Cyber Analyst Resume Samples

4.5 (109 votes) for Cyber Analyst Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the cyber analyst job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
DP
D Paucek
Deshaun
Paucek
10425 Melyna Port
Chicago
IL
+1 (555) 917 3465
10425 Melyna Port
Chicago
IL
Phone
p +1 (555) 917 3465
Experience Experience
Dallas, TX
Cyber Analyst
Dallas, TX
Ferry Inc
Dallas, TX
Cyber Analyst
  • Provides recommendations for protecting networks, workstations, servers, and IT assets.
  • Monitors and manages security devices such as Firewalls, Intrusion Prevention Systems, VPN devices, and Security Event Management systems
  • Communicate and manage relationships and with end users, IT service providers (both internal and external), and business unit and IT management
  • Provide support for the independent assessment of compliance of information systems with DoD RMF standards using DoDI 8510.01/DoD Risk Management Framework
  • Provide recommendations to protect networks, workstations, servers, and IT assets
  • Develop ideas to improve cost and performance for analyzing documentation supporting RMF security controls
  • Provide enterprise-wide network systems and applications systems security log auditing
Chicago, IL
Mid-level All Source Cyber Analyst
Chicago, IL
Kuhlman LLC
Chicago, IL
Mid-level All Source Cyber Analyst
  • Clearly and effectively communicate through written and verbal communications with senior government personnel ranging from intelligence analysts, planners and operators to senior decision-makers. Produce and brief presentations conforming to Command standards
  • Provide intelligence support for J3/J5 mission analysis to ensure an accurate command cyberspace Priority Effects List (PEL)
  • Provide intelligence support to all aspects of planning, including Joint Planning Groups (JPG), Operations Planning Group (OPT) and Core Analytic Team (CAT) activities, including conducting cyber portions of the JIPOE
  • Assist in conducting cyber portions of Joint Intelligence Preparations of the Operational Environment (JIPOE)
  • Provide intelligence support for the USSTRATCOM’s Cyber Mission Force (CMF), including the Combat Mission Team(s) (CMT) and Cyber Protection Teams (CPT)
  • Perform all intelligence related aspects of collection and production management to include writing and submitting evaluations and providing feedback to collectors and producers
  • Assist with the writing and coordination of intelligence products analyzing offensive or defensive options
present
Boston, MA
Lead Insider Threat Cyber Analyst
Boston, MA
Crona-Hilpert
present
Boston, MA
Lead Insider Threat Cyber Analyst
present
  • Execute high risk cyber security incidents by working in conjunction with response partners
  • Propose and execute program initiatives, and collaborate with key stakeholders to create business value
  • Develop strategies to improve the efficiency and consistency of service delivery
  • Provide guidance to information security analyst on forensic evidence analysis, interpretation and documentation of findings
  • Formulate and execute a strategy to support the collection of electronically stored information (ESI) used in investigative and electronic discovery matters
  • Maintain an awareness of industry challenges and advancements in order to add value to existing technologies and processes used within the team
  • Identification of root cause in partnership with peer groups on remediation of control gaps/failures
Education Education
Bachelor’s Degree in Related Field
Bachelor’s Degree in Related Field
Georgia State University
Bachelor’s Degree in Related Field
Skills Skills
  • Quick learner who is easily able to understand new products, systems, applications and technologies
  • Advanced knowledge and experience in active hunt methodologies, including capability and process improvement methods
  • Knowledge and proficiency in technical writing
  • Ability to work effectively under time constraints and potentially changing priorities, while maintaining a high level of attention to detail
  • Considerable knowledge in monitoring network defense technologies and analyzing the products produced
  • Ability to manage projects, establish control gates, deliverables, and other planning documents
  • Demonstrated leadership and strong initiative
  • Strong analytical, problem-solving and critical thinking skills
  • Multi-tasking skills and the ability to balance multiple priorities and keep up with project scope changes
  • Able to work well with virtual globally dispersed project teams, developers and other technology SMEs
Create a Resume in Minutes

15 Cyber Analyst resume templates

1

Cyber Secuirty Fusion Center Core Team Cyber Analyst Resume Examples & Samples

  • Perform cyber threat analysis, alerting, and reporting based on intelligence gathered from both internal and external sources
  • Analyze cyber threat data and synthesize the analysis with cyber threats impacting the Citi franchise; identify, escalate, and fill intelligence gaps
  • Collaborate with Citi’s Cyber Security Fusion Center participant members in support of ongoing threat intelligence analysis and collection plans
  • Prepare written reports and give presentations to internal customers
  • Apply expertise to conduct intrusion analysis following the Lockheed Martin Kill Chain methodology to ascertain the impact of an attack and develop threat trends to develop mitigation techniques and countermeasures that can prevent future attacks
  • Provide cyber threat analysis to support the CSFC Core Team development and research
  • 2 years working in a threat intelligence job function
  • Can apply a variety of structured analytic techniques to generate and test a hypothesis, create scenarios, assess cause and effect, challenge analysis, and support decision making. Examples of these techniques include, but are not limited to
2

Csfc Core Team Senior Cyber Analyst Resume Examples & Samples

  • Conduct research using multiple data sources, performs analysis and disseminates findings to consumers
  • Work daily with the CIC Intelligence Coordinator on intelligence collection tasking in support of ongoing threat collection plans
  • Bachelor’s degree or equivalent work experience
  • 5 years working in a threat intelligence job function
  • 1 years leading a cyber threat analysis related function
  • Can apply a variety of structured analytic techniques to generate and test a hypothesis, create scenarios, assess cause and effect, challenge analysis, and support decision making
3

Fusion Center Cyber Analyst Resume Examples & Samples

  • Conduct research using multiple data sources, performs analysis and disseminates findings to both technical and non-technical consumers throughout Citi
  • Coordinate risk, vulnerability and threat reporting from Fusion Center participant members to create a common operating picture for Citi assets, thus reducing Citi’s attack surface or risk exposure and minimizing damage and recovery time
  • Identify incidents of significance through fusion of current and historic threat data; determine impact, urgency and audience to whom prevention, detection, mitigation and remediation guidance would be most beneficial
  • Provide cyber threat analysis to support to development and research teams
  • Enumerate adversary’s tradecraft to address asymmetrical capabilities and enhance Citi’s cyber tradecraft
  • Liaison with external partners to build greater situational awareness for the Cyber Security Fusion Center and its partners
  • 3+ years in an Analyst role with very strong writing skills
  • 1+ years working in a cyber-operations or cyber fusion center strongly preferred
  • Experience in managing and leading a team during a cyber-incident or event preferred
  • Ability to review information to determine its significance, validate its accuracy and assess its reliability to technical and non-technical audiences
  • Should be familiar with one or more of the following areas
4

Csfc Core Team Cyber Analyst Resume Examples & Samples

  • Perform cyber threat analysis, alerting, and reporting based on intelligence and information gathered from both internal and external sources
  • Conduct research using multiple data sources, perform analysis and disseminate findings to CSFC team members
  • Work daily with the Citi SOC and Global Command Center to develop situational awareness, trends, and crisis management processes for integration with other CSFC team members
  • Present ongoing and upcoming significant events virtually during the daily CSFC morning briefs
  • Prepare written reports and give presentations to internal and external customers
  • Apply expertise to ascertain the impact of an attack and develop threat trends to develop mitigation techniques and countermeasures that can prevent future attacks
  • Triage, process, analyze, and disseminate alerts, reports, and briefings
  • Routinely liaison with a variety of external partners to build greater situational awareness for the Cyber Security Fusion Center and its partners
  • Drive and coordinate deliberate crisis management planning activities
  • 3+ years working in a security operations, network operations, or cyber fusion center
  • Demonstrated ability to successfully collaborate on information technology related topics with multiple teams in a variety of locations
  • Experience either leading or being part of a response effort during a cyber-incident or event
  • Understanding of or competency in deliberate crisis management planning
  • Ability to quickly review information to determine its significance, validate its accuracy and assess its reliability to technical and non-technical audiences
  • Self-starter, self-motivated and able to work independently with little oversight
  • Strong cyber security analytical and situational awareness skills
  • Exceptional written and verbal communication and presentation skills to internal and external customers
  • Demonstrated capability to produce written products on a reoccurring basis by working with cross-functional and cross-enterprise teams
5

Cyber Analyst Resume Examples & Samples

  • Create Data Requirement Specifications and Technical Specification documents
  • Identification of data specific issues and liaise with key technology partners in resolving them
  • Must have strong client and vendor relationship building skills
6

Tier Cyber Analyst Resume Examples & Samples

  • Review, triage and coordinate all reported SIRT events on a daily basis; working with the Cyber Investigations Managers to ensure each incident is properly identified, updated and assigned to the correct Investigations Tier
  • Administratively close all low level incidents that do not require additional investigation
  • 2 years of Information Security Experience
  • Familiarity working in complex database environments
  • Ability to manage work (organization/prioritization abilities/multi-task)
  • Quality orientation and attention to detail
  • Excellent analytical skills
  • Strong preference to those with fluency (written and spoken) in English and an additional language represented in the EMEA or Asia Pacific regions
7

Cyber Analyst, Senior Resume Examples & Samples

  • Experience with Navy afloat information systems
  • Experience with assessing, analyzing, and providing recommendations for vulnerabilities covering naval GENSER National Security Systems (NSS)
  • Experience in interfacing with military unit level leadership, including CO, XO, or Dept Head
  • Experience with DoD information security toolsets, including eEye Retina, HBSS, SCAP, or ACAS
  • BA or BS degree and 5+ years of experience with Cyber security technical assessment or 8+ years of experience with Cyber security technical assessment in lieu of a degree
  • CISSP, CISM, GSLC, or CAP Certification
  • 10+ years of experience with Cybersecurity technical assessment
  • Experience with CCRI and CSICP Cyber security inspections
  • Experience with VMS, eMASS, VRAM, and OCRS
  • Experience with system administration on Windows and Linux operating systems
  • MCTS Certification in Windows Desktop or Server
8

Cyber Analyst, Lead Resume Examples & Samples

  • 10+ years of experience with computer security and usability
  • Experience with researching and analyzing integrated Cyber defense strategies and Cyber security solutions
  • Ability to apply Cyber security solutions to the development and implementation of Cyber security operational services for clients
  • Experience with monitoring, analyzing, detecting, and responding to Cyber events and incidents within information systems and networks
9

Cyber Analyst Associate Bournemouth Resume Examples & Samples

  • Understand the project objectives and scope and to assess associated data requirements
  • Formulate and document data sourcing, enrichment and usage needs and make recommendations for quality or process improvement where identified
  • Translate complex data requests into clear, business-oriented communications
  • Perform complex data analysis in an evolving data environment
  • Work with Management to report on key metrics related to data issues, data quality etc
  • Support transition/handover of data gathering, enrichment, storage, usage, etc. to a business as usual state
  • Work in a collaborative team of Information Security/Cyber and technology professionals
  • Excellent presentation skills, and ability to communicate with various audiences, including end users, managers, and members of the IT team. Experience in supporting Information Technology or Cyber Security projects from inception to delivery
  • Strong analytical, problem-solving and critical thinking skills
  • Multi-tasking skills and the ability to balance multiple priorities and keep up with project scope changes
  • Able to work well with virtual globally dispersed project teams, developers and other technology SMEs
  • Strong skills in Excel and or Access for data analysis and PowerPoint for presentation
  • Self-starter with leadership skills in order to take charge of or facilitate requirement-gathering sessions
  • Quick learner who is easily able to understand new products, systems, applications and technologies
10

Tier, Cyber Analyst Resume Examples & Samples

  • Review, triage, and coordinate all reported SIRT events on a daily basis; work with the Cyber Investigations Managers to ensure each incident is properly identified, updated, and assigned to the correct Investigations Tier
  • Manage and administratively close all incidents that do not require extensive investigations
  • Actively engage with the Cyber Investigation Managers and Security Incident Management Team leads (SIM) to ensure they are kept apprised of any significant changes identified during the progress of handling an incident
  • Minimum of an Associate’s degree, Bachelor’s degree preferred
  • 2+ years’ of Information Security experience
  • Familiarity with Data Privacy Regulations i.e. GLBA
  • Proficiencies with Microsoft Office Suite of Technologies
  • Ability to manage work (organization/prioritization abilities/multi-tasking)
  • Flexibility/orientation to change
11

Cyber Analyst Resume Examples & Samples

  • Support the coordination of all technical and cyber counterintelligence components in support of the Comprehensive National Cyber Security Initiative, to include periodic reporting through the Office of the Director of National Intelligence to the President
  • Collaborate with CI officials to validate and ensure fiscal reporting from agencies align with technical capabilities documented through agency program builds and status reporting
  • Prepare materials for briefing senior officials as necessary on significant events and emerging program trends, and provide structure recommendations for improving national security and counterintelligence programs
  • Provide technical assessments, strategy, and execution recommendations for designated special topics
  • Support development of business use cases and concept of operations
  • Collaborate with stakeholders to identify and capture system requirements
  • Must be a US Citizen that currently holds an Active TS/SCI with Poly**
  • Bachelors’ Degree and a minimum of 6 years in positions of increasing responsibility and demonstrated experience in cyber mission areas, to include computer engineering, systems engineering, computer science, telecommunications, information technology, information security/assurance, and/or computer network operations
  • Demonstrated experience (minimum of 5years) conducting research, analysis, coordination, and completing communications (written documents and oral presentations) on complex cyber-related issues such as terrorism, economics, criminal, and state-sponsored adversaries
  • Ability to manage projects, establish control gates, deliverables, and other planning documents
  • Experience translating and communicating complex subject matter between technical and non- technical audiences
  • Currently possess excellent oral and written communication skills. Graduate-level grammar, spelling, writing style, and presentation are the minimum expectations. Finished products must be prepared and presented without errors and in a timely manner
  • Ability to work in a collaborative, team environment
  • Knowledge of cloud- based technologies including Hadoop, Pig and Hive
12

Cyber Analyst, Senior Resume Examples & Samples

  • 5+ years of experience with providing Information Assurance (IA) and Cybersecurity in DoD environments
  • 5+ years of experience in working with network management using DoD and CND tool sets and TTPs
  • Experience in working with SCADA and other industrial control systems
  • Experience with providing analysis of advanced Cyber threats, network defense environments, and intelligence community capabilities
13

Mid-level All Source Cyber Analyst Resume Examples & Samples

  • Conduct cyber-focused all-source intelligence analysis to deliver situational awareness, support to plans and operations, and finished products in government –directed product formats. Contractor shall tailor and apply all authorized sources of information and intelligence, including open source, research, collaborate, fuse, analyze, write and disseminate intelligence products
  • Evaluate changes in adversary doctrine and capabilities, threats, requirements and system environments. The contractors shall provide the cyber expertise, experience, and familiarity with understanding the adversary, including capability, intent and strategic threat implications
  • Provide intelligence support for J3/J5 mission analysis to ensure an accurate command cyberspace Priority Effects List (PEL)
  • Provide intelligence support to all aspects of planning, including Joint Planning Groups (JPG), Operations Planning Group (OPT) and Core Analytic Team (CAT) activities, including conducting cyber portions of the JIPOE
  • Assist in conducting cyber portions of Joint Intelligence Preparations of the Operational Environment (JIPOE)
  • Shall assist with writing collection and production requirements to address all PEL intelligence needs and track status of all intelligence requirements to conclusion
  • Assist with collaboration and coordination of all COLISEUM requirements with CMF, collection managers and producers for accuracy
  • Provide intelligence support for the USSTRATCOM’s Cyber Mission Force (CMF), including the Combat Mission Team(s) (CMT) and Cyber Protection Teams (CPT)
  • Provide intelligence support to J3 and J5 for intelligence needs and requirements for Offensive Cyberspace Operations (OCO)
  • Perform all intelligence related aspects of collection and production management to include writing and submitting evaluations and providing feedback to collectors and producers
  • Assist with the writing and coordination of intelligence products analyzing offensive or defensive options
  • Provide intelligence support to all aspects of planning, including Joint Planning Groups (JPG), Operations Planning Group (OPG) and Core Analytic Team (CAT) activities including conducting cyber portions of the JIPOE
  • Support cyberspace intelligence requirements and integrate with J3 counterparts for command operations
  • Perform all intelligence analysis related aspects of collection and production management to include writing and submitting evaluations and providing feedback to collectors and producers
  • Assist in synchronizing efforts and partnering with USSTRATCOM organizations, U.S. Cyber Command, CCMD JCCs, CCMD J2s, and counterparts in DoD and the IC
  • Provide intelligence support for exercises and war-gaming
  • Provide intelligence support for intelligence and command training. The contractor shall develop cyber-related education and training requirements and construct and conduct cyber training courses and training plans, as requested by the government. -
  • Perform all aspects of mission support including production statistics, trend data, maintaining web based sites and portals, maintaining mission databases and analytical visualization tools
  • Build and maintain continuity books, standard operating procedures (SOP), spreadsheets and visualization charts, such as Analyst Notebook, to ensure all research and background knowledge is captured and documented. Continuity books will record and document research, search queries, and analysis techniques and will include area of responsibility points of contact. -
  • Participate in meetings, briefings, conferences and symposiums as directed. Prepare and present necessary information and data, produce minutes and recommend solutions to identified problems, or a trip report if travel was involved
  • Clearly and effectively communicate through written and verbal communications with senior government personnel ranging from intelligence analysts, planners and operators to senior decision-makers. Produce and brief presentations conforming to Command standards
  • Five (5) years of demonstrated relevant cyber analytical experience writing intelligence assessments, to include researching, organizing, collaborating, analyzing, writing, reviewing, coordinating and disseminating intelligence products
  • Five (5) years of demonstrated relevant analytical experience performing analysis and evaluating changes in adversary threats, strategy, doctrine, and operational environments
  • Five (5) years of demonstrated relevant cyber analytical experience to provide intelligence support intelligence needs, and requirements for offensive and defensive cyberspace operations
  • Five (5) years of demonstrated relevant cyber analytical experience supporting deliberate and all aspects of crisis action planning and conduct the cyber portions of JIPOE, including System of System Analysis (SoSA)
  • Five (5) years of demonstrated relevant analytical experience to collaborate and coordinate all COLISEUM requirements with CMF, collection managers and producers
14

Senior All Source Cyber Analyst Resume Examples & Samples

  • Conduct all-source intelligence using a whole-of-government approach to identify Adversary strategic intent and objectives, decision-making processes and influences, capabilities, strategy, and operational plans including within the cyber/information and space domains
  • Provide for Intelligence Community emulations including identifying adversary courses of action; red lines and thresholds; employment tactics, techniques, and procedures; and escalation and de-escalation strategies. Contract personnel will function as a Red Cell and support United States Strategic Command/Strategic Initiative exercises, war-games, and table top exercises
  • Provide A&AS for developing, producing, and presenting SI products to include well researched, in-depth multi-source analytical reports, studies, papers, senior leader-level executive summaries, briefings, and charts/graphics
  • Provide analytical support for the development, validation, implementation and modification of current and evolving USSTRATCOM operational planning documents, including support to STRATJIOC Joint Intelligence Preparation of the Battlespace efforts
  • Advice and assist the STRATJIOC in identifying SI related intelligence gaps; developing appropriate collection and production strategies, requests for information (RFIs), and requirements to address information shortfalls; and submitting, tracking, and reporting on the status of requirements
  • Provide A&AS support to STRATJIOC collaboration efforts including developing and maintaining appropriate Intelligence Community contacts; attending conferences and Strategic Initiative events, and updating, posting, and managing on-line collaborative forums such as the USSTRATCOM JIOC Microsoft SharePoint Portal and Integration Space
  • Leverage Government furnished databases and software applications, including Open Source reporting, to support SI analysis
  • Attend and support relevant Government meetings to include periodic training, conferences, and production and technical exchanges either on or off-site
  • Twelve (12) years of demonstrated relevant experience utilizing analytical research collaboration tools, resources, associated equipment and software
  • Twelve (12) years of demonstrated relevant experience and knowledge of the IC, its primary members, the intelligence process, evaluation and analysis of intelligence data and J2 functions and capabilities, to include collections and requirements processes
  • Twelve (12) years of demonstrated relevant experience in joint and combined operational planning and intelligence methodologies (e.g., Joint Operational Planning and Execution System, Joint Intelligence Preparation of the Operational Environment ), and tactics, techniques and procedures involved in fusing intelligence into operational planning
  • Twelve (12) years of demonstrated relevant experience with intelligence information flow and other governing regulations, including Intelligence Oversight classification guidelines and other requirements as needed to insure a timely response to meet customer requirements
  • Twelve (12) years of demonstrated relevant experience in All-Source intelligence processes, data evaluation, and analysis, to include alternative analysis techniques
15

Cyber Analyst Resume Examples & Samples

  • Providing computer forensic and intrusion analyst support to high technology investigations in the form of computer evidence seizure, computer forensic analysis, data recovery, and network assessments
  • Conducting vulnerability assessments/penetration tests of information systems
  • Researching and maintaining proficiency in tools, techniques, countermeasures, and trends in computer network vulnerabilities, data hiding and network security and encryption
16

Cyber Analyst Resume Examples & Samples

  • Bachelors Degree and 2+ years of experience an additional 4 years of related experience may be considered in lieu of a degree
  • Experience with Computer programming skills (C#,C++,Java, or PERL)
  • Working knowledge of the Social Science
  • Knowledge of commercial and/or proprietary forensic analysis tools (e.g. Encase, FTK)
17

Cyber Analyst Operations Manager Resume Examples & Samples

  • Bachelor’s Degree in a technical discipline with a minimum of 5 years related technical experience is required
  • Active Top Secret Security Clearance with current DHS SCI-level Suitability/favorably adjudicated DHS background investigation (EOD) is required
  • Strong understanding and ability to learn technical specifications, system requirements and other application design information across the customer’s Incident Response, Network Analysis and Digital Analytics domains is needed
  • Mission-oriented, excellent interpersonal skills
18

Cyber Analyst & Incident Responder Resume Examples & Samples

  • Configure and utilize Splunk (including dashboards) to review and monitor ongoing events on the system
  • Review, Analyze, and provide reports on Vulnerability Management Tools (Tenable Security Center/ACAS)
  • Review reports in configuration management tools for unauthorized activity and software
  • Monitor firewall and IPS data/logs
  • Generate and provide reports to management to include current status and potential corrective courses of action
  • Investigate potential incidents or suspicious activity
  • US Citizenship required, Must be eligible for DoD SECRET clearance, must receive their Interim SECRET clearance before starting and receive their final secret clearance within 6 months
  • Must have a minimum of 3 year direct IA or cybersecurity security experience
  • Bachelor's degree in Computer Science, Computer Engineering, Information Technology or related technical discipline with 3 years experience; 4 years additional experience maybe considered in lieu of degree
  • Must possess technical knowledge of both Windows and UNIX or Linux based platforms
  • Must possess knowledge and experience with Security infrastructure products such as McAfee E-Policy Orchestrator, Tenable Security Center, ACAS, or Splunk
  • Must possess technical knowledge of TCP/IP and Ethernet networking
  • Ability to understand and apply company methodologies, standard, and policies
  • Demonstrate the skill and abilities to perform moderately complex security information technology tasks independently
  • Must possess an appropriate certification as required by DoD Directive 8570 (such as CEH) for an CNDSP Analyst and IAT Level II (such as Security+CE) Position. (http://iase.disa.mil/iawip/Pages/iabaseline.aspx)
  • Flexibility and strong problem solving, and communication skills are a critical requirement for this position
  • Able to understand and apply company methodologies, standards, and policies
  • Experience with the Risk Management Framework (NIST SP 800-53) and Committee for National Security Systems Instruction (CNSSI 1253)
  • Experience with technologies or applications such as Splunk, PKI, Smartcards
19

Cyber Analyst Resume Examples & Samples

  • Bachelor's Degree in Computer Information Systems, Computer Science, Information Technology, Information Science, Information Systems, or a related academic disciplines of science, technology, engineering, or mathematics
  • Minimum 3 years’ experience working in a Cyber Operations/Response environment with Bachelor's degree
  • Ideal candidates will be experienced with leading a team of experts in computer forensics and intrusion analysis
  • Ideal candidates will have the ability to adapt quickly to a fast paced and dynamic environment for high impact, mission-critical network security operations
  • Demonstrated Cyber Incident Response/Forensics/Vulnerability analysis background
  • Candidate should have knowledge and experience in the Incident Response Cycle
  • Candidate should be able to perform research to solve problems in a creative and repeatable manner
20

Cyber Analyst Resume Examples & Samples

  • Requires 5 to 8 years with BS/BA or 3 to 5 years with MS/MA or 0 to 2 years with PhD
  • Minimum 2+ years’ experience working in a Cyber Operations/Response environment with Bachelor's degree
  • Experience with interpreting firewall logs
  • Experience with working with SEIM and network security technology to mine data from events for investigations
21

Senior Cyber Analyst Resume Examples & Samples

  • Advanced Malware analysis function
  • Expert technical skills in RSA SA & Archer
  • Expert technical skills with scripting, parsing and query development
  • Experience building & managing SRSA use cases & content, driven from customer requirements
  • Experience in vulnerability management and performing vulnerability scans
  • Experience in malware analysis and forensics
  • Bachelors or higher degree in Computer Science, Information Security or similar discipline
  • Ability to drive process improvements and identify gaps
  • Proactive in engaging with customers, client executives and Verizon management teams
  • At least 3-5 years SOC experience as a senior engineer
  • Platform experience with competing correlation platforms a plus
  • RSA certifications
  • CISSP, SANS GIAC
22

Cyber Analyst & Incident Responder Resume Examples & Samples

  • Utilize Splunk (including dashboards) to review and monitor ongoing events on the system
  • Monitor firewall and IPS data/logs in Splunk
  • Must have a minimum of 1 years direct IA or cybersecurity security experience
  • Bachelor's degree in Computer Science, Computer Engineering, Information Technology or related technical discipline with 2 years experience; 4 years experience may be substituted with an associates degree in a related field, or 6 years with no degree
  • Experience with technologies or applications such as HBSS, ACAS, Splunk, PKI, Smartcards
23

OT&E Cyber Analyst Resume Examples & Samples

  • Identify cyber security test capability requirements
  • Recommend cyber security approaches to operational test and integrated developmental / operational test activities
  • Provide inputs to AFOTEC in support of cyber security planning requirements and OT&E activities
  • Assist in preparing test documentation for inclusion in test and evaluation reports
  • Assist in the preparation of lessons learned reports
  • #clearance #linkedin #indeedcampaign
24

Cyber Analyst Resume Examples & Samples

  • Identify cyber security test capability shortfalls
  • Develop cyber security test methodologies and tools
  • Collect and analyze data to assist in the evaluation of cyber security, and make recommendations to the test director
  • Assist in the preparation of briefings or slides as part of the report coordination process
  • Participate in Integrated Test Teams
  • Must possess a Bachelor’s degree in Computer Engineering, Computer Science, Cyber Security Operations, Electrical Engineering, Information, or related degrees
  • Must have a minimum of five (5) years of experience in the field of cyber security, network defense, and network attack; 10 or more years of experience in cyber security, network defense and network attack is highly desired
  • Must have one or more of the following DoD 8570 Information Assurance Technical Level III Baseline certifications
25

CDM Cyber Analyst Resume Examples & Samples

  • Experience with Cybersecurity technologies and systems engineering, including requirements management, solicitation, and analysis
  • Experience with creating technical documentation, reports, whitepapers, and briefings
  • Ability to assess disparate sets of information and make technical recommendations
  • Ability to obtain security clearance
  • Experience with Agile and engineering Tools, including JIRA, IBM Requirements Composer, and DOORS
  • Experience with Cybersecurity tools, including Nessus, Wireshark, ArcSight, and Analyst Notebook
26

Associate System / Cyber Analyst Resume Examples & Samples

  • Associate's Degree AS/AA in science, engineering, management, or other relevant field. Two (2) additional years of experience may be substituted for the degree
  • At least two (2) years of recent experience in a technical discipline relevant to stated requirements such as EOD to include military or military support operational experience that includes Individual lED-related and Collective C-IED-related tasks, communications, security, or intelligence programs
  • Ability to obtain CompTIA Security+ certification within 60 days of joining the team
  • Must be proficient with Windows Server 2008 R2 and have experience with Red Hat Enterprise Linux Server 6 operating systems
  • Experience in the areas of implementing encryption solutions, key management, patch management, identification and authentication administration, and auditing/monitor
27

Cyber Analyst CSE Resume Examples & Samples

  • Incorporate input from SOC staff and external vendor personnel to validate events and incidents
  • Perform initial validation to determine whether a security event is an Incident and open an information assurance trouble ticket as needed
  • Analyze event data received from Network Security tools to eliminate false positives and identify incidents
  • Bachelor’s degree in related field or equivalent; advanced degree preferred
  • Active DoD Clearance
  • Security+ Certification
  • Operating System Certification (Windows Server, Linux, etc.)
  • CEH Certification
28

Cyber Analyst Lead Resume Examples & Samples

  • 10+ years of experience with telecommunications analysis
  • Experience with Cyber security for systems
  • Experience with effectively leading teams and projects
  • Knowledge of security design principles
  • DoD 8570 IAT II Certification
  • Possession of excellent leadership and project management skills
29

Cyber Analyst Resume Examples & Samples

  • Monitors and manages security devices such as Firewalls, Intrusion Prevention Systems, VPN devices, and Security Event Management systems
  • Provides technical support and consultation as it relates to network and multi-platform systems security configurations
  • Resolves security-related operational issues reported through internal ticketing systems, including fault isolation and resolution for security devices and escalating responses when necessary
  • Ensures compliance with security policies and standards
  • May provide information security awareness training to employees, contractors, and other third parties
  • May be a point of contact with suppliers and vendors
  • Typically requires a bachelors degree in a related discipline and two or more years of progressive experience in computer system security or related field. Equivalent professional experience may be substituted in lieu of education
  • Must demonstrate a general understanding of computer system security principles, concepts, practices and techniques
  • Must have experience organizing, planning scheduling conducting, and managing work assignments to meet project milestones or established completion dates
  • Must be customer focused and possess: (1) the ability to identify issues, analyze and interpret data and develop solutions to a variety of technical problems; (2) good analytical skills, verbal and written communication skills to accurately document, report and present findings; (3) good interpersonal skills and ability to interface with other professionals; and (4) good computer skills
  • Ability to work both independently and in a team environment is essential as is the ability to work extended hours as required
30

Cyber Analyst Resume Examples & Samples

  • Conduct market research into industry standard tools, processes and procedures for the detection and monitoring of cyber insider threats to include such areas as intrusion detection and prevention, denial of service detection and prevention, review audits and analysis, digital media use, etc
  • Development data requirements and associated network traffic/incident log analysis required to assess the effectiveness of the developed TTP
  • Provide subject matter expertise in the identification and development of an insider threat incident response framework and resulting cyber security management system processes
  • Provide input to the identification and assessment of risks to the successful execution of the Joint Test and development/validation of the objective TTP. Support the development of related risk mitigation plans
  • Provide expert recommendations for potential test venues that will provide sufficient operational realism, maximize opportunities for scenario excursions and minimize impacts to operational networks
  • Support the successful completion of all task order requirements and development of task order deliverables such as the Program Master Plan, Test Article Framework, Consolidated Resource Estimate inputs, and program review briefings
  • Bachelor's Degree, preferably in computer science, information systems, cyber security or related field and;6 years experience
  • Practical experience in monitoring information networks using industry standard tools
  • Possess one or more cyber security related certifications, such as CompTIA A+, Security+, CISSP, or Certified Ethical Hacker
  • Strong skills in using Microsoft Office software suite for technical document creation, data management and analysis, and presentation development
  • Understanding of Test and Evaluation processes to include test planning and execution; data collection, management and analysis; and reporting of results
  • Understanding of CNDSP operations (23 DOD CNDSPs)
  • Understanding of and experience with the development, validation, and implementation of tactics, techniques and Procedures (TTP) within the DoD
  • Experience with planning and executing DoD Joint Test and Evaluation projects (Joint Feasibility Studies, Joint Tests, and/or Quick Reaction Tests
31

All Source Cyber Analyst Resume Examples & Samples

  • Assist in conducting intelligence integration and support to mission areas
  • Collaborate with counterparts and partners throughout the USG, DoD, and other relevant cyber entities
  • Conduct and deliver all-source cyber intelligence analysis to support cyber mission responsibilities
  • Conduct in-depth and open-source research and analysis to provide cyber intelligence reports and threat assessments
  • Build and maintain continuity books, standard operating procedures (SOP) and visualization charts, such as Analyst Notebook in support of the cyber mission
  • Research and write on current intelligence related to potential cyber threats, plans, and activities that directly affect the cyber mission
  • Provide analytic and technical assessments of adversaries’ capabilities, intent, and strategic threat implications, and integrate comments from within the Intelligence Community
  • Bachelor or higher degree with 4-6 years of intelligence analysis experience, or, specialized training & 4-8 years intelligence analysis experience, or, equivalent intelligence/academic experience
  • Analytical expertise and experience, working knowledge, and full understanding of intelligence support to the cyber mission
  • Cyber analytical expertise and working experience as an all-source intelligence analysis and producing assessments through various USG products and formats
  • Experience working with DoD and/or Combatant Command planning elements
  • Ability to work independently with moderate oversight
  • Provide comprehensive and completed products that may require multiple minor revisions and/or editing
32

Cyber Analyst Resume Examples & Samples

  • Perform analysis of the system
  • Perform analysis of test capabilities
  • Identify test capability requirements
  • Identify test capability shortfalls
  • Develop methodologies and tools
  • Identify mission critical functions and equipment
  • Estimate potential impacts of threats upon functions and equipment
  • Design tests using Design of Experiments (DOE)
  • Identify potential mission impacts
  • Review, analyze and report to test director status of Systems Program Office (SPO), and developmental contractor’s systems documentation
  • Analyze subsystem’s technology readiness levels
  • Assist in translating user requirements into program/system requirements
  • Identify the System Program Office's (SPO) plans for Developmental Test (DT)
  • Identify deficiencies in DT plans and data requirements that must be addressed in OT
  • Identify OT data that can be collected during DT events (Integrated Testing)
  • Identify appropriate test tools and methods required to conduct OT
  • Participate in and represent OT interests during Integrated Testing
  • Participate in dedicated OT events
  • Analyze, characterize system performance and report results of OT and IT&E events
  • Must possess a bachelor’s of science degree in Computer Engineering, Computer Science, Cyber Security Operations, Electrical Engineering, Information Systems, or related degree
  • Must possess 6 or more years’ experience in cyber security, network defense, and/or network attack
  • Background in operational testing highly desired
  • Background in space systems, missile warning, satellite communications, global positioning system, space situational awareness, or overhead persistent infrared systems is desired
  • Contractor personnel must possess one or more of the following DoD 8570 Information Assurance Technical Level III Baseline Certifications
33

VP Cyber Analyst & Investigations Resume Examples & Samples

  • Develop, manage and deliver a highly effective and motivated team with the objective of identifying, collecting, assessing, developing and disseminating high quality and timely Internet based OSINT
  • Develop, manage and deliver a dynamic and informed intelligence collection plan in support of internet based OSINT strategy and the business need as a whole
  • Develop, manage and deliver the technology assets required to support effective overt and covert Internet based OSINT strategies
  • Develop, manage and deliver the non-technology assets required to support effective overt and covert Internet based OSINT strategies
  • Develop, manage and deliver the human resource assets required to support effective overt and covert Internet based OSINT strategies
  • Able to demonstrate a firm understanding of the wider security threat landscape in respect to Barclays including the identification of relevant threats and vulnerabilities
  • Able to demonstrate a firm understanding of the cyber threat landscape in respect to Barclays including the identification of relevant threats and vulnerabilities
  • Able to demonstrate sound operational experience in investigation management and the management of intelligence processes including within a cyber investigative environment
  • Able to demonstrate strong experience in the management, identification, analysis, extrapolation and visualisation of data from multiple sources and using established tools and methodologies
  • Able to demonstrate sound knowledge of established procedures, policies and legal constraints concerning Internet based OSINT and your application of them
  • Able to demonstrate sound operational experience of the management of Internet based OSINT in respect to the receipt, tasking, identification, collection, analysis, development and dissemination of material including specific reference to your ability to manage, undertake and deliver effective research, analysis and development of intelligence
  • Able to demonstrate a strong knowledge of established methodologies for the identification, collection, assessment, development and dissemination of Internet based open source intelligence as well as effective reporting of findings from surface, deep and dark web environments
  • Able to demonstrate strong experience in respect to the development and articulation of governance, policy, control and development strategies both verbally and in writing
  • Able to demonstrate sound understanding of training, governance and policy needs for staff involved in OSINT collection at different levels of capability as part of a tiered but overall singe OSINT solution
  • Able to demonstrate sound operational experience of a wide range of tools for the purpose of conducting effective Internet based OSINT identification, collection and reporting including manual and automated tooling
  • Able to demonstrate strong experience of complex internal and external stakeholder engagement
  • Able to demonstrate a strong ability to communicate effectively, both orally and in writing, with clients, customers and colleagues
  • Able to demonstrate excellent time management and planning skills
  • Able to demonstrate a dynamic, creative and structured approach to tasking’s
  • Able to demonstrate a strong track record in effectively and successfully managing, motivating and developing teams in operational environments
  • Able to demonstrate a significant ability to effectively and successfully manage the workload of a team and individual’s workload and prioritise effectively tasks above others
  • Able to demonstrate a significant ability to work successfully as part of a team, or where appropriate, on your own initiative independently from others in an operational environment
  • Able to demonstrate a significant ability to manage, instigate and maintain effective and accurate record keeping
34

Cyber Analyst Resume Examples & Samples

  • Documents overall analysis of the subject computer system, as well as a listing of possibly relevant files and discovered file data. Determines approaches for analysis in order to ensure integrity and protection of the system. Develops new processes and procedures for computer investigation
  • Creates custom investigative reports and presentations for courtroom use to provide a clear synopsis of analysis results. Develops policies and procedures for the use of and creation of reports and presentations
  • May provide expert consultation and/or testimony to provide expertise in support of litigation
  • Bachelor's degree in computer science or related field preferred
  • Experience working with systems infrastructure including hardware configuration, operating system, and networks
  • Possess Department of Defense (DoD) security access of ADP I, ADP II, or ADP III
  • Pass background checks such as NAC, NACLC, and/or SSBI
  • Strong communication skills to communicate with customers
  • Good leadership skills to train and assist less experienced personnel
35

Cyber Analyst Resume Examples & Samples

  • The Cyber Analyst provide in-depth technical and operational knowledge as related to cybersecurity (CS) and Information Technology (IT), Multidisciplinary Security, Joint Exercises, Joint Planning, exercise training objective development, and Joint Lessons Learned
  • The Cyber Analyst shall be fully capable of conducting assessments in all aspects of cybersecurity, which includes interoperability, mission assurance and exercise mission areas
  • Bachelor’s Degree in Computer -Information Technology related field highly desired or may be substituted with minimum of 13 years experience
  • Must be knowledgeable of the CND and CNE environments
  • Experience in mission assurance analysis highly desired
  • Experience in military operations highly desired
  • Experience in technical writing highly desired
  • Must have the ability to quickly understand the customers’ overall technical objectives and mission and provide effective solutions
36

MEF IMO Spt / Cyber Analyst Resume Examples & Samples

  • Familiar with the Department of Defense - US Marine Corps
  • High School Education or Equivalent
  • Familiar with Adobe Acrobat Professional
37

Counter Intelligence Cyber Analyst Resume Examples & Samples

  • TS/SCI clearance with ability to pass a CI Polygraph
  • Bachelors degree or 4 additional years of experience in lieu of degree
  • Must be a graduate of Windows Forensics Exam (WFE), Introduction to Networks and Computer Hardware (INCH), the Computer Incident Response Course (CIRC), Intrusion Investigations in a Windows Environment, and CI Collections in a Cyber Environment (CICCE)
  • Must have a minimum of five (5) years of experience conducting or supporting CI operations, CI investigations and/or CI collections in the cyber environment
38

Cyber Analyst Resume Examples & Samples

  • 1+ years of experience with Cyber
  • 1 year of experience with network management and network operations
  • 1 year of experience with the analysis of Cyber threats, network defense environments, and implementation of STIGS
  • Experience with performing and analyzing network monitoring logs
  • DoDD 8570.01-M IAT Level I Certification preferred
39

Senior Counter Intelligence Cyber Analyst Resume Examples & Samples

  • Must be a graduate from an accredited CI Special Agent credentialing school
  • Must have a minimum of seven (7) years of experience conducting or supporting CI operations, CI investigations and/or CI collections in the cyber environment
  • Must have conducted digital forensic analysis on Personal Electronic Devices (PEDs), intrusion investigations, and CI collections on-line
40

CI Cyber Analyst Resume Examples & Samples

  • Conduct non-attributable searches for Cyber CI-related information and provide CI Cybersecurity Education Briefings to the USSOCOM workforce
  • Graduate of Department of Defense or Federal Counterintelligence/Law Enforcement Badge & Credentialing School
  • Graduate of Advance Foreign CI Training (Offensive CI) Course
  • Must have certification/training as a Computer Forensics Examiner
41

Junior Cyber Analyst Resume Examples & Samples

  • An individual with a passion for technology and understanding of the core concepts of cyber security. (DLP, Vulnerability Management, Cyber Threat Intelligence, Security Monitoring, SOC. Qualys is the vulnerability management tool our client utilizes
  • Outside of technical expertise, the most important skill sets for this individual are catered towards their integrity, purpose, and mission in their career. Someone who is a critical thinker and problem-solver with set goals will thrive in this environment
  • Being a liaison between the security team and the rest of IT/Business is crucial. Having the ability to effectively communicate with business partners who are resistant to additional processes (security) is vital to the successful integration of security across the organization
  • Understanding of E-mail security and thread detection
42

Cyber Analyst Resume Examples & Samples

  • Perform all source analysis of cyber based data to reveal entities of interest, determine life style patterns, and provide detailed background information for entities of interest
  • Assist in creating analytic tools that will automate the process of analysis of bulk data Search all available cyber information sources for associations of interest
  • Analyze cyber patterns and profiles Develop leads for new partnerships and projects analyzing various datasets, working group meetings, outside contacts, or other sources
  • Develop analytic methods and techniques to verify entities and reveal those entities using various data sources
  • Respond to requests for information (RFIs) from the customers
  • Research subjects of interest to the client and report on all findings orally and in writing as required Format, edit, review, and design a layout for finished products for publication in multiple formats including hard copy, soft copy, and online formats
  • Give formal presentations and participate in briefings and meetings
  • Provide information to the customer that will assist them in prioritizing their analytic efforts
  • 4+ years experience conducting analysis of multiple data sources
  • 4+ years of experience with internet search engines or web-based search applications Four years of experience conducting cyber based analysis
  • Understanding of how social networks work
  • Experience using official message formats
  • Minimum 4 years experience conducting business/competitive intelligence research
  • Minimum 4 years experience writing and publishing finished intelligence products
  • Experience using link analysis software
  • Experience using GIS applications
  • Google Earth Foreign language skills
43

Advanced CI Cyber Analyst Resume Examples & Samples

  • 10 years counterintelligence (CI) experience through military, or government agency
  • 3 years’ experience conducting CI Source operations
  • Must have certification/training as a computer forensics examiner
44

Apan Intelligence / Cyber Analyst Resume Examples & Samples

  • Primary responsibilities of the APAN Cybersecurity Analyst will be monitoring APAN application and network for attacks, malicious software and possible intrusions
  • Monitor, investigate, analyze both raw and normalized network traffic, correlate connected sequences of events, detect incidents, reconstruct into timelines for analysis, identify malicious network activity, and generally assist in conducting defensive cyberspace operations to protect our organization’s network infrastructure and intellectual property
  • Participate in Incident Response activities and work closely with security services (NIS, FBI, NSA, etc.) who may be inquiring specific incidents related to APAN application and / or network services
  • Work closely with APAN Software Engineers and knowledge managers to provide relevant situational awareness for APAN information security stakeholders
  • Writes and reports information security operations documentation and analysis
  • Work with the Pacific Warfighting Center (PWC) information security and systems team to develop strategies and plans to enforce security requirements and address identified risks
  • Analyze, interpret & recommend solutions for system shortfalls, discrepancies or improvements in APAN related technologies and access requirements
  • Work as an integral part of the PWC / APAN team
  • Update servers with latest software and patches Audit network systems & identify security issues, policy violations & performance problems
45

Red Team Cyber Analyst Resume Examples & Samples

  • Scope, execute and facilitate red team table top threat simulations for Barclays business units and the group as a whole
  • Ensure quality and realistic adversarial threat simulations are in line with red team service offerings
  • Provide executive reports which highlight and clearly articulate identified strengths, gaps and opportunities in a way the targeted audience can understand and take prioritised action against
  • Establish and maintain strategic partnerships across the group, to develop a trusting and collaborative working environment, utilising the niche adversarial perspective of the team
  • Work with the red team director in program management and resourcing activities
  • Partner with the Outreach and Awareness to provide adversarial perspectives and increase visibility
  • Technical knowledge and expertise in a security related domain
  • Knowledge and understanding of modern cyber threat actors, their motivation, scenarios, tools, tactics and procedures
  • Capability to be persistent and creative in solving complex and challenging problems
  • Demonstrated ability to solve complex and challenging problems
  • Competence in discussing risks, detection, remediation and prevention with appropriate audiences
  • Ability to differentiate between vulnerability and threat centric approaches
  • Desire and capability to collaborate with others to accelerate peer capabilities, and drive excellence across GIS
  • Capable of identifying skill deficiencies and proposing solutions to enhance capabilities
  • Ability to evaluate risk, business impact, cost and difficulty to remediate in relation to communication of findings
  • Good awareness and understanding of how large organisations function, the various roles, responsibilities and complexities involved
  • Appreciation of how threat centric analyse can benefit the business and provide insight into the wider more impactful risks
  • Strong facilitation skills, with proven ability to challenge and influence different personality types
  • Knowledge and exposure of red teaming approaches and methodology, its strengths and complimentary attributes to other forms of security testing
  • Ability to lead effective sessions to understand business impact as a result of findings and drive prioritise remediation
  • Understanding of the ever changing threat landscape and the relevant threat groups relevant to the finance sector
  • Experience in leading table top threat simulations
  • Broad security domain expertise
  • Ability to self-motivate and organise time effectively to achieve objectives
  • Ability to act and communicate professionally to audiences at all levels, whilst remaining consistent on messaging
46

All-source Cyber Analyst Resume Examples & Samples

  • Staff experience researching and writing white papers, compliance reports and assessment reports in support activities for defining policy
  • Excellent writing skills and ability to communicate effectively, including public speaking, and briefing senior officers
  • Proficiency in use of Microsoft Office Suite
  • DoD 8570 Requirements
  • Demonstrated understanding of cyber advanced persistent threats, actors, infrastructure, and TTP's
  • Demonstrate understanding of defensive cyber operations to include cyber incident response, and Intrusion Detection Systems (IDS)
  • DODIN Threat And Intrusion Intelligence And Cyber Analysis Support: The candidate will produce and disseminate all-source integrated intelligence analysis to support DODIN and defensive cyberspace operations (DODIN/DCO-internal Defensive Measures) planning, integration, coordination, and execution. The candidate will assist in analyzing, develop presentations and brief ongoing threat related activities and information targeting the DODIN and develop Joint Intelligence Preparation of the Operational Environment (JIPOE). This J2 Cyber Intel Analyst will assist in analyzing Information Assurance/Computer Network Defense activities on DoD systems and make recommendations for JFHQ-DODIN action to protect the DODIN in close collaborations with J3 (Operations Directorate) to produce reports and/or briefs, and make intelligence-derived recommendations to the J2/J3 for the defense of the affected network. Daily, the candidate will evaluate operational information, intelligence assessments and reports, Computer Emergency Response Team, Law Enforcement/Counterintelligence, allied/coalition, and open-source information to assess potential impacts on the DODIN and alert the stakeholders internally and external to JFHQ-DODIN
47

Cyber Analyst Resume Examples & Samples

  • Monitor the network and supporting systems to detect security compromise events (including intrusions and virus incidents)
  • Correlate events for early warning, alerting, trends and prevention
  • Perform investigations on suspected intrusions and/or suspicious activities
  • Inspect, identify and analyze log files to detect, identify and report anomalous malicious network activity
  • Perform incident triage on all incidents to determine scope, urgency, and potential operational impact
  • Analyze incident event data and provide detailed information for executive summaries
  • Analyze incident event data against known vulnerabilities
  • Provide network and security operations technical analysis, assessment, and recommendations to senior personnel in the areas of: real-time security situational awareness, operational network systems and applications systems security monitoring
  • Provide enterprise-wide network systems and applications systems security log auditing
  • Provide recommendations to protect networks, workstations, servers, and IT assets
  • Conduct trend analysis of security events to identify anomalous malicious activity and repeat infection
  • Travel: No Travel or <10%
  • Bachelor’s degree in related field or equivalent experience. May use related experience in lieu of education
  • Minimum of two years’ work related experience
  • The following certifications are required
  • Operating System (OS) certification (Windows Server, Linux)
  • Certified Ethical Hacker (CEH) certification
  • CISSP-ISSMP
  • Working knowledge of ACAS, HBSS, Palo Alto Firewalls, SNORT, SPLUNK, DISA STIGS and STIG-Tools
48

Cyber Analyst Resume Examples & Samples

  • 4-10+ years’ experience in multiple cyber security domains (Access Control, Network Security, Governance / Risk Management, Architecture & Design, Operations)
  • Demonstrated Experience with Incident Response and Network Reconnaissance
  • Demonstrated data mining experience (Data auditing, Aggregation, Validation and Reconciliation; Advanced Modelling Techniques; Testing, Developing, and Presenting outputs in clear and concise reports)
  • Maintain a broad understanding and have experience with real-time analytics and business intelligent platforms
  • Knowledge of Security Best Practices: NIST, CIS, CISCO, Juniper, Checkpoint, Microsoft, Unix/Linux
  • Familiarization with large scale data analytics and strong Analytical Skills
49

Cyber Analyst Resume Examples & Samples

  • Provide support for the independent assessment of compliance of information systems with DoD RMF standards using DoDI 8510.01/DoD Risk Management Framework
  • Responsible for the creation and maintenance of certification and accreditation documentation related to maintaining DIACAP accreditation and gaining RMF compliance
  • Participates in the creation and enforcement of enterprise security documents (policies, standards, baselines, guidelines and procedures)
  • Conducts vulnerability assessment scans utilizing assessment tools such as ACAS and SCAP. Works across teams to ensure vulnerabilities are mitigated
  • Generates documentation required for Certificates of Networthiness (Con)
  • Responsible for designing and implementing the processes and procedures required to address security incidents and compliance with legal requests
  • Must be able to interpret DoD RMF and other security standards and provide technical guidance for their implementation into enterprise systems
  • IAT Level III Certification (CISSP or equivalent)
  • Acceptable Computing Environment certification
  • Knowledge of Federal and DoD Guidance (DoDD 8500.1, DoDI 8500.2), DIACAP, RMF, NIST, and DoD Certification & Accreditation processes
  • Excellent written and organizational skills
  • Proficiency in Microsoft Office General knowledge of network, server and desktop technologies
50

Lead Cyber Analyst / Engineer Resume Examples & Samples

  • Databases – MS SQL , Oracle
  • Experience with DIACAP and RMF in DHA a plus
  • Possession of excellent customer service and organization skills
51

Senior Cyber Analyst Resume Examples & Samples

  • Proactive threat hunting, as well as passive threat analysis and incident investigation
  • Create customized intelligence reports, digests on trends, emerging threats campaigns, and data breaches. This will include impact and exposure assessments relative to [customer] and its business partners
  • Along with the Principal Cyber Analyst, proactive management of end to end solutions
  • Vulnerability analysis and tracking for false positive/negative, as well as recommendations for tuning the vulnerability scanning solution
  • Produce service management reports, SLA reports, and associated KPI style reports
  • Along with Principal Cyber Analyst, help develop operational metrics to illustrate risk reduction over time. This includes the publication for daily flash reports, weekly risk reports, and monthly trend reports
  • Develop guidance on mitigation strategies and defense techniques relative to trends and events in the global threat landscape
  • Assist Principal Cyber Analyst and [customer] security staff with incident management, security strategy, and publication of security intelligence
  • Monitor the global threat and vulnerability landscape. Participate in Verizon’s weekly intelligence calls and intelligence summary reports
52

Cyber Analyst Resume Examples & Samples

  • Document real-world engagement IP effects along with the methodologies used in a Munitions Effectiveness Manual (MEM)
  • Working closely with the principal analyst to ensure analysis of "data is performed in a timely manner is completed accurately and is retrievable from the database to assist in long-term analysis when necessary
  • Bachelor's degree in Computer Science or a related field with 5 years of experience OR Masters degree and 3years of experience; OR equivalent combination of training and experience
  • At least 1 year in teaching technical material to small groups, developing technical training on basic system, network, and/or malware analysis
  • Knowledge of ATO production processes, AOC Division functions, and software/systems commonly used in an AOC is essential
  • Possess excellent analytical and technical problem-solving skills
53

Technical / Cyber Analyst Resume Examples & Samples

  • Serve as subject matter expert and advise customer on information assurance issues
  • Review the application of information assurance policies, principles, and processes involving information assurance from a counterintelligence perspective
  • Identify improvements to existing programs, processes and procedures to enhance the overall security and counterintelligence posture of communication/computer networks, systems, and data
  • Prepare, document, and present positions, analyses, risk assessments, process improvement opportunities, and studies in oral and written form
  • Conduct and develop counterintelligence vulnerability and threat assessments of technical projects and computer network defense issues
  • Develop counterintelligence analysis and assessments of foreign threats to USG and IC computers, networks, and information
  • Support development, coordination and review of information assurance policies, strategic plans, standards, implementation plans and/or methodologies for technical or cyber counterintelligence concerns
  • Identify, document and recommend mitigations to security events of technical and cyber CI significance
  • Document requirements and mitigations and drive application of technical CI practices
  • Develop reports on changes, trends and implications of evolving cyber counterintelligence issues
  • Support integration of research results and analysis into processes, standards and policies
  • Coordinate with multiple agencies on technical counterintelligence issues involving the protection of information
  • Support integration of CI processes, analyses and mitigations into the protection of IC and USG data and information technology enterprises
  • Support outreach to the IC, Federal Partners, and to non-government and commercial entities involved in the protection of critical infrastructures
  • Support IC-wide working groups and conferences. Develop meeting agenda, minutes with action items, issue papers, briefings, and propose working group activities
  • Develop analytical reports and publications, create graphics, and provide client ready material
  • Bachelor’s degree in Engineering, Computer Science or related technical discipline
  • Knowledge of one or more of the following areas: Cross Domain Technologies, Information Technology Virtualization, Cloud Technologies, Cryptography, Public Key Infrastructure, Network and Host-Based Intrusion Detection and Prevention Systems, Computer Network Defense techniques, Computer Cyber Defense Techniques
  • Knowledge of Computer Operational Readiness, Verification, and Validation Reviews
54

Cyber Analyst Resume Examples & Samples

  • Bachelor's degree in a computer related discipline or equivalent experience
  • Minimum of 7 years directly related experience
  • Must have the ability to obtain and maintain Security+ce within 90 days of hire
  • Demonstrated experience with either Windows or Linux operating systems
  • Candidate must be a US Citizen and possess an active DoD Secret security clearance
  • Active Security+ highly desired
  • Addition preferred certifications include: CISSP, CISM, CASP, or CEH
  • Experience with both Windows and Linux operating systems
  • Knowledge of basic networking concepts and operation is a plus
55

Senior Cyber Analyst Resume Examples & Samples

  • Team management and skills mentoring
  • Report into the Global Security Operations Manager and be articulate in the development of technical reporting and the production of business cases to recommend new strategies and technologies which your team will be proficient in using
  • Monitoring and analysing logs, packet captures and alerts from a variety of different data sources (IDS / IPS, Firewall, Proxies, Anti-Virus, SIEMSs, etc.), across multiple platforms
  • Understanding the cyber kill chain in relation to Advanced Persistent Threats (APT's)
  • Utilising a variety of intelligence sources to maintain a strong awareness and understanding of the current threat landscape
  • Providing situational security awareness by combining information from a variety of systems and normalising / correlating the information
  • Identifying suspicious and / or anomalous activities and taking appropriate action based on documented processes and procedures
  • Assisting customers and key stakeholders with security related issues and advice
  • Support the Global SOC in managing security incidents through all phases of the incident response lifecycle from identification through to closure
  • Creating comprehensive security assessments which articulate security issues, analysis and remediation techniques
  • Liaising with Rolls-Royce counterparts around the world to provide global coverage
  • Defining toolset requirements, supporting the selection of appropriate tools and in some cases developing in-house capability to support the needs of the Advanced Analytic team’s long term strategy and technology roadmaps
  • Escalating and explaining severe security incidents verbally and in writing
  • Contributing to information sharing partnerships
  • Conducting research on emerging security threats and potential customer impact
56

Cyber Analyst Resume Examples & Samples

  • Bachelors Degree and 2+ years of experience. Four years of related experience may be considered in lieu of a degree
  • Bachelors Degree and 5+ years of experience. Four years of related experience may be considered in lieu of a degree
  • Experience with Computer programming skills (C#, C++, Java, or PERL)
57

Technical / Cyber Analyst Resume Examples & Samples

  • MS+10 or BS+15
  • TS/SCI w/CI Poly
  • Minimum of 10 years in positions of increasing responsibility and demonstrated experience in cyberspace mission areas, to include computer engineering, computer science, telecommunications, information technology, information security/assurance, and/or computer network operations
  • Experience providing program and policy support on Cyber CI issues
  • Minimum 5 years CI experience obtained from multiple IC agencies highly preferred
  • Depending on specific tasks. Minimum 5 years of current experience in tasks supporting cyber damage/loss assessments, collection management, training and education, national and international cyber policy, and/or computer network operations
  • Possess outstanding oral and written communication skills, with desired experience providing communications to Executive and Legislative Branches of Government, and senior corporate industry leadership
58

Cyber Analyst, Mid Resume Examples & Samples

  • 3+ years of experience with Cyber warfare to perform analyses in regards to current and future Cyber capabilities
  • DoD 8570 IAT II Certification, including Security + CE
  • Experience with assessing organizational risks and recommending mitigation strategies
59

Senior IA / Cyber Analyst Resume Examples & Samples

  • Must have one of the following educational requirements
  • High school diploma with 12 years of experience performing full-time DoD security functions
  • Previous Special Access Program (SAP) experience
60

Cyber Analyst, Senior Resume Examples & Samples

  • 7+ years of experience with using Cyber warfare to perform analyses in regards to current and future Cyber capabilities
  • Experience with the DIACAP or Risk Management Framework
  • DoD 8570 IAT II Certification, including Security+ CE
  • Experience with DoD Cybersecurity policies, directives, and STIGs
  • BA or BS degree in a STEM field required
61

Cyber Analyst Resume Examples & Samples

  • Analyze network data to include packet capture analysis, network flow analysis
  • Assists and may perform a wide range of Cyber security issues including architectures, firewalls, electronic data traffic, and network access and reviews and recommends changes
  • Performs analyses at all levels of total system product
  • May interface with external entities (e.g. law enforcement, intelligence/government agencies, etc.)
  • May substitute relevant experience or certifications in lieu of education
  • The candidate must have or be able to meet DoD 8570.1-M certification requirements for CND-A (Security+, CEH, and OS Certification) within a 6 month employment period
  • DoD Security Clearance required
  • Two or more of the following certifications: Security +, CEH or OS Certification
62

Cyber Analyst Resume Examples & Samples

  • Responsible for administering security activities within assigned security programs *
  • Responsible for ensuring compliance with government and company security policies and procedures in assigned area *
  • Monitors, evaluates, and maintains systems and procedures to safeguard information systems, networks, and databases *
  • Conducts regular audits to ensure that systems are being operated securely, and information systems security policies and procedures are being implemented as defined in security plans *
  • Responds to queries and requests for computer security information and reports *
  • Researches, evaluates, tests, recommends, communicates, and implements new security software or devices *
  • Analyzes and/or administers security controls for information systems *
  • Safeguards servers against unauthorized infiltration, modification, destruction, or disclosure *
  • Applies system security patches during scheduled patch cycles *
  • Performs periodic hardware/software inventory assessments *
  • Identifies system security controls' shortcomings and develops POA&Ms *
  • Performs control assessments as part of the systems’ Continuous Monitoring Plan *
  • Implements, enforces, and develops security policies or plans for infrastructure OS and hardware *
  • Associate’s Degree in Computer Science or a related field, or equivalent experience (4 years of experience may be substituted for degree)
  • Minimum of 2 years directly related experience (total of 6 years of experience if no degree)
  • Knowledge of Cyber Security policy development, threat mitigation tactics, and security deployments
  • Knowledge of security tools and secured networks
  • Experience with Linux variants, configuration of O/S, server installation/configuration, client installation, SSH, shell scripting, and web technologies
  • Working knowledge of desktop applications including word processing, spreadsheet, and database programs
  • Knowledge of the NIST government security regulatory controls
  • Experience with Windows variants, configuration of O/S, server installation/configuration, client installation, power shell scripting, and web technologies
  • At least one computing environment certification (Windows Server, Linux, and/or VMware)
63

Senior Insider Threat Cyber Analyst Resume Examples & Samples

  • Review and direct user activity monitoring strategies
  • Identification of root cause in partnership with peer groups on remediation of control gaps/failures
  • Maintain an awareness of industry challenges and advancements in order to add value to existing technologies and processes used within the team
  • Imaging of hard disk drives and other digital storage media
  • Bachelor’s degree/or equivalent combination of education and 10 years Cybersecurity and IT Forensic Investigative experience
  • At least 5 – 7 years of overall experience in Cybersecurity
  • At least 2 – 4 years experience in computer forensic investigations
  • Insider Threat program experience as a focus area within Cybersecurity
  • Working knowledge of Data Loss Prevention controls (e.g. Symantec DLP, McAfee, Websense)
  • Proven ability to self-direct project outcomes, with minimal supervision, to achieve program goals
  • Hands on experience with industry standard computer forensics solutions (EnCase, FTK, X-Ways, Cellebrite)
  • Working knowledge of enterprise solutions for searching, monitoring, and analyzing machine-generated big data (ArcSight, LogRhythm, Splunk)
  • Hands on experience with user activity monitoring tools such as ObserveIT or Veriato 360
  • Ability to build consensus and cooperation as well as the ability to interact, influence, and negotiate with leadership within the firm
  • Ability to navigate and work effectively across a complex organization
  • Experience with scripting environments (e.g. Python, Ruby, Perl, VB Script) to automate technical response
  • Experience with databases, SQL, and data visualization tools
64

Cyber Analyst, / Isso Resume Examples & Samples

  • Currently active DoD 8570 Information Assurance IAM-I level certification (Security+) and a one Computing Environment Certification (Microsoft, RedHat, Linux+, etc)
  • Experience of determining and assessing vulnerabilities including planning, testing, and documenting (DoD) accreditation packages for Information Technology (IT) systems and networks, specifically within RMF
  • Working knowledge of eMASS, ACAS, HBSS, DISA STIGS and STIG-Tools
  • Currently active DoD SECRET security clearance required
  • Experience applying DISA STIGS, conducting vulnerability audits, security configuration checks, and system configuration scans to meet Cyber Security requirements desired
  • Experience deploying and configuring HBSS components
  • Knowledge of Information Security and Auditing
  • Ability to achieve Certified Information Security Professional (CISSP) or equivalent desired
  • Knowledge of Federal and DoD Guidance DoDD 8500.1, DoDI 8500.2, DoDI 8510.01 SP 800-57, SP 800-53, CNSSI 1253
65

Cyber Analyst Resume Examples & Samples

  • Bachelor’s Degree in Computer Science or a related field, or equivalent experience (8 years of experience may be substituted for degree)
  • Minimum of 7 years directly related experience including a minimum of 2 years of experience managing a Nessus Security Center (total of 15 years of experience if no degree)
  • Knowledge of security tools, secured networks, and network and web-related protocols (e.g., TCP, UPD, IP, HTTP/S, TLS)
  • Experience with Windows and Linux variants, configuration of O/S, server installation/configuration, client installation, SSH, shell scripting, and web technologies
  • Must be able to obtain and maintain a Secret clearance
  • At least one computing environment/IT Security certification (Windows Server, Linux, SANS, CompTIA, CISCO, Microsoft, or EC-Council )
66

Intermediate CI Cyber Analyst Resume Examples & Samples

  • Assist with J2X CI investigations by providing CI Cyber input to Risk Assessments, Damage Assessments, and Threat Assessments subsequent to Cyber-attacks and vulnerabilities
  • Provide CI Cyber support to the Insider Threat Program, Identity Management, and J3X/J2X operations, activities, and special projects
  • Design and maintain a mechanism to track offensive and defensive Cyber capabilities by country, assess and evaluate emerging technology threats, draft Liaison Contact Reports, draft CI After Action Reports, and draft comprehensive CI Cyber Threat Assessments
  • Represent USSOCOM CI interests through attendance in conferences and meetings with cyber defenders and engineers
  • Graduate of Advance Foreign CI Training or Source Operations training
  • 1 year experience conducting CI Source operations
67

Cyber Analyst / Sign ON Bonus Potential Resume Examples & Samples

  • Uses encryption technology, penetration and vulnerability analysis of various security technologies, and information technology security research
  • Bachelor’s degree in related field or equivalent experience
  • Minimum of 4-6 years work related experience
  • Must have at least two of the required certifications in accordance with DoD 8570.1-M for CND-A: Security+, CEH, and OS Certification. The lacking certification must be obtained within 6 months of employment
  • All three certifications: Security +, CEH or OS Certification
68

Cyber Analyst, Mid Resume Examples & Samples

  • Knowledge of network fundamentals, including OSI model and TCP/IP protocol suite
  • Knowledge of scripting languages and data extraction techniques
  • Knowledge of databases and their role in aiding in analysis
  • Ability to analyze data and produce high quality analytical reports
  • Ability to work in a diverse, operations floor collaborative environment
  • BA or BS degree in a related field preferred
  • Networking or Security Certifications, including Network+, CCNA, or others preferred
69

E-site Cyber Analyst Level Resume Examples & Samples

  • Bachelors and two (2) years or more experience; Masters and 0 years related experience
  • Knowledge and experience working with Defense Intelligence Agency (DIA)
  • Agile Foundation Certification, CompTIA Security+ Certification, DevOps Foundation certificate
  • Computer Technology: Cyber Security Assessment and Management (CSAM), Cyber, DoD Information Assurance Certification and Accreditation Process (DIACAP)
70

Cyber Analyst Resume Examples & Samples

  • 2-3 years of relevant IT experience
  • Knowledge and understanding of information security risks, preventative measures, and incident and threat management
  • Provide computer security incident response including monitoring, detection, investigation, and lessons learned. Assess and prioritize incidents based on business impact and escalate as necessary
  • Research and analyze security threat intelligence from a variety of sources. Apply appropriate mitigations for identified indicators of compromise. Suggest changes to security controls as needed to adapt to the changing threat landscape
  • Conduct computer forensics investigations including malware sample analysis, memory analysis, network traffic analysis, and imaging and analysis of hard disk drives
  • Actively contribute to information security projects and initiatives
  • Communicate and manage relationships and with end users, IT service providers (both internal and external), and business unit and IT management
  • Take ownership of service improvement projects (both technical and procedural)
  • Must be available to provide 24x7 on call support on a rotational basis
71

Cyber Analyst, Mid Resume Examples & Samples

  • 4+ years of experience with Cyber analysis
  • Experience with network fundamentals, including the OSI model and TCP/IP protocol suite
  • Possession of excellent analytical and time management skills
72

Lead Insider Threat Cyber Analyst Resume Examples & Samples

  • Further the design and maturation of TIAA’s Insider Threat program
  • Formulate and execute a strategy to support the collection of electronically stored information (ESI) used in investigative and electronic discovery matters
  • Provide guidance to information security analyst on forensic evidence analysis, interpretation and documentation of findings
  • Develop and deliver stakeholder presentations which further the awareness and understanding of the insider threat program and capabilities
  • Propose and execute program initiatives, and collaborate with key stakeholders to create business value
  • Develop strategies to improve the efficiency and consistency of service delivery
  • Provision of report and statements in clear unambiguous language
  • Maintain a strong focus on case logs, repeatability and chain of custody
  • Interact with and lead discussions with executives across different functions and lines of business
  • Execute high risk cyber security incidents by working in conjunction with response partners
  • Digital forensic examination and analysis
  • Potential travel (occasional) related to investigative needs
  • Bachelor’s degree/or equivalent combination of education and experience (minimum 10 years experience)
  • Minimum of 7 years of overall experience in Cybersecurity
  • Minimum of 4 years of relevant experience in computer forensic investigations
  • Strong knowledge of User Behavior Analytical concepts and products
  • Experience in financial services including Retirements, Retail/Commercial banking, or another other financial institution line of business (Brokerage, Insurance, or Asset Management)
  • Good understanding of data privacy laws and experience interacting with Legal and Compliance professionals
  • Possess one or more of the following certifications: CFCE, CCE, EnCE, ACE, GCFA
73

Senior Cyber Analyst Resume Examples & Samples

  • Be a lead analyst for Splunk as the core SIEM by implementing the security detection strategy to detect the most sophisticated threats that Thales faces. Thinking beyond a traditional SIEM and using big data techniques to continually improve and enhance the SIEM beyond security event detection
  • Be the leading figure for incident response, by mentoring analysts in incident response and forensics work, ensuring capability exists to enable incident response to be performed and performing incident management. Become the technically astute on incident response and forensic techniques using Encase Enterprise, expanding out the capabilities and using the enterprise wide tools to remediate and reduce risks across the business
  • Becoming a champion for security throughout the organisation, but working with other teams to ensure best practice is implemented throughout. Attendance at various forums such as architecture review boards, technical forums and external conferences to ensure that security’s voice is heard
  • Ability to understand business issues and context, with the ability to dive deeply into technology issues, integrate business information and understand the critical role of securing the information system in the organisation
  • Data analysis experience and skills, particularly in big data platforms (preferably Splunk)
  • Incident response experience skills (preferably Encase)
74

Cyber Analyst Resume Examples & Samples

  • Prepare, plan, execute and report activities in support of the DOT&E Cybersecurity Assessment Program to include providing in-depth technical and operational knowledge as related to the cybersecurity (CS) and mission assurance (MA) posture of DoD organizations, weapon systems, weapons system operators, and operational decision makers
  • Coordinate, observe, analyze, and report Blue and Red Team activities and conduct mission impact analysis during major Combatant Command and Service exercises
  • Execute operationally relevant cybersecurity assessments featuring representative cyber threats to evaluate how realistic cyber conditions affect CCMD and/or Service abilities to execute their assigned missions
  • Provide timely feedback to CCMD, Service, and DoD leadership on identified problems, associated mission effects, and successful defensive strategies
  • Share relevant information with and support those organizations authorized and able to provide remediation and mitigation assistance and to verify that remediation and mitigation activities are effective
  • Report overarching cybersecurity observations and trends for inclusion in the Director’s Annual Report to Congress
  • Be fully capable of conducting assessments in all aspects of cybersecurity, which includes offensive and defensive cyber operations, mission assurance and operational mission areas
  • MUST have IAT level II certification as minimum (Security+ CE)
  • Experience with DoD operational weapons systems and mission planning systems desired
  • Joint Exercise planning experience or assessment planning experience highly desired
  • Experience in Defensive Cyberspace Operations, Military Operations, Mission Assurance analysis, and technical writing is highly desired for Cyber Analysts
  • Experience in system and network security architecture, network interoperability, and logical/infrastructure network experience is highly desired for Cyber Engineers
  • Must be able to work in a dynamic, fast-paced environment while being able to prioritize work to balance multiple projects and deadlines
  • Must have the ability to quickly understand the customers’ overall technical objectives and mission objectives and provide effective solutions
75

Cyber Analyst Resume Examples & Samples

  • 9 Years with Bachelors in Science; 7 Years with Masters; 4 Years with Ph.D. or 13 years in lieu of a degree
  • Must meet certification requirements of DoD 8570 IAT-II (CCNA-Security, GICSP, GSEC, Security+ CE, SSCP)
  • Advanced knowledge and experience in active hunt methodologies, including capability and process improvement methods
  • Thorough understanding of insider, adversarial, and persistent threats, including associated techniques, tactics, and procedures (TTPs)
  • Ability to collect and analyze host and network forensics data
  • Expertise in TCP/IP, Windows, and Linux operating systems, malware identification and eradication, Indicators of Compromise (IoC), access control, standard security configuration and best practices, and cyber incident response activities
  • Understanding of the anatomy of a cyber attack
  • Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner
  • Ability to provide technical and analytical expertise for investigation or validation of potential network and/or system anomalous behavior
  • Knowledge of cyber security, network attack, computer network defense and exploitation concepts, practices, and tools for the administration of all DoD computer systems
  • Knowledge and proficiency in technical writing
  • Previous experience and sound knowledge of C2BMC System or Missile Defense
  • C|EH, GCIA, GCFA, GCIH, OSCP, GSNA certifications
  • Python, PHP, Perl, or PowerShell scripting experience
76

Cyber Analyst Resume Examples & Samples

  • Cyber Security Analyst are responsible for 24x7 monitoring of security events from all the various sensors and agents, providing analysis and correlation, provide situational awareness level reports and trending reports. Analysts are responsible for detection, triage, initial investigation, and response, and reporting. Analysts coordinate and respond to events on all of the monitored networks and the systems on those networks
  • Analysts work together as a team to develop skills, sources, and methods to provide the best possible cyber defense capability to protect the Sponsors IT assets from all manner of cyber threats, attacks, and exploitation
  • Analysts work together with Sponsor personnel to develop relationships across industry, the federal government, and the Intelligence Community to maintain awareness and status of all relevant cyber defense initiatives, indicator lists, threat reports, incident response techniques, and cyber defense technologies to ensure that Agency cyber defenses are effective and incorporating the best possible protections
  • Location will be Bethesda or McLean
  • BS in CS, Math, CE or other technical field plus minimum 3 years relevant experience
  • Good interpersonal, organizational, writing, communications and briefing skills
  • Either an ISC2 CISSP certification or SANS GSEC certification
77

Cyber Analyst Resume Examples & Samples

  • Advising on security tool data integrations with advanced analytics platform
  • Work closely with analytics team to develop correlation of data elements across security data landscape
  • Develop dashboards, reporting and recommended actions based on analysis of data
  • Knowledge of latest threats and mitigation tactics; web application, network level and operating system attacks
  • Collaborates and coordinates with technology and business leads on the investigation of data points
  • Provides support and analysis during and after a security incident
  • Assists system administrators and CSIRT team members in the review and resolution of reported security incidents
  • Participates in security and compliance reviews, as requested by internal and external auditors
  • Collaborates on critical IT projects to ensure that security data integration with advanced analytics platform where appropriate
  • Knowledge of various security tools and platforms
  • Ability to create rules, alerts, trends and other analytics based upon security data
  • Demonstrated knowledge of SIEM, packet captures, meta tags and log analysis
  • Bachelor's degree in information systems or equivalent in relevant field of study
  • CISSP strongly preferred
  • Excellent data analysis skills using standard office and advanced analytics tools are required
  • A strong attention to detail
  • Ability to interact with personnel at all levels across the organization and to comprehend business imperatives
  • A strong customer/client focuses with ability to manage expectations appropriately and provide superior customer/client experience and build long-term relationships
78

Cyber Analyst Resume Examples & Samples

  • Assist in creating requirements for analytic tool development that will automate the process of analysis of bulk data
  • Search all available cyber information sources for associations of interest
  • Analyze cyber patterns and profiles
  • Develop leads for new partnerships and projects analyzing various datasets, working group meetings, outside contacts, or other sources
  • Research subjects of interest to the client and report on all findings orally and in writing as required
  • Must have a current/active TS/SCI with Polygraph
  • Requires a BS degree OR one year of relevant analytic experience working in the Intelligence Community
  • Minimum of 4 years of experience with internet search engines or web-based search applications
  • Minimum of 1 year of experience conducting cyber based analysis
  • Minimum of 1 year understanding of how social networks work
  • Minimum of 1 year Experience using official message formats
  • Minimum of 1 year experience conducting business/competitive intelligence research
  • Minimum1 year experience writing and publishing finished intelligence products
79

Junior Cyber Analyst Resume Examples & Samples

  • Lead go-to-market, customer acquisition, branding, and channel partner strategies for Siemens’ industrial cyber business
  • Lead and manage customer engagements, focusing on cyber risk strategy, program stand-up and technology selection
  • Provide oversight and leadership to assist internal stakeholders and external customers with critical cyber security management decisions related to business processes, security controls, policies and standards, regulations and investment prioritization
  • Produce and present persuasive outputs leveraging multiple formats, including Excel-based models and PowerPoint
  • Sequence and prioritize work, provide meaningful input into client deliverables and drive innovation in cyber risk for customers
  • Perform market forecasting and investment analyses to advise R&D and product level investment decisions
  • 3-5 years of experience in a strategy role or consulting organization
  • Knowledge of cybersecurity, with strong preference for experience in Operational Technology/Industrial Control Systems
  • Experience interacting with and presenting to high-level executives
  • Ability to develop business opportunities through campaigns to create awareness and increase offering adoption
  • Experience creating and defining specific consulting and service offerings
  • Ability to work in a mix of commercial and public sector environments
  • Ability to meet travel requirements when they arise
  • Preferred MBA or MA/MS degree in related field, including data analytics, risk assessment, cyber technology, or statistics
80

Cyber Analyst Resume Examples & Samples

  • Uses the latest tools and techniques to develop and present training on monitoring the network and supporting systems to detect security compromise events (including intrusions and virus incidents). *
  • Provides network and security operations technical analysis, assessment, and recommendations both for operations and for training events *
  • Identifies where systems/networks deviate from acceptable configurations, enclave policy, or local policy.*
  • Provides recommendations for protecting networks, workstations, servers, and IT assets. *
  • May conduct audits to ensure information systems security policies and procedures are implemented as defined in security plans and best practices. *
  • May participate in response teams to ensure identified anomalies in customer systems are corrected in accordance with government or industry standards.*
  • May participate in cyber and cyber tools research and development
  • Bachelor’s degree in related field, or equivalent experience, advanced degree preferred
  • Minimum of 7 years of work related experience
  • A relevant certification in a security or IT area is required. Examples include but are not limited to: Network+, Security+, CCNA, an operating system (e.g., LINUX, Windows)
  • Experience running common cyber tools (e.g., Metasploit, Cobalt Strike, Nessus, Wireshark)
  • Knowledgeable in networking protocols
  • A SECRET clearance is required
  • Some weekend work is required to conduct training classes
  • CISSP is preferred but not required
81

Cyber Analyst Resume Examples & Samples

  • Monitors the network and supporting systems to detect security compromise events (including intrusions and virus incidents). *
  • Provides standard support for processes, investigations and maintenance of system accreditation*
  • Provides recommendations for protecting networks, workstations, servers, and IT assets.*
  • Involved in conducting audits to ensure information systems security policies and procedures are implemented as defined in security plans and best practices. *
  • Supports the formal testing requirements through pre-test preparations, participation in the tests, analysis of the results, and preparation of required reports
  • Involved in passive evaluations (compliance audits) and/or active evaluations (vulnerability assessments)
  • Minimum of 4 to 6 years of work related experience
  • The following DoD certifications are required: Security+ or equivalent, Certified Ethical Hacker (CEH) or equivalent, and an Operating System (OS) certification (Windows Server, Linux)
  • Previous technical writing/documentation experience desired
  • Working knowledge of eMASS, ACAS, HBSS, Palo Alto Firewalls, SPLUNK, SNORT, DISA STIGS and STIG-Tools
  • Experience applying DISA STIGS, conducting vulnerability audits, security configuration checks, and system configuration scans to meet Cyber Security requirements desired
  • Experience deploying and configuring HBSS components
  • Knowledge of Information Security and Auditing
  • Ability to achieve Certified Information Security Professional (CISSP) or equivalent desired
  • Working knowledge for Unix workstations and servers (SUN, SGI, etc), Linux Redhat, Microsoft workstations and servers, and boundary protection devices (firewalls, IDS, etc)
82

Cyber Analyst Resume Examples & Samples

  • Provides basic support for testing, investigations, and maintenance of system accreditation.*
  • Assists in conducting basic audits to ensure information systems security policies and procedures are being implemented as defined in security plans and best practices. *
  • Provides routine support of program control processes and accreditation of systems.*
  • Performs basic analyses to validate established security requirements and may recommend additional security requirements and safeguards
  • Minimum of 0 to 2 years of work related experience
83

Technical Cyber Analyst Resume Examples & Samples

  • Bachelor’s degree in Engineering, Computer Science, or relevant technical field (g., physics, mathematics, operations research)
  • 15+ years of DoD experience
  • 5+ years of management experience with focus on Systems Engineering Plans, Test and Evaluation Master Plans, and Critical Program Information identification
  • 7+ years of experience with DoD weapons systems systems engineering
  • Knowledge of Defense Industrial Base Cyber Security policy, program protection planning
84

Cyber Analyst Resume Examples & Samples

  • Bachelor’s degree in Information Security, Computer Science, Information Systems, or relevant work experience
  • Familiarity with latest security vulnerabilities, understanding of attack vectors, detection methods and countermeasures
  • Proven experience in cloud-focused Cyber Security
  • Veteran of military service in unit with relevant cyber security experience
85

Senior Cyber Analyst Resume Examples & Samples

  • Along with the Senior Security Advisor, proactive management of end to end solutions
  • Help develop operational metrics to illustrate risk reduction over time. This includes the publication for daily flash reports, weekly risk reports, and monthly trend reports
  • Assist security staff with incident management, security strategy, and publication of security intelligence
  • Lead Use Case design & implementation on RSA SA toolset
86

Cyber Analyst Resume Examples & Samples

  • Government trained Signals Intelligence (SIGINT) analyst with a minimum of 5 years of experience
  • Experience dealing with cyber related intelligence and familiarization with the US Cyber Command (USCYBERCOM), US Army Forces Cyber Command (USARFORCYBER), or theater cyber offices is required
  • Experience with SIGINT support of counterterrorism, counter insurgency or counter IED operations is desired. Previous deployment to Afghanistan is desired
  • Knowledgeable of data processing systems such as NSANet, DCGS-A, CIDNE, and SIPRNET and JWICS search engines
  • Proficient at using basic computer applications and intelligence related automation to support analytical efforts and product development; possess strong research and writing skills; and be capable of coordinating CITP cyber intelligence requirements with theater and IC cyber intelligence organizations
  • Requires former Military Occupational Specialty (MOS) 35G, 35S, 352C, DoD joint service or civilian equivalent and a Bachelor’s Degree (may substitute 4 years of experience for education requirement)
87

Cyber Analyst Resume Examples & Samples

  • Read and interpret documentation supporting controls for the Risk Management Framework to determine of the control is compliant with the requirements
  • Work independently with little supervision and also work in a group as part of a larger team
  • Assist with the preparation of quotes for formal and informal tests and audits
  • Develop ideas to improve cost and performance for analyzing documentation supporting RMF security controls
  • Stay current on the latest cyber security policies and regulations
  • May be involved in conducting audits to ensure information systems security policies and procedures are implemented as defined in security plans and best practices
  • May support the formal testing/audit requirements through pre-test preparations, participation in the tests, analysis of the results, and preparation of required reports
  • May participate in limited travel to support audits and tests
  • Use eMASS to support the RMF process
  • Relevant certifications, including government directed certifications, are required (e.g. Security Plus)
  • Experience writing RMF documentation
88

Forensic Cyber Analyst Resume Examples & Samples

  • Conduct Forensic investigations with EnCase Forensic (or similar) tool using all legal and customer required control steps
  • Support and develop the Incident Management SOPs
  • Prepare results for the appropriate law enforcement (LE) or other investigating agencies if required
  • Update, and maintain existing and future COAs to effectively contain events and incidents to minimize and damage or impact to DSS networks, Information Systems (ISs), data, and services in accordance with DOD mandates
  • Conducted malware analysis to develop incident reports
  • 5 years’ of Cyber Security experience with a Bachelor’s degree, preferably in a technical specialty: cyber security, computer science, or similar field. We may accept four (4) years of additional relevant experience in lieu of a degree
  • At least three (3) years of experience successfully managing and performing forensic analysis
  • Knowledge of DoD enterprise cyber tools, such as, ACAS, HBSS, SIEM, Firewalls, and NAC
  • Experience in developing policies and procedures related to forensic investigations and incident response
  • IAT-I, II or III IA Baseline Certification (SEC+, CISSP preferred)
  • CCNA certification
  • Experience in developing root cause analysis report based on investigation
  • Knowledge of mitigation techniques for discovered incidents
  • Experience in performing forensic response on remote networks