and performance of Splunk, Loggers and connectors
  • Integration of data feeds (logs) into Splunk. Perform Content Development to properly identify data feeding SIEM’s and correlation of events. Develop filters to assist in the identification of significant events
  • Provide recommendations and implement changes to optimize Splunk products in the customer environment
  • Write and develop custom scripts, programs as needed
  • Provides strategic support of Splunk integration and deployment, configuration and maintenance
  • Must understand, interpret and develop content for SIEM products to meet internal and external customer requirements
  • Will coordinate with other organizations (SOC/JSOC) and assist with advanced issue resolution across the enterprise
  • Bachelors Degree in Information Systems, Security, Engineering, or other related scientific or technical discipline and 9 years of experience or 14 years of IT experience maybe accepted in lieu of the degree
  • One or more years’ experience with design, configuration, and support of Splunk 6.x, or similar
  • Ability to perform basic scripting tasks with Splunk to automate repeatable processes using Python, Ruby, PowerShell, Perl, etc
  • Strong analytical and creative problem solving skills and experience with interpreting requirements and implementing Use-Cases
  • Able to interact with customers and team members and product support personnel
  • Position requires a current Top Secret Clearance
  • Bachelor’s Degree in Information Systems, Security, Engineering, or other related scientific or technical discipline
  • Additional education, training, and/or certifications such as Splunk Architect or Engineer, plus an advanced degree
  • Thorough understanding of Information Security with relevant work experience and/or relevant education/certifications
  • 5 or more years experience with implementation/support of Splunk
28

Computer Systems Security Analyst Resume Examples & Samples

  • Designs, tests, implements, monitors and reports state-of-the-art secure operating systems, networks, and database products to ensure they comply with compliance policy, procedures, and technical requirements
  • Installs, tests, maintains, and upgrades network operating systems software and hardware to comply with compliance requirements
  • Supports, monitors, tests, and troubleshoots hardware and software IA problems pertaining to the network environment
  • Complies with customer compliance standards, community best practices and published benchmarks
  • Involved in a wide range of compliance issues including architectures, firewalls, electronic data traffic, and network access
  • Extensive experience preparing, reviewing, and revising relevant artifacts (SSP, CTP, SCTM, Security CONOP, Security Architecture, Privileged Users Guide, POA&M, RAR, etc.)
  • Prepares clear and concise presentations and briefings for customer and program audiences
  • Provides technical and procedural advice to the program in support of Program Management Reviews, Critical Design Reviews and System Design Reviews
  • Articulates and advocates security considerations in collaborative meetings, as well as formal reviews
  • Examines potential security violations to determine if the network environment has been breached, assess the impact, and preserve evidence
  • Participates in a wide range of security issues including architectures, firewalls, electronic data traffic, and network access
  • Uses encryption technology, penetration and vulnerability analysis of various security technologies, and information technology security research; and may prepare security reports to regulatory agencies
  • Interprets assessment results to identify vulnerabilities and verify system hardening
  • Analyzes patterns of non-compliance and takes appropriate administrative or programmatic actions to minimize security risks and insider threats. Analyzes system performance for potential compliance problems
  • Identifies IA vulnerabilities resulting from a departure from the implementation plan or that were not apparent during testing
  • Evaluates potential compliance risks and take appropriate corrective and recovery action
  • Performs system audits to assess compliance related factors within the network environment
  • Performs IA related support functions including installation, configuration, troubleshooting, assistance and/or training, in response to agency requirements for the network environment
  • 10 years of computer security experience with a Bachelor of Science; 8 years with a Master. 14 years of related experience may be substituted for degree
  • Windows/Linux/RHEL Administrative and Configuration Experience
  • Knowledge of NISPOM information system requirements, particularly chapter 8 and the ability to develop and implement IS certification test(s) and conduct ongoing periodic reviews
  • NIST/RMF/NISPOM/JAFAN/DCID 6/3 knowledge
  • Familiarity with DISA Security Technical Implementation Guides (STIGs)
  • Must be able to establish, maintain, and disestablish Information Systems ("Cradle to Grave")
  • Experience performing system certification and accreditation planning and testing; and liaison activities
  • Must be skilled with MS Office suite to develop and maintain accreditation packages (SSP, Network Drawings, Forms, etc.) and have good verbal skills to communicate with the programs
  • Experience performing security engineering analysis, risk analysis and vulnerability studies on systems and applications under development
  • Knowledge of SIEM (Security Information and Event Management) products
  • Experience with vulnerability scanning using tools, such as Nessus/Security Center
  • Working experience with Splunk, DISA STIGs, and ACAS
  • Current 8570 - CISSP certification is required
  • Active clearance: TS/SCI with CI Poly
  • Must be able to work in a fast paced environment where multiple projects are being developed and deployed simultaneously
  • Must be able to work well within a team environment and able to adapt quickly to change
  • Past or current ISSM/ISSO experience
  • UNIX and/or Solaris Experience
29

Computer Systems Security Analyst Resume Examples & Samples

  • Support the control assessment, reporting and monitoring processes using the Cyber Security and Assessment Management (CSAM) system. Assess NIST 800-53, Rev 4. controls and document results in DOJ CSAM repository
  • Support and document security controls tests, assist in remediation and ensure that POA&Ms are being appropriately managed
  • Design and develop comprehensive Systems Security Plan, covering at a high level the infrastructure, policies and procedures which define the systems security profile for the analyzed systems; initial Privacy Assessment (IPA) and Privacy Impact Assessments (PIAs) for each major Federal Government IT Systems
  • Develop and conduct System Test and Evaluations (ST&Es) and Independent Verification and Validation (IV&Vs); and OMB A-123 security assessments of Federal Government IT Systems
  • High school diploma and 9 years of experience
  • 8 years’ experience performing systems security assessments, preparing system security documentation, and/or performing security upgrades for live networks, desktop systems, servers, and enterprise data bases leading to successful certification and accreditation or security authorization of such systems
  • 8 years’ experience assessing and enhancing IT systems security policies and procedures in response to the regulatory requirements associated with Federal and International standards
  • 8 years IT Security experience with extensive knowledge in security regulations and security assessments having developed numerous security C&A (or SA&A) and ATO on a range of systems including classified systems
  • Strong working knowledge working with software package DBProtect
  • 8 Years experience and a Bachelor’s in Science in Information Technology or Cyber Security
  • Certified Information Systems Auditor (CISA) certification - maintained and current
  • Certified Authorization Professional (CAP) - maintained and current