Cyber Operations Resume Samples

4.8 (119 votes) for Cyber Operations Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the cyber operations job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
GC
G Champlin
Gwen
Champlin
40623 Melyssa Rest
Philadelphia
PA
+1 (555) 136 5334
40623 Melyssa Rest
Philadelphia
PA
Phone
p +1 (555) 136 5334
Experience Experience
New York, NY
Cyber Operations Planning Analyst
New York, NY
Jenkins, Berge and Tromp
New York, NY
Cyber Operations Planning Analyst
  • The candidate shall assist in preparing for USTRANSCOM joint training meetings and completing any action items and after action reports as necessary. T
  • The candidate shall be the single focal point in TCJ6 for reviewing, commenting on, and coordinating USTRANSCOM orders
  • The candidate shall also assist in developing and writing USTRANSCOM orders
  • The candidate shall support all phases of the Joint Operational Planning Process (JOPP) from the C4S, Cyberspace Operations, and cyberspace perspective
  • The candidate shall be responsible for the USTRANSCOM TCJ6 Joint Lessons Learned Program (JLLP) and will be the TCJ6 Lessons Manager (LM)
  • The candidate shall provide lessons learned inputs to the USTRANSCOM Joint Lesson Manager, IAW with USTRANSCOMI 10-14, after contingency, exercise, and training events
  • The candidate shall review, develop, and maintain the C4S annexes and cyberspace operations sections for all operational plans involving USTRANSCOM and for all CAAs, in accordance with Government established timelines
Los Angeles, CA
Cyber Operations Integration Manager
Los Angeles, CA
Fadel-Jacobson
Los Angeles, CA
Cyber Operations Integration Manager
  • Develop approaches to ensure collection-to-alerting processes are working as designed
  • Develop & maintain a 'coverage heat map' to provide constant situational awareness of current status and limitations of data collection capabilities and visibility
  • Define enhancements to workflow management systems to drive efficiency and automation of analyst tasks
  • Identify and monitor key performance indicators to ensure controls are operating as designed and as efficiently as possible
  • Quality control and oversight of workflow and data collection to ensure metrics generated are based on high-quality inputs
  • Employs approved defense-in-depth principles along the kill chain to eliminate risk and vulnerabilities and improves security controls
  • Cultivates trust through personal and team relationships with senior management and key stakeholders inclusive of MD’s
present
Philadelphia, PA
Senior Director, Global Cyber Operations
Philadelphia, PA
Koch, Konopelski and Erdman
present
Philadelphia, PA
Senior Director, Global Cyber Operations
present
  • Expert in leading incident response and forensics data acquisition procedures and techniques
  • Present risks and propose countermeasures to senior technology executives
  • Demonstrated track record for building effective and efficient programs including developing the necessary processes
  • Attends and presents at networking and technology events with members of the information security associations and other groups of interest while being a proven champion for the highest workplace integrity, respect and diversity; committed to building a secure business environment while meeting the highest ethical standards
  • Develops a cybersecurity data analytics model to proactively detect potential suspicious activity indicative of potential threats to the business
  • Work with Security Architecture and Engineering teams to design and implement architecture to conduct statistical analysis of relevant data coming from IT infrastructure and business processes to draw meaningful conclusions from statistical trends
  • Leads a small team of cyber experts directed at hunt exercises across the entire corporation
Education Education
Bachelor’s Degree in Cybersecurity
Bachelor’s Degree in Cybersecurity
University of San Francisco
Bachelor’s Degree in Cybersecurity
Skills Skills
  • Strong attention to detail in conducting forensic analysis combined with an ability to accurately record full documentation in support of the investigation
  • Detailed knowledge of current international best practices in the high tech investigation and forensics arena
  • Knowledge of and experience working within the constraints of data privacy laws
  • Able to work under pressure in time critical situations
  • Able to work either independently or in a team to conduct forensic examinations
  • The ability to coordinate, work with and gain the trust of business stakeholders to achieve a desired objective
  • Able to articulate and visually present complex forensic investigation and analysis results
  • Memberships and participation in relevant professional associations
  • Ability to communicate with other industry forensic professionals to ensure solid partnerships with key external stakeholders to ensure that the forensic investigation process remains at a word class level
  • Ability to communicate effectively with business representatives in explaining forensic findings clearly and where necessary, in layman's terms
Create a Resume in Minutes

15 Cyber Operations resume templates

1

Cyber Operations Malware Analyst Resume Examples & Samples

  • Maintain site licenses for department/organization
  • Plan and implement network security, including building firewalls, applying cryptography to network applications, managing host security, file permissions, backup and disaster recovery plans, file system integrity, and adding and deleting users
  • Troubleshoot networks, systems, and applications to identify and correct malfunctions and other operational difficulties
  • Develop and conduct various training and instruction for system users on operating systems, relational databases, and other applications; assist users in maximizing use of networks and computing systems
  • Identify utilization patterns and their effect on operation/system availability and performance expectations
  • Anticipate communication and networking problems and implement preventive measures
  • Establish and perform maintenance programs following company and vendor standards
  • Ensure timely user notification of maintenance requirements and effects on system availability
  • Investigate, recommend and install enhancements and operating procedures that optimize network availability
2

Cyber Operations Resume Examples & Samples

  • Demonstrating a deep understanding of digital forensic skills, techniques and tools necessary for conducting live forensics on critical systems, and being able to produce detailed analysis of the root cause of any incidents
  • Use of host-based and network forensic capabilities to develop information regarding IOCs and TTPs for threat actors and malware, which can be shared amongst other internal teams
  • Leveraging practical experience to develop methodologies for proactive hunting of threat actors in the absence of alerting or rules-based appliances
  • 7 + years of experience working in the computer forensics, cybercrime investigation and other related fields with a combination of both public and private sector experience preferred
  • A proven track record in live forensics, log-file analysis, network forensics and malware reverse engineering
  • Experience with investigating large data compromise events as well as online banking fraud
  • Expert knowledge of networking protocols and packet analysis
  • Knowledge of computer forensic best practices and industry standard methodologies for investigating network threats
  • Experience working with industry standard tools (X-Ways, EnCase, Volatility, Rekall, Wireshark, SIFT etc.)
  • Ability to automate tasks using a scripting language (Python, Perl, Ruby, etc)
  • Bachelors Degree in Computer Science or other Technology related fields preferred
  • Able to work either independently or in a team to conduct forensic examinations
  • The ability to coordinate, work with and gain the trust of business stakeholders to achieve a desired objective
  • Able to articulate and visually present complex forensic investigation and analysis results
  • Detailed knowledge of current international best practices in the high tech investigation and forensics arena
  • Knowledge of and experience working within the constraints of data privacy laws
3

Senior Cyber Operations Specialist Resume Examples & Samples

  • Perform well controlled vulnerability exploitation/penetration testing on applications, network protocols, and databases
  • Perform security forensics on systems
  • Demonstrate advanced understanding of business processes, internal control risk management, IT controls and related standards
  • Actively participate in decision making with engagement management and seek to understand the broader impact of current decisions
  • Generate innovative ideas and challenge the status quo
  • Build and nurture positive working relationships with clients with the intention to exceed client expectations
  • Facilitate use of technology-based tools or methodologies to review, design and/or implement products and services Identify opportunities to improve engagement profitability
  • Excellent potential for 1) playing lead role in designated tasks of the project team in gathering, organizing and analyzing data; 2) making major contributions in assuring products/deliverables meet contract/work plan and; 3) strong potential for growth and acceptance of additional responsibilities
  • Advanced knowledge of offensive cyber operations, vulnerability assessments and penetration testing using manual testing techniques, scripts, commercial and open source tools
  • Experience in exploiting vulnerabilities
  • Ability to read, write and modify scripts
  • Experience with OWASP
  • Experience with wireless penetration testing
  • Experience with password cracking
  • Experience with security forensic analysis
  • Knowledge of computer control environments
4

Cyber Operations Specialist Resume Examples & Samples

  • Perform internal and external vulnerability assessments as well as penetration
  • Perform network reconnaissance
  • Understand complex business and information technology management processes
  • Execute advanced services and supervise staff in delivering basic services
  • Demonstrate a general knowledge of market trends, competitor activities, Deloitte & Touche products and service lines
  • Experience with network reconnaissance and open source intelligence (OSINT) gathering
  • Ability to read and analyze network packet captures
  • Experience with firewall, router, and switch security
  • Knowledge of security best practices: NIST, CIS, Cisco, Juniper, Checkpoint, Microsoft, Unix/Linux, etc Experience with incident response
  • Experience with virus analysis, malware analysis and honeypots
  • Knowledge of security auditing techniques
5

Cyber Operations Planning & Analysis SME Resume Examples & Samples

  • Through the use of network behavior trending and network stability, utilize statistical deviation level, obtained from tools processing the data, to establish identifiable network norms and deviations. Present results to analysts and operators and train them how to recognize changes in operational environment likely to cause mission success or failure
  • One to three (1-3) years’ experience in teaching technical material to small groups, developing technical training on basic system, network, and/or malware analysis
  • Have significant understanding of and practical experience with various Internet protocols (e.g., TCP/IP, DNS, SMTP, BGP)
6

Cyber Operations Lead Resume Examples & Samples

  • Candidates must possess strong interpersonal and organizational skills and have demonstrated effective written and verbal communication to ensure that staff members feel tied to department operations: technical strategy and capability development, development and performance review, mentoring, collaboration, team-building, and business development
  • Demonstrated customer relationships, a careful eye for technical review with attention to detail and schedule, analytical skills, and a collaborative nature are required
  • The successful candidate will have a technical knowledge of Network and Cyber Operations domain that can be applied to Air Force networks at multiple security levels as well as other MITRE customers
  • The technical domain knowledge applied to this MITRE group includes the application of service management best practices to improve network service delivery, understanding AF and USCYBERCOM needs for offensive and defensive cyber operational capabilities
  • Deep technical knowledge of at least two of the following: IT service management, network management capabilities, network security infrastructure, cyber operations (forensics, counter infiltration, network security evaluation, penetration testing), mission assurance, secure configuration
7

Cyber Operations Specialist Resume Examples & Samples

  • Conduct analysis, understanding collection operations on digital networks and legal authorities required by US Law and DoD policy
  • Assist in providing advice to tactical units in the planning of Cyber Warfare activities. Uses subject matter experience to advice units and operators on using information collected from a variety of computer network defense and SIGINT resources to identify, analyze, and report events that occur on digital networks
  • Assist and advise units to investigate computer security incidents in order to enable mitigation of network vulnerabilities. Facilitate advisory support concerning computer (network and infrastructure) analysis to enable Cyber and or Electronic Warfare effects in support of tactical unit requirements and provide leading edge Cyberspace and Electronic Warfare Operations support to an evolving Army Cyberspace Operations at the tactical level while Leveraging information derived from a variety of computer network defense resources
  • Identify, assess, report on adversary computer network capabilities and vulnerabilities that could pose a threat to maneuver units weapons, computers, communications, and operations
  • Conduct threat research and analysis, threat documentation, defining information requirements (IR) for operational advisors deployed globally
  • Facilitate the timely and accurate development of material and nonmaterial solutions to capability gaps derived from AWGs tactical observations by conducting DOTMLPF-P analysis
  • Write and maintain information papers, running estimates, quad charts, hasty DOTMLPF-P analysis, and other products on potential material and non-material solutions
  • Assist with creating operationally integrated CEWO test, evaluation and training environment and facilitate concept development to identify emerging threats and capabilities while possessing knowledge of a wide range of concepts, principles, practices and skill in applying this knowledge to difficult and complex work assignments
  • Leverage a comprehensive and detailed knowledge of Cyberspace and Electronic Warfare Operations (SIGINT/CNE/CYBER NET OPS/CYBER WARFARE) and skill in applying this knowledge to the development of material and nonmaterial new methods, approaches, or procedures
  • Conduct analysis to support DOTMLPF-P implications of identified gaps, new capabilities and requirements
  • Prepare, edit, and package professional information papers, quad charts and other documents in support of capability/solution development and emerging asymmetric threats and operational needs
  • Assist project managers and actively participate in Integrated Support Team (IST) meetings to facilitate solution development and provide continuity from project initiation through DOTMLPF-P integration
  • Support the development of solutions to capability gaps derived from AWG’s tactical observations and trends
  • Assist in conducting assessments and market research on emerging technologies and assist in developing plans to continuously optimize technology for improving future capabilities to defeat asymmetric threats
  • Draft training instruction materials for deploying and non-deploying units to train Soldiers in CEWO threats and CEWO defensive measures at the tactical level
  • Provide technical and operational expertise to assist development of realistic training and operational scenarios
8

Cyber Operations Specialist Resume Examples & Samples

  • Log analytics, hunting, and incident response
  • Some programming experience with C, C++, C#, Python, HTML, JavaScript, .NET
  • IDS monitoring and analysis, analyze network traffic, log analysis, prioritize and differentiate between potential intrusion attempts and false alarms
  • Experience on a Computer Incident Response Team (CIRT), Computer Emergency Response Team (CERT)
9

Cyber Operations Manager Resume Examples & Samples

  • A Bachelor’s Degree and a minimum of 5 years related experience required
  • Minimum 5 years of cybersecurity exercise and/or training experience required
  • Previous experience leading a cybersecurity function and/or planning operation
  • DHS Suitability at the SCI level
  • Microsoft Access and/or Database Management experience
10

Cyber Operations Program Manager Resume Examples & Samples

  • 10+ years of experience in a professional work environment
  • 3+ years of experience with SEIM architectures, including ArcSight and deployment in an infrastructure support role
  • Experience in at least one successful significant SEIM deployment, including ArcSight installation and tuning of SEIM connectors, loggers, and ESM, including one of the following CND architectures: system or application run-time performance profiling, system stress testing, or system or application load balancing
  • Experience as an enterprise systems engineer, enterprise network engineer, or operating systems programmer and with writing a script or program of moderate complexity
  • Knowledge of operating system internals, including memory and process management and networking internals for performance tuning, profiling, and load-balancing
  • Knowledge of modern system auditing architectures and components, including Windows Event Logs and Event Forwarding, UNIX and Linux audits and syslogs, network syslogs, netflow or variants, and regular expressions for taking data and translating it to security controls
  • Ability to demonstrate CCNA-level expertise in networking technologies
  • DoD 8570 Compliant Certified Ethical Hacker or Systems Security Certified Practitioner Certification
  • Experience with business development
  • Experience with writing a script or program in excess of 1000LOC in a language that possesses object-oriented capabilities, including Ruby, Python, Java, C, C++, or C#
  • Knowledge of network and information system auditing requirements
  • BS degree in a STEM field, including CS, Systems Engineering, or Computer Engineering preferred; MS degree in CS, Systems Engineering, or Computer Engineering a plus
11

Cyber Operations Enabling Analyst Resume Examples & Samples

  • Perform activities in compliance with DoD Cyber Security Risk Management Framework (RMF) and DoDI 8500.2, ICD 503 and other existing standards, guidance and policy
  • Perform cyberspace focused intelligence analysis by employing a variety of tools such as TAC, PROTON, or IC REACH
  • Perform activities that employ DoD and AF processes such as COLESIUM, CRATE, NSRP, CHROME and OSCAR is a multi-level environment
  • Perform activities to conduct CNDSP oversight and management
  • Perform duties/activities to support readiness reporting using SORTS or DRRS
12

Cyber Operations Resume Examples & Samples

  • Experience with analyzing and contributing to Joint and Army Cyberspace operations (CO), including Cyber Mission Force (CMF) organization, training, and operations
  • Experience with developing CONOPS, CONPLANs, OPORDs or OPLANs, fragmentary orders, execute orders, and other MDMP or JOPP planning products
  • Knowledge of the Army Cyberspace operations enterprise, including ARCYBER and Second Army, JFHQ-C, CMF, NETCOM, and CPB HQDA Staff and the Joint CO enterprise, including USSTRATCOM, USCYBERCOM, GCCs, FCCs, and JFHQ-DODIN
  • BA or BS degree or 5 years of experience with Cyberspace planning and execution
  • Knowledge of USSTRATCOM, US Cyberspace Command (USCYBERCOM), HQDA, and Joint Staff (JS) processes and procedures
13

Cyber Operations Planners Resume Examples & Samples

  • Acts as a full participant and provides substantive contributions to JPGs, OPG/OPTs developing and integrating cyber capabilities into plans, and in support of Combatant Commander planning efforts
  • Fully participates and provides substantive contributions to cyberspace operations planning activities coordination through the IJSTO to include Evaluation Request and Response Messages, the SAP, and the RAPCO
  • Serves as a technical expert of all planning methodologies and applications in all phases of military operations, providing analytical expertise and expert knowledge of operational design, Joint Operation Planning, and APEX
  • Conducts joint operation planning in support of combat and contingency operations without supervision
  • Provides technical expertise and participates in all phases and steps of the JOPP and APEX activities
  • Provides significant contribution to the development of cyberspace operations plans, contingency plans, concepts of operations, and orders
14

Cyber Operations SME Resume Examples & Samples

  • Keep abreast of COTS equipment and technological advances to recommend methods to enhance cyber operations, through modification and application of evolving technology
  • Advise and assist government personnel in preparing requirements documentation
  • Attend briefs, conferences, seminars, and conventions to keep abreast of advancements in the commercial cyber industry, Other Government Organizations, and academia. Author reports to share the knowledge gained with Government personnel
15

Cert Cyber Operations Resume Examples & Samples

  • At least two years proven experience in investigating and analyzing cyber security incidents
  • Background and practical experience in the areas of research, analysis and response to cyber- attack incidents
  • Background and practical experience with information security products with an emphasis to monitoring and detection systems
  • Background in SIEM systems and SOC in operation room
  • Background and practical experience with communication protocols
  • Background and practical experience with infrastructure System Windows \ Linux and familiarity with the services
  • Former intelligence communities, Air Force or TIKSHUV - an advantage
16

Cyber Operations Expert Resume Examples & Samples

  • Perform threat analyses based on expert knowledge on electronic warfare/intelligence systems and concepts
  • Develop methodologies and models for EW/IO system analysis
  • Provide SME guidance on latest technologies and threats in the EW/IO environment
  • Develop reports and briefings to be delivered to customer leadership
  • Defines, plans, designs, and evaluates information security systems
  • Assesses architecture and current hardware limitations, defines and designs system specifications, input/output processes and working parameters for hardware/software compatibility
  • Performs a variety of complex tasks associated with information security ranging from the design of security components to complex architectures
  • Supervises the work of other engineers performing a variety of information security tasks
  • Certification: Technical security certifications are preferred. CISSP, CISM, Security +
  • Knowledge of the SDLC Process a plus
17

Senior Director, Global Cyber Operations Resume Examples & Samples

  • Advanced knowledge of current security threats, techniques, and landscape, as well as a dedicated and self-driven desire to research current information security landscape
  • Ability to research, develop, and keep abreast of tools, techniques, and process improvements in support of security detection and analysis in accordance with current and emerging threat and attack vectors
  • Expert in leading incident response and forensics data acquisition procedures and techniques
  • Present risks and propose countermeasures to senior technology executives
  • Demonstrated track record for building effective and efficient programs including developing the necessary processes
  • Vast experience in negotiating global licensing deals
  • Excellent communications skills (verbal and written) are required
  • Attends and presents at networking and technology events with members of the information security associations and other groups of interest while being a proven champion for the highest workplace integrity, respect and diversity; committed to building a secure business environment while meeting the highest ethical standards
  • Develops a cybersecurity data analytics model to proactively detect potential suspicious activity indicative of potential threats to the business
  • Work with Security Architecture and Engineering teams to design and implement architecture to conduct statistical analysis of relevant data coming from IT infrastructure and business processes to draw meaningful conclusions from statistical trends
  • Leads a small team of cyber experts directed at hunt exercises across the entire corporation
  • Directs activities and creates programs associated with detecting and discovering hidden and persistent cyber threats
  • Maintain, develop, and continuously evaluate cyber threat intelligence sources (technical & non-technical) to increase effectiveness cyber threat information
  • Establishes, evaluates, and implements performance metrics for functions supervised
  • Bachelor's Degree or Masters Preferred
  • 10+ years related experience. 5+ years in a cyber management position
  • Certifications: CISSP; CISA, CISM or GIAC
  • LI-KG1
18

Cyber Operations Integrator Resume Examples & Samples

  • Coordinate the Engineering, Integration, and Administration Functions required to successfully deliver Cyber capabilities and services to the enterprise
  • Ensure that all aspects of the project activities are completed and delivered according to the implementation plan and schedule
  • Utilize your understanding of cyber-based threat techniques and solutions such as HBSS, FireEye, ATP, and IDS solutions
  • Understanding of commercial and DOD best practices, procedures to compare industry related events, exposures, and incidents with open source
  • Gathered intelligence research to determine threat capability and intent, and the potential impact of the threat on customer network architecture and operations
  • Conduct analysis of network infrastrucute to identify potential threat vectors and perimeter exposure
  • Support exploration and emerging technologies by arranging demonstrations, providing technical evaluations, and input to the customer’s roadmap development
  • Use your good interpersonal skills and ability to multi-task to operate in a high tempo environment
  • Must possess an active TS/SCI clearance with ability to obtain a Polygraph
  • Knowledge of COMM’s Change Request and Request For Change Processes
  • Willing to travel occasionally and may be required to provide support at contractor sites
  • Ability to work in a Government Environment as part of a multi-contractor team
  • Experience with providing Cyber gap analysis
  • Familiar with core network protocols such as SSH/SCP, FTP, SSL, ICPKI, VPN, SNMP, and SMTP
  • Masters Degree in Computer Science, Information Technology or related field with five years of experience or a Bachelors Degree in Computer Science, Information Technology or related field with at least nine years of experience
  • Applicants with no degree and significant customer experience may be considered
19

Cyber Operations Program Manager Resume Examples & Samples

  • Experience in at least one successful significant SEIM deployment, including ArcSight installation and tuning of SEIM connectors, loggers, and ESM, including one of the following CND architectures: system or application run
  • Time performance profiling, system stress testing, or system or application load balancing
  • Knowledge of operating system internals, including memory and process management and networking internals for performance tuning, profiling, and load
  • Balancing
  • Ability to demonstrate CCNA
  • Level expertise in networking technologies
  • Experience with writing a script or program in excess of 1000LOC in a language that possesses Object-oriented capabilities, including Ruby, Python, Java, C, C++, or C#
20

Cyber Operations Manager Resume Examples & Samples

  • Minimum of a Bachelor’s degree in related discipline and/or 14 years or more of professional experience in a project management related field
  • Successful candidate must be process oriented and have strong technical writing and verbal communication skills
  • Position requires the ability to work efficiently with little to no supervision while providing periodic updates to management in various forms of media to include oral and written
  • Must be able to obtain and maintain a TS/SCI clearance and DHS EOD
  • Position prefers a candidate with a current Top Secret SCI with DHS EOD
21

Cyber Operations Lead Resume Examples & Samples

  • 5+ years of experience in vulnerability tool configuration, deployment, engineering, and defining policies and procedures based on government best practices
  • Experience with leading security operations center (SOC), CSIRT, and Cyber operations teams
  • Experience with developing and maintaining policies and Standard Operating Procedures (SOPs) which define operational processes for vulnerability analysis, reporting, and event response or management
  • DoD 8571 Level III Cybersecurity Certification, including CISSP, CISA, or CISM
22

Cyber Operations Joint Planner Resume Examples & Samples

  • 5+ years of experience as a Joint Operation Planner
  • Knowledge of the JOPP, JOPES, and APEX planning formats and guidance
  • Completion of specialized education in military joint operation planning through the Joint Professional Military Education Phase II (JPME II) or JIOPC, or other similar military operation planning courses
23

Cyber Operations Engineer Resume Examples & Samples

  • Provide staff and users with assistance in solving computer related problems, such as malfunctions and program problems
  • Test and monitor computer systems, including coordinating the installation of computer programs and systems
  • Conduct root-cause analysis of noted system performance issues
  • Develop analytical and computational techniques and methodology for problem solutions
  • Prepare required documentation, including both program-level and user-level documentation
  • Apply, as appropriate, activity and data modeling, transaction flow analysis, internal control and risk analysis and modern business methods and performance measurement techniques
  • Experienced with the operations and maintenance (O&M) of Microsoft Windows Servers and Workstations
  • Experienced with the O&M of McAfee security products
  • Experience with malware identification, analysis, and event resolution
  • Previous experience with developing and modifying Standard Operating Procedures
24

Cyber Operations & Maintenance Site Lead Resume Examples & Samples

  • Experience as a senior security or systems engineer, administrator, or lead in a US federal government operating environment
  • Ability to interface with CISO–level agency executives on a regular basis and manage scope through enforcing processes and procedures
  • BA or BS degree in Cybersecurity, IT, or Technical Management
  • Experience with operating Cybersecurity tool consoles
  • Professional Certifications in Cybersecurity, including Security+ and CISSP, network administration or engineering, including Network+ and CCNA, or systems administration or engineering, such as RHSCA (E), and MSCE
25

Sso-cyber Operations Resume Examples & Samples

  • 12+ years of related work experience
  • 8+ years of demonstrated management experience and familiarity in providing shore-based Information Technology infrastructure operations and support functions to include logistics, facilities, finance and administration
  • 8+ years of demonstrated experience and familiarity providing technical services and analytic expertise in SCI/SAP program security management for DoD, DoN and/or NUWC, Keyport
  • 8+ years of managerial experience in cyber and management operations, which include staff briefings, program/project evaluation and project management assistance
26

Defensive Cyber Operations Resume Examples & Samples

  • Minimum eighteen (18) years+ of experience in the area of Cyberspace expertise
  • Minimum of Bachelor’s Degree in a technical or business discipline in the area of expertise from an accredited college or university or a Masters Degree and 16+ years of experience
  • Technical knowledge and understanding of the lifecycle of the network threats, attack vectors, methods of exploitation, computer network theory
  • Experience writing procedures, reports or other communications to document information about cybersecurity conditions on operational networks
  • Minimum of DOD 8140/DOD 8570 IASE Level II or Computer Network Defense (CND) Certification, DOD 8140/8570 CNDSP Analyst/Infrastructure Support/Incident Responder certified
  • Strong analytical and problem
27

Defensive Cyber Operations Site Lead Resume Examples & Samples

  • 10+ years of experience in the Cybersecurity and information assurance field with at least 4 of those years in the role of managing an operations center for security event and incident response across an enterprise
  • DoD IAM Level III Certification, including CISSP, CISM, or GSLC
  • CNDSP Managers Certifications, including CISSP-ISSMP or CISM
  • Experience with Cybersecurity analysis or incident response
  • Experience with leveraging all source intelligence analysis
28

Cyber Operations Integration Manager Resume Examples & Samples

  • Leads the design, analysis, development, and/or delivery of Cybersecurity products and services
  • Cultivates trust through personal and team relationships with senior management and key stakeholders inclusive of MD’s
  • Contributes to the definition of the strategic roadmap and its execution; inclusive of R&D of emerging industry trends
  • Employs approved defense-in-depth principles along the kill chain to eliminate risk and vulnerabilities and improves security controls
  • Promotes the identification of threats and risks to drive the selection of cost effective security controls
  • Oversees and directs incident response, risk reviews, and vulnerability assessments
  • Identify and monitor key performance indicators to ensure controls are operating as designed and as efficiently as possible
  • Articulate complex Cybersecurity problems and comfortable presenting solutions to Senior Management in business language while driving resolution
  • May include direct accountability for people management and financial budgeting
  • Embrace & promote cultural embodiment of group and firm
  • Define integrated content strategy to further cyber defenses in collaboration with both the cybersecurity technology and cybersecurity operations organizations
  • Drive collection of cybersecurity operations business and technology requirements, including alerting and analytics, to assist in furthering its mission
  • Assess impact of both the Firmwide Cybersecurity Program and BAU projects on Cybersecurity Operations
  • Develop & maintain a 'coverage heat map' to provide constant situational awareness of current status and limitations of data collection capabilities and visibility
  • Develop approaches to ensure collection-to-alerting processes are working as designed
  • Engage with Threat Intelligence to ensure threat use cases are mapped to collection-to-alerting execution
  • Engage with lines of business to ensure collection-to-alerting infrastructure is business aligned. Critical applications of the firm need to have the correct monitoring and data flows to cover all threat use cases relevant to those business systems
  • Quality control and oversight of workflow and data collection to ensure metrics generated are based on high-quality inputs
  • Define enhancements to workflow management systems to drive efficiency and automation of analyst tasks
  • Deep experienced knowledge of operations practices, risk management processes, principles, architectural requirements, and threats & vulnerabilities in the context of Cybersecurity as well as incident response handling methodologies as they apply
  • Well versed in national and international laws, regulations, policies, and ethics as they relate to Cybersecurity and specifically in the financial industry
  • Expertise in multiple disciplines, optimizes Cybersecurity products and services through the lifecycle
  • Recognized expert in their field, creating competitive advantage through the application of leading-edge technologies and methodologies
  • Understands Agile and is seen as an expert and leader in this area
  • Able to influence strategy at the group level, and firm level where applicable
  • Extensive industry experience in a large, mission-critical environment
  • Considerable cyber defense experience
  • Deep understanding of the Cyber analyst and analyst processes
  • Passion for Cybersecurity data and how to unlock its potential
  • Teaming attributes to work across organizational boundaries
  • Comfort working in a high pace environment with tight schedules, dynamic priorities and high visibility
29

Cyber Operations Specialist Resume Examples & Samples

  • Conducting defensive cyberspace operations
  • Conducting offensive cyberspace operations
  • Analyzing information
  • Self-discipline, confidence and intelligence
  • Physical and mental fitness to perform under pressure
  • Ability to make quick decisions
  • Capability to bear numerous responsibilities
30

Cyber Operations Specialist Resume Examples & Samples

  • 1+ years of experience with working in a client environment, including comprehension of how a 24x7 environment works when supporting commercial or government clients
  • Experience with network protection and monitoring tools like Sourcefire, Splunk, Checkpoint, Sidewinder, Virtual Firewalls, RSA Security Analytics for Network Forensics, Varonis Encase Enterprise, Cisco ISE, Imperva, RSA Archer, Skybox, Qualys, or FireEye Product Suite
  • Knowledge of Cyber threat capabilities and the technical capabilities used to defend networks and systems
  • Knowledge of network operating systems, SLAs, and service expertise
  • Ability to clearly and concisely document Cybersecurity incident details and escalate appropriately, as required
  • Ability to inform or brief senior officials, when appropriate
  • Knowledge of networking fundamentals
  • GCIA or GCIH Certification
31

Cyber Operations Engineer Resume Examples & Samples

  • Five (5) years or more experience as a Cyberspace Operations Engineer or related function with a Bachelor’s Degree from an accredited college or university in Computer Science, Cybersecurity, Computer Engineering, or related discipline, or three (3) years of experience with a Masters Degree
  • Minimum DoD 8140/DOD 8570 IAM Level II Certification (CAP, CASP, CISM, CISSP, GSCL)
  • Strong analytical and problem solving skill
32

Senior Cyber Operations Manager Resume Examples & Samples

  • Responsible for formulating and enforcing work standards, assigning schedules, reviewing work discrepancies, supervising personnel and communicating policies, purposes, and goals of the organization to subordinates
  • Directs project and technical management subordinates to include but not limited to: all financial management and administrative activities, such as budgeting, manpower and resource planning and financial reporting
  • Supervises and directs staff to evaluate management problems or contractual issues of existing procedures, processes, techniques, models, and/or systems in order to develop reports and/or recommended solutions
  • Candidate shall have 15+ years of extensive background working in DoD and with private industry and solid experience supporting all aspects of IT teams for large global operations
  • Excellent written and oral communications skills and leadership abilities and experience working as a client interface
  • Specialized skills, knowledge, and demonstrated ability to provide technical guidance and direction for Network Assurance of computer and network systems
  • Proven expertise in the management and control of schedules and matrixed resources, and demonstrated capability in managing vendors and contracts is a must. Network Operations, Administration & Maintenance, and Network Assurance with excellent risk management skills, experience with Performance Based Management (PBM), large IT transitions, and performance and scheduling tools (ie. MS Project), former DISA/DoD experience expertise in developing, deploying, and managing technology insertion, and professional and network services solutions to Defense clients' on a fee-for service or billable hour basis
  • Candidates shall have experience managing toward a strategic direction & vision while maintaining regular contact with tactical duties of a complex technical and functional projects or group of projects
  • Candidates shall have experience overseeing results of multi-functional project teams and administrative/operational leadership of a project within the program guidelines set by the customer
  • Candidates shall have demonstrated skills with monitoring projects to ensure work scope, schedule, and budget are well defined and maintained and setting policies for resource managers/supervisors to ensure all necessary reviews and approvals are received
  • Bachelors degree from an accredited college in a technical discipline, or equivalent experience/combined education, with 15 years or more of professional experience (with minimum of ten years being Management experience); or 10 years of professional experience (with minimum five years being Management experience) with a related Master degree
  • Requires PMP or equivalent certification
  • Must possess certifications satisfying the requirements for the Information Assurance Manager Level III (IAM III) category as specified in DoD Directive 8570 (CISSP, GSLC, or CISM are suitable)
33

Mgr Cyber Operations Center Resume Examples & Samples

  • Oversees the network defense operations within their organization
  • Responsible for producing guidance for their network environment (NE) or enclave, assisting with risk assessments and risk management for organizations within their NE or enclave
  • Responsible for managing the technical classifications within the organization
  • Establishes and refines operating procedures for operations center personnel
  • Manages the work of Tier I, Tier II, and Tier III incident analysis and response personnel, computer forensic specialists, security engineers, IA auditors, and others who tend the security operations defending the information systems and networks
  • Must possess a minimum of a BS degree and 9 yrs of related experience: Note: 4 additional years of related experience may be considered in lieu of the degree
  • Must possess a Current Secret Clearance
  • Must have experience working OCONUS
  • Must have a full, complete, and in-depth understanding of all aspects of Cyber Security as it relates to Network operations and management
  • Must have a working knowledge of US Army Regional Cyber Center operations
  • Must be a self-starter with the ability to lead others and provide vision to their team
  • Must possess the ability to deploy corporate values in support of the US Military mission
  • Must have the following Specialized Certifications
  • Five or more years experience managing teams in an Enterprise Cyber Operations Center
34

Manager, Cyber Operations Center Resume Examples & Samples

  • Defines, documents, and directs the enforcement of controls which clearly separate the privileges and abilities of users in three different multi-user computer environments: production, testing, and development
  • Evaluates proposed technological changes to the information security systems managed by Security Operations, identifying potential incompatibilities and other implementation issues prior to cut-over to production status
  • Must possess a minimum of a BS degree and a minimum of 9 yrs of related experience: Note: 4 additional years of related experience may be considered in lieu of the degree
  • Must have a full, complete, and in-depth understanding of all aspects of Cyber Operations as it relates to Systems (i.e. Microsoft, Unix, SAN, VMware, Disaster Recovery, Service Desk, etc)
  • Must have a proven positive experience in working with government customers
  • Must have demonstrate strong written and verbal communications skills
  • Must be fluent in all aspects of government and corporate communications media to include all MS Office products, MS Project
  • Must possess these Specialized Certifications
35

IT / Cyber Operations Specialist Resume Examples & Samples

  • 2+ years in a technical or functional lead role
  • Exposure to any of the following Analytics and Information Management competencies –Data Management and Architecture, Performance Management, Information Delivery and Advance Analytics
  • Must be able to obtain and maintain TS SCI with Poly
  • Experience as part of a large IT and/or Cyber-related operations center (e.g. military, law enforcement)
  • Experience with process robotics, analytics, C2 for a new warfighting domain, and operations center or structure, staffing and training
36

Senior Cyber Operations Engineer Resume Examples & Samples

  • Serve as a key contributor to Team CACI through technical and engineering leadership to our project team and customer stakeholders; providing technical subject matter expertise related to the design, development, integration, and sustainment of cyber tools and infrastructure
  • Coordinate closely with operational stakeholders to ensure technologies are fit-to-use, meet appropriate security protocols, and develop new and emerging capabilities to meet dynamic mission needs
  • Serve as the Technical Lead for identifying user requirements, assessing technical solutions, facilitating requirements-to-capabilities, ensuring successful integration of all tools, applications, and infrastructure, and developing the technical roadmap for the customers dynamic and growing mission space
  • Convey technical tools and technical tradecraft concepts to operational (non-technical) audience
  • Oversees the vulnerability assessments and penetration testing of applications, infrastructure, and system functionality; Responsible for the overall security assessment and coordinating with the Government stakeholders for authorization cycle and authority to operate status
  • Develops test plans and tests software security mechanisms for operational effectiveness and deployment readiness; develops test and evaluation reports
  • Experience within the IC or DoD applying cyber expertise, to include computer network operations, network management tools, cyber operations tools, and cyber tool development
  • Experience providing technical capabilities or tools to support IC or DoD missions in cyberspace
  • Fundamental knowledge of network security concepts, virtual networking, network infrastructure devices, wireless communication technologies, computer network exploitation attack and exploitation concepts, tradecraft, and tools
  • Fundamental knowledge of Agile development processes, systems engineering, and IC and DoD accreditation and authorization processes
  • Possesses a thorough understanding of software security and security technologies and concepts
  • Ability to work in a dynamic and challenging team environment
  • TS/SCI Security Clearance with Polygraph
  • Certifications such as Security+, Network+, CISSP, CEH are desired
  • Experience performing computer network exploitation development: embedded reverse engineering, vulnerability research, and application development for software and embedded systems with a focus on Offensive Cyber Operations (OCO) and Defensive Cyber Operations (DCO) activities
37

Senior Cyber Operations Specialist Resume Examples & Samples

  • Bachelors or equivalent and nine (9) years or more experience
  • Masters and seven (7) years or more experience
  • PhD or JD and four (4) years or more experience
  • Advanced knowledge of offensive cyber operations, vulnerability assessments and penetration testing using manual testing techniques, scripts and commercial and open source tools
38

Cyber Operations Manager Resume Examples & Samples

  • Manage a team of sales engineers positioned with each sales team (minimum of 1 sales engineer per sales team.)
  • Ensure operational metrics are maintained to ensure a high level of customer satisfaction
  • Creates a culture of continued learning where ongoing education on the cyber products, service solutions and key differentiators are routinely refreshed across the operations team
  • Serves as key communication point to our product partners. Identifies gaps, needs and potential additions in our cyber security line card
  • Serve as a corporate liaison across interdepartmental working groups when activating new products and services
  • Coordinate effective branch training, product launches and national roll out strategy
  • Articulate technology and product positioning to internal employees, business and technical users
  • Provide design strategy and scope recommendations to reflect customer need and appropriate regulatory / compliance standards
  • Project management skills and management of operational team of direct reports
  • Maintains a high level knowledge of industry trends, competitive landscape, and product / service differentiation
  • Knowledge and understanding of the basic requirements and regulations specific to different industries (HIPAA, PCI-DSS, SOX, etc.) as they relate to cyber security
  • Knowledge and familiarity with cyber security solutions (anti-virus, firewall, etc.) and threats (malware, ransomware, data breaches, etc.)
  • Knowledge of cloud-based on on-premise data storage, data governance, and disaster recovery solutions
  • Strong organizational skills and the ability to prioritize and maintain multiple priorities
  • Excellent written and oral communication skills. Active listener
  • Self-motivated and positive attitude
  • Skilled in discretion when using sensitive pricing and company information
  • Skilled in discretion when discussing and handling sensitive customer information
  • Ability to adapt to change in the work environment, delays or unexpected events, managing competing demands, changes in approach that benefit the customer
  • BA/BS in Computer Science, Cyber Security, Engineering, or a related field, or equivalent experience
  • Experience - 3–5 Years in managed services, managed security services preferred
  • Experience in either a sale or sales support role including customer engagement
  • Available for Travel up to 25%
39

Cyber Operations Afspc Mission Systems Cyber Operations Resume Examples & Samples

  • Employee shall recommend and help improve/repair existing processes and implementation procedures. Individual shall track completion of ordered tasks to subordinate units and respond to questions from subordinate units for assistance with task completion
  • Employee will assist units by coordinating with USSTRATCOM, USCYBERCOM, AFSPC, 624 OC (AFCYBER), and subordinate units to clarify, deconflict, and track tasks required in conducting cyberspace operations on space mission systems
  • This includes, but not limited to, issue resolution, anomaly analysis, topic research, report writing, and briefing
  • Employee will assist the customer by supporting routine and emergency Cyberspace Protection Team (CPT) requests
  • Employee will provide strategic theories, methodologies, and direction to customer in support of Computer Security Service Provider (CSSP) activities for space mission systems
  • Employee will coordinate with Special Program Offices (SPOs) and Project Management Offices (PMOs) to ensure network and system cyberspace defense elements are identified, tracked, and resolved
  • Employee will comply with all customer security requirements, participate in customer meetings, and provide training to junior analyst, as required. Employee will be required to notify the government of any suspected security incidents in a timely manner and assist in the investigation of incidents, as necessary
  • Strong oral and written communications skills, technical writing and briefing skills are required
  • Performance of duties after hours may be required
  • 4+ years of hands-on experience in cyberspace operations is a must
40

Cyber Operations Planning Analyst Resume Examples & Samples

  • The candidate shall support all phases of the Joint Operational Planning Process (JOPP) from the C4S, Cyberspace Operations, and cyberspace perspective
  • The candidate shall perform C4S and cyberspace operations planning for contingencies, crisis response, Continuity of Operations (COOP), and exercise events IAW the JOPP
  • The candidate shall perform all work under this subtask IAW current National and DoD cyber policy and doctrine (e.g., Joint Publication 3-12, Cyber Forces Concept of Employment (CFCOE), etc...)
  • The candidate shall analyze, develop, plan, and source C4S and cyberspace operations support to meet campaign, deliberate, contingency, crisis response, COOP, and exercise requirements. The candidate shall develop campaign, deliberate, contingency, crisis response, COOP, and exercise plans
  • The candidate shall work with the integration team to ensure new or change services (C4S capabilities) are incorporated into operational plans and CAAs
  • The candidate shall review, develop, and maintain the C4S annexes and cyberspace operations sections for all operational plans involving USTRANSCOM and for all CAAs, in accordance with Government established timelines
  • The candidate shall maintain a C4S exercise-planning schedule that identifies all exercise/training events utilizing USTRANSCOM C4S exercise and/or operational resources. The candidate shall be the interface between USTRANSCOM Operations and Plans Directorate (TCJ3), TCJ6, Joint Cyber Center, and TCC personnel to ensure proper scheduling of C4S resources and shall assist in resolving scheduling conflicts
  • The candidate shall assist in developing, organizing, and conducting tabletop exercises for campaign, deliberate, contingency, crisis response, and cyberspace operations scenarios and shall assist in addressing any follow-on action items
  • The candidate shall be the single focal point in TCJ6 for reviewing, commenting on, and coordinating USTRANSCOM orders
  • The candidate shall also assist in developing and writing USTRANSCOM orders
  • The candidate shall work closely with the IT Service Continuity Manager to assist in analyzing and identifying critical C4S infrastructure in support of the USTRANSCOM Critical Infrastructure Protection (CIP) program; En-Route Infrastructure Master Plan (ERIMP); Functional Mission Analysis-Cyber and Cyber Key Terrain; and in support of campaign, deliberate, contingency, crisis response, COOP, and exercise planning. The candidate shall assist in developing policy, doctrine, operating techniques, methodology, and procedures for USTRANSCOM cyberspace operations and C4S security, survivability, sustainability, interoperability, and readiness to support the transportation infrastructure and integration with the JDDE
  • The candidate shall support all phases of the Joint Training System to include analyzing mission requirements, developing training objectives and plans, executing/observing/evaluating training events, and conducting assessments against those training events. The candidate shall prepare the Joint Monthly Readiness Report (JMRR), the quarterly Joint Forces Readiness Report (JFRR), and perform an annual update of the Joint Mission Essential Task List (JMETL)
  • The candidate shall manage the TCJ6 Joint Mission Essential Tasks (JMETs), overseeing the monthly and quarterly JMET assessments and preparing the Directorate Quarterly Training Brief (QTB) associated with JMETs
  • The candidate shall provide guidance and training, as required, to directorate assessors in completing their JMET assessments in the Defense Readiness Reporting System (DRRS) and Joint Training Information Management System (JTIMS)
  • The candidate shall evaluate the C4S portion of the TCCs’ readiness reports to determine if sufficient information is provided and help compile the data into meaningful readiness indicators. The candidate shall assist in making recommendations to leadership and staff concerning JMET updates/changes and assessment criteria
  • The candidate shall assist in preparing for USTRANSCOM joint training meetings and completing any action items and after action reports as necessary. T
  • He candidate shall provide support using the Government provided automated software tools, when applicable, and IAW the suspense assigned by the Government or through the Government staffing process
  • The candidate shall be responsible for the USTRANSCOM TCJ6 Joint Lessons Learned Program (JLLP) and will be the TCJ6 Lessons Manager (LM)
  • The candidate shall provide lessons learned inputs to the USTRANSCOM Joint Lesson Manager, IAW with USTRANSCOMI 10-14, after contingency, exercise, and training events