Cyber Security Analyst Resume Samples

4.8 (49 votes) for Cyber Security Analyst Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the cyber security analyst job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume by selecting wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
AP
A Parisian
Aliyah
Parisian
761 Lindgren Corner
Houston
TX
+1 (555) 577 2756
761 Lindgren Corner
Houston
TX
Phone
p +1 (555) 577 2756
Experience Experience
05/2014 present
Boston, MA
Senior Cyber Security Analyst
Boston, MA
Senior Cyber Security Analyst
05/2014 present
Boston, MA
Senior Cyber Security Analyst
05/2014 present
  • Provide SME level input for APS
  • Working in a SIEM environment
  • Provide SME level input support for SC Administrators and HBSS Support Admin's
  • Provide ATO Certification & Accreditation artifacts for ACAS and CMRS capabilities
  • Provides incident remediation and prevention documentation
  • Provides performance metrics as necessary
  • Provides customer service that exceeds our customers’ expectations
08/2007 01/2014
Los Angeles, CA
Lead Cyber Security Analyst
Los Angeles, CA
Lead Cyber Security Analyst
08/2007 01/2014
Los Angeles, CA
Lead Cyber Security Analyst
08/2007 01/2014
  • Provide technical and operational leadership for cyber-security incident response
  • Assist with triage, prioritisation and response to cyber-security events and incidents
  • Act as technical incident lead during major cyber-security incidents
  • Continuously improve maturity and operational efficiency of the team – including methodologies, processes, detection use cases and response playbooks
  • Maintain an up-to-date knowledge of cyber threats
  • Drive continuous learning and knowledge sharing within the team
  • Work in a 'business hours + rostered on-call' environment
08/2003 02/2007
Phoenix, AZ
Cyber Security Analyst
Phoenix, AZ
Cyber Security Analyst
08/2003 02/2007
Phoenix, AZ
Cyber Security Analyst
08/2003 02/2007
  • Work with developers, system/network administrators, and other associates to ensure secure design, development, and implementation of applications and networks
  • Perform network traffic analysis using raw packet data, network flow, Intrusion Detection Systems (IDS), and custom sensor output from communication networks
  • Assist the Cyber Security Manager with the development of the IA related Procedures, and Work Instructions
  • Tracks performance metrics and provides timely updates to CSOC management
  • Develop, improve and help implement best practices for risk reduction across a broad range of enterprise applications, systems, networks and interfaces
  • Assists with the development of processes and procedures to improve incident response times, analysis of incidents, and overall SOC functions
  • Works with clients to implement system security measures, assists with computer security plans and documentation and provides technical guidance and training
Education Education
Bachelor’s Degree in Computer Science
Bachelor’s Degree in Computer Science
Adelphi University
Bachelor’s Degree in Computer Science
Skills Skills
  • Ability to compress knowledge to an easily understandable level for organization circulation
  • Knowledge of common application frameworks Strong attention to detail
  • Proven accountable, dependable and reliable work ethic
  • Demonstrable knowledge of application security, risk assessment, validation of security pen test results, and vulnerability resolution
  • Demonstrable knowledge of secure coding practices and the ability to conduct security assessments and analysis of applications
  • Ability to break down highly complex technical topics into language and diagrams understandable to a wide audience
  • Strong attention to detail
  • Strong knowledge of network protocols, network analysis tools, and network architecture
  • Excellent business analysis skills, including strong communication abilities
  • Ability to perform basic malware analysis to develop network based indicators and custom protocol decoders
Create a Resume in Minutes
1

Csfc Core Team Cyber Security Analyst Resume Examples & Samples

  • Provide cyber threat analysis to support development and research teams
  • Bachelor’s degree plus 3+ years or Master's degree plus 2+ years working in a cyber-security operations or information security space
  • 1+ years leading a cyber-threat analysis related function
  • Knowledge of three-tier Internet application architecture
  • Experience in packet capture analysis using tcpdump or wireshark
  • Knowledge of HTTP, IP, TCP/UDP, BGP, MPLS, and OSPF protocols
  • Should have an knowledge of the following areas
  • Denial of Service attacks
  • Malware analysis
  • Knowledge of Network Forensic tools and analysis techniques with a proven ability of identifying malicious traffic and infection vectors
  • Experience working with SAP BusinessObjects is a plus
  • Understanding of the tools such as, Splunk, ArcSight, Map Reduce, and the sources available to conduct cyber security alerting, analysis, and enhanced situational awareness
2

Csfc Core Team Senior Cyber Security Analyst Resume Examples & Samples

  • Work with Security Operation teams to collect data for incident metrics reporting
  • Bachelor’s degree or equivalent work experience. Masters is a plus
  • 5+ years working in a cyber-security operations or information security space
  • 3+ years leading a cyber-threat analysis related function
  • Working experience in analyzing Netflow, DNS, Proxy and web access logs
  • Extensive experience in packet capture analysis using tcpdump or wireshark
  • Should have an extensive knowledge of the following areas Cyber crime
  • Computer Forensics
  • Network monitoring, IDS/IPS, Firewalls, Proxy servers, load balancers
  • Must be a self-starter, self-motivated and able to work independently with little oversight
  • Significant experience working with SAP BusinessObjects
  • Strong understanding of the tools such as, Splunk, ArcSight, Map Reduce, and the sources available to conduct cyber security alerting, analysis, and enhanced situational awareness
3

Cyber Security Analyst Resume Examples & Samples

  • 3 years of experience as an information assurance analyst on DoD projects or systems of similar scope
  • 3 years of experience in working with the DoD IA driving policies, including DoD 8510.01 (DIACAP), DoDI 8500 series (Information Assurance), or CNSSI 1253
  • Knowledge of existing USSTRATCOM systems and missions
  • Ability to analyze system requirements and develop technical solutions
  • Experience with establishing security policies and procedures
  • Experience with developing training and instructional documentation
  • Knowledge of command and control and communications systems
4

Cyber Security Analyst, Senior Resume Examples & Samples

  • 10 years of experience with information assurance, including information assurance system evaluations, system security penetration testing, security information management, or security event management
  • Experience with testing tools, including Nessus, Metasploit, nmap, BurpSuite, Kismet, Nipper, Wireshark, or BackTrack
  • Experience with configuring, administering, and troubleshooting operating systems, including UNIX, Linux, Windows, iOS, or Android 6
  • Experience with network vulnerability assessments and penetration testing
  • Experience with analyzing results, writing assessments, and test reports
  • Experience with Cyber forensics a plus
  • Experience with the project management framework
  • Knowledge of databases, applications, and Web server design and implementation
  • Possession of excellent team leadership, development, and client relationship skills
  • BS degree in Information Assurance, CS, or Computer Engineering
  • Certified Information Systems Security Professional (CISSP), CISM, or other recognized technical Cyber Security Certification preferred
5

Cyber Security Analyst, Mid Resume Examples & Samples

  • Under direct supervision, provides technical support to the organization's internal users of computer applications and client hardware
  • Answers routine questions regarding system procedures, online transactions, systems status and downtime procedures
  • Assists network services, software systems engineering and/or application development in order to restore service and/or identify problems
  • Maintains a troubleshooting tracking log ensuring timely resolution of problems
6

Cyber Security Analyst, Senior Resume Examples & Samples

  • Experience with configuration and management of network systems, network design, and integration of security technologies
  • Experience with identifying security flaws and misconfiguration from multiple data sources using trend analysis and automated and manual test results
  • Experience with analyzing results and writing assessments and test reports
  • Ability to communicate in Arabic
  • BS degree in Information Assurance, CS, IT, or Computer Engineering
  • Experience with Cyber forensics
  • Ability to demonstrate industry recognition and publication a plus
  • MA or MS degree in Cyber Security, Information Security, or CS
7

Cyber Security Analyst, Mid Resume Examples & Samples

  • 5+ years of experience I working with computer network devices and operating systems
  • 4+ years of experience with information assurance and security practices
  • 3+ years of experience with writing SSPs or other security related policy
  • 3+ years of experience with DoD 8500.1, DoD 8500.2, DoD 8510.01, or NIST 800-53
  • 1+ years of experience with resolving security findings discovered on network devices and OS
  • 1+ year of experience with C&A package review for CA or DAA making risk-based recommendations
  • CISSP, CISM, or GSLC Certification, including DoD 8570 IAM Level III
  • Experience with FISMA reporting and spreadsheet and DB coding
  • Knowledge of DoD acquisition policy
  • Knowledge of Service Orientated Architecture (SOA)
  • MS degree in a related field
8

IT Cyber Security Analyst Resume Examples & Samples

  • Performing competitive analyses and maintain knowledge of emerging technologies in both the automotive and consumer electronics field
  • Actively work with Security Partners, Research, Government, Advanced Engineering for information sharing, joint project development, and reporting
  • Scope includes all portions of the connected vehicle ecosystem from vehicle systems, backend cloud infrastructure, to mobile platforms
  • Some travel expected to cover critical Cyber Security Conferences or meet with home base in Dearborn
9

Cyber Security Analyst Resume Examples & Samples

  • Monitor global NIDS, Firewall, and log correlation tools for potential threats Initiate escalation procedure to counteract potential threats/vulnerabilities Provide Incident remediation and prevention documentation Document and conform to processes related to security monitoring Provide performance metrics as necessary Provide customer service that exceeds our customers’ expectations
  • Research and identify key indicators of malicious activities on the network and end user workstations
  • 4 years of hands-on experience in a security operations center (SOC) environment Strong command of Linux systems administration
  • Hands on experience with tools such as Wireshark, Hex Rays, IDA Pro or Hex workshop. Experienced in computer security incident response activities Advanced capability to analyze malware, including: worms, viruses, trojans, rootkits and bots Experience with network monitoring and packet analysis tools Strong understanding of TCP/IP An attitude of providing FANATICAL support to the end users! Strong analytical / problem solving skills Strong decision making / risk assessment capability
  • GCIH certification/and/or penetration testing experience is highly desired/
  • We are offering a competitive hourly rate plus a bonus structure and shift differential for qualfied hours!* **
10

Cyber Security Analyst Resume Examples & Samples

  • Manage & triage daily cases presented in the Brand Protector application tools
  • Prepare case studies for internal Under Review and Legal meetings pertaining to infringements that you have researched
  • Issue and continuously follow-up on Cease and Desist Notifications to infringers for timely case closure
  • Maintain a thorough knowledge of the types of brand infringements and the proper disposition processes available to you as a Brand Protection Analyst for JPMorgan Chase
  • Track and monitor the Brand Protection caseload through various reporting methods available to you
  • Perform periodic quality assurance checks of Brand Protection databases
  • Perform research regarding new technologies used by the firm and brief entire team
  • Assist in additional research and executing additional functions within the Cyber Security IT Risk group as required
  • B.A. or B.S. preferred
  • 2 years of financial services, risk management, technology, digital services or legalfacing experience
  • Basic understanding of Cyber Security, Information Security and Risk Management
  • Technology experience or technology risk background is a plus
  • Strong PC skills, including MS suite are a must (MS Access a plus)
  • Web analytics and web design knowledge are a plus
  • Attention to detail and strong organizational skills required
  • Goal oriented, independent thinker, self-starter
  • Excellent interpersonal communication skills (written and verbal) are a must
  • Demonstrate an ability to work effectively in a large complex corporate environment
  • Demonstrated ability to work independently on projects and produce required results in a time-sensitive environment
11

Senior Cyber Security Analyst Resume Examples & Samples

  • Carry out triage of security events and elevate their priority to incident when required
  • Review and remediation of data loss prevention incidents and issues
  • Advanced capability to analyse malware, including: worms, viruses, trojans, rootkits and bots
  • Provide guidance and mentoring to new and existing members of the team
  • Typically a Bachelor’s degree or suitable industry experience
  • Strong command of operating systems administration – Windows, LINUX and UNIX
  • Good understanding of common protocols and services such as FTP, HTTP, SMB, LDAP and SSH
  • Strong time management skills with the ability to multi-task
  • Strong decision making and risk assessment capability
  • Ability to multitask and be flexible, in an environment of rapid change
12

Cyber Security Analyst Resume Examples & Samples

  • Day-to-day usage of industry standard security tools (SIEM,IDS, IPS, traffic analyst, etc.)
  • Research and identify key indicators of malicious activities on the network and end-user workstations
  • Initiate the escalation procedure to counteract potential threats/vulnerabilities
  • Provide incident remediation and prevention documentation
  • Provide performance metrics as necessary
  • Provide subject matter expertise on security projects and ensure security controls are implemented according to defined policies
  • Participate in business security awareness and training initiatives
  • Bachelor’s degree or suitable industry experience
  • Strong understanding of TCP/IP
  • Experience of vulnerabilities, exploits and network attacks
  • Experience of Packet analysis tools
  • Hands-on experience in a security operations center (SOC) environment
  • Security certifications (as provided by SANS, ISC2, ISACA, E-Council, etc.)
13

Senior Cyber Security Analyst Resume Examples & Samples

  • Lead CSFC EMEA cyber threat analysis, alerting, and reporting based on intelligence and information gathered from both internal and external sources globally
  • Drive cyber security research projects using multiple data sources, perform analysis and disseminate findings to both technical and non-technical consumers throughout the Citi enterprise
  • Work daily with different Information Security counterparts to gather intelligence and data for analysis and to formulate changes in technology, policy or procedure that may reduce the risk to information security with an emphasis in the EMEA region
  • Actively monitor and research cyber threats with a direct or indirect impact to the Citi brand, regional business operations, technology infrastructure and client trust
  • Supervise daily interactions with the Cyber Security Fusion Center and collaborate with Cyber Intelligence Center staff to fuse threat intelligence with risk, impact, mitigation and recovery assessments
  • Maintain a routine business integration with the CSFC leaders in Warren, NJ, USA and Irving, TX, USA
  • Bachelor’s degree and significant equivalent work experience
  • Proven ability to review information to determine its significance, validate its accuracy and assess its reliability to technical and non-technical audiences
  • Expertise or significant working knowledge several of the following areas
14

Cyber Security Analyst Resume Examples & Samples

  • Perform CSFC EMEA cyber threat analysis, alerting, and reporting based on intelligence and information gathered from both internal and external sources globally
  • Conduct research using multiple data sources, perform analysis and disseminate findings to both technical and non-technical consumers throughout the Citi enterprise
  • Work daily with different Information Security teams to gather intelligence and data for analysis and to formulate changes in technology, policy or procedure that may reduce the risk to information security with an emphasis in the EMEA region
  • Interact daily with the Cyber Security Fusion Center and collaborate with Cyber Intelligence Center staff to fuse threat intelligence with risk, impact, mitigation and recovery assessments
  • Maintain a routine business integration with the CSFC teams in Warren, NJ, USA and Irving, TX, USA
  • 3+ years working in a cyber-security operations or information security space
  • Exceptional written and verbal communication and presentation skills to internal and external customers, ability to speak and write in multiple languages a plus
  • Should have expertise or working knowledge in the following areas
15

Csirt Cyber Security Analyst Resume Examples & Samples

  • One or more of the following technical certifications: GIAC Certified Incident Handler (GCIH), GIAC Certified Forensic Analyst, EnCE or equivalent certification in these areas
  • Strong technical expertise in
  • Ability to document and explain technical details clearly and concisely to both technical peers and senior (non technical) business management
  • Ability to manage multiple projects under tight deadlines
  • Solid attention to details
  • Ability to think “outside the box” and identify opportunities to improve current processes
16

Cyber Security Analyst Resume Examples & Samples

  • Bachelor's Degree with 2-3 years of Information Security experience or an Associate's Degree with equivalent technical certifications
  • Strong technical skills across cyber security technologies including; scripting skills and an understanding of network traffic flows, and vulnerability management
  • Computer literacy with proficiency in Windows Server, Windows 7, and Microsoft Office Suite
  • Ability to effectively interact with customers, support staff, outside vendors and various levels of management
  • Demonstrate ability to work in teams in a manner consistent with Company objectives
  • Intrusion detection/prevention systems, web application/database firewall systems experience
17

Cyber Security Analyst Resume Examples & Samples

  • Working knowledge of security related technologies and practices, including: authentication and authorization, endpoint protection, encryption, segmentation strategies, vulnerability management, secure remote access, and firewalls
  • Holds one of the following certifications: CISSP, CISM, EnCE, GCIH, GCIA, GREM, GCFA, GPEN, SSCP, CCFP, or equivalent
  • Experience with regulatory compliance issues such as: FFIEC, OFCC, SEC and Federal Reserve plus: SOX, GLBA and PCI
18

Senior Cyber Security Analyst Resume Examples & Samples

  • Provides incident remediation and prevention documentation
  • Provide training and mentorship to lower-level security analysts
  • Malware Detection
  • Network Monitoring Tools
  • Email Security
  • Bachelor’s degree in Computer Science or equivalent combination of education and experience required
  • GCIA, GCIH required. GCFE, CISSP, Security +, Network +, CEH, RHCA, RHCE, MSA, MCP, or MCSE preferred
  • Experience creating Snort signatures required
19

RIC Palo Alto IT Cyber Security Analyst Resume Examples & Samples

  • Research and develop concepts around related Cyber Security incidents reported in industry and research organizations.Lead technology and feature Security projects delivering to internal customers.Development and maintenance of tools (e.g. Fuzzing) for use in internal vehicle penetration testing.Threat Analysis and Risk Assessment tool/modeling against connected vehicle concepts.Development of security specifications and tools as needed for connected vehicle features and testing
  • 5+ years of experience in IT, product development, or research with 1-2 years experience in a security related field
  • The ideal candidate will have exceptional planning, research and investigative skills, and the ability to work within the framework of security, privacy, usability, and reliability constraints in the automotive environment
  • The candidate will contain a working knowledge of industry IT security and controls efforts as well as embedded security tools and processes (ideally automotive)
  • We collaborate extensively within Ford and with external partners, thus we require exceptional communication and collaborative skills
  • Strong knowledge of Security and Controls, CPMM, Supplier Relationship and Contracts Management Experience
  • Strong ability to work independently, work on all aspects of a project, take follow-up on project deliverables, go above and beyond the task at hand
  • Ability to develop and maintain technical documentation as required for projects at hand
  • Ability to influence teams towards a desired outcome with varying degree of authority requiring strong facilitation, active listening, and team-building skills
  • General understanding of CAN network, firewalls and primary/secondary bootloader architecture within microcontrollers
  • Knowledge with cryptographic algorithms and protocols
  • Knowledge with PKI management
  • Knowledge of industry standard security protocols, tools, processes
  • Experience with Secure Coding Techniques
  • Experience with embedded hardware and software and coding experience with one or more platforms (see below)
  • Knowledge of digital communication and familiarity with communication technologies such as TCP/IP, Ethernet, Bluetooth, WiFi, DSRC and CAN
  • Mobile web/in-vehicle application development
  • Embedded experience (Windows/QNX/Linux/Microcontroller) is a plus
  • Strong programming experience (C/C++/CS/Python/Lua/Qt)
  • Azure Cloud Security, general Web services / object oriented development experience are a plus ( C++, CS, Qt, Lua, Perl/Python )
  • Knowledge with common programming frameworks such as .NET, Android SDK, and/or iOS SDK
  • Familiarity with in-vehicle network architecture, modules, and protocols (CAN etc.) are a plus
  • Electrical or System Engineering background will be a plus for module-related work, but not required
  • Mobile Phone Application Programming, Bluetooth, Networking familiarity a plus, but not required
  • Penetration testing and tools experience is a plus
  • PKI experience on medium to large deployments is a plus
20

Senior Cyber Security Analyst Resume Examples & Samples

  • 5 years of Security Analysis (SOC) experience with significant previous Information Technology experience with network technologies, specifically TCP/IP, and related network tools is required
  • Knowledge of common network tools (e.g., ping, traceroute, nslookup)
  • Knowledge of Windows command line (e.g., ipconfig, netstat, dir, nbtstat)
  • Comprehensive knowledge of network design, defense-in-depth principles and network security architecture
  • Experience in host forensics
21

Cyber Security Analyst Resume Examples & Samples

  • 3-5 years of IT experience
  • 1-3 years of security-related experience
  • Strong knowledge of network protocols, network analysis tools, and network architecture
  • Ability to analyze raw PCAP data to validate security events, interpret network traffic, and extract indicators
  • Ability to perform basic malware analysis to develop network based indicators and custom protocol decoders
  • Knowledge of common attacker tools, malware families, and known attacker group TTPs
  • Ability to write tools and automate tasks in scripting languages such as Python
  • Experience hunting for unknown threats, as well as tracking existing campaigns and adversaries to see how they evolve over time
  • Experience writing snort/suricata/YARA signatures
22

Cyber Security Analyst Resume Examples & Samples

  • Monitor for intrusions and insider threats
  • Determine severity and impact of Cyber Threat scenarios
  • Perform second-level analysis, remediation and escalations
  • Assist engineers in developing cyber defense tools and procedures
  • Identify and model new threat scenarios
  • Support investigations of wrong doing by internal or contracted staff
  • Flexibility for possible after hours escalations from our first tier Cyber Security Operations Center
  • Possible participation in the ongoing development and enhancement of our Insider Threat Program and security metrics program
  • Collaborate directly with peers outside of security team to resolve urgent matters in a constructive and thoughtful manner
  • 3+ years experience within a Security Operations Center (SOC) resolving events related to malicious intrusion, data loss and/or user behavior anomalies
  • Knowledge of malware propagation, behavior, and how machines get infected
  • Strong technical understanding of
23

Senior SOC Cyber Security Analyst Resume Examples & Samples

  • Comprehensive Knowledge of TCP/IP, IPv6, UNIX, Windows, HTTP
  • Ability to conduct packet analysis and decode
  • Knowledge of intrusion detection methodologies and techniques for detecting host and network-based intrusions via intrusion detection technologies
24

Cyber Security Analyst Resume Examples & Samples

  • Monitor individual workstations and laptop activity to identify any attacker or event that violates current policy. Document all activity violating policy, assign criticality and escalate to the end user based on the severity of the occurrence
  • Identify new vulnerabilities in TCF’s environment using internal assessments defined by TCF policy. Deliver incident reports documenting the new vulnerabilities weekly to the appropriate avenues based on severity
  • Update TCF employees’ outdated antivirus versions, and monitor the aging of antivirus definitions on TCF network endpoints
  • 2 year college degree or equivalent industry experience
  • 1 year of experience either working in IT Security or Information Technology
  • Familiarity with network security applications, protocols, and associated hardware
25

Cyber Security Analyst Resume Examples & Samples

  • Monitors global NIDS, Firewall, and log correlation tools for potential threats
  • Initiates escalation procedure to counteract potential threats/vulnerabilities
  • Highly proficient in intrusion analysis and incident response
  • Ability to handle high-pressure situations in a productive and professional manner
  • Strong time management, skills with the ability to multitask
  • Packet and log analysis
  • General knowledge and experience and expertise with ethical hacking, firewall and intrusion detection/prevention technologies, secure coding practices, and threat modeling
  • Web Security Gateway
26

Cyber Security Analyst Resume Examples & Samples

  • 1+ year of previous Cyber Security experience
  • Working knowledge of Sharepoint
  • Investment Bank / Compliance / Regulatory Reporting background
27

Cyber Security Analyst Resume Examples & Samples

  • Evaluating assigned IT areas for cyber security risks
  • Identify risk areas and work with team for possible resolutions
  • Implement and test safeguards implemented to ensure functioning as designed
  • Report to top management findings and new design requirements
  • Degree in technical field
  • Experience with large data platforms
  • Minimum of 3 years experience in network information security coupled with mobile applications
  • Certifications in IT Security a major plus
28

Lead Cyber Security Analyst Resume Examples & Samples

  • Assist program sponsor in planning the delivery of the overall program and its supporting strategic projects and run initiatives to achieve program strategic goals and demonstrated success against goals
  • Assist in the definition of projects scope and objectives, involving all relevant stakeholders and ensuring technical feasibility
  • Providing subject matter expertise to the supporting program team and program sponsor to support the success of project/initiative delivery against established scope
  • Report and escalate to executive management by forming supportive relationships to ensure ongoing visibility of project success and progression toward strategic goals
  • Facilitate development of new initiatives to support the strategic direction of the program and establish support through the project budget planning cycle
  • Provide technical subject matter expertise to support the execution of the program portfolio of projects
  • Provide support to Cybersecurity Program Management Office and Strategy team to connect overall Cybersecurity strategy, service management and Program Management while fostering an environment of continuous improvement
  • Bachelor’s Degree or equivalent in computer science, management information systems or equivalent discipline from an accredited college or university required
  • Minimum 5-7 years’ of overall experience in Information Technology
  • Minimum 5-7 years’ experience in IT Risk Management, Information
  • Minimum 3 years’ experience with Cyber security SIEM tools
  • Security Consulting, Information Security
  • Demonstrated experience in understanding of Cyber Analytics in support of Cybersecurity programs such as Insider Threat/Cyber Investigations/Identity & Access Management
  • Working knowledge and understanding of project management processes
  • Proven success in leading project/programs driving execution based on strategic direction
  • Master’s Degree or equivalent in computer science, management information systems or equivalent discipline from an accredited college or university
  • Strong process orientation and understanding of technology and financial services
  • Proficient use of data analytics tools
29

Cyber Security Analyst Resume Examples & Samples

  • Monitor individual workstations and laptop activity to identify any attacker or event that violates current policy. Document all activity violating policy, and assign criticality based on the severity of the occurrence
  • Identify new vulnerabilities in TCF’s environment using internal assessments and industry standards. Deliver incident reports documenting the new vulnerabilities weekly to the appropriate avenues based on severity
  • Monitor the TCF enterprise network for malicious activity through the Endpoint Protection tool. Identify any trends in malicious network behavior, such as an increase in attacks or a new virus emerging. Utilize daily automatic reports and create manual reports to send to the appropriate management team
  • Complete analysis of reported vulnerability data on a daily basis using internal tools and vendor partner tools. Monitor data for cyber attacks on TCF’s network
  • Document and investigate more complex Security incidents as defined by TCF policy. Escalate incident reports to IT management in order to maintain compliance with security related regulatory requirements
  • Maintain current knowledge of industry best practices and regulations such as Community Emergency Response Teams (CERT) and SysAdmin, Audit, Network and Security (SANS)
  • 4 year college degree or equivalent industry experience
  • 2-3 years of experience either working in IT Security or Information Technology
  • Experience or knowledge of how to conduct intelligence analysis
  • Excellent written and verbal communication skills, with an emphasis on relationship building
30

Cyber Security Analyst Resume Examples & Samples

  • Scoping of penetration tests, use cases, and timing
  • Development of ‘rules of engagement’ with partners
  • Performing ethical hacking tests within explicit bounds
  • Capture test findings, communicate repeatable process steps
  • Develop and communicate recommendations on findings remediation
  • Creation of testing reports and delivery of results to management
  • Continuous improvement of testing processes and methodologies
  • Coordinate and function as an SME to third-party penetration testing efforts, as needed
  • Bachelor’s Degree in Computer Science or other field of study
  • 2+ years of penetration testing experience
  • Master's Degree in Computer Science
  • 1-5+ years of experience and knowledge of ISO27001
  • CEH - Certified Ethical Hacker Certification
  • Deep experience in IP based networking
  • Strong encryption background
  • Broad Operating System knowledge
  • Previous Security Experience with Cellular Carriers
  • Demonstrable Threat Modeling experience
  • This role will span both traditional IP based infrastructure as well as in-vehicle technologies - working knowledge of vehicle-based security protocols is a big plus
  • CISSP - Certification
31

Senior Information & Cyber Security Analyst Resume Examples & Samples

  • Establish, implement, monitor, review and improve a suitable set of controls for the prevention of threats to the security of our information assets, ensuring the business objectives of the organization
  • Act as security relationship manager to our Digital Technology team. Providing them support, advice and direction related to the security of our digital assets
  • Assist with the operation of controls operated by information security
  • Ensure all staff are: able to identify and respond to threats, aware of the threats we face and practiced in responding to cyber events
  • Oversees one of the BCIS workstreams. The Information and Cyber Security Analyst will be expected to lead one workstream and participate in all facets of the BCIS programme
  • Assist with the gathering and dissemination of security intelligence
  • Assist with the development and testing of effective IT recovery plans ensuring the availability of critical applications
  • Assist with the development and testing of effective business continuity plans
  • Assist with the development and testing of crisis management plans
  • Participate in and / or lead as required incident response, from discovery through to recovery, lessons learned and remediation
  • Analyze IT infrastructure and operations and help to design controls to ensure the security of corporate information assets
  • Help business units understand and establish acceptable levels of risk, reducing the potential for incidents that pose security threats
  • Help business application teams integrate sound security components into their systems
  • Protect data privacy and information integrity in response to business needs and compliance requirements
  • University degree (or equivalent). Math, science or computer science preferred
  • Proven experience in an information security role
  • Excellent, demonstrable, customer service skills
  • Excellent communication (spoken and written) and interpersonal skills
  • Good influencing skills. Able to deal with all levels of the organization
  • Able to take the initiative. Positive ‘can do’ attitude and a determination to succeed
  • Diligent, able to work to deadlines while managing multiple priorities
  • Inquisitive, able to solve problems and come up with solutions
  • Curious, innovative, willing to challenge conventional approaches and test new ones
32

Cyber Security Analyst Resume Examples & Samples

  • Managing and performing on teams that conduct analyses related to forensic investigations, cybercrimes, and/or cyberattacks; and supporting various and dynamic security analysis needs of the team
  • Analyzing security logs, monitoring logs, firewall logs, intrusion prevention system logs, and network- and core-related logs
  • Analyzing and developing baselines for all related risks from Security Analytics and/or other log management tools, emphasizing security analysis of critical system logs and network protocols
  • Managing analyses of logs, traffic flows etc. to identify malicious activity, design rules that trigger response to malicious activity, analyzing the findings on malicious activity and preparing reports; developing response procedures for addressing potential security threats and driving the on-boarding of new logs into Security Analytics
  • Utilizing cyber forensics knowledge to analyze and draft findings, articulating this information to various internal and external audiences and levels
  • Utilizing Netwitness and security analytics, including Security Information and Event Management (SIEM) products such as Q1Labs, ArcSight, and Nitro
  • Conducting analyses of evidence of network penetrations and data theft using firewalls, active directory, Windows operating systems, intrusion detection/prevention systems, proxy servers, breach indicators, and log aggregation technology
  • Utilizing creative problem-solving and written and oral communication skills to articulate, explain, and deliver technical concepts and issues to non-technical business leadership; researching pertinent technical matters with an attention to detail, and innovating new solutions and processes, incorporating new technologies, when warranted
  • Exhibiting capabilities to multitask, perform and deliver results as both part of a team and independently
  • Adapting to ever-changing schedules and work assignments, including the ability and willingness to work extended hours and conduct business travel domestically and/or globally; and,
  • Willingness and motivation in taking the initiative for individual and team professional growth and development
33

Cyber Security Analyst Resume Examples & Samples

  • Network Analysis, Host Forensics Analysis, Malware Analysis
  • SIEM Experience
  • Use of threat intelligence sources
  • Experience with Forensics toold (enCase, MIR, CarbonBlack etc.)
  • Splunk experience (OR other big data platforms)
  • Scripting/software development skills
  • Working knowledge of common intrusion analysis models
34

Cyber Security Analyst Resume Examples & Samples

  • Formal incident response efforts - coordinated responses to major intrusions or exploits
  • Provide consistent and repeatable methods to resolve security incidents
  • Allow management to envision additional threats and incorporate improvement activities
  • Daily analysis of multiple data sources (host and network activity) with the ability to determine if a threat applies to Ford or not
  • 2+ years’ professional experience in an IT related field
  • 3+ years’ experience with infrastructure development or operations
  • Experience with reviewing system language log files, data correlation, and analysis (i.e. firewall, network flow, IDS, system logs)
  • In depth knowledge of servers, clients, various computer peripherals, network and/or Storage technologies
  • Strong deductive reasoning, critical thinking, problem solving, and prioritization skills
  • Customer service including the resolution of escalations, incident handling, and response
  • Experience in a fast paced, high stress, support environment, able to work with a sense of urgency and pay attention to detail
35

Senior Cyber Security Analyst Resume Examples & Samples

  • Coordinate and perform security testing activities (penetration testing, vulnerability scanning, application security testing), report on results, track metrics & trends, and drive remediation
  • Coordinate and perform proactive security monitoring, event analysis, incident response, and trending
  • Participate in and respond to internal and 3rd-party security audit & assessment activities
  • Engage in security architecture reviews
  • Design & implement new security solutions & projects
  • Assist with contingency planning and disaster recover processes
  • Maintain security policies & procedures
  • Assess adherence to security requirements and manage exceptions & mitigations
  • Provide on-the-job security education & training for junior security team members
  • Create and maintain software security resources for the software engineering team
  • Develop and enhance security awareness training for employees and contractors
36

Cyber Security Analyst Resume Examples & Samples

  • Prepare quarterly briefings for the Information Security Steering Committee and track the progress on actions coming out of the meetings
  • Develop and maintain IMS strategy & roadmaps to address risk landscape
  • Develop and manage portfolio of IM&S projects. Ensure the right strategic investments are made. Drive the execution of IM&S projects through the assigned project managers
  • Broad Information Security experience
  • Experience developing and implementing security strategies and security patterns
  • Depth and breadth across all the core bodies of information security knowledge including threat, vulnerability, risk, and controls
  • Excellent English oral and written communication skills
  • Experience in working in a global, multinational organisation
  • CISSP, ISSAP, or SABSA certification
  • Broad foundation of on the job IT technical knowledge
37

Senior Cyber Security Analyst Resume Examples & Samples

  • Having Bachelors degree in any discipline
  • Demonstrated manual product penetration testing experience; for example, you must be able to simulate a SQL injection without tools, simulate XSS attack, X-Path Injection, etc
  • Knowledge on domain understanding about the HVAC / Fire control systems, controllers, field instruments, cameras, industrial networks, sensors etc
38

Lead Cyber Security Analyst Resume Examples & Samples

  • Having 3+ years of hands-on experience on Data Classification, Encryption & IRM technologies
  • Good Understanding of Data Classification Standards & Technology such as Boldon James
  • Good knowledge on NIST and other industry standards
  • Good knowledge on Networking and Linux, Basic Knowledge on Active directory and LDAP
  • Ability to write scripts either in Python or Perl
  • Good knowledge on server maintenance activities
  • Basic knowledge on Windows, NetApp filer and SharePoint technologies
  • Knowledge on Information Security fundamentals is added advantage
39

Lead Cyber Security Analyst Resume Examples & Samples

  • Technical lead for the Behavior Analytics platform for the entire company and accountable for the availability, reliability and performance of the platform
  • Collaborate with IT infrastructure/Application teams and business security leaders to define and gather Analytics requirements
  • Consolidate and validate business assumptions relevant to the solution strategy, prior to initiating and throughout the analytical process
  • Identify and gather the relevant and quality data sources required to fully answer and address the problem for the recommended strategy
  • Integrate/transform disparate data sources and determine the appropriate data hygiene techniques to apply
  • Understand the company’s IT Infrastructure/Applications, Business model/processes, Security controls and develop Threat Detection Models within the Behavior Analytics platform
  • Define the global and business level metrics reporting dashboard
  • Having 5+ years of hands-on experience on UEBA Domain ( Securonix)
  • Ability to write scripts SQL and good knowledge on DBA administration tasks
  • Hands-on experience on Linux or UNIX platform
  • Hands-on experience on McAfee or Symantec DLP events analysis
  • Strong knowledge on server administrator tasks
  • Good knowledge on HR and proxy systems
  • Good in troubleshooting data integration issues
  • Hands-on experience on Building threat model with various transmission channels like USB, Email etc
40

Cyber Security Analyst Resume Examples & Samples

  • Proven team player, will be working individually and with other staff members, on both long-term projects and rapid response under tight deadlines
  • Ability to work with local and remote IT staff/management, vendors and consultants
  • Ability to work independently and possess strong project management skills
  • Demonstrated proficiency in
  • Implementation and maintenance of SIEM (ArcSight, IBM Qradar, McAfee NitroSecurity, etc.)
  • Forensic analysis tools (MIR, EnCase, FTK)
  • Malware analysis tools (dynamic and static)
  • Vulnerability assessment tools (Qualys, ISS Scanner, nmap, etc.)
  • Secure Web Gateway (BlueCoat, Microsoft Forefront)
  • Network sniffers and packet tracing tools (DSS, NAI SnifferPro, Ethereal and tcpdump)
  • Encryption technologies (PGP, PKI and X.509)
  • Directory services, LDAP, and their inherent security (Active Directory, CA Directory)
  • Proxy and caching services
  • Client/server platforms including Sun Solaris, Windows, Linux
  • Operating system hardening procedures (Solaris, Linux, Windows, etc.)
  • LAN/WAN routing and high availability (OSPF, BGP4/iBGP, EIGRP and NSRP)
  • Bachelor’s degree in Computer Science, Engineering, or other related field
  • Minimum five years of information security experience, preferably in the financial services industry
  • Minimum three years hands-on security operations experience including interdisciplinary experience with four or more of the following: Cyber Threat Analysis, Digital Computer Forensics, Incident Response, Application Security, Operating Systems Security, Cryptographic Controls, Networking, Programming languages
  • Technical experience and comprehensive knowledge of threat actor capabilities, intentions, methodologies and motives
  • Familiarity with computer network exploitation and network attack methodologies while maintaining an understanding of the relationship these activities have with the financial services industry and critical infrastructure
  • Industry knowledge of leading-edge security technologies and methods
  • Shift work and working in an on-call response capacity is required including availability for 24 x 7 on-call support responsibilities
  • Previous people/project management experience is a plus
  • Government Security Clearance is a plus
  • Strongly prefer at least one of the following certifications: CISSP, GCIA, GCIH, CHFI, GCFA, CCE, CFE
41

Cyber Security Analyst Resume Examples & Samples

  • Monitor information system activity, collect, review, and retain audit logs to include system logs and records and determine actions to be taken when discrepancies are detected
  • Performs analyses to validate established security processes and recommend additional security steps to ensure compliance with applicable DOD IA requirements and baseline IA controls
  • Conduct network security vulnerability assessments using DoD provided scanning tools and liaison with network administrators to correct identified problems
  • Review Information Assurance Vulnerability Alerts (IAVA) for applicability and impact to the range networks. Ensure that all systems are patched and report compliance
  • Evaluate information systems for compliance with Defense Information Security Agency (DISA) Security Technical Implementation Guideline (STIG) and review measures needed to bring systems into compliance
  • Conduct vulnerability scanning for new information system deployment or systems temporary connected to support training events or testing
  • Verify all Virus Signatures are kept up to date, and Automated and Manual Virus Scans are documented, scheduled and are being completed
  • Assist in evaluation of Information Systems for compliance with Government statutes, DoD 8500.2 IA Controls, DoD FISMA directives, policies and regulations
  • Assist the Cyber Security Manager with the development of the IA related Procedures, and Work Instructions
  • Information System Security
  • Risk Analysts
  • Network Security Auditing
  • Host Based Security System (HBSS) Administration
  • Assured Compliance Assessment Solution (ACAS) Administration
  • VMware Administration
  • DoD Certification and Accreditation
42

Cyber Security Analyst Resume Examples & Samples

  • Provide administrative support for the DoD Information Assurance Certification and Accreditation Process (DIACAP)
  • Maintain system accreditation status in Enterprise Mission Assurance Support Service (eMASS) by performing quarterly updates and updating documentation
  • Review DISA Application Security and Development Security Technical Implementation Guide (STIG) checklist items and perform remediation/mitigation activities as required
  • Support Cyber Security Inspections three times a year
  • Conduct annual contingency plan and disaster recovery reviews for specific systems
  • Report activities on a Monthly Status Report
  • Bachelor's degree or four (4) years of additional experience in lieu of degree
  • Previous experience supporting the Department of Defense is preferred
  • Three (3) years of experience with Department of Defense Information Assurance Certification and Accreditation Process (DIACAP) Certification and Accreditation packages, reviewing, interpreting, identifying and resolving (remediation/mitigation) Defense Information Systems Agency (DISA) Security Technical Implementation Guides (STIG) checklist items
  • Three (3) years of experience with DISA Security Content Automation Protocol (SCAP) Content program and SCAP benchmarks and DISA STIG viewer
  • Three (3) years of experience with securing and configuring Windows Server 2008 operating system and related products (SQL Server, Internet Information Services, Active Directory, etc.)
  • One (1) year of experience managing packages with the Enterprise Mission Assurance Support Service (eMASS) system
  • Experience with Department of Defense Information Assurance Risk Management Framework Assessment and Authorization Process (RMF) packages
43

Cyber Security Analyst Resume Examples & Samples

  • Develop, write, and review certification and accreditation (C&A) documentation per Department of Defense (DoD), Risk Management Framework (RMF) for DoD Information Technology (IT) (formerly DIACAP)
  • Perform the duties of Navy Validator for all NNSY accreditation submissions and assist other Naval Shipyards and the corporation on these duties when required
  • Evaluate and test information systems and networks to determine compliance with CS requirements
  • Conduct evaluation, test, and accredit various Industrial Plant Equipment (IPE) that contain computer technology to ensure full compliance with Navy and DoD requirements
  • Assist with office clerical work; assist users with Cyber Security (CS) related issues, and provide other CS support as the need arises (e.g., auditing, contingency planning, CS awareness training,
  • Bachelor’s Degree in Cyber Security, Information Technology or related field and a minimum of three (3) years direct experience in the IT field
  • Institutional knowledge and a minimum of 3 years’ experience, on the mission critical procedures, systems, and processes, as they pertain to the Public Naval Shipyards’ Information Technology and Cyber Security requirements
  • Qualified and registered as a Navy Validator IAW DoN Memorandum 5239, Ser 5.0/1274 dated 18 Mar 10, Subj: QUALIFICATION STANDARDS AND REGISTRATION PROCEDURES FOR NAVY VALIDATORS
  • Experience in certifying and accrediting DON information systems and networks, as well as Platform IT
  • Expert knowledge of and experience with CS requirements as defined by Public Laws, National, DoD, and DON guidance [e.g., Federal Information Security Management Act (FISMA), DoDD 8500.1, DoDI 8500.2, DoDI 8510.01 (Risk Management Framework (RMF) for DoD Information Technology (IT)), DODINST 8570/01M INFORMATION ASSURANCE WORKFORCE IMPROVEMENT PROGRAM. SECNAVINST 5239.3, OPNAVINST 5239.1, NIST Special Publications Series 800, etc
  • Expert knowledge and experience with the requirements outlined in OPNAVINST N9210.3 Safeguarding Naval Nuclear Propulsion Information
  • Ability to move and maneuver up to 50 pounds of weight (computer hardware, accessories, support equipment, etc.)
44

Cyber Security Analyst Resume Examples & Samples

  • Serve as an individual on the Cyber Security Team
  • Develop Cyber Security documentation validating software quality, security, reliability and maintainability attributes. Identify gaps in Cyber Security/CND posture and assess risks
  • Participate in development and review of DIACAP/RMF documentation, Networthiness Documentation, and ensure STIG compliance and validation
  • Provide quality assurance specialist support including formulating, coordinating, directing, and executing all quality assurance policies, tools, and training programs; conducting internal controls reviews to ensure product assurance competency and the effectiveness of surveillance activities
  • Develop strategies, goals, tasks, roles, responsibilities, and information needs for Cyber Security surveillance and oversight
  • Review information systems for compliance with applicable DoDI 8500.01 and DoDI 8510.01
  • Provide IS security advice and guidance in accordance with applicable regulations, and directives and guidance to Government and DoD partners for the protection of data at all classification levels including SCI
  • Evaluate and recommend approval, disapproval, or waiver(s) for IS processing national security data
  • Provide input or consideration in the promulgation of future security policy
  • Support and/or conduct site visits and assessments to inspect and verify IS reports and plans at various locations, and provide a written report for review and approval
  • Prepare reports and memoranda, to include, but not limited to: Memoranda for the Record (MFR), Memoranda of Agreement (MOA), Authorization To Proceed, and status and technical briefs for review and approval by government Cyber Security
  • Update data on Government-provided databases with current information about IS status
  • Prepare, review, and record notification and status messages to indicate A&A state of systems to system owner or programs
  • Ensure IS security requirements, including applicable RMF directives and guidance, are addressed and applied; appropriate documentation prepared by the system owners or programs inclusive of the Security Assessment Package, Concept of Operations (CONOPS) Plan, System Security Plans, System Requirements Traceability Matrix, Risk Management Matrix, Test Results, interface control documents, requests for changes, test plans, and other related program security documentation
  • Track completion of the Security Assessment Package and report status
  • Provide preparation of the Security Assessment Report (SAR). The SAR contents include, but not limited to, the Summary of Assessment results and Authorization Recommendation
  • Bachelor's degree preferably in a Technical Computer Field (Computer Science, Management Information Systems, Information Technology, Networking). 8 years applicable experience may be considered in lieu of degree
  • Experience with XACTA, DIACAP, Risk Management Framework (RMF), NIST, eMASS, SCAP Scanning, IAVA’s methodologies, STIG’s and ACAS
  • · - Minimum 5 years data/network/information system assurance and system design, information security assessments, C&A, Plan of Action Milestones (PoAM) remediation, Information Assurance Vulnerability Alerts
  • Experience performing Information Assurance functions in a Capability Maturity Model Integration (CMMI) Maturity Level 3 (or better)
  • Required Certifications: Currently possess DoD 8570 certification, Security +
  • In depth knowledge of Information Assurance auditing, continuous monitoring, and analysis
  • Possesses strong analytical skills and good interpersonal and communications skills in dealing with multiple contractor and government organizations
  • Must currently possess TS/SCI
  • NSA Information Assurance Guidelines
  • Certifications: CompTIA Security +, CISSP, CEH, GSEC, GCIH, CISA, GCED, SSCP, and/or CISA
  • Familiar with multiple operating systems including Linux and Windows
  • Virtualization experience with technologies such as KVM and VMWare VSphere
45

Senior Cyber Security Analyst Resume Examples & Samples

  • Minimum Certification as a DoD 8570 IAM II, must possess or able to obtain from hire date, within 6 months IAT Level II certification related to the Information Assurance field
  • Demonstrated exceptional ability to troubleshoot complex systems required
  • 5 years IT experience
  • 2+ years administrating servers
  • 4+ years with vulnerability scanners
  • Knowledge and experience in working with ACAS
  • Knowledge and experience in working with NESSUS Scanner
  • HBSS APS working knowledge
  • Support Risk Management Framework
  • EMASS
  • Upload information, documentation, and artifacts into the eMASS application for Army tracking of RMF compliance
  • POA&Ms
  • Coordinate with IASOs, IMOs, and system owners to establish POA&Ms
  • Track POA&M progress and coordinate with IASOs for updates
  • Develop routine POA&M approval package and brief the Authorizing Official Representative
  • Develop and track Privacy Impact Assessments
  • Develop and track System Interconnection Agreements
  • Routinely Review System Security Plans
  • Routinely Review System Standard Operating Procedures
  • Maintain FISMA Compliance Reporting
  • Perform routine FISMA Technical Control Reviews
  • Document findings and coordinate with owners to establish POA&Ms
  • Perform routine FISMA Continuity of Operations Reviews
  • Perform routine FISMA Security Control Reviews
  • Participate in annual Information Technology Continuity Planning
  • Per new RMF standards, support more frequent external 3rd party assessments required for Army Assessment and Authorization Official Representative
  • Perform physical security inspections Minimum Qualifications
  • Must possess at least 5 years of hands on technical experience with a minimum of 4 year of experience in Information Assurance or a Master’s degree and 3 years’ experience
  • Must be able to work independently and provide timely status updates, as well as be able to manage multiple tasks
  • Must be a highly effective communicator (both verbal and written) and possess excellent analytical and problem-solving skills
46

Cyber Security Analyst Intern Resume Examples & Samples

  • Pursuing bachelor's degree, preferably in Computer Science, Cyber Security, Information Technology, Computer Engineering, or related IT discipline
  • Strong technical skills including understanding of software development principles
  • Hands-on experience through coursework or internship
  • Ability and obtain and maintain a SECRET Security Clearance
  • Willing to live and work in the Charleston, SC area
  • Computer based training system development
  • Ability to quickly adapt to a changing environment
  • Ability to quickly learn new concepts and software is necessary
  • Candidate should be a self-motivated, independent, detail oriented, responsible
  • Ability to multi-task& support multiple priorities
  • Ability to handle multiple clients and multiple team members with confidence
47

Cyber Security Analyst Resume Examples & Samples

  • Maintain DIACAP/RMF IA controls so that security posture remains high
  • Participate in the Cyber Security Working Integrated Product Team (WIPT) and provide updates
  • Conduct verification tests for system upgrades to maintain the high security posture
  • Create ATO POA&M entries for items (such as patches) that will take additional time to research to prevent potential negative effects by testing changes to the environment prior to implementation. The IA analysts will work with the System Administrators and Database Administrators (DBAs) to develop a remediation plan, including a schedule, mitigation strategy, and details to enable the IAM and AO to understand the risk
  • Support Cyber Security auditing, continuous monitoring and analysis
  • Scan the environment with vulnerability assessment tools such as ACAS/Nessus
  • Prepare Cyber Threat Analysis, POAMs, and IAVM reports
  • Bachelors degree or equivalent experience (4 years) and 5 years or more experience
48

Information Cyber Security Analyst Resume Examples & Samples

  • Performs routine to moderately complex cybersecurity incident analysis including technical investigations, evidence gathering, log events analysis, stakeholders' interviews and threat mitigation
  • Monitors systems to identify and respond to anomalous activity such as worms, Trojans, viruses, and malware. Investigates ongoing internal and external vulnerability assessments for the purpose of identifying vulnerability trends and makes recommendations to address issues
  • Utilizes ticketing system to ensure that logged incidents and/or requests are resolved in a timely fashion
  • Performs research to identify and report on the intentions and capabilities of external threat actors
  • Performs cybersecurity-related risk assessments and communicates results Information/Cyber Security Manager
  • Keeps current and maintains an understanding of industry threats, vulnerability landscape and applicable exploits
  • Conducts research on emerging products, services, protocols, and standards in support of cyber security enhancement and development efforts
  • Performs special projects and additional duties and responsibilities as required. Where applicable and when performing the responsibilities of the job, employees are accountable to maintain Sarbanes-Oxley compliance and adhere to internal control policies and procedures
  • Thorough knowledge and understanding of information security systems and appliances
  • Knowledge and experience supporting, reviewing, or administrating security technologies such as IDS/IPS, log aggregators, Internet and email filters, and next generation threat prevention platforms
  • Experience with system vulnerability scanning tools and ability to analyze associated scan results
  • Experience with administration of application whitelisting systems is preferred. Working knowledge of current attack methodologies, such as man-in-the middle, sniffing, phishing/vishing, cross site scripting, SQL injection and DDoS; as well as monitoring methods used to identify and respond to anomalous activity such as worms, trojans, virus', and malware
  • Strong analytical and troubleshooting skills. Strong written and verbal communication, interpersonal, and organizational skills
  • Ability to work both independently with sole responsibility and as part of a team to deliver high quality work product in a fast-paced environment
  • Ability to multi-task, prioritize projects, and exercise strong professional judgment. Ability to work well with people from different disciplines with varying degrees of technical experience
49

Senior Cyber Security Analyst Resume Examples & Samples

  • Develop Risk Management asset protection framework and asset classification processes that enable mitigation of risk to HP’s most critical assets & ecosystems. To include issue/gap management framework, including supporting processes and procedures
  • Provide consultative advice to internal customers that enables them to make informed risk decisions and develop acceptable risk mitigation strategies
  • Generate succinct and actionable reporting to Risk Owners that provides a current status on all open issues, including remediation plans or exception requests
  • Conduct periodic touch bases with GRC and Business Unit Sr. Leadership risk owners to ensure accountability and visibility of all open issues and to verify progress is being made towards previously committed remediation plans
  • Communicate information security risk and compliance assessments (e.g., vulnerability scans, penetration tests, PCI DSS, risk assessments, etc.) results to management, both verbally and in writing
  • Gather documentation and technical information in support of issue remediation efforts and audit requests
  • Work with GRC Team to enhance or streamline existing eGRC tool, issue management, & risk register workflows as appropriate
  • As the Sr. GRC Analyst & leading be example, must keep abreast of latest security and privacy legislation, regulatory, advisories, alerts, and vulnerabilities
  • 5 years of Information Security, Cyber Security, &/or GRC related experience required
  • Excellent prioritization and multitasking capabilities
50

Cyber Security Analyst Resume Examples & Samples

  • Experience in developing processes and technology standards Ability to train and mentor staff
  • Exceptional attention to detail and strong focus on quality
  • High knowledge of or exposure to ANZ teams and systems
  • Experience in IT Security tools
  • Basic Regex Coding Skillset
51

Cyber Security Analyst Resume Examples & Samples

  • Execute (thru providers) pen-testing on our products
  • Understand and prioritize security findings and risks
  • Work with upper management, architecture and engineering teams on resolution
  • Advanced understanding of access control (Identity, provisioning, authentication, authorization)
  • Advanced understanding of security monitoring (logging, error and exception handling as part of application lifecycle)
  • Advanced understanding of operational security, e.g., security of hosting environments (firewalls, Intrusion Detection Systems), key management, key revocation, rotation
  • Experience in interaction with pen testing providers in order to identify the risk associated to security findings. Basic understanding of pen testing and related frameworks
  • Experience with the definition of security policies (e.g., input validation, hosted services configuration) and implementing good security practices
  • Basic understanding of automated security testing frameworks (e.g., fuzz testing)
52

Senior Cyber Security Analyst Resume Examples & Samples

  • Lead efforts in intrusion detection, malware analysis, and APT analysis
  • Design and execute remediation efforts within the "Response" phase of cyber incident lifecycle across functions, business units and regions
  • Continuously engage intelligence team in a two way conversation: Develop, refine, and maintain intelligence requirements to focus intelligence in support of detection operations, and provide feedback on detection indicators and intruder tactics, techniques, and procedures
  • Mentor and provide direction to junior analysts, conduct additional triage on escalations from those analysts
  • Conduct forensic investigations of internal or external threats based on a working knowledge of IT environments including: Microsoft Windows, Apple MAC, Linux, mobile devices and infrastructure components such as firewall technology, Active Directory, and operational log and event console activity
  • Champion use of processes, standards, governance, and disciplined execution
  • Evaluate and use advanced IR products and services to improve efficiency and effectiveness of incident response
  • Lead projects to enhance CSIRT capabilities up to region or sector level
  • Analyze and reverse engineer malware
  • High School Diploma or GED from an accredited institution is required
  • Minimum 5 years of experience in cyber security incident response, security operations, or a graduate of Eaton's Leadership Development Program is required
  • Must reside within a 50 mile radius of work location or work remotely; no relocation benefit offered
  • Bachelor’s or Master’s degree in a technical discipline such as: B.E / BTech / MCA / Equivalent (EITC) or B.S. Comp Science / Mathematics / Engineering / Equivalent
  • Excellent proficiency with the English language (written and verbal). Additional language capabilities are a plus
  • 10 years of IT experience in information technology
  • Deep understanding of multiple Information Security disciplines with relevant work experience and/or relevant certifications (e.g. GCIH, CSIH, GREM, etc.)
  • Deep understanding of common threats, penetration/intrusion techniques and attack vectors
  • 3 years of experience with security technologies (e.g. IPS, IDS, SIEM, DNS, proxies) and detection techniques (e.g. forensics, malware analysis, packet analysis)
  • 3 years of experience in correlating events from multiple sources to detect suspicious and/or malicious activity
  • 3 years of application development and secure programming techniques
  • 3 years of solution design and architecture
  • 3 years of experience in internet technology and remote access control systems
53

Senior Cyber Security Analyst Resume Examples & Samples

  • Previous experience as an IT Security Analyst or related field as typically acquired during 6 to 8 years in a similar position
  • Three to five (3 to 5) years of healthcare information technology industry experience preferred
  • Previous experience providing cyber security support by planning, coordinating, integrating and synchronizing cyber defense and prevention activities
  • Proven experience ensuring compliance with all applicable state and federal cyber laws and regulations
  • Significant experience creating comprehensive and accurate reports that are used to communicate Sutter Health’s risk profile impact to peers and management
  • Thorough knowledge of information systems security concepts and current information security trends and practices including security processes and methods
  • General knowledge of Federal and State IS security and privacy-related regulatory requirements and laws
  • In depth knowledge regarding NIST, HIPAA, FIPS, and other recognized industry security standards and best practices
  • Detailed understanding of DLP and DLP technologies
  • Detailed understanding of data movement in a large healthcare system and typical healthcare business processes
  • In depth knowledge of cyber security solutions, policies and technologies
  • Understanding of the lifecycle of a network threat and network vulnerability exploitation in a healthcare environment
54

Cyber Security Analyst Resume Examples & Samples

  • Minimum of 10 years of work related experience required
  • Prior work experience specifically-related to Cybersecurity/IA with demonstrated understanding of applicable DoD Cybersecurity/IA guidelines, instructions, and directives is required
  • A Secret Security clearance is required
  • Program management experience is required
  • Prior supervisory, task management, technical management, or project leadership experience in the areas of Cybersecurity/IA
  • A thorough understanding of cyber stakeholders and the process/procedures for integration
  • Ability to develop briefings and present them to high level officials
55

Cyber Security Analyst, FCC Resume Examples & Samples

  • Three (3)+ years in the IT field
  • Security+, CISSP, GWAPT, GPEN, GCIH, CISM/CISA is a plus! ISO27001 Lead Auditor is also a plus
  • Support the development of risk evaluation criteria; prioritize the risk register that identifies trends; communicate common view of the categories of security risk
  • Assist in implementation of new security solutions
  • Conduct and participate in vulnerability audits and assessments
56

Cyber Security Analyst Resume Examples & Samples

  • Monitor NASA agency sensors and SOC (Security Operations Center) systems for incidents and malicious activity
  • Generate high quality reports
  • Coordinate with both Tier 1 and Tier 3 teams while providing incident handling and response support for the agency
  • BS degree in relevant field/technology or equivalent years of experience
  • Experience reviewing and analyzing large amounts of raw log data (firewall, network flows, IDS, system logs),
  • Track record of being motivated to learn and thrive on challenges
  • Commitment to Excellence; Thirst for Knowledge
  • Experience working in a mission critical security operations team, preferably 24x7
  • Experience with enterprise level security incident event management tools such as ArcSight or Splunk
  • CEH, Security+, GCIA are desired certifications
57

Cyber Security Analyst, Lead Resume Examples & Samples

  • 10+ years of experience with information assurance or Cybersecurity, including 3 of the following areas: systems requirements, operational requirements, test and evaluation, or training
  • 3+ years of experience in a technical security role, including network security, operating system security, Internet or Web security, Data Loss Prevention (DLP), anti-malware, IDS/IPS, and penetration and vulnerability testing
  • Experience with designing and implementing a Cybersecurity program for a federal agency and documenting and championing technical requirements that result from business processes or organizational change recommendations
  • Knowledge of security concepts and security management practices, security architecture, security operations, and security modeling
  • Knowledge of Certification and Accreditation (C&A) activities in accordance with the NIST, OMB, and DOE processes
  • Ability to analyze the security architecture of IT systems for compliance with federal and agency policies and manage multiple priorities and projects, deliverables, and stakeholders
  • Ability to influence peers and management, team cross-functionally, and form relationships to achieve objectives
  • 3+ years of experience with the Department of Energy
58

Senior Cyber Security Analyst CND Tools Data Integration TS Resume Examples & Samples

  • 10-15 years of related experience in data security administration
  • Must be DoD 8570: IAT III (either CISA; GCIH; GCED; CISSP; CASP) and CND-SP Specialty: CND-IS
  • Work location Reston
59

Weapons & Tactics Cyber Security Analyst Resume Examples & Samples

  • IAT Leave II Certification required. Certified Ethical Hacker, Net+, CCNA, and Windows/Linux certifications highly desired
  • Must complete self-assessment questionnaire, customer pre-screen, skills assessment lab, and pass the training and certification program(s) as directed by the customer, and remain Mission Ready qualified
  • Must have experience working with and in a network systems security environment with a focus on security and information assurance
60

Intermediate Cyber Security Analyst TS Resume Examples & Samples

  • Serves as technical team or task leader
  • 10-15 years of directly related experience in network analysis and design
  • Requires Relevant Certifications: DoD 8570 IAT III (CASP; CISSP; GCIH; GCED; CISA) and CND-IS (CEH; SSCP)
  • Must be willing to obtain & maintain a CI polygraph
61

Senior Cyber Security Analyst CND Tools Data Integration Lead TS Resume Examples & Samples

  • Broad scope of tasks to include O&M and tuning of cyber defense tools, integration of Splunk, Forescout, Fire Eye, Tanium and other tools, security architecture design, implementing new cyber capabilities, implementing regional based IPS, designs and defines system architecture for new or existing computer systems
  • Performs functions to include but not limited to systems engineer, audit/inspection, infrastructure support, certification and accreditation, vulnerability management, detection and response support services
  • Lead and manage a team of cyber experts
  • 10-15 years of related experience in data security administration (5+ years computer network defense and information assurance experience)
62

Intermediate Cyber Security Analyst TS Resume Examples & Samples

  • Analyze data communications networks; including planning; designing; evaluating; selecting; and upgrading operating systems and protocol suites and configure Firewalls; IPS/IDS and other defensive capabilities as needed
  • Have specialized knowledge in computer network theory and understand IT standards; including but not limited to the OSI model; and the methods of exploiting those standards
  • Plan network layouts and configures cyber defense systems to protect the network
  • Analyzes network topologies and traffic and capacity requirements
  • Serve as Firewall and IPS/IDS engineer
  • Have experience with multi-tasking providing on ground support to a critical Security Operations center
  • Have excellent oral and written skills creating programmatic documentation; standard operating procedures and granular process checklists
  • Conduct special projects by request
  • Requires Relevant Certifications: DoD 8570 IAT III (CASP; CISSP; GCIH; GCED; CISA) and CND-IS (CEH; SSCP) 2. Must be willing to obtain & maintain a CI polygraph
63

AIS / Cyber Security Analyst Resume Examples & Samples

  • A.S./A.A or B.A. Degree with ten (10) years of experience in IT disciplines may substitute for the Bachelor's Degree requirement
  • Five (5) years of cyber security related experience
  • Working level knowledge of DoD cyber security practices/procedure is required
  • Three (3) years of specific DIACAP/DIARMF related experience
  • Experience in briefing DoD Executive Leadership (0-6/GS-13 and above) a plus
  • SME level knowledge current DoN cyber security practices/procedure is highly desirable
  • CISSP is highly desirable
64

Cyber Security Analyst Resume Examples & Samples

  • Active TS/SCI
  • Bachelor’s degree from an accredited institution and 7 years of direct experience or an additional 4 years of direct relevant technical experience may be substituted for education
  • Fully Qualified Navy Validator (FQNV)
  • Compliant with DoD 8570.01-M Information Assurance Manager Level III requirements (GSLC, CISA, CISSP)
  • Prior experience with NIST 800-53 Controls
  • Strong communication, coordination, and collaboration skills
  • Hold (or be able to obtain) at least one of the following certifications: Cisco Certified Network Associate (CCNA), Microsoft Certified System Engineer (MCSE), Red Hat Certified Systems Administrator, and/or Oracle Certified Solaris Administrator (OCSA)
  • Experience with the Assured Compliance Assessment Solution (ACAS) Solution and Security Compliance Automated Protocol (SCAP) tools
  • Experience with Security Technical Implementation Guides (STIG) and associated Checklist
  • Experience in completing, submitting, and tracking accreditation packages for Navy Programs of Record (POR), sites, and/or systems
  • Prior experience with Risk Management Framework (RMF)
65

Cyber Security Analyst Resume Examples & Samples

  • Incident handling (guiding customers, directing resources through intelligence-based response process)
  • Environment monitoring and development of thorough incident reports
  • Delivering threat awareness and education briefings
  • Maintaining technical proficiency in the use of tools, techniques and countermeasures
  • Maintaining professional knowledge of trends in computer and network vulnerabilities and exploits
  • Participation in the production of cohesive technical intelligence reports
  • Adherence to the highest standards of ethical and professional conduct
66

Cyber Security Analyst Resume Examples & Samples

  • Development of thorough incident reports
  • With computer security concepts and best practices
  • With networking, system administration and security best practices
  • Using Unix/Linux operating systems including command-line tasks and scripting
  • Writing formal reports and other technical documentation
  • With analyzing and investigating computer network intrusions
  • With malware analysis
  • With conducting data analysis
  • Ability to obtain and maintain appropriate DoD Secret level security clearance
  • Current DoD Secret level security clearance
  • Experience providing enterprise incident handling support
  • Experience researching and tracking Advanced Persistent Threat (APT) campaigns
  • Experience performing programming/scripting tasks
  • Experience using Digital Forensics techniques and tools (Encase, FTK, File Systems)
  • Experience performing forensic analysis tasks (Intrusions and/or Incident response)
  • Experience with Cyber Kill Chain and Intelligence Driven Response
  • Experience with Reverse Engineering of malware
  • SANS GIAC GGCIH/GCFA, or CISSP certification(s)
  • Experience mentoring junior level employees
  • Effective customer service skills
67

Cyber Security Analyst Resume Examples & Samples

  • Demonstrated experience with networking, system administration, architectures and security elements
  • Ability to obtain and maintain appropriate DoD clearance
  • Demonstrated excellent customer service and teaming skills
  • Malware/ Reverse Engineering experience
  • Enterprise incident handling experience
  • Forensic analysis experience
68

Cyber Security Analyst Resume Examples & Samples

  • Using the big data toolset Splunk, analyse security incidents for evidence of malicious behaviour . (Training on Splunk provided)
  • Carry out analysis to determine the root cause of events, with the support of big data, enterprise wide forensic toolsets and intelligence processes
  • Using enterprise wide forensic toolsets, carry out threat hunting activities, looking for trouble. Ingest, analyse and contextualise data and turn that into intelligence for threat assessment and risk management
  • Applying scientific and analytical skills, develop big data algorithms for detection and reporting of threats against the organisation and sector
  • Reverse engineer malware and malicious code to determine the risk and impact across differing platforms, from enterprise to field equipment, then feed that information back into the architecture for security enhancement
  • De-obfuscate code to determine actions of scripts and malware
  • Perform protocol analysis for the detection and investigation of command and control traffic
  • Analysis packet level data for the detection and analysis of covert exfiltration mechanisms
  • Provide advice on configuration of network security devices for service and security enhancement
  • Liaise with UK Government agencies for intelligence sharing
  • Participate within the Global Thales security community
  • Perform vulnerability assessments and penetration tests of systems to determine risk and recommend mitigating actions
  • Carry out first responder actions, triaging and containing breaches
  • Identify service inadequacies and contribute to the Customer Service Improvement Plan
  • Maintain an understanding of current and emerging threats and vulnerabilities and security technology developments
  • Candidate will need to become familiar with, adhere to and ensure implementation of all Thales security policies and standards and the change control environment
  • Support client facing / end user helpdesk and other IT Support Team’s
  • Ensuring support tickets are fully updated with the most current data. Provide proper escalations and hand overs to management and support staff
  • Experience or skilled in one or more of the following areas: Cyber security, network security, forensics, vulnerability assessment, data analytics or big data techniques
  • A technical degree, PhD or equivalent experience
  • Knowledge of myriad of operating systems, from the latest to legacy Windows, Unix and embedded SCADA platforms
69

Team Lead, Cyber Security Analyst Resume Examples & Samples

  • Partners with cyber security researchers on data analysis, prototype implementation, collaboration, and feedback
  • As necessary, shares knowledge with external entities including law enforcement, intelligence and other government organizations and agencies
  • Must be able to obtain a federal security clearance
  • Keen ability to anticipate and recognize cyber security threats
  • Clearly communicating technical information in various forms to senior management, peers, and customers
70

Cyber Security Analyst Resume Examples & Samples

  • Develop IT security policies, procedures, standards, and guidance as required by the Federal government and Federal customers
  • Provide IT security policy and methodology recommendations to Federal customers
  • Ensure information systems are operated, used, maintained, and disposed in accordance with Federal customer security policy, procedures, standards, and guidance
  • Support implementation of cybersecurity and risk management frameworks to drive technical solutions for Federal customers
  • Conduct oral and written communications on cybersecurity project status and issues with IT Manager and Team Lead to facilitate project planning and control of relevant task orders
  • Communicate technical topics to management and non-technical audiences, as well as interface with the Federal customer when required
  • Become knowledgeable on the HIPAA policies and procedures for the program and ensure awareness of HIPAA breach process. Understand your role in HIPAA compliance and be able to execute that role in an effective manner
  • Bachelor’s degree and 9 years related work experience, Master’s degree and 7 years of experience; or 13 years of experience across multiple IT disciplines including cybersecurity, information security auditing, and information assurance in lieu of a degree
  • 3 years’ experience in developing, implementing, or evaluating IT security policies and procedures, system security plans, configuration management plans, security audit plans, and security risk assessment plans
  • Must be a US citizen or green card holder
  • “Big Four” audit and management consulting experience supporting Federal government contracts
  • Experience in FISMA, GAO FISCAM, NIST Cybersecurity Framework, NIST information security standards and guidance including FIPS 199, FIPS 200, NIST SP 800-53, and NIST SP 800-53A
  • Solid understanding of Access Control, Audit and Accountability, Configuration Management, and, Identification and Authentication control families in NIST SP 800-53
  • Solid understanding of SSA operations
  • Strong team player committed to excellence and adherence with Northrop Grumman values, ethics, and standards of conduct
  • Strong written, verbal, and interpersonal communication skills
71

Principal Cyber Security Analyst Resume Examples & Samples

  • Responsible for tuning and filtering of events and information, creating custom views and content using all available tools following an approved methodology and with approval and concurrence from management
  • Notify the Customer of significant changes in the security threat against the Customer networks in a timely manner and in writing via established reporting methods
  • Coordinate with the O&M team to ensure production systems are operational
  • Produce daily/weekly/monthly/quarterly reporting as required by management
  • Maintain system baselines and configuration management items, including security event monitoring “policies” in a manner determined and agreed to by management. Ensure changes are made using an approval process agreed to in advance
  • Coordinate with appropriate organizations regarding possible security incidents. Conduct intra-office research to evaluate events as necessary, maintain the current list of coordination points of contact
  • Produce reports identifying significant or suspicious security events to appropriate parties. Include latest security threat information and tie back to specific intrusion sets of nation state actors when possible
  • Review and evaluate network modifications and recommend security monitoring policy updates
  • Establish procedures for handling each security event detected
  • Be able to create and add user defined signatures, or custom signatures, to compensate for the lack of monitoring in threat areas as warranted by threat changes or as directed by the customer. This includes creating content in Arcsight as needed
  • Maintain a network diagram depleting the relevant security checkpoints in the network
  • Develop and implement a methodology using Arcsight Use Case UML processes that identify procedures for correlating security events. Analysis should all be able to create custom content and develop new use cases to better correlate security event information
  • Develop and utilize “Case Management” processes for incident and resolution tracking. The processes should also be used for historic recording of all anomalous or suspicious activity
  • Identify misuse, malware, or unauthorized activity on monitored networks. Report the activity appropriately as determined by the customer
  • Maintain proficiency and skills through relevant training, conventions, conferences, and on-the-job training
72

Cyber Security Analyst Resume Examples & Samples

  • Science related Bachelor's or Master's degree with a GPA 2:1 or above (UK) or GPA of 3.0 or above (US) or First Class/2nd Upper Honours (Singapore)
  • Technical background in cyber security is not mandatory but demonstration of interest and passion for the field will be advantageous
  • Ability to deliver under pressure and to tight deadlines
  • Excellent organisation and time management
73

Cyber Security Analyst Resume Examples & Samples

  • Conduct platform or operating system vulnerability scans which assess exposure of system to attacks or hacking. Respond to questions regarding viral activity, concerns about spam/phishing etc. Produce reports
  • Serve as organization's POC for the third party certification of security procedures and use of cyber security protections. Ensure that system's security controls, policies and procedures examined, measured and validated against third party standards
  • Design, plan and implement test strategies to support the core infrastructure in the contingency environment for all critical business applications to ensure business continuity in the event of a major business interruption or disaster
  • Lead projects as related to technology refresh/evaluation such as Load Balancing and SSL technology. Research corrective measures (long term solutions) needed for any chronic issues identified that compromise security of particular systems or platforms
  • Participate in developing and testing of new methodologies and systems for recovery of the critical core business processes and the enterprise infrastructure
  • May serve as technical lead or project lead in projects involving testing defenses against hacking, Denial of service, spam, break-ins, or related attacks. Provide technical guidance to less senior staff or applications developers/systems administrators
  • Demonstrable knowledge of application security, risk assessment, validation of security pen test results, and vulnerability resolution
  • Demonstrable knowledge of secure coding practices and the ability to conduct security assessments and analysis of applications
  • Ability to identify security requirements for applications and services and to effectively communicate requirements to application development teams and application/business owners
  • Ability to review application source code for vulnerabilities, using both manual and automated code scanning techniques
  • Ability to identify and explain the risks associated with common application vulnerabilities, demonstrate exploitation, and recommend mitigation options
  • Ability to initiate and promote activities to foster Information Security awareness and education among application development
  • Information security and application security or application development experience
  • Ability to coordinate activity among multiple teams, both technical and non-technical
  • Strong verbal and written communications skills; comfortable briefing senior management
  • Strong interpersonal skills for developing relationships with individuals and teams across the enterprise
  • Strong understanding of fundamental Application Security concepts, including common types of attacks and exploitation techniques
  • Experience with various application security tools
  • Familiarity with emerging applications security exploits and willingness to research them
  • Solid understanding of frequently used web application security testing tools
  • Solid understanding of common web and systems application vulnerabilities
  • Familiarity with key security concepts/frameworks such as OWASP, CVE, and CVSS
  • Thorough understanding of application architecture and supporting component
74

Cyber Security Analyst Resume Examples & Samples

  • Perform monitoring, research, assessment and Attack analysis on Intrusion Detection and Prevention tools as well as Anomaly Detection systems, Firewalls, Antivirus systems, proxy devices
  • Follow pre-defined actions to handle BAU and High severity issues including escalating to other support groups
  • Identifying weaknesses and vulnerabilities within the system
  • Execute daily ad hoc tasks as needed
75

Cyber Security Analyst, Senior Resume Examples & Samples

  • 5 years of experience with Cyber threat analysis
  • DoD 8570 complaint IAT II certification
  • GXPN: GIAC Exploit Researcher and Advanced Penetration Tester, GREM: GIAC Reverse Engineering Malware, GCFA: GIAC Certified Forensic Analyst, GWAPT: GIAC Web Application Penetration Tester, GPEN: GIAC Certified Penetration Tester, GCIA: GIAC Certified Intrusion Analyst, or GCIH: GIAC Certified Incident Handler Certification
76

Cyber Security Analyst Resume Examples & Samples

  • Assessing the security impact of security alerts and traffic anomalies on customer networks
  • Escalating and explaining severe security incidents to clients verbally
  • Responding to technical security questions and concerns from clients
  • Possessing a deep understanding of hacker techniques, vulnerabilities, attacks and countermeasures
  • Conducting research on emerging security threats and potential customer impact
  • Strong knowledge of the TCP/IP protocol suite and related security concerns
  • Working knowledge of well-known security tools such as NMAP, Nessus, TCPDump, Wireshark, Netcat, and Backtrack
  • Working knowledge of common attacks and vulnerabilities
  • Strong understanding of common categories of malware and characteristics of each
  • Advanced college coursework in Computer Science or Information Technology, or equivalent experience
  • Bachelor's degree in similar field desirable
  • Relevant industry standard certifications preferred (SANS, CISSP, C|EH, Etc..)
  • Candidate expected to work towards SANS GIAC Certified Intrusion Analyst (GCIA) within 6 months of entry into this position
  • ====================​====================​
77

Senior Cyber Security Analyst Resume Examples & Samples

  • Bachelor’s degree in related field with 10+ years of experience in IT with a minimum of 5+ years in IT security. An equivalent combination of education, certification, and experience may be considered
  • IAT III Level certification, CISSP preferred
  • Knowledge of DIACAP and RMF processes and deliverables
  • Ability to understand the impact of cybersecurity on an information system and its organization and how risks may affect goals and objectives
  • Ability to meet and communicate effectively with management and technical staff
  • Knowledge of DIACAP and RMF processes and necessary forms and artifacts
  • Experience with vulnerability scanners, STIG, NIST SP, Retina, SRR, ACAS (Nessus)
  • Experience with security hardening, and maintenance
  • Knowledge of cybersecurity regulations, and policy, including federal mandates, FISMA, and service-specific regulations
  • Knowledge of NIST SP 800-30, 800-37, 800-39, 800-53, 800-53A, 800-60, and DoDI 8500 Series
  • Self-motivator with ability to work as part of a team or independently with little supervision or direction
  • Professional oral and written presentation skills
  • Attention to detail and effective problem-solving skills
78

Cyber Security Analyst Resume Examples & Samples

  • Conduct platform or operating system vulnerability scans which assess exposure of system to attacks or hacking. Respond to questions and issues raised regarding viral activity, spam/phishing etc. Produce reports
  • Participate in internal reviews by auditors, operational risk assessment staff, or compliance/reporting staff to prepare assessments or reports of operational risks associated with IT/IS infrastructure, access to systems, exposure to attacks, etc
  • Review commercial products available to enhance corporate hardware, platforms, applications and data. May test or evaluate products under consideration for purchase or licensing
  • 2 + years’ experience supporting Sail point’s Identity Governance products (IdentityIQ and IdentityNow)
  • Extensive experience with Java and J2EE application development and support
  • Demonstrate experience supporting Linux Operating System (SUSE and Red hat)
  • Demonstrate extensive experience with SQL query development
  • Knowledge and support of Oracle database
  • Knowledge of SDLC development Life Cycle and Configuration Management
  • Able to support JBOSS or Web logic application
  • Able to support Apache webserver
  • Good understanding of Privileged Account Security Solution with CyberArk PIM (Privileged Identity Management) preferred
  • Experience deploying and supporting Microsoft Windows Cluster preferred
  • Experience and supporting Microsoft IIS services is preferred
  • Experience installing, configuring, and supporting Microsoft Active Directory is preferred
79

Senior Cyber Security Analyst Resume Examples & Samples

  • BS in IT/Cyber Security or related field
  • 5-10+ years’ experience in multiple cyber security domains (Access Control, Network Security, Governance / Risk Management, Architecture & Design, Operations)
  • Demonstrated Experience with Incident Response
  • Demonstrated Experience with Network Reconnaissance
  • Demonstrated data mining experience (Data auditing, Aggregation, Validation and Reconciliation; Advanced Modelling Techniques; Testing, Developing, and Presenting outputs in clear and concise reports)
  • Familiarity with Defensive Cyber Operations (DCO-Teams) and Computer Protection Teams (CPT)
  • Familiarity with basic programming and scripting languages (i.e. Python)
  • Demonstrated Experience working in a Client Service environment
  • Knowledge of Security Best Practices: NIST, CIS, CISCO, Juniper, Checkpoint, Microsoft, Unix/Linux
  • Familiarization with large scale data analytics
  • Strong Analytical Skills
  • Experience Managing and Prioritizing Multi-Dimensional Technical Requirements
  • Military Cyber experiences within DoD preferred
  • MS in IT/Cyber Security or related field
80

Cyber Security Analyst Resume Examples & Samples

  • Demonstrated experience with the various phases of digital forensics that involves acquisition, examination, analysis and reporting
  • Relevant security knowledge and experience in two or more of the following areas: Digital forensics, Malware analysis, Incident response, network/host intrusion detection or security operations
  • Self-motivated and able to work in an independent manner
  • Solid working experience with any of the following tools/vendors is desired: Arcsight, Splunk, Wireshark, Riverbed, Sourcefire IDS or Cisco ASA. Certifications with these tools/vendors will be given extra consideration
  • Must have at least two (2) certifications in the field of information technology. ** Certified Intrusion Analyst Certification (GIAC) is preferred **
81

Cyber Security Analyst Resume Examples & Samples

  • BA/BS required: Master’s preferred. Focus areas include: Information Assurance, Cyber Security Science, Information Security
  • Between 7 - 10 years IA/Cyber Security experience developing and executing IA, CND, Cybersecurity policy and programs within DoD
  • Possess working knowledge of DoD policies, directives and instructions (i.e. 8500 series) and technical guidance
  • Host Security & Information Security Continuous Monitoring (ISCM), Risk Management Framework Implementation and Governance, DoD IA/CND Compliance Requirements, Federal Information Security Management Act (FISMA), Computer Network Defense Service Provider (CNDSP) Program, cyber security, knowledge of relevant DoD components, IA Portfolio and Governance Management, and Cloud Computing
  • Ability to support training and/or facilitation engagements with senior government personnel
  • CISSP, ITIL, PMP, CISM
82

Entry Level Cyber Security Analyst Resume Examples & Samples

  • Determine if security events monitored should be escalated to incidents and follow all applicable incident response and reporting processes and procedures
  • Ability to problem solve, ask questions, and discover why things are happening
  • Correlate data from intrusion detection and prevention systems with data from other sources such as firewall, web server, and DNS logs
  • Reporting outputs will be reviewed and approved to ensure quality and metrics are maintained
83

Principal Cyber Security Analyst Resume Examples & Samples

  • 7 years of operational IT experience
  • 5+ years’ experience with Network Security Monitoring, SIEM and/or other log aggregation and correlation tools
  • 4+ years’ experience with host-centric detection & response skills, as well as process automation
  • Excellent communication skills with the ability to drive technical change and constructively influence peers and leadership
  • Specific focus on Digital Forensics & Investigative Response (DFIR), cyber security, threat detection, penetration testing (red/blue) and vulnerability management
  • Experience leading small to medium-sized teams in focused, matrixed projects
  • Experience with Agile Management
84

Associate Cyber Security Analyst Resume Examples & Samples

  • Processing of Requests
  • Support of Entitlement Reviews and remediation of exceptions
  • Participation in Quality Reviews
  • Support the Develop and Maintenance of Internal Procedure Documentation
  • Identify security administration deficiencies, recommend improvements, and assist to implement corrective action
  • Secondary On-call responsibilities when assigned
  • Generally work is self-directed and not prescribed
85

Cyber Security Analyst Resume Examples & Samples

  • Software development lifecycle and JAVA development skills, code analysis
  • Security Testing (Functional testing)
  • Monitoring and Event Handling (1st, 2nd or 3rd Line)
  • Drafting and presenting quality documentation in good written English
  • Ability to explain findings in terms of technical and business risk
  • Analytical & Systematic Approach
  • Integrating COTS products
  • Embedded software and processor driven devices
  • Shell Scripting
86

Cyber Security Analyst Resume Examples & Samples

  • Conduct platform or operating system vulnerability scans which assess exposure of system to attacks or hacking. Aggregate vulnerabilities discovered during scanning process and produce reports
  • Participate in disaster recovery assessments, drills, or redundancy/backup assessments
  • Must have proven record of accomplishment in successful problem solving. Proactive learner and creative problem solver who enjoys being in a fast-paced environment, and who enjoys interactions that lead to ultimate customer success and satisfaction
  • Must have ability to analyze current business workflow and align new strategy to the large user base across different divisions; influence senior management on project strategy and identify business opportunities, acting as an escalation point and advocate for critical customer issues, collaborating with other departments as needed
  • Must have experience engaging and coordinating cross-functional resources both internally and with customer organizations to align on problem solving activity; deriving primary pain points and objectives for stakeholder groups including key data elements used in business processes, unique technical specifications and opportunities for high impact changes
  • Must have ability to solve and document solutions for usage of other technicians and customers
  • Must have ability to coordinate and communicate to large diverse groups of both technical and non-technical stakeholders leveraging strong command & control skills
  • Must have excellent verbal and written communication skills with demonstrated experience communicating with technical and non-technical audiences
  • Knowledgeable of Credential management, non-human identity and Privilege access management work stream
87

Cyber Security Analyst Resume Examples & Samples

  • Bachelor’s Degree in Math, Science, Engineering or Computer Science and 8 years previous experience with security configurations of Windows, Linux, and Cisco operating systems in an enclave. 4 additional years of experience can be substituted for the degree
  • Candidate must have a DoD Top Secret security clearance
  • Experience building, configuring, STIGing, and administering HBSS and ACAS
  • Understand principles of information assurance, DOD Risk Management Framework (RMF), NIST 800-53 security controls, and cybersecurity best practice
  • Ability to analyze IA test results, identify system weaknesses and develop a risk analysis/evaluation
  • Experience documenting RMF artifacts, procedures, processes, and documentation to support system accreditation
  • Perform as the team’s cybersecurity operations lead responsible for managing cyber status and reporting of Cyber Task
  • Excellent interpersonal skills, selfmotivated, with keen attention to detail
  • Must have CISSP or equivalent certification under DoD 8570.01-M in an ISSO/IAM-III role
  • Knowledge intrusion detection and firewall system architecture and management; Windows, Linux, and Unix operating systems; IAVM Program; and NIST accreditation process; CAC/PKI technology; security incident handling; software testing and evaluation; Common Criteria requirements; FIPS 140-2 standards
  • Specific expertise includes but is not limited to: utilizing
88

Cyber Security Analyst, Mid Resume Examples & Samples

  • 3+ years of experience in Cybersecurity policies, processes, and guidance
  • Experience with SAP, Citrix, Excel, Business Process Procedures (BPP's), and Change Management
  • Knowledge of federal IT security requirements and technical knowledge of the implementation of security controls and practices on an array of technical environments and applications
  • Knowledge of SAP security and maintaining user management security roles
  • BA or BS degree in IT or CS
  • Experience with Heat, Quality Center, QA Tools, UPerform, and Dimensions
  • Experience in the area of configuration management and request for change processes
  • Possession of excellent oral and written communications skills in the preparation of client-ready, executive-level briefings and reports
  • Windows Server 2008 R2 OS Training
89

Cyber Security Analyst Resume Examples & Samples

  • Develop and deliver business specific opportunities to minimise costs
  • Be capable of acting as the escalation point for critical issues when required
  • Ensure quality outcomes are provided by the team to internal stakeholders
  • Provide escalation support to issues encountered in day to day operations
  • Mentor staff on internal processes and technology to improve methodologies and up skill resources
90

Cyber Security Analyst Resume Examples & Samples

  • Security Analysts will assist in the creation of processes/procedures, technical documentation, as well as completion of project tasks
  • Provides regular monitoring, triage, and response to automated security alerts
  • Provide timely detection, identification, and alerts of possible attacks/intrusions, anomalous activities, and misuse activities, and distinguish these incidents and events from benign activities
  • Identifies false-positives and false-negatives from alerting
  • Provides regular feedback to enhance our security monitoring and controls
  • Work with others to resolve computer security incidents and vulnerability compliance
  • Examine network topologies to understand data flows through the network
  • Provides mentorship to Security Technicians
  • Proven Information Technology experience with network technologies, specifically TCP/IP, HTTP and related network tools is required
  • In depth understanding of regular expressions
  • In depth understanding of network services, vulnerabilities and attacks
  • Skill in performing packet-level analysis using appropriate tools (e.g., Wireshark, tcpdump)
  • Knowledge of server and client operating systems
  • Knowledge of defense-in-depth principles and network security architecture
  • Skill in network mapping and recreating network topologies
  • Knowledge of the types of Intrusion Detection System (IDS) hardware and software
  • Skill in tuning sensors
  • Skill in protecting a network against malware
  • Knowledge of how traffic flows across the network (TCP/IP, Open System Interconnection model [OSI], Information Technology Infrastructure Library [ITIL])
91

Cyber Security Analyst Resume Examples & Samples

  • Conduct platform or operating system vulnerability scans to assess exposure of system to attacks or hacking. Respond to questions regarding viral activity, concerns about spam/phishing etc. Produce reports
  • Serve as technical lead or project lead in projects involving testing defenses against hacking, Denial of service, spam, break-ins, or related attacks. Provide technical guidance to less senior staff or applications developers/systems administrators
  • Experience with multiple phases of the intelligence process, including producing and disseminating intelligence products in written and verbal form
  • Experience integrating written analysis products with structured threat data
  • Ability to apply data science processes to manipulate and analyze cyber threat intelligence
  • Familiarity with one or more classes of threat actor, such as nation state, organized crime, or hacktivist entities
92

Cyber Security Analyst Resume Examples & Samples

  • Experience with email and web advanced malware detection technologies such as FireEye and Yara
  • Experience with SIEM and/or log aggregation technologies such as ArcSight, Splunk, or ELK
  • Experience with netflow analysis and/or deep packet inspection technologies
  • Experience developing and tuning new detection signatures
  • Familiarity SOC monitoring operations
93

Cyber Security Analyst Resume Examples & Samples

  • 4 years+ of related Information Security experience
  • High aptitude for troubleshooting
  • A self-starter with a strong work ethic
  • Experience in driving change and delivering measureable results
  • Experience supporting global customers
  • Vulnerability management experience
  • Experience with the McAfee suite of endpoint security products
  • SIEM experience
  • Cloud computing experience
94

Cyber Security Analyst Intern Resume Examples & Samples

  • Must be rising junior in a Bachelors program or above, with a minimum 3.2 GPA – both cumulative and major (will be verified by transcripts)
  • Must have strong communication skills and ability to work effectively in a collaborative environment
  • Preferred Course of Study: Computer Science / Information Assurance
  • 3 years experience with Python, web2py and API Scripting
  • 2 years experience with Splunk, vulnerability management and networking skills
  • Security certifications a strong plus (CISSP, SANS, etc)
95

Cyber Security Analyst Resume Examples & Samples

  • Support Center management in the risk management process to
  • Identify the Center cyber footprint
  • Identify and understand the Center’s cyber risks
  • Identify how the Center processes and uses unclassified but sensitive information (e.g., OUO, PII, ECI, UCNI)
  • Identify how the Center processes and uses classified information
  • Maintain knowledge of cyber requirements within the Center and the Center’s mission
  • Serve as the Center’s liaison for Corporate Unclassified Information and PII requirements and be able to direct Center personnel to available resources
  • Corporate Dictionary for definition of PII
  • Corporate, Identify and Protect Unclassified Information, and Control Personally Identifiable Information
  • Available Corporate Tools
  • Participate in Cyber Security working groups, CSO Senate, and Cyber related training
  • Communicate information regarding cyber security to Center management and/or the Center workforce as necessary
  • Be cognizant of any foreign national personnel working with, or within, the Center, as well as the rules regarding foreign national access to SNL cyber resources
  • CSAA: Coordinate, prepare and maintain the Cyber Security Accreditation Agreement (CSAA) information in NWIS, in accordance with applicable Corporate and Cyber Security policies
  • Audits: Assist Cyber Security personnel and auditors with
  • Internal corporate inspections, surveys and audits
  • External inspections, surveys and audits
  • Cyber Security self-assessments and risk assessments
  • ISSO: As the Information System Security Officer (ISSO) for classified stand-alone cyber systems within your center, coordinate, prepare and maintain one-page classified cyber security plans. Potential assignment as an AISSO for network security plans
  • Refer Center management or line personnel to external organizations when applicable
  • Bachelor’s degree or equivalent experience (4 years) and 2+ years of Information Technology experience
  • Familiarity DISA STIGs
  • Demonstrated ability to exercise good judgment, discretion and tact
  • Demonstrated ability to communicate detailed technical information to a non-technical audience
  • Demonstrated ability to run vulnerability scan reports, analyze and interpret results
  • Demonstrated ability to maintain Windows server and desktop systems
  • Familiarity with AD and group policy objects
  • Demonstrated ability to understand and manipulate Windows registry entries
  • Excellent written, verbal, and decision-making skills
  • Demonstrated ability to work independently without day-to-day supervision
  • At least 2 years of experience as a desktop or server system administrator
  • Familiarity with Linux
  • Familiarity with Tenable Security Center
  • Security + or SSCP certification
  • Familiarity with Windows Server 2012
  • Familiarity with VMWare ESXi 6
96

Cyber Security Analyst, Chennai Resume Examples & Samples

  • Good understanding of cyber security principles like; cyber security architecture, defense in depth, default deny, least privilege, compartmentalization, privileged initiation, RBAC, etc
  • Good understanding of basic cyber security controls like; IDS/IPS (host and network), hardening, security policies, Malware Protection, Filtering, NGFW, etc
  • Basic understanding and knowledge about Industrial Control Systems and SCADA systems
  • Good knowledge in industrial communication protocols (eg.,Modbus, CAN, EtherCAT) and standards - IEC 60870-5, IEC 61850
  • Experienced software developer in at least C/C++ and C#
  • Experienced network developer in Winsock, Berkley, TCP/IPv4 and v6
  • Real time Programming skill would be an added advantage
97

Cyber Security Analyst Resume Examples & Samples

  • Advanced degree with experience in a national security related field
  • Active federal security clearance - DOD TS or DOE Q
  • Foreign language skills desired
  • Build real-world situational awareness from cyber technical data
  • Intelligence Analysis, Data Fusion Methodologies, and Data Visualization Techniques
  • Analytic workflow
98

Senior Cyber Security Analyst Resume Examples & Samples

  • Analysis of network activity logs using Wireshark, Splunk, netflow, etc. to identify root cause, malicious activity, and evidence of post-exploitation
  • Analysis of Windows log files for the purpose of finding artifacts related to malicious activity
  • Develop and produce reports on all activities and incidents to help maintain day to day status, develop and report on trends, and provide focus and situational awareness on all issues
  • Mentor and train cyber security analysts on advanced detection and analysis methods
  • Provide support for the A/V hotline and appropriately document each call in an existing tracking database for this purpose
  • Coordinate with appropriate organizations regarding possible security incidents
  • Conduct intra-office research to evaluate events as necessary, maintain the current list of coordination points of contact
  • Produce reports identifying significant or suspicious security events to appropriate parties
  • Recommend and/or execute procedures for handling each security event detected
  • Be able to create and add user defined signatures, or custom signatures, to compensate for the lack of monitoring in threat areas as warranted by threat changes or as directed by the customer
  • Develop appropriate ArcSight Dashboards, Data Monitors, Query Viewers, Trends, and Reports as needed to investigate detection trends and activities
  • Develop and implement a methodology using Arcsight Use Case UML processes that identify procedures for correlating security events
  • Analyst should all be able to create custom content and develop new use cases to better correlate security event information
  • Utilize “Case Management” processes for incident and resolution tracking
  • Identify misuse, malware, or unauthorized activity on monitored networks
  • Provide analytical support as needed for the overall projects and systems by working with engineers, O&M, and other personnel to ensure effective operations of all capabilities, piloting of new systems, and periodic updates to systems
  • Bachelor’s Degree in cyber security, computer engineering, computer science, or other closely related IT discipline
  • Minimum of five years of progressively responsible experience in cyber security analysis, incident response, or related experience
  • Experience in Incident Handling and/or Digital Forensics, familiarity with advanced cyber threats, experience authoring and reading Snort and/or Yara rules; and advanced knowledge of TCP/IP, OSI model, and pcap analysis
  • DoD 8570 IAT Level III compliant
99

Senior Cyber Security Analyst Resume Examples & Samples

  • Prior cyber security experience, ideally in Penetration testing role
  • Able demonstrate a passion for cyber security - through written papers, research etc
  • Knowledge of a variety of architectures and exploitative tools
  • Desire to conduct research
100

Cyber Security Analyst Resume Examples & Samples

  • Review, document, and analyze defensive security tactics and procedures
  • Collaborate to analyze attack vectors, gather evidence, and implement preventative controls
  • Architect and design cyber security technologies, integration of cyber detection capabilities, and defensive countermeasures
  • Provide recommendations on strategies for improving cyber security controls
  • Design and implement cyber maturity models to evaluate the effectiveness of an organization’s cyber program
  • Prepare and present technical reports and briefings
  • Work in a cyber-program focused on collaboration, partnership, and “out of the box” creativity
  • 4+ years of cyber operations, engineering, and / or architecture experience
  • 3+ years of audit experience
  • 2+ years in a leadership role in cyber security
  • 2+ years government related cyber security experience
101

Cyber Security Analyst Resume Examples & Samples

  • ) Advanced threat monitoring, threat intelligence experience
  • ) Security Information Management, monitoring, platform management
  • ) Networking Firewall Experience
102

Cyber Security Analyst Resume Examples & Samples

  • Monitor and analyze security event data
  • Use security tools to determine the nature and scope of security events to differentiate between potential intrusion attempts and false alarms
  • Use the trouble ticketing system to track security event investigations to resolution
  • Document all activities during an incident and provide status updates to leadership
  • Stay up to date on current vulnerabilities, attacks and countermeasures
  • Conduct proactive threat and compromise research and analysis
  • Assist with the development of processes and procedures to improve NOC operations
  • Foster and maintain good relationships with colleagues to meet Sponsor’s requirements
  • 24x7 shift coverage
103

Cyber Security Analyst Resume Examples & Samples

  • 3+ years' experience in an enterprise security role
  • Extensive experience with Web Application Security - able to identify, confirm, and remediate vulnerabilities
  • Broad knowledge of security best practices and compliance requirements
  • Technical and user experience with Atlassian suite of products, including, but not limited to, JIRA, Confluence, or Bamboo
  • Experience with secure coding best practices
  • Experience implementing and assessing security controls in appropriate information systems
  • Determine agency-level risk to the mission or business case
  • Experience with enterprise Identity Management technologies and implementation
104

Cyber Security Analyst Resume Examples & Samples

  • DoD 8570.1M IAM level 2 is required (i.e., CISSP or CASP)
  • Resource will act as the IASO for hosted systems, assuming the responsibilities
  • Resource will assist hosted customers in obtaining and maintaining RMF for DOD IT, DIACAP, and other certifications as required
  • Resource will update and/or assist the hosted system's personnel in updating artifacts of the accreditation package and store the artifacts in organizationally defined repository; i.e., system diagram (logical and physical) Hardware/Software/Firmware Inventory, Interface & Ports, Protocols and Services listing, etc
  • Resource will assist in the preparation of network infrastructure specifications or designs incorporating required information security features
  • Resource will review and evaluate Information Systems Design Plans, Continuity of Operation Plans, Communication Plans, engineering change proposals and configuration changes for compliance with relevant security regulations, policies, and best industry practice
  • Resource will assist in the preparation of required documentation and coordination with Authorizing Official/Designated Approval Authority to obtain hosted system security accreditation to include certification procedures and criteria, certification evaluation reports and reports of findings
  • Resource will provide security engineering design and analysis services
  • Resource will perform vulnerability scanning of computer systems using authorized security scanning software
  • Resource will use results of vulnerability scans to determine vulnerabilities and develop operational plans to remediate or mitigate vulnerabilities as they are discovered
105

Cyber Security Analyst Resume Examples & Samples

  • ) Advanced threat monitoring, threat intelligence, dark web, gathering analysis
  • ) Security Information Management, Monitoring, Platform Management - Experience with SIEM tools (i.e., Archsight, Splunk, Snort, Qradar)
  • ) Perimeter protection - Networking Firewall
  • **NO CORP TO CORP****
106

Senior Cyber Security Analyst Resume Examples & Samples

  • Provides subject matter expertise on enterprise cyber security risks, threats, technologies, and potential impact
  • Continually monitors against authorized security control requirements and reports system risks and application configurations or vulnerabilities
  • Intercepts and prevents internal and external attacks or attempts against PNNL systems
  • Interprets, analyzes, and executes incident response actions for detected intrusion anomalies and events
  • Conducts system, network, and software vulnerability assessments and penetration testing
  • Prepares and presents technical reports and briefings
  • Contributes to design, development and implementation of countermeasures, cyber security systems integration, and leverages tools specific to cyber security operations
  • Ability to reverse engineer malware
  • Advanced Security Certification (CISSP, CEH, EnCE, etc)
  • Weekend or evening “on-call” duties
  • Exceptionally strong peer leadership, interpersonal, collaborative, and customer relationship skills are essential
  • Use practical knowledge to effectively remediate threats, and modify activities and priorities to anticipate and respond to changing conditions
  • Network protocols, uses, and potential exploitation by malicious software
  • Applying layered computer network defense techniques and network policy architectures
  • Tracking malware infections across a wide enterprise
  • Working independently and leading collective team efforts to develop theories, ideas, and concepts around cyber security methodologies
107

Cyber Security Analyst Resume Examples & Samples

  • 1+ years of experience Cyber Security, Information Security and Risk Management
  • 1+ years of experience of Domain Name System (DNS), networking topologies and protocols, and internet security concepts
  • 1-2 years of financial services, risk management, technology, digital services or legal-facing experience
  • Experience leveraging Open Source Intelligence (OSINT) to inform a process a plus
  • Experience with Lockheed Martin’s Cyber Kill ChainTM and Intelligence Driven Defense a plus
  • Nice to have experience in Brand Protection detection tools
108

Cyber Security Analyst Resume Examples & Samples

  • CISSP, Security+ or equivalent security certification preferred
  • Active or ability to obtain SC clearance
  • Experience with SIEM and/or log aggregation technologies such as LogRhythm, Netwitness, RSA SA or McAfee ESM
109

Lead Cyber Security Analyst Resume Examples & Samples

  • Develop an overarching security awareness strategy that takes corporate culture and existing relevant policies and technical security standards into account
  • Drive the development and publishing of security awareness materials and contents
  • Facilitate training sessions for new hires, existing employees and target user groups as required by the business
  • Evaluate existing security capabilities to understand needs with a view to translating those needs into additional capabilities verified to meet business requirements
  • Serve as an information security advisor to other subject matter experts and key business stakeholders, establishing trust relationships through active engagement and powerful collaboration
  • Interpret relevant security policies, standards, guidelines and best practices for the purposes of communicating security requirements and rationales to internal customers in non-technical terms
  • Act as an advocate for information security on mergers & acquisition projects
  • Own and manage the team’s intranet site to keep contents relevant and updated
  • Conduct threat and vulnerability assessments to determine security requirements and controls following assessment of the potential business impact of security breach
  • Provide security consultancy and assessment services whilst introducing improvements in technical security standards and security implementation designs/patterns
  • Sound decision making skills with exceptional ability to strike the right balance between security requirements and strategic business objectives
  • Strong analytical and conceptual skills balanced by broad perspective on how security efforts support realization of business goals
  • Demonstrated experience in understanding security risks, identifying control gaps and advising senior management and relevant business stakeholders on the most effective mitigation options
  • Working knowledge of security frameworks and industry best practices such as NIST, SANS, ISF, ISO 27001 and COBIT
  • Ability to thoroughly review technical design components to ensure alignment with security policies, standards and best practices
  • Strong knowledge and understanding of current and emerging cyber security threats, vulnerabilities, trends and mitigations ranging across the technologies required to provide layered defense
  • Excellent understanding of key information security terms, tenets and models
  • Strong interpersonal skills and positive attitude required to interface with all levels within the organization
110

Cyber Security Analyst Resume Examples & Samples

  • 5 years of experience with SharePoint
  • 3 years of experience as a Cyber security analyst as of January 2010
  • Experience with Enterprise Mission Assurance Support Service (eMASS)
  • Experience in developing change management plans and procedures
  • Experience in writing product evaluation papers and senior staff summary documents
  • DODI 8570 IAT Level I or higher Certifications, including Net+, Security+, CISSP, and CISM
  • Experience with DoD and Air Force Cybersecurity policies and processes, including DODI 8530
  • Experience with Air Force or DoD Command and Control capabilities
  • Experience with JCIDS Battlespace Awareness requirements
  • Experience with developing DoDAF artifacts and using them as input for system validation and verification
  • MCSE or MCITP, SQL, SPLUNK, and Oracle Certifications
111

Cyber Security Analyst Resume Examples & Samples

  • Investigate network intrusions and other cyber security breaches to determine the cause and extent of the breach
  • Research, develop, and recommend hardware and software needed for Incident Response and develop policies and procedures to analyze malware
  • Participate in technical meetings and working groups to address issues related to malware security, vulnerabilities, and issues of cyber security and preparedness
  • Collaborate with the Executive Director of Cyber Security & Investigations and INFOSEC to facilitate an effective IR program
  • Prepare, write, and present reports and briefings
  • Thoroughly investigate instances of malicious code to determine attack vector and payload
  • Develop high performance, false positive free, signature based network level, and malware detection schemes
  • Participate in special forensic investigations as required, including collection, preservation of electronic evidence
  • Preserve and analyze data from electronic data sources, including laptop and desktop computers, servers, and mobile devices
  • Preserve, harvest, and process electronic data according to the department's policies and practices on an as necessary basis
  • Endpoint and network intrusion detection, investigation, and response
  • Information security monitoring and risk management
  • Identify areas of weakness and vulnerability and recommend changes to meet security standards
  • Attack sensing and warning
  • Host and network security auditing
  • Insider threat analysis
  • Previous experience working in a regulated/compliance based environment (PCI/POS/Gaming)
  • Previous experience with ProofPoint
112

Principal Cyber Security Analyst Resume Examples & Samples

  • Bachelors and five (5) years or more experience; or Masters and three (3) years or more experience
  • Excellent organizational, attention to detail, multi-tasking, and time management skills
  • Ability to interface effectively with all levels within the organization
  • A holistic understanding of attack vectors, current threats, and remediation strategies is essential for this role
  • Certifications such as CISSP, CEH, etc
  • Five (5) years incident response experience
  • Three (3) year vulnerability scanning experience
  • Apple OSX operating systems (system administration level)
  • Penetration testing experience. Working knowledge of security auditing processes
  • Coding/Scripting experience e.g. Perl, VB Script, Python etc
113

Cyber Security Analyst Resume Examples & Samples

  • Three (3) years or more experience in lieu of degree
  • Ability to occasionally support flexible shifts
  • Ability to occasionally support travel
  • An understanding of attack vectors, current threats, and remediation strategies
  • Three (3) years development / programming / scripting
  • Application Development / Programming / Scripting
  • Database Administration (i.e. Microsoft SQL, MySQL, Postgre)
  • One (1) year vulnerability scanning experience
  • Coding/Scripting experience e.g. Perl, VB Script, Python, Bash, Shell etc
114

Principal Cyber Security Analyst Resume Examples & Samples

  • Data Analytics, including mastery with Excel, Filemaker and other tools
  • Ability to effectively lead meetings and projects
  • Experience with SharePoint administration (basic level)
  • Strong written, verbal, interpersonal skills, emotional intelligence, and a positive attitude to interface effectively with all levels within the organization
  • Possess excellent analytical and problem-solving skills
  • Excellent organizational, detail, multi-tasking, and time management skills
  • 3+ years incident response or vulnerability management experience
  • Operating Systems: Linux, Apple OSX, Windows (system administration level)
  • High level of experience with Splunk for data analysis
  • Coding/Scripting experience e.g. Perl, VB Script, Python etc. is a plus
115

Senior Cyber Security Analyst Resume Examples & Samples

  • Collaboration with IT technical teams for issue resolution and mitigation
  • Collaboration with IT technical teams to deliver Information Security service improvements through project lifecycle
  • Host level forensics
  • Experience assisting the development and maintenance of tools, procedures, and documentation for the Computer Security Incident Response Team (CSIRT)
  • Subject matter expert (SME) in one or multiple areas such as Windows, Unix, firewalls, intrusion detection, threat detection analysis, or computer forensic
  • Outstanding work ethic
  • Ability to rapidly find, assimilate and correlate information correctly while under pressure
  • One or more of the following SANS GIAC, GCIA or GCIH certification and/or CISSP, CISM
  • Working knowledge UNIX/Linux
  • Working knowledge of malware forensic technologies
  • Working knowledge of malware sandboxing technologies
  • Working knowledge Vulnerability Management Products
  • Working knowledge of SQL queries
116

Senior Cyber Security Analyst Resume Examples & Samples

  • Bachelor's Degree and 5+ years of experience or H.S. Degree and 9+ years of experience
  • Experience with Cisco or Palo Alto firewalls is required
  • Experience conducting Threat Analysis
  • Experience with Splunk is highly desired
117

Cyber Security Analyst Resume Examples & Samples

  • Experience conducting Vulnerability Assessments running such tools as WebInspect, Burp, Nessus, Appscan and others
  • Experience defining and managing tasks with minimal oversight and providing status to senior government managers
  • Experience writing and maintaining organizational and project level IT security policies, standards, guidelines and procedures based on Federal IT security requirements and agency policies/practices
  • Experience administering and configuring a broad range of operating systems, databases, and server configurations
  • Experience applying, tailoring and augmenting 3rd party security baselines for operating systems, databases, mobile devices, laptops, workstations, servers and cyber security defense infrastructure
  • Knowledge of Linux and Windows scripting
  • Communication skills that include developing and delivering technical papers and presentations to senior management, stakeholders and peers in business (non-technical) terms, if required
  • Reporting skills - relating project, task and other work status to senior IT management and stakeholders both informally and formally
  • Documentation skills - writing policy, plans, procedures and supporting documentation
  • Maintain currency on Federal security recommendations and practices
  • Evaluate security tools and develop business cases for investments in technology solutions that deliver improvements in security
  • Assist with creating and maintaining policies, standards, guidelines and procedures
  • Recommend improvements for the overall security posture of infrastructure, systems and applications
  • Develop, improve and help implement best practices for risk reduction across a broad range of enterprise applications, systems, networks and interfaces
118

Cyber Security Analyst Resume Examples & Samples

  • Monitor NASA agency reports and SOC (Security Operations Center) systems for incidents and malicious activity
  • Correlate and discover relationships between events and incidents
  • Produce high quality reports
  • Perform relevant incident data analysis and correlate with multiple sources for mitigation
  • Provide incident handling and response support for the agency
  • 4-6 years related work experience
  • Process oriented individual excelling in a team environment
  • Knowledge of common enterprise applications, e-mail, web, cloud, client/server applications
  • Ability to obtain a government clearance (US Citizenship is required)
  • Experience with customer service coordinating with team activities
  • Experience reviewing and analyzing log data
  • Familiarity in a command line environment
  • CEH, Security+ are desired certifications
119

Cyber Security Analyst Resume Examples & Samples

  • Review threat data from various sources, and develop custom signatures for open source Intrusion Detection Systems (IDS) or other custom detection capabilities
  • Employ advanced forensic tools
  • May conduct malware analysis of attacker tools providing indicators for enterprise defensive measures, and reverse engineer attacker encoding protocols
  • Interface with remote team members located across the globe
  • Bachelor’s degree in a Computer Science/Engineering or Information Technology related field
  • 2 to 5+ years of successful work experience in IT technologies including networking, operating systems, or a related field
  • Knowledge of networking protocols (such as TCP, UDP, DNS, FTP, SMTP, DHCP, etc.)
  • Experience with Windows operating system functionality (file system structure, registry keys, scheduled tasks, processes, services, memory management, data storage, etc.)
  • Excellent analytical and critical thinking skills
  • Excellent interpersonal and communication skills (verbal & written)
  • Required Travel: <10%
  • Experience managing an investigation; understanding the methodologies for investigative triage, case/investigation definition, etc
  • Understanding of the Windows File System structure, and ability to recover deleted files, search hidden files, and access registry keys
  • Knowledge of Operational Security (OpSec) principles for cyber operations with an emerging understanding of the relationships between the cyber domain disciplines
  • Ability and experience capturing and analyzing volatile (in-memory) data
120

Tier Three Cyber Security Analyst Resume Examples & Samples

  • Extensive experience analyzing and synthesizing information with other relevant data sources, providing guidance and mentorship to others in cyber threat analysis and operations, evaluating, interpreting, and integrating all sources of information, and fusing computer network attack analyses with counterintelligence and law enforcement investigations
  • Email security
  • Digital media forensic
  • Monitoring and detetion
  • Vulnerability assessment and pen test
121

Tier Two Cyber Security Analyst, DC Metro Resume Examples & Samples

  • Extensive experience working with various security methodologies and processes, advanced knowledge of TCP/IP protocols, experience configuring and implementing various of technical security solutions, extensive experience providing analysis and trending of security log data from a large number of heterogeneous security devices
  • Expert knowledge in two or more of the following areas: Vulnerability Assessment, Intrusion Prevention and Detection, Access Control and Authorization, Policy Enforcement, Application Security, Protocol Analysis, Firewall Management, Incident Response, Encryption, Web‐filtering, Advanced Threat Protection
  • Specialized experience in one of the following areas
122

Cyber Security Analyst Vulnerability Management TS Resume Examples & Samples

  • Broad scope of tasks associated with vulnerability management; system and application scanning; compliance reporting and other cyber security tasks related to identifying and mitigating security vulnerabilities
  • Performs VM functions related to audit/inspection; infrastructure support; certification and accreditation; detection and response support services
  • Requires DoD 8570: IAT II and CND-SP Specialty: CND Analyst
123

Senior Principal Cyber Security Analyst CND Tools Data Integration Resume Examples & Samples

  • Broad scope of tasks to include O&M and tuning of cyber defense tools; integration of Splunk; Forescout; Fire Eye; Tanium and other tools; security architecture design; implementing new cyber capabilities; implementing regional based IPS; designs and defines system architecture for new or existing computer systems
  • Performs functions to include but not limited to systems engineer; audit/inspection; infrastructure support; certification and accreditation; vulnerability management; detection and response support services
  • Executes policies and guidance provided by senior functional/technical leads
  • Must be willing to obtain and maintain CI polygraph
124

Intermediate Cyber Security Analyst Data Integration Aggregation TS Resume Examples & Samples

  • Communicates alerts to agencies regarding intrusions and compromises to their network infrastructure, applications and operating systems
  • Primary responsibility is Maintain; Configure and Troubleshoot Cyber Defense Systems. The candidate will have experience in one of the following areas
  • Linux based servers and appliances
  • Client\Server technologies and troubleshooting
  • Arcsight
  • May also assist with the following: 80/443 web content filters/proxies; email security capabilities; IDS; IPS;SEIM; DNS security practices; advanced log analysis; network monitoring; network flow analysis; packet capture analysis; network proxies; firewalls; anti-virus capabilities; Linux/UNIX command line; and access control lists
  • Ability to write signatures for detection systems; such as SNORT and McAfee Intrushield a plus
  • Will have experience with multi-tasking providing on ground support to CNDSP work centers
  • Will have excellent oral and written skills creating programmatic documentation; standard operating procedures and granular process checklists
  • Requires DoD 8570: IAT III and CND-SP Specialty: CND-IS
125

Cyber Security Analyst Resume Examples & Samples

  • DbProtect vulnerability Assessment & Database Inventory. Assess, identify and remediate vulnerabilities that expose the database. Enforce user access controls and privileges
  • SNORT network intrusion prevention system (NIPS) and network intrusion detection system (NIDS). Perform traffic analysis and packet logging on Internet Protocol (IP) networks. Carry-out protocol analysis, content searching, and content matching to detect probes or attacks, including operating system fingerprinting attempts, common gateway interface, buffer overflows, server message block probes, and stealth port scans
  • Countertack Active Defense to detect malware infections on client systems and collect forensic memory dumps
  • Report and disable lost mobile devices to include mobile phones, tablets, and thin clients
  • Assist with System Certification / Assessment and Audit response / compliance assurance
  • Adhere to Service Level Agreements (SLAs), Key Performance Indicators (KPIs), and operational metrics
  • Utilize ITSM (Remedy preferred) ticketing system
  • Experience with Remedy service management systems and working in a collaborative service desk environment would be an asset
  • Other skills required include possessing strong written & verbal communication skills and inter-personal qualities needed to collaborate closely with Operations and Engineering Staff, Service Desk Support Technicians, Managers and Customers
  • Capable of managing multiple tasks while demonstrating flexibility with adjusting priorities depending on operational need and will be able to assimilate new technologies quickly and be willing to maintain industry knowledge
126

Senior Principal Cyber Security Analyst Resume Examples & Samples

  • Linux (Debian, RedHat, CentOS) and Windows experience (system administration level)
  • Strong written, verbal, interpersonal skills, emotional intelligence, and a positive attitude
  • Seven (7) years cyber security experience
127

Cyber Security Analyst Resume Examples & Samples

  • Strong Splunk skill set. The security analyst will leverage Splunk to analyze logs and other security events to find targeted attacks against network based bank assets
  • Strong Intrusion Analysis background. Resource must be able to identify and interpret weblogs from various webservers
  • Working knowledge of Linux, Windows, and OS X operating systems
  • Comfortable with scripting languages and regular expressions
  • Working knowledge of enterprise Client / Server architecture
  • We are a front line team that handles active security events and highly current threats. On call and after hours work can be expected although we rotate to approximately one week every 2 months
  • The analyst will use new intelligence to update existing controls to detect new threats against the bank. Will be expected to have solid technical skills to operate independently and to support others within the security team
  • Understanding of stateful firewalls and able to interpret firewall rules
  • Familiarity with web application attacks including SQL injection, cross-site scripting, and remote file inclusion
128

Csoc Cyber Security Analyst Resume Examples & Samples

  • Interface/engage with external customers on a range of topics to include: alerts, system configurations, incident response, calibration of detection tools and similar activities
  • Serve as a technical resource during pre-sales, ramp up, deployment and operations for the CSOC business leadership
  • Correlate actionable security events from various log sources which either feed or supplement the Security Information and Event Management (SIEM) solution
  • HS degree required, Bachelor’s degree in a Computer Science/Engineering or Information Technology related field highly preferred
  • 5 to 8 years of successful work experience in IT technologies including networking, operating systems, or a related field
  • Capable of learning new concepts and processes quickly, and adapting to a constantly changing environment
  • Ability to apply skill set to resolve complex problems
  • Required Travel: <10% (International and Domestic)
  • Working knowledge of ICS (Industrial Control Systems) systems, protocols, etc
  • Application of common Cyber Security concepts including Intrusion Detection Systems, Host Intrusion Prevention Systems, and Anti-Virus Solutions
  • Experience with network signature development with tools such as SNORT, NetFLOW, WireShark, tcpdump or related tools
129

Cyber Security Analyst Resume Examples & Samples

  • 1 year of Cyber Security experience
  • Ability to manage tools such as Tippingpoint, Splunk, and Forcepoint
  • Experience performing risk/vendor assessments or policy development
  • Experience with Intrusion detection systems (IDS)
  • Experience with in-plane switching (IPS)
130

New Grad-cyber Security Analyst Resume Examples & Samples

  • Develop sound Cybersecurity processes to include implementation of RMF-based policies and procedures
  • Conduct assessments of systems and networks within the networking environment or enclave and identify where those systems and networks deviate from acceptable configurations, enclave policy, or local policy
  • Execute vulnerability assessments; ensure mitigation of risks and support obtaining certification and accreditation of systems
  • Document the results of Certification and Accreditation activities and technical or coordination activity and prepare the system Security Plans and update the Plan of Actions and Milestones POA&M
  • Be completing or has completed their degree (Bachelor’s, Master’s, or PhD) from an accredited institution; It must be no more than 1 year if the degree has already been obtained
  • Not have professional work experience in their field of study (excluding internships, co-ops, or research studies)
  • Be majoring in a STEM degree field such as computer engineering, computer science, engineering, physics, or math
  • Have an overall cumulative GPA of 3.25/4.0 or higher (unofficial academic transcripts must be provided at time of application by uploading the documents to your application or profile)
  • Be able to obtain a U.S. Government security clearance (U.S. citizenship is a pre-requisite)
  • Good presentation and writing/communication skills
  • Self-motivated, willing to learn, and interested in working in a team environment
  • Have an overall cumulative GPA of 3.70/4.0 or higher
  • Top Secret/SCI security clearance
  • Working knowledge of Linux Red Hat and Microsoft operating systems
  • Working knowledge and understanding of boundary protection devices, including firewalls and IPS devices
131

Cyber Security Analyst Resume Examples & Samples

  • Candidate should have experience supporting CND or related teams; working CND duties; working with DoD / Government Leaders at all levels; and strong communication skills
  • Knowledge of hacker tactics, techniques and procedures (TTP)
  • Ability to conduct malware analysis - analyze packed and obfuscated code. Understanding of software exploits
  • Associates Degree and 4 years experience in IS
  • Applicable military experience/training or equivalent training certificate(s) from an accredited training program may substitute for the degree requirement
  • A Bachelor’s degree in Electrical Engineering, Information Systems, Computer Science, Physics, Math, or related field that supports the duty requirements may fulfill all the education and experience requirements established for this position
  • Candidate must possess a CompTIA Security+ with Continuing Education (CE) certification. Must meet DoD 8570.01-M IAT II certification within six months of hire (CEH certification)
132

Cyber Security Analyst Resume Examples & Samples

  • Candidate will provide C2 support, situational awareness support, and provide leadership & support for all CND applicable activities within Protect, Detect, Respond, and Sustain
  • Candidate will support teams within a performance-based environment with pre-determined Acceptable Levels of Performance (ALP’s)
  • Candidate is responsible for maintaining the integrity & security of enterprise-wide systems & networks
  • Candidate should have at least one other IA certification completed, i.e., SSCP, CSIH, GCIA, GCIH or CEH
  • Candidate should have UNIX Administrative skills. -
  • Be able to conduct malware analysis
  • Demonstrated hands on experience with various static and dynamic malware analysis tools
  • Knowledge of advanced threat actor tactics, techniques and procedures (TTP) Understanding of software exploits
  • Ability to analyze packed and obfuscated code
  • Comprehensive understanding of common Windows APIs and ability to analyze shellcode
133

Senior Cyber Security Analyst Resume Examples & Samples

  • Conducts tests on existing complex data security architecture to determine degree of stability
  • Reviews security status reports to oversee system status and potential and actual security violations
  • Writes reports and communicates to management/client findings. Understand and provide expertise on the Operational Acceptance process for weapon systems and IT capabilities. Prepare and conduct system implementation readiness reviews on behalf of the 24 AF Commander
  • Experience working with company software and hardware products
  • Experience working with operating systems
  • Experience with networking
  • Good communication skills to interact with team members, management, and support personnel
  • Defense community experience required
  • Data and Network security experience required
  • Technical writing experience desired
  • Cloud computing experience desired
  • Network architecture experience desired
  • Required Certifications: Security+, IAT Level II
134

Cyber Security Analyst Resume Examples & Samples

  • Identifies security exposures that currently exist, or are emerging, and that create potential threats to Baker Hughes infrastructure, systems or data. Notifies leadership of potential or existing threats and proposes risk mitigating strategies
  • Able to perform computer forensics for Windows and UNIX based operating systems
  • Utilizes “Incident Response” and testing procedures during the investigation of security alerts and events
  • Capable of understanding network forensics in order to identify lateral movement and threat vectors related to a cyber-event
  • Monitors security blogs, articles, and reports and remains current on related laws, regulations, and industry standards to keep up to date on the latest security risks, threats, and technology trends and uses this knowledge. Incorporates information into processes, procedures, and audit preparedness activities
  • Ability to assess present cyber security related technical controls and recommend additions or modifications where appropriate to increase defensive posture. Familiarity with the technical security control marketplace and recommend future direction in order to fill existing or emerging gaps as they are known to exist
  • Able to engages at all levels of Business and IT Functions as deemed necessary based on the type and severity of a Cyber Incident
  • 5-7 years’ experience
  • Security audit functions experience
  • Security operations experience including the deployment and use of enterprise tools such as firewalls, web proxies, anti-virus and patching solutions
  • Proficiency in forensics, forensic investigation/analysis, advanced incident handling, intelligence gathering, forensic research, and formal incident investigation
  • Detailed technical experience with a minimum of four years’ experience in one or more of the following: computer network penetration testing and techniques; computer evidence seizure, computer forensic analysis, and data recovery; computer intrusion analysis and incident response, intrusion detection; computer network surveillance/monitoring; network protocols, network devices, multiple operating systems, and secure architectures
  • Applicable Certifications: CISSP, GIAC Certified Intrusion Analyst (GCIA), GIAC Certified Incident Handler (CGIH), GIAC Certified Forensic Analyst (GCFA)
135

Cyber Security Analyst Resume Examples & Samples

  • Ensure all pertinent information is obtained to allow the identification, categorization, incident handling and triage actions to occur in a time sensitive environment
  • Analyze network traffic and various log data and open source information to determine the threat against the network, recommend appropriate countermeasures, and assess damage
  • Act as the point of contact for accepting, collecting, sorting, ordering, and passing on incoming information for the reported cyber events
  • Facilitate and expedite the tracking, handling, and reporting of all security events and computer incidents in accordance with organizational procedures
  • Evaluate and perform incident escalation in accordance with organizational guidelines
  • Solve complex technical issues with limited supervision
  • Work with other team members to ensure an effective and efficient cyber incident management system
  • Open to future career development opportunities within Textron business unit locations
  • Protect and maintain the privacy of employee personnel records including, but not limited to, personal and compensation information about employees
  • Bachelor’s Degree in Information Assurance/Security or related field required
  • Ability to obtain a secret security clearance required
  • Relevant internship experience preferred
  • Degree from designated National Centers of Academic Excellence in Information Assurance (CAE/IAE) Education Programs preferred
  • MCSE, CCNA, CCNP, ISC, CAP, Associate of (ISC)²/CISSP, CISM, CompTIA, or GIAC certifications preferred
  • Knowledge of a scripting language, Python preferred
  • Ability to work individually and part of a team with little supervision
  • A high level of personal integrity with the ability to handle confidential matters
  • Demonstrated knowledge of incident data flow and response, content, and remediation
  • Demonstrated understanding of incident response processes, cyber threats, vulnerabilities and network exploits
  • Working knowledge of security monitoring, security event and incident management systems, Internet content filtering/reporting, and malware prevention
  • Working knowledge of anti-virus, firewall, intrusion detection/prevention, and web security technologies
  • Classroom experience or exposure to incident response or malware analysis
136

Cyber Security Analyst Resume Examples & Samples

  • (ISC)², Microsoft, CompTIA, or GIAC certifications preferred
  • Knowledge of a scripting language, Python or PowerShell preferred
  • Familiar with common server and authentication technologies
137

Joint Service Provider Cyber Security Analyst Resume Examples & Samples

  • BS degree with 2 years experience OR 6 years experience in lieu of degree
  • 6+ years of Cyber Security experience
  • DoD Experience - 2 or more years
  • IAT Level III certification
138

Cyber Security Analyst Resume Examples & Samples

  • Selected candidate will collect and analyze event information and perform threat or target analysis duties
  • Provides operations for persistent monitoring on a 24/7 basis of all designated networks, enclaves, and systems
  • Reviews incident logs/records mining for patterns and correlate with tools, including Splunk
  • Coordinates with external organizations and authorities to collaborate on investigations, collect IOCs, share intelligence, etc
  • Coordinates and distributes directives, vulnerability, and threat advisories to identified consumers
  • Provides daily summary reports of network events and activities and delivers metric reports
  • Recommend counter measures to malware and other malicious type code and applications that exploit customer communication systems
  • Monitors various sources for threat intelligence on a regular basis
  • Conduct reverse engineering for known and suspected malware files
  • Develop policies and procedures to investigate malware incidents for the entire computer network
  • Assist in the development and delivery of malware security awareness products and briefings
  • Develops models for identifying malicious activity using various tools and statistical analysis
  • Works closely with other teams to investigate and remediate incidents
  • Active Top Secret or Secret security with the ability to obtain a TS/SCI
  • Existing Public Trust
  • CEH, MSCE, CGIA, CCNA, or CISSP Certification
  • Statistical modeling and analysis experience to infer possible cybersecurity threats
  • Experience in analysis in investigations, such as with IT, law enforcement, military intelligence, or business analytics
  • Pentesting experience
139

Senior Cyber Security Analyst Resume Examples & Samples

  • Participate in audit review and interview of subject matter experts (SMEs)
  • Bachelor’s degree
  • 6+ years of relevant experience
140

Cyber Security Analyst Resume Examples & Samples

  • Apply knowledge of cyber best practices, controls, policies, procedure, and standards
  • Apply cyber and information privacy approached to systems, networks, services, devices, tools, communications, policies, and business processes
  • Document findings for client reporting
141

Senior Cyber Security Analyst Resume Examples & Samples

  • Monitor for and investigate suspicious or malicious activity and alerts
  • Review Change Management requests for security relevance and impact
  • Daily review of system, application logs, and custom monitoring tools
  • Malware and Advanced Persistent Threat (APT) analysis and remediation
  • Leading Incident Response and Investigations
  • Availability for rotating on-call shift (1 week every 10-12 weeks)
  • Bachelor’s degree or 5+ years of related field experience
  • Professional Certifications preferred including SANS GIAC, CISSP, Security+
  • 5+ years work experience in Information Technology
  • 3+ years experience in information security incident response and operations management
  • 3+ years of OS, application, and network security weaknesses, vulnerabilities, and remediation
  • Experience researching, analyzing, and resolving complex problems with minimal supervision
  • Must possess excellent written and verbal communication skills
142

Cyber Security Analyst / CI Poly / CR Squad Resume Examples & Samples

  • Expert knowledge of physical computer components and architectures, including the functions of various components and peripherals, basic programming concepts, assembly codes, TCP/IP, OSI models, underlying networking protocols, security hardware and software
  • Proficiency with command line interface for UNIX/Linux and Windows
  • Proficiency in writing, editing, executing scripts on Windows, Linux, UNIX systems
  • Certifications such as CEH, Security+, SANS GPEN, GIAC, OSCP
  • One or more of the following experiences required: Experience with toolsets such as Wireshark, Metasploit, tcpdump, NMap, Nessus, Snort, BRO, EnCase, Forensic Toolkit, Windows Fundamentals, Unix fundamentals, exploitation theory, privilege escalation, evidence removal
  • Possess one of the following certifications, or similar certification upon hire or be willing to obtain within 6-months of start date
  • Experience with encryption and decryption such as PGP, DES, AES, RSA, PKI
  • Experience with Cyber Threats Detection and Mitigation, Behavioral Malware Analysis
  • Experience with, Advanced Network Traffic Analysis, Malicious Network Traffic Analysis
  • Experience programming in C, C++, C#, Ruby, Perl, Python, SQL
  • Certifications such as GXPN, GREM CCNA, CCNP, CCIE, RHCE, CompTIA
  • Experience working with correlation environment tools (i.e., ArcSight)
143

Cyber Security Analyst Resume Examples & Samples

  • BS/BA in Computer Science, Information Systems, Software Engineering or other related analytical, scientific or technical discipline or 6 years related experience
  • Ability to work independently and also collaborating with others
  • Must be motivated and results oriented
  • Final DoD TS/SCI clearance with reinvestigation in the last 5 years
  • DISA’s HBSS 301 Advanced ePO5.1
  • CompTIA Network+
  • 1-3 years experience risk managemet framework
144

Cyber Security Analyst Resume Examples & Samples

  • Manage all aspects of Information Systems (IS), data availability, integrity, authentication, confidentiality, and non‐repudiation
  • Develop and execute Government approved security policies, plans, and procedures; design and implement data network security measures
  • Conduct vulnerability assessments and carries out penetration tests
  • Perform social engineering tests and analyzes technical security weaknesses
  • Research and maintain proficiency tools, techniques, countermeasures, and trends in computer and network vulnerabilities, data hiding, and encryption
  • Develop tools, techniques, training, and countermeasures for computer and network vulnerabilities, data hiding, and encryption
  • TS/SCI with active polygraph clearance is required
  • Experience working in a cyber-security position
  • Experience adapting easily to new and changing technologies
  • Experience performing penetration testing and using tools such as Wireshark and Splunk
  • Experience supporting the Intelligence Community and expertise with multiple technical applications is required
  • Experience working across organizations, managing multiple, high-priority tasks
  • Excellent written communication skills are required
145

Cyber Security Analyst Principal Resume Examples & Samples

  • Requires sound understanding of Cyber security systems and process
  • Provide systems engineering service support/advisement to the customer on cyber event resolution efforts of suspected and detected cyber network defense (CND) events
  • Provide subject matter expertise (SME) support to technical problem resolution capabilities on CNDS components
  • Advise customer on performance of the CND systems
  • Provide SME support and advise customer on the Indications and Warning functions within the ops center associated with security breaches, intrusions, or illicit activity
  • Provide SME support to customer meetings, forums, and crisis action teams
  • Bachelors and nine (9) years or more experience; Masters and seven (7) years or more experience ; PhD or JD and four (4) years or more experience
  • Bachelor’s degree with 5+ years of Cyber experience or equivalent relevant experience
  • Relevant cyber security experience in accordance with the job description mentioned above
  • Experience working with IT systems, networks, processes, or requirements
  • Proficient with multiple CND tools
  • Demonstrated ability to manage multiple tasks and deliverables simultaneously
  • Ability to work independently and with a team
  • Familiarity with the Customer/Client missions and organizations
  • Excellent writing, organization, verbal communication, and presentation skills
  • Experience with the Customer/Client Communications Systems Directorate
  • Experience working in the Intelligence Community
  • Experienced user in Microsoft Office applications (PowerPoint, Word, Excel, etc.)
  • Commitment to recognize, understand, respect and operate effectively within various SETA, FFRDC, and Government lines of authority
146

Cyber Security Analyst Resume Examples & Samples

  • Bachelor’s Degree (equivalent experience accepted in lieu of degree) 6 + years of relevant work experience
  • Knowledge of Federal and DoD Guidance (DoDD 8500.1, DoDI 8500.2), DIACAP, RMF, NIST, and DoD Certification & Accreditation processes
  • Excellent written and organizational skills
  • General knowledge of network, server and desktop technologies
  • IAT Level III Certification (CISSP or equivalent)
  • Acceptable Computing Environment certification
147

Senior Cyber Security Analyst Resume Examples & Samples

  • Bachelors and Five (5) years or more of related experience; or equivalent relevant experience in leiu of a degree
  • DoD 8570/8140 IAT II Certification (Security+, GSEC, or SSCP)
  • Experience with Cross Domain technologies
  • Experience with Information Technology Virtualization o Experience with Cloud IA Technologies
  • Experience with Cryptography
  • Experience with Public Key Infrastructure
  • Experience with Network and Host-Based Intrusion Detection and Prevention Systems
  • Experience with Cyber mission Computer Network Defense of space assets o Experience with Cyber Defense Techniques
  • Operational Readiness, Verification, and Validation Reviews
  • Masters and seven (7) years or more related experience; PhD or JD and four (4) years or more of related experience
  • CISSP, or CISM certification o Applies extensive technical expertise and has full knowledge of other related disciplines
  • Receives assignments in the form of objectives and establishes goals to meet objectives
  • Provides guidance to subordinates to achieve goals in accordance with established policies
  • Work is reviewed and measured based on meeting objectives and schedules
  • Establishes and recommends changes to policies which affect subordinate organization(s)
148

Cyber Security Analyst, Expert Resume Examples & Samples

  • Applies current Information Assurance technologies to the architecture, design, development, evaluation and integration of systems and networks to maintain system security
  • Developing customer technical solutions and enhancement of operational network security that harden networks to protect client's data against cyber attacks
  • Providing technical, security, and certification support during the development and testing phases of advance technology equipment
  • Developing requirement documents and system design documents
  • Participating in technical meetings to gain an understanding of customer requirements and to generate enterprise-wide system-level solutions
  • Providing technical support for specific contract tasks, contacts with vendors, and participating in external/commercial technical forums
  • Will prepare security documentation, using NIST and VA standards to achieve accreditation of supported systems. Represents program security interests at customer meetings
  • Provide support to achieve and maintain full FISMA High Assessment and Authorization (A&A) certification
  • Bachelor’s Degree in computer science, electronics engineering or other engineering or technical discipline is required
  • Minimum of 10 years experience with information security engineering discipline
  • Minimum of 5 years experience with complex security architecture consisting of multiple trust levels
  • 5+ years experience provisioning and operation of Security networking equipment, including IDS, Antivirus, AAA, Firewall, Security Gateway, VPN appliances, and SIEM architectures
  • Experience with Agiliance Risk Vision tool
  • Experience supporting VA Office Information & Technology is desired
  • Ability to pass VA Position Sensitivity and Background Investigation
149

Cyber Security Analyst Resume Examples & Samples

  • 82 and DoD 8510.01 Risk Management Framework (RMF) to provide solutions at the programmatic level in the development of complex work products, including analyses, reports, plans, policies, and presentations. This position will require occasional domestic and international travel and will be located in Arlington, VA or Norfolk, VA
  • 5+ years of experience with information assurance and security controls
  • Experience with building out accreditation packages for MCCAST (USMC) using the Risk Management Framework (RMF) process
  • Ability to travel periodically, both internationally and domestically
  • Knowledge of Industrial Control Systems (ICS) and IT networking preferred
150

Cyber Security Analyst Resume Examples & Samples

  • 4 year college degree in Computer Science, Management Information Systems, Computer Information Systems, or Computer Engineering
  • Industry certifications: Security Plus, Global Information Assurance Certification (GIAC), Global Certified Incident Handler (GCIH), Certified Information Systems Security Professional (CCISP)
  • 5 years of experience in IT Security roles or Security Technology
  • Familiarity with Symantec Endpoint Protection (SEP) or other Endpoint Protection programs
  • Knowledge of Advanced Persistent Threat (APT) activities
151

Cyber Security Analyst, Mid Resume Examples & Samples

  • Level IT security policies, processes, and guidance
  • Possession of excellent oral and written communications skills in the preparation of client
  • Ready, executive
  • Level briefings and reports
152

Cyber Security Analyst Resume Examples & Samples

  • Identification of electronic attacks from internal and external sources globally
  • Threat assessment of detected attacks and event escalation to the appropriate business area
  • Act as 1st line point of contact for detected security events
  • Apply decision-making logic and adequately react to security events affecting the business areas of Barclays Group
153

Cyber Security Analyst Resume Examples & Samples

  • Provide CND reports, trends, responses, mitigations, analysis, and information dissemination
  • Provide C2 support, situational awareness support, and provide leadership & support for all CND applicable activities
  • Support the development, documentation and tracking of measurements & metrics relevant to the ALP’s
  • Maintain the integrity & security of enterprise-wide systems & networks
  • Support security initiatives through predictive & reactive analysis, and by articulating emerging trends to leadership & staff
  • Possess a CompTIA Security+ with Continuing Education (CE) certification
  • Experience supporting CND or related teams
  • Experience working CND duties
  • Strong communication skills (both written and verbal)
  • In-depth understanding of TCP/IP protocols, ports, and services
  • At least one other IA certification completed, i.e., SSCP, CSIH, GCIA, GCIH or CEH
  • UNIX Administrative skills
  • Command Line Scripting skills (PERL, python, shell scripting) to automate analysis task
154

Cyber Security Analyst Resume Examples & Samples

  • Performs network traffic analysis utilizing raw packet data, net flow, IDS, and custom sensor output as it pertains to the cyber security of communications networks
  • Correlates actionable security events from various sources including Security Information Management System (SIMS) data and develops unique correlation techniques
  • Develop analytical products fusing enterprise and all- source intelligence
  • Conduct malware analysis of attacker tools providing indicators for enterprise defensive measures, and reverse engineer attacker encoding protocols
  • Interface with external entities including law enforcement organizations, intelligence community organizations and other government agencies such as the Department of Defense
  • 5 years of professional experience and a Bachelor’s degrees from an accredited college in a related discipline, or equivalent experience/combined education
  • CND reports, trends, responses, mitigations, analysis, and information dissemination
  • C2 support, situational awareness support, and provide leadership & support for all CND applicable activities
  • Supporting teams within a performance-based environment with pre-determined Acceptable Levels of Performance (ALP’s)
  • Supporting the development, documentation and tracking of measurements & metrics relevant to the ALP’s
  • Maintaining the integrity & security of enterprise-wide systems & networks
  • Supporting security initiatives through predictive & reactive analysis, and by articulating emerging trends to leadership & staff
155

Senior Cyber Security Analyst Resume Examples & Samples

  • BS/BA in Computer Science/Engineering (or equivalent)
  • 5+ years experience with Network or Information Security support
  • Needs to have a keen understanding of threat vectors as well as exfiltration techniques
  • Experience hunting proactively for threats within an enterprise
  • Experience investigating computer network intrusions in an enterprise
  • Security tool integration and process automation via scripting
  • Experience investigating intrusions in cloud/hybrid environments is desired
  • The ideal candidate will be knowledgeable and passionate about all things cyber
  • 5+ year experience with Incident Response
  • We prefer someone with 8+ years overall IT Infrastructure experience and 5+ years of recent operational security experience (SOC, Incident Response,
  • Malware Analysis, IDS/IPS Analysis, etc
156

Cyber Security Analyst Resume Examples & Samples

  • 3+ years experience with Network and/or Information Security support
  • Systems security exposure in at least two Operating Systems (Windows, Linux preferred)
  • Strong troubleshooting skills of complex network and security problems
  • Strong analytical skills to perform threat, vulnerability, and intrusion detection analysis
  • Highly disciplined and motivated, able to work independently, under direction, or as a member of a team
  • Must be able to attain a Secret Security Clearance
  • Needs to have an understanding of threat vectors as well as exfiltration techniques
  • CISSP or other security certifications. CCNA/CCNP or other network certifications
  • 1+ year experience with Incident Response
  • We prefer someone with 5+ years overall IT Infrastructure experience and 1+ years of recent operational security experience (SOC, Incident Response, Malware Analysis, IDS/IPS Analysis, etc.)
157

Senior Cyber Security Analyst Resume Examples & Samples

  • Responsible for monitoring and auditing ACAS Security Console (SC) and CMRS data feed and report directly to command IAM
  • Maintain ACAS date feed, via APS to DISA (Tier I)
  • Responsible for assisting SC Administrators with applying patches, ACAS update, STIGS, and plugins
  • Provide ATO Certification & Accreditation artifacts for ACAS and CMRS capabilities
  • Responsible to ensure SC roll updates as required
  • Provide SME level input support for SC Administrators and HBSS Support Admin's
  • Provide SME level input for APS
  • Must possess at least 5 years of hands on technical experience with a minimum of 5 year of experience in Information Assurance
  • 8 years IT experience
  • 5+ years administrating servers
  • 3+ years with vulnerability scanners
  • 2+ years Microsoft SQL server administration
  • 1+ years with IIS administration
  • NESSUS Scanner experience
  • Security Center experience
158

Cyber Security Analyst Resume Examples & Samples

  • Master's degree in Engineering, Computer Science, Business Management, Information Systems Management, or a related discipline, as well as ten (10) years of general experience and six (6) years of relevant experience OR possess a Bachelor's degree in Engineering, Computer Science, Business Management, Information Systems Management, or a related discipline, as well as twelve (12) years of general experience and eight (8) years of relevant experience
  • Possess five (5) years of experience providing information technology support services, including information assurance
  • Possess, or obtain within the first six months of assignment, the appropriate Risk Management Framework (RMF) training and certification
  • Possess, or obtain within the first six months of assignment, an active security-related certification (e.g., CISSP, CAP, or Security+)
  • Possess exceptional organizational skills
  • Possess excellent interpersonal and communication skills, both oral and written
  • Proven ability to participate in the analysis of IT and business issues
159

Cyber Security Analyst Resume Examples & Samples

  • Minimum 2 years' professional experience supporting information assurance or technology delivery to DoD
  • Risk Management Framework Training and Certification required within the first six months of employment
  • Active security-related certification (CISSP, CAP, or CompTIA Security+)
  • Bachelor Degree in Information Technology or related field
  • Strong written and verbal communications skills are a must
  • B.S. in information systems related major
  • MINIMUM OF INTERIM SECRET CLEARANCE REQUIRED
160

Cyber Security Analyst Resume Examples & Samples

  • Provide Level 1 support for Information Security requests; Review security policy clarifications and exception requests; assist in Rubicon Security projects under the direction of a Sr. Security Engineer or a Principal Security Engineer; triage general security questions from other internal teams
  • Monitor and analyze network traffic and IDS alerts
  • Participate in incident response and triage
  • Required Skills, Knowledge and Experience
  • Industry Certification such as Security+, SSCP, CEH, etc
  • Familiar with; Trend DSM, Splunk, Algosec, Safenet, Vormetric
  • 1+ years of experience with different aspects of Information Security including knowledge of network, web and platform technologies and secure application development methods
  • Familiarity with TCP/IP protocol
  • On-call 24/7 support
  • Experience Required: 3+ years relevant experience
  • Secret Clearance Required
  • Attributes
  • Ability to work in a cross-functional team environment
  • Ability to work effectively with a broad range of personalities and people
  • Flexible, Dependable and Self-motivated
  • Willingness to learn new skills from senior peers
161

Cyber Security Analyst Resume Examples & Samples

  • Bachelor’s degree in Computer Science, Cyber Security, Systems Engineering, Information Technology or other related technical discipline, is required
  • Knowledge and experience with network infrastructure, modern operating systems, database applications, web applications and other computing technologies is preferred
  • At least 3 years of system, network and or applications security experience is required
  • At least 3 years of experience as a System Administrator/Information System Engineer is preferred
  • Possession of at least two or more of the following Industry Certifications is strongly preferred
162

Senior Cyber Security Analyst Resume Examples & Samples

  • Perform log analysis and monitor and respond to security events
  • Respond to security events driving issues to closure engaging all appropriate resources
  • Document Security process and procedures
  • Support service request in-take process and communicate back to requestors promptly
  • Provide enforcement of security policies, standards and procedures
  • Staying current on security technologies, trends, standards and best practices
  • Continually update skills
  • This position will sit in Nike’s 24/7 Cyber Defense Center and will involve shift work including day, evening and weekend roles
  • Bachelor’s degree in computer science or related field, or equivalent work experience
  • Five years of information technology experience with two years in an information security-related role
  • Solid knowledge and understanding of information technology systems and process
  • Experience using Splunk for log analysis
  • Experience with Unix, Linux
  • Computer programming and scripting languages (python, c++, perl, etc.)
  • Experience analyzing firewall access control lists
  • One or more of the following professional certifications
163

Senior Cyber Security Analyst Resume Examples & Samples

  • Bachelor’s degree and 12+ years of professional IT experience, including Cyber Security. Additional years of experience will be considered in lieu of a Bachelor's degree
  • US citizenship required and must possess an active DOD Secret clearance or above (Active Top Secret highly preferred)
  • Must have solid knowledge of Security Operation Center (SOC), Computer Incident Response Teams (CIRTs), Network Operations Security Center (NOSC), across Defense, Intel, or other highly regulated environments
  • Knowledge in computer forensic methodology and evidence chain of custody
  • Demonstrate timely task completion involving solid organizational skills, task tracking, follow-up, and productive peer interaction
  • Working knowledge of Defense-in-Depth models traditional and updated
  • Analyze, disassemble, and reverse engineer code to discern weaknesses for exploitation; document and transition results in reports, presentations and technical exchanges
164

Senior Cyber Security Analyst Resume Examples & Samples

  • Bachelor Degree or equivalent experience Target of 8 years hands on A&A experience with Navy and/or DoD programs
  • Able to work in a highly collaborative and cross-functional team environment
  • Highly organized, prepared, and reliable
  • Strong analytical skills and can-do problem solving attitude
  • Possess and maintain a valid Cyber Security certification for CAP, GSLC, CISM, or CISSP
  • Designated as a member of the Cyber Security Workforce at a target IAM Level II in accordance with DoD 8570 and SECNAV Manual 5239.2
  • Target of 8 years hands on A&A experience with Navy and/or DoD programs
  • Experience with Risk Management Framework (RMF) and/or National Institute of Standards and Technology (NIST) 800- 53 preferred
  • Designation as or ability to obtain designation as a Navy Qualified Validator (NQV)
  • Potential for teleworking: No
165

Lead Cyber Security Analyst Resume Examples & Samples

  • Work with Cyber Analysts to assist in the remediation of identified vulnerabilities for all IT organizations
  • Report on and enhance current metrics surrounding vulnerability management
  • Take a lead role in the vulnerability management lifecycle
  • Team Leadership experience, taking initiative; providing and following through on solutions
  • Proficient with Security related service and process assessments and evaluations based on NIST, COBIT, ISO and ITIL standards
  • Knowledge and experience implementing controls based on security regulation. E.g. NIST 800-53
  • Effective and excellent oral and written communication, analytical, judgment and consultation skills
166

Cyber, Security Analyst Resume Examples & Samples

  • Configure, implement, manage and maintain security devices as well as provide general knowledge and recommendations for security best practices
  • Actioning escalated incidents, problems and service requests in a timely manner
  • Owning and managing tickets through to resolution
  • Performing audit and analysis functions on client data
  • This specialty covers integration, implementation, modification, and coordination of the installation, testing, operation, troubleshooting, and maintenance of hardware and software systems
  • Functions may include conducting needs analyses, planning and scheduling the installation of new or modified hardware/software, developing functional and technical requirements and specifications, allocating systems resources, managing accounts, documentation, and access to systems and equipment, monitoring the performance, capacity, availability, service ability, and recoverability of installed systems, implementing security procedures and tools, maintaining systems configuration, managing the installation and integration of system patches updates, and enhancements, and ensuring the rigorous application of information security/information assurance policies, principles, and practices
  • Experience / Knowledge of SIEM technology – HP Arcsight ESM
  • Very strong working knowledge of security tools such as firewalls, IDS/IPS, A/V, anti-spam, content management, server and network device hardening
  • Completion of University or College program in Computer Science; or 5 years of equivalent industry experience in the information systems field
  • Proven experience in the design, implementation and troubleshooting of operational security solutions
  • Understanding of mitigating controls at the systems, network, and application level (VPN, Firewalls, Intrusion detection and prevention, security information event management systems (SIEM), server hardening and encryption technologies)
167

Cyber Security Analyst On-call Resume Examples & Samples

  • Analyze cyber security requirements, technologies, risks, or issues
  • 15+ years of relevant experience
  • IT audit experience and CISA certification
168

Cyber Security Analyst Resume Examples & Samples

  • Investigation, escalation, and coordination of information security incidents
  • Contribution to cyber threat assessments and ad-hoc security reviews and/or investigations
  • Identification of cyber security threads within the Nestlé landscape and workable solutions
  • Contribute on the design, development and implementation of new analytic methods for detecting threads
169

Senior Cyber Security Analyst Resume Examples & Samples

  • Review the application design, architecture and implementation, provide the security test recommendations
  • Run & Analyze the penetration test (Manual & Automated) and pinpoint the security issues and suggest counter measures for security improvements
  • Keep up to date with evolving cyber threats and identify any new and sophisticated methods of detecting vulnerabilities
  • Highly customer focused and motivated with willingness to take ownership/responsibility for their work and ability to work both independently and in a team oriented environment
  • Demonstrate manual product penetration testing; must be able to simulate a SQL injection without tools, simulate XSS attack, X-Path Injection and etc
  • Good understanding of security development lifecycle process
  • Knowledge of requirement gathering, planning, and creating test plan
  • 6-8 years of hands-on experience in Security Testing
  • Understanding of Vulnerability Assessment, Penetration Testing, Application Security Testing, SOC and Managed Security Services
  • Should possess relevant university degree and/or professional qualifications (ex
  • Intimate knowledge and hands-on experience using various penetration testing tools like Nessus, Web Inspect, Nmap (Slow Scans, Service detection, OS detection, namp Scripts), BurpSuite, Nikto, ZAP & fuzz testing tools like SPIKE, PEACH etc. including manual techniques
  • Manual security assessment using browser utilities like developer toolbar, browser plugins
  • Knowledge of Wireless networks and Infrastructure Penetration Testing
  • In depth knowledge of Networks and Operating Systems
  • Knowledge of configuration review of applications, servers, network devices and others
  • Knowledge of Web Application Assessment
  • Should be able to think "out of the box". Possess ability to implement new attack approaches/vectors
  • Knowledge of SAP and/or other non-traditional environment is a plus
170

Cyber Security Analyst Resume Examples & Samples

  • Good understanding of security development lifecycle processes
  • Automated Whitebox Fuzz testing using SPIKE, PEACH and/or Other COTS Tools
  • Knowledge of open source Ethical hacking tools (Kali)
  • Highly motivated with willingness to take ownership/responsibility for their work and ability to work both independently and in a team oriented environment
  • Adept at selecting and utilizing appropriate technologies to solve complex problems effectively
  • Ability to work within an International team
171

Cyber Security Analyst Resume Examples & Samples

  • Lead security assessments of customer systems, services, and programs, as well as provide oversight to less experienced staff
  • Analyze customer processes and configurations to verify that previously identified flaws have been corrected, and document the results
  • Develop approaches for industry-specific threat analyses, application-specific penetration tests, and the generation of vulnerability reports
  • Develop detailed remediation reports and recommendations for compliance and security improvements across industries based on changing threats
  • Develop and update a consistent approach to information security programs and ensure adherence with best practices
  • Minimum of 4 years of related experience
  • Must possess at least a Secret clearance with the ability to be granted a Top Secret clearance
  • Clearly articulates technical requirements and other information in written documentation
  • Effectively communicates technical and nontechnical concepts to a variety of audiences
  • Communicates well with customer technical staff and management
  • Methodically gathers, documents, and presents specific customer requirements
  • Follows existing processes and procedures, and propose updates to such. Develop new processes and procedures as necessary
  • Works with minimal supervision, set priorities, and give attention to detail and quality
  • Demonstrates strong organizational and time-management skills: multitasking, working individually and with a team, having a positive attitude, being self-motivated and reliable, being trustworthy, having strong interpersonal and diplomatic skills, and being able to handle stress in a professional manner
  • Demonstrates technical skills in one or more focus areas (i.e. networking, messaging support (Exchange), Active Directory, system administration, etc.)
  • Be proficient with Microsoft Office
  • Have knowledge and hands on experience with IT architecture and design (e.g., firewalls, intrusion detection systems, virtual private networking, virus protection technologies, LAN/WAN design, and/or general internetworking technologies)
  • Understanding of risk management practices and security program development including change management, access control, and physical security
  • Understanding of the NIST Special Publications (SP) with emphasis on 800-37, 800-53, 800-53A
  • IP network and security engineering experience including a basic understanding of IP routing, quality of service mechanisms, MPLS, and IPsec architectures
  • Hands on system administraqtion experience with various operating systems including Windows, AIX, BSD, z/OS, RHEL, SUSE, HPUX, QNX, etc
  • Experience with system development lifecycles (SDLCs)
  • Experience with change management processes
172

Senior Cyber Security Analyst Resume Examples & Samples

  • Leading large/complex security assessments of customer systems, services, and programs
  • Supporting and interacting with customers, at the highest levels, as well as providing oversight to less experienced staff
  • Analyzing customer processes and configurations to verify that previously identified flaws have been corrected, and document the results
  • Developing approaches for industry-specific threat analyses, application-specific penetration tests, and the generation of vulnerability reports
  • Developing detailed remediation reports and recommendations for compliance and security improvements across industries based on changing threats
  • Develop and update a consistent approach to information security programs and adherence with best practices
  • Bachelor’s degree in a related field, or equivalent
  • Minimum of 6+ years related experience
  • Experience assessing Federal information systems’ compliance with the Federal Information Security Management Act (FISMA). Specifically, conducting independent security control assessments in accordance with NIST SP 800-53, 800-53A, CNSSI 1253, and the Risk Management Framework (RMF) described in NIST SP 800-37
  • Clearly articulate requirements and other information in written documentation and effectively communicate technical and non-technical concepts to a variety of audiences
  • Broad understading or knowledge of risk management practices and security program development including change management, access control, and physical security
  • Direct experience involving configuration, deployment, and administration of network appliances, operating systems, and databases
  • Demonstrated excellent technical skills in one or more focus areas (i.e. networking, messaging support (Exchange), Active Directory, system administration, etc.)
  • Demonstrated strong organizational and time-management skills: multitasking, working individually and with a team, having a positive attitude, being self-motivated and reliable, being trustworthy, having strong interpersonal and diplomatic skills, and being able to handle stress in a professional manner
  • ISC2 Certified Authorization Professional (CAP)
  • Hands-on experience with and knowledge of IT security architecture and design (e.g., firewalls, intrusion detection systems, virtual private networking, virus protection technologies, LAN/WAN design, and/or general internetworking technologies)
  • Experience with one or more information security frameworks such as SAS70/SSAE No. 16, PCI, NERC CIP, Nuclear Energy Institute (NEI) 0809, HIPAA, GLBA, SOX, etc
  • Broad understanding of risk management practices and security program development including change management, access control, and physical security
  • Broad IP network and security engineering experience including a basic understanding of IP routing, quality of service mechanisms, MPLS, and IPsec architectures
  • Hands on experience configuring, deploying, and managing mission critical network appliances such as routers, firewalls, IDS/IPS, DPI, etc
  • Hands on system administration experience with various operating systems including Windows, AIX, BSD, z/OS, RHEL, SUSE, HPUX, QNX, etc
  • Hands on system administration experience with DB2, MS SQL, Oracle, Sybase, etc
  • Have a Security+ certification and actively working towards the CISSP
173

Cyber Security Analyst Resume Examples & Samples

  • The qualified candidate will assess network threats such as computer viruses, exploits, and malicious attacks
  • Monitor for potential compromise, intrusion, deficiency, significant event or threat to the security posture and security baseline
  • Update and maintain standard operating procedures and other technical documentation
  • 2-4 years concentration security operations and analysis
  • Prior experience working in one of the following
  • Computer Incident Response Team (CIRT)
  • Experience in the detection, response, mitigation, and/or reporting of cyber threats affecting client networks and one or more of the following
  • Experience in computer intrusion analysis and incident response
  • Working knowledge of Intrusion detection/protection systems
  • Knowledge and understanding of network devices, multiple operating systems, and secure architectures
  • System log analysis
  • Experience responding to and resolving situations caused by network attacks
  • HTTP Headers & Status codes
  • FTP Traffic & Status Codes
  • At least 1 security certification as stated below
  • Or related advanced IT certification
  • Speaks English fluently
  • Experience with firewalls, routers or antivirus appliances a plus
  • Experience working on a 24x7x365 watch desk environment
  • Experience with industry standard help desk tools
174

Senior Cyber Security Analyst Resume Examples & Samples

  • Bachelor degree related education or relevant experience
  • EDR/Endpoint AV
  • TCP-IP and Packet Captures
  • Splunk, Kibana, Logstash, Sumo Logic or similar
  • Cloud security architectures – particularly AWS and the related tooling
  • Operating System internals across Linux & Windows.Security-related professional certification (Crest CRIA/CCNIA/CCMRE/CCHIA, SANS GIAC, GCIH, GPEN, GCFA) is an asset
  • Development experience with Python or C++ is an asset
175

Senior Cyber Security Analyst, Disa Resume Examples & Samples

  • Security+ CE, CISSP or equivalent in holding a DoD-8570 IAT Level 2 baseline certification and knowledge of layer 3 router configurations and the ability to troubleshoot/investigate anomalies
  • Snort and IDS/IPS monitoring experience
  • Ability to obtain a CND-A certification (Certified Network Defense-Architect) within 180 days of start date
  • Solid understanding and work experience with TCP/IP, common networking ports and protocols, traffic flow, system administration, OSI model, defense-in-depth and common security elements
  • Demonstrated understanding of the life cycle of network threats, attacks, attack vectors, and methods of exploitation with an understanding of intrusion tactics, techniques and procedures (TTPs)
  • Familiarity with Lockheed Martin's Intelligence Driven Defense or Cyber Kill Chain methodology desired
  • Serve as a Boundary/ACL Operations Engineer supporting our DISA Command Center Network Assurance customer
  • Analyze layer 3 router configurations and troubleshoot anomalous activity
  • Determine indicators that can mitigate anomalous activity
  • Analyze intelligence reports and strategic boundary hardening initiatives and make recommendations based on IAP router tool capabilities
  • Perform ACL reviews (Access Control List)
  • Strengthen boundary defensive posture and advise on tool capabilities to support ongoing and future operations
176

Cyber Security Analyst Resume Examples & Samples

  • 5 years relevant Cyber Security / Information Assurance experienceExperience with Risk Management Framework (RMF) and eMASSExperience with DoD RMF Assessment and Authorization (formerly Certification and Accreditation) processes
  • Experience with development of Cyber Security / IA accreditation documentation
  • Experience with vulnerability scanning using ACAS
  • CISSP or Security + certificationOperating system certification on Windows or Linux (can be obtained within 1 year)
  • BS in Computer Science or other technical field
177

Cyber Security Analyst Resume Examples & Samples

  • 2) Experience working with leading firewall, network scanning and intrusion detection products and authentication technologies. They use - Cisco Sourcefire, but experience with that tool isn't required
  • 3) Understanding of Windows/Linux operating systems and command line tools
  • *Experience with EnCase Forensic Software is a nice to have***��
178

Senior Cyber Security Analyst Resume Examples & Samples

  • Develop content for enterprise full-packet capture security application, combining big data security information collection, management, and analytics capabilities with full network and log-based visibility and automated threat intelligence from commercial vendor and other government agencies
  • Perform daily Intrusion Detection Sensor (IDS) monitoring to ensure that all sensors are active
  • Review the Security Information and Event Management (SIEM) tool interface, as the tool correlates and aggregates alert data from multiple IDS sensor types and additional security devices
  • Review alerts and packet-level data collected from sensors on a daily basis
  • Submit an End-of-shift Report summarizing activities for each shift
  • BS or equivalent + 6 Years IT OR 10 Years IT required in lieu of Bachelors
  • Must have at least four years experience in full packet capture analysis
  • Must have experience conducting analysis at the packet level
  • Experience with RSA Security Analytics
  • Experience administering UNIX-based systems
  • Experience with Python scripting
179

Junior Cyber Security Analyst Resume Examples & Samples

  • Receive, document, and report cyber security events
  • Categorize incidents and implement corresponding escalation procedures
  • Conduct daily operational update meetings for SOC staff and unscheduled situational update briefings for FAA leaders
  • Provide telephone, e-mail and ticket service to customers
  • Access, secure and inspect local classified information processing areas
  • In addition to required education or equivalent experience; - Minimum four (4) years IT experience
  • Experience with intrusion detection systems and threat techniques. (Lateral Movement, Rootkits & Toolkits
  • Experience working in a network security environment, such as a Security Operations Center (SOC), Computer Emergency Response Team (CERT), Computer Incident Response Team (CIRT), Computer Incident Response Center (CIRC) or Cyber Security Incident Response Center (CSIRC)
  • Experience with business process reengineering, capability maturity model, change management, or process improvement
  • Exceptional writing and documentation skills
  • You will maintain twenty four (24) hours a day, seven (7) days a week, three hundred sixty five (365) days per year, incident handling capability
  • You must be a proven team player with excellent oral and written communications skills
  • You must be capable of working on projects independently. Frequent interaction with government client is required
  • You must have previous experience working in a network security incident response team, such as a Security Operations Center (SOC), Computer Emergency Response Team (CERT), Computer Incident Response Team (CIRT), Computer Incident Response Center (CIRC) or Cyber Security Incident Response Center (CSIRC). Infrequent (<5%) local travel, infrequent (<5%) long distance travel
180

Cyber Security Analyst Resume Examples & Samples

  • Defines and validates the need for proposed new or improved systems (5%)
  • Proactively identify potential security issues in order to advise and consult Exelis on prevention, monitoring and mitigation strategies (5%)
  • Maintains and manages corporate DoD 8570 compliance and training/certification program (5%)
181

Lead Cyber Security Analyst Resume Examples & Samples

  • Researches, designs, deploys and manages network-based security protections such as next-generation firewall protections, intrusion prevention, content filtering, web application filtering and malware prevention
  • Act as a coach (subject matter expert) to the rest of the team on any network security related issues
  • Defines architectural standards to secure corporate and cloud-based data center and application solutions
  • Develops policies, procedures and standards relating to the security and protection of corporate data and business functions
  • Represents the Information Security team in meetings with customers, business partners and business leadership
  • Oversees the work of managed service partners, vendors, and others that perform work on behalf of Williams
  • Performs regular network security device configuration audits for compliance with regulations, business needs, and adherence to industry best practices
  • Monitors and interprets released indicators of compromise and other cyber threat intelligence, then designs and deploys technical solutions to mitigate them
  • Participates in security risk discussions and strategic risk assessment/planning with teammates and peers
  • Participates in the development and execution of corporate information security strategies and direction
  • Excellent listening and communication skills (verbal and written)
  • Creative problem solving and solutions development
  • Effective project management including personal time management and ability to multi-task in a fast paced environment
  • Demonstrates leadership and ability to work independently
  • A Bachelor's degree in IT-related area or 7+ years of associated hands-on IT experience
  • Deep technical understanding of core networking technologies (OSI model, TCP/IP and routing protocols, switching, VLANs, network virtualization, etc.)
  • Deep technical understanding of operating systems (Unix-based systems, Windows, OSX, IOS, etc.)
  • 3+ years’ of recent hands-on technical experience with next-generation firewall platforms such as Palo Alto
  • 3+ years’ of recent hands-on technical experience with load balancing, proxying and security technologies such as those provided by F5 Networks products (Local Traffic Manager, Global Traffic Manager, Application Security Manager, and Access Policy Manager, etc.)
  • Deep understanding of different cyber security threats, how they propagate through the network and how to configure network devices to protect against them
  • Experience with information security incident response and the development of response planning and preparedness policies and procedures
  • Experience with deploying and managing remote access technologies (VPN, SSL VPN, etc.)
  • Develops reports and other documentation in support of business needs, audit and compliance testing
  • Extremely detail oriented
  • Experience functioning in a team lead or technical lead role
  • Occasional on-call duties
  • Disaster Recovery concepts and application
  • Experience with virtualization technologies such as VMware and Docker
  • Palo Alto certification
  • F5 Networks certification
  • Cisco certification
  • CISSP certification
  • GIAC certification
  • Understanding of automated threat intelligence feed technologies and protocols, such as STIX and TAXII
  • Experience with server and application security tools, such as web application security scanners, vulnerability scanners, etc
  • Experience with scripting and/or application development
  • Experience with UNIX or Linux management
  • Experience with Microsoft Windows Server 2008, 2008 R2, 2012
  • Experience with security technologies that are closely related to the networking (IDS/IPS, NAC, WAF) is a plus
  • Experience with networking and infrastructure monitoring tools
  • Experience with packet capturing, analysis and troubleshooting
  • Experience utilizing netflow and other analytics tools
  • Experience in SIEM management and tuning
  • Experience with threat analytics and the consumption / usage of threat intelligence feeds
  • Experience with penetration testing / threat hunting
182

Cyber Security Analyst Resume Examples & Samples

  • Assist in monitoring, incorporation, and analysis of federal security requirements impacting business systems
  • Translate federal and organizational cyber security requirements into specifications meaningful to senior management, stakeholders, and Engineering/Operational staff members
  • Leverage industry good practice expertise to enhance the maturity of security services offered by the group
  • Participate in internal staff meetings and other stakeholder discussions
  • Provide process and quality improvement recommendations
  • Provide project status updates describing the state of assigned security related deliverables, accomplishments, and significant risk items
  • Adhere to local organizational policies, procedures, and practices
  • This role requires thought leadership, strong analysis skills, and the ability to interact with varying stakeholder entities
  • Excellent business analysis skills, including strong communication abilities
  • Ability to compress knowledge to an easily understandable level for organization circulation
  • Ability to lead, advise, and coordinate others
  • Strong verbal and written communication skills with the ability to communicate to all levels of the organization
  • Security+ or higher level DoD approved 8570 IA baseline certifications. Ability to obtain within 6 months
  • Broad understanding of federal security requirements, including
  • Knowledge using Microsoft Office products
183

Cyber Security Analyst Resume Examples & Samples

  • Perform A&A activities and monitor status, within eMASS and XACTA for all INSCOM G7/Modernization program office systems and sites
  • Provide Confidentiality, Integrity and Availability by identifying appropriate IA controls within accreditation packages and verify implementation is in accordance with DoD and Army IA standards
  • 9 years of general IA experience, with a minimum of 5 years of demonstrated experience with program support based on NIST Special Publication 800-37 (Guide for Applying the Risk Management Framework to Federal Information Systems)
  • Bachelor's Degree in Computer Science, Information Systems, Engineering, Business, or related scientific or technical discipline
  • Risk Management Framework Training
  • EMASS Training
  • Active TS/SCI based upon an SSBI required
184

Senior Cyber Security Analyst Resume Examples & Samples

  • Bachelor's Degree in Computer Science (or related field) and 3+ years of hands-on working experience in cyber intrusion detection, system administration or network administration
  • Cyber intrusion detection, incident response or forensic analysis experience
  • Solid understanding of computer network protocols including TCP/IP
  • Linux and Windows system administration experience
  • Working knowledge of information security issues, trends and leading practices
  • Demonstrated analytical skills
  • Self-disciplined and self- motivated
  • Coding/Scripting experience e.g. Perl, Bash, VB Script, Python, etc
  • Experience working with networking and security tools such as Tenable Security Center, McAfee Vulnerability Manager, ELK, Intella and Metasploit
  • Certifications such as CISSP, GCIA, CEH, GCIH, GCFA or CSIH
  • A self-starter, performing tasks with minimal supervision but working effectively with immediate and cross-functional team members
  • Possess excellent analytical and problem- solving skills
  • Excellent organizational, detail, multi-tasking and time management skills
185

Senior Cyber Security Analyst Resume Examples & Samples

  • Creating advance queries methods in Splunk or advance Grep skills,
  • Firewall ACL review
  • Examining Snort based IDS events
  • Pcaps, web server log review
  • Working in a SIEM environment
  • Knowledge of information security programs and processes
  • Strong skills and experience in requirements management, especially in the security field
  • Work well within a team of professionals in a multi- disciplinary environment
  • Strong client engagement and facilitation skills, and the ability to build positive working relationships
186

Cyber Security Analyst Resume Examples & Samples

  • Bachelor's degree (equivalent experience accepted in lieu of degree) in computer science, computer engineering, information systems, cyber security or a related field
  • Minimum of five years of directly relevant experience in information systems and information security
  • Minimum three years of experience performing Cybersecurity/IA responsibilities including planning, testing, and documenting accreditation packages for Information Technology (IT) systems and networks
  • Information Assurance and technical writing skills
  • IT experience in System Administration, Linux preferred
  • Experience with Android Operating System
  • Experience in conducting Application Security scans using HP Fortify
  • Tactical networks and information systems
  • Server virtualization technologies
  • Knowledge of Federal and DoD Guidance (DoDD 8500.1, DoDI 8500.2), RMF, DIACAP, NIACAP, NIST, and DoD Certification & Accreditation processes
  • Must meet baseline IA certification requirements for an IAT and/or IAM Level II position per DoD 8570.01-M (CISSP, CISM, CISA, etc). Will consider Security+ as satisfying requirement
  • Microsoft Certified IT Professional (MCIPT)/Microsoft Certified Systems Engineer (MCSE)
  • VMware Certified Professional (VCP)
  • Red Hat Certified Engineer (RHCE), or Red Hat Certified Architect (RHCA), or Red Hat Certified System Administrator (RHCSA)
187

Senior Cyber Security Analyst Resume Examples & Samples

  • US citizenship required and must possess an active DoD Secret clearance or above
  • Must be a Certified Computer Forensic Examiner from one of the following
  • CCE: Certified Computer Examiner
  • EnCe: EnCase Certified Examiner
  • CSFA: CyberSecurity Forensic Analyst
  • Previous experience with Splunk (Splunk Power User)
188

Senior Cyber Security Analyst Resume Examples & Samples

  • Performs forensic analysis of digital information and gathers and handles evidence
  • Identifies network computer intrusion evidence and perpetrators
  • Investigates computer fraud or other electronic crimes, crack files and system passwords, detects steganography and recovers deleted, fragmented and corrupted data from digital media of all types
  • Ensures chain of custody and control procedures, documents procedures and findings in a manner suitable for courtroom presentation and prepares comprehensive written notes and reports
  • May be required to testify in court as expert witnesses
  • DoD 8500 Series / NIST SP 800 Series
  • Navy Cross Domain Solutions Off
  • Knowledge of Cybersecurity aspects of MILSATCOM/GPS
  • Knowledge of C41/IT products
  • IA Level II certification
189

DP Ns-cyber Security Analyst Resume Examples & Samples

  • Be responsible for the identification of network attacks from internal and external sources
  • Act as a member of the team to identify incidents and threats
  • Utilise processes and technologies to detect and prevent malicious attacks
  • Respond to security events, from detection, analysis to closure
  • Ensure availability and security of the network infrastructure due to adequate security systems and mechanisms, pro-active monitoring, resilient technical design and effective capacity planning
  • Identify network vulnerabilities
  • Specification of change control procedures for networking security systems and work with the ITIL service desk to schedule changes
  • Act as technical mentor to other IT staff
  • Maintain documentation of proposed & deployed infrastructure
  • Manage, monitor and backup of firewalls, security appliances, spam filters IDS etc, remote access solutions, VPN’s, third party suppliers and vendor relationships
  • Contribute to Business Continuity Planning
  • Ensure IT Disaster recovery is planned and tested for all services
  • Actively seeks new or alternative ways to complete project
  • Identify key or underlying patterns that could affect present or future service performance
  • Networking security experience in an enterprise environment
  • A good understanding of network security technologies and processes including and understanding of current and emerging security threats and an awareness of systems and methods to counter them
  • Knowledge of TCP/IP including routing protocols, management protocols, IPSEC VPN’s, SSL
  • Good communication skills enabling interaction with all levels of the business (including written and oral communication where appropriate)
  • Proactive and highly motivated, a robust individual who drives their own success
  • Analytical and logical thought processes, ability to relate and coordinate requirements across the business or develop structured solutions
  • Customer focussed, service driven
  • Strive to make systems, services and processes more efficient
  • The ability to work to targets in a flexible manner individually or as part of a team
  • Broad understanding of security techniques and technologies including Intrusion Detection, Threat Analysis and Malware & Trojan Research
  • An understanding of the current and developing Malware & Trojan landscape
  • Knowledge of full packet capture technologies
  • Knowledge of correlation tools and SIEM technologies
  • Sandbox technologies
  • Knowledge of log analysis tools and techniques
  • LAN/WAN experience
  • Able to demonstrate the Drax values of Honest, Energised, Achieving and Together
  • Cisco Security Products
  • VPN Remote Access Technologies
  • Please note that proof of qualifications will be requested at interview
190

Cyber Security Analyst Resume Examples & Samples

  • Interact with, configure, and troubleshoot network intrusion detection devices and other security systems via proprietary and commercial consoles, both local and remote
  • Linux/Unix and Windows operating system navigation and administration, working from the command line (vs using a GUI)
  • Packet analysis, and related tools (tcpdump, Wireshark, ngrep, etc.)
  • Using and recognizing regular expressions
  • Database queries and structures
  • Highly professional communication (written and verbal), teamwork and customer service skills -Attention to detail and great organizational skills
  • Problem solving, and ability to diagnose and troubleshoot technical issues
  • Ability to work both independently and collaboratively with peers, across teams, and with management
  • Strong passion for learning new technology and concepts quickly
191

Cyber Security Analyst Resume Examples & Samples

  • Under limited supervision, investigate incidents that are escalated per procedure. Communicates with customers as appropriate, keeping Cyber Security Operations Center (CSOC) management informed per incident severity requirements. Follows applicable processes and procedures while maintaining the flexibility to “think outside the box” during the investigation in order to find all affected systems including “patient zero” performs root cause analysis; determines attribution if appropriate; completes documentation; and participates in lessons learned post mortem. For high severity level incidents function as a team member of the incident team, interfacing with outside incident response personnel as well as both senior and junior cyber associates
  • Creates, revises and maintains processes and procedures related to continuous monitoring, triage, incident analysis and incident response activities. Consults with other cyber associates to continuously improve those processes and procedures and ensure that when new tools or external inputs change that the documentation is adjusted accordingly
  • Mentors and trains junior cyber associates on proper investigation techniques, documentation requirements and evidence handling. Serves as a technical consultant to those associates. Functions as a technical contact for managed security service provider (MSSP) analysts when technical questions arise, consulting with senior analysts and management for guidance as appropriate
  • Performs rule creation, system tuning, rule tuning and threat intelligence integration in order to improve the detection capabilities of the security systems
  • Communicates with CSOC management, cyber and information security staff members and customers in written and verbal communication regarding investigations and status updates. Maintains need-to-know discretion for all investigations
  • Interfaces regularly with the Cyber Security Engineer to test and improve custom tools, suggesting features and improvements in order to improve efficiency and productivity. During investigations, communicates with the engineer in order to quickly gather the information needed in the most efficient manner possible, giving constructive feedback on custom tools provided in that process
  • Performs knowledge sharing with team members through meetings, presentations and written communications. Creates, revises and maintains documentation of incident response processes and procedures in the central knowledge base
  • Participates in after-incident lessons learned meetings to give input on recommendations for process or procedure improvements and to provide mitigation recommendations to reduce future incidents or minimize their impact
  • Tracks performance metrics and provides timely updates to CSOC management
  • Potential on-call support during nights and weekends
  • Performs other duties as assigned by management
  • Demonstrated experience in threat detection technologies including: intrusion detection and prevention systems (IDS/IPS), security incident and event management (SIEM) technology, and network packet analyzers. Experience with security data analytics, endpoint protection, malware analysis, and forensics tools are highly desired
  • Demonstrated SIEM utilization skills, including the ability to review and analyze security events from various monitoring and logging sources to identify or confirm suspicious activity
  • Demonstrated experience in incident analysis and response activities, including execution of response and analysis plans, processes and procedures and performing root cause analysis. Experience in a SOC environment is preferred
  • Demonstrated ability to analyze large data sets and unstructured data for the purpose of identifying trends and anomalies indicative of malicious activity
  • Proven knowledge of current security trends, threats and techniques. Demonstrated self-driven desire to continually learn and grow in knowledge related to the constantly evolving threat landscape
  • Proven experience on both Linux-based and MS Windows-based system platforms with a strong IT technical understanding and aptitude for analytical problem-solving
  • Demonstrated strong understanding of enterprise, network, system and application level security issues
  • Proven understanding of the current vulnerabilities, response, and mitigation strategies used in cyber security
  • Demonstrated strong team player – collaborates well with others to solve problems and actively incorporates input from various sources. Proven experience motivating fellow team members toward excellence and project completion
  • Demonstrated customer focus – evaluates decisions through the eyes of the customer; builds strong customer relationships and creates processes with customer viewpoint
  • Demonstrated analytical skills – continuously defines problems, collects or interprets data, establishes facts, anticipates obstacles,and develops plans to resolve; strong problem solving skills while communicating in a clear and succinct manner effectively evaluating information/data to make decisions
  • Demonstrated inherent passion for information security and service excellence
  • Proven excellent verbal and written communication skills; frequently expresses, exchanges or prepares accurate information conveying information to internal and external customers in a clear, focused and concise manner. Continuously conforms to proper rules of punctuation, grammar, diction and style
  • Demonstrated self-starter with strong internal motivation. Proven ability to work with general supervision or direction
  • Proven ability to work under multiple deadlines with general supervision. Cite examples of successfully organizing and effectively completing projects where given minimal direction
  • Demonstrated ability to perform an activity such as: preparing and analyzing data and figures; transcribing; viewing a computer terminal; extensive reading
  • Linux-based and MS Windows-based system platforms
  • Fundamental or greater understanding of encryption technologies
  • Basic experience with one or more scripting languages (examples: Python, Perl, Java or Ruby)
  • Knowledge of Identity & Access Management practices, systems and controls
  • Experience with security tools including but not limited to IDS (snort or suricata preferred), IPS, data analytics software, SIEM solutions (QRadar preferred), web application firewall (WAF), malware analysis, knowledge base platforms and live response/forensics tools
192

Cyber Security Analyst Resume Examples & Samples

  • Experience with privilege identity management processes, solutions and products, plus
  • Knowledge and use of CyberArk product, a plus
  • Support projects related to Credential management, non-human identity and Privilege access management work stream. Specifically: develop and manage project schedule, dependencies resources; define and manage risks and issues; write and deliver project status; and, coordinate across work streams
  • Demonstrated ability to provide subject matter expertise to develop options and recommended solutions
  • Ability to coordinate and communicate to large diverse groups of both technical and non-technical stakeholders leveraging strong command & control skills
  • Excellent verbal and written communication skills and strong facilitation and influencing skills. Ability to engage with broad range of and enterprise stakeholders across all levels (staff to executive management)
193

Cyber Security Analyst Resume Examples & Samples

  • Coordinate and manage public keys and certificates within the environment, as well as mitigating cyber security vulnerabilities associated with the area of focus
  • Provide cyber security support to business and technical teams in the design of standardized products and customized solutions. Must be flexible to continuously changing demands and technologies and have the ability to maintain a library of security tools used as part of this function
  • Bachelor’s degree with a concentration in computer science, technology, accounting or business or equivalent combination of education and experience
  • Minimum of 5 years experience in I/T including 1 years direct experience in cyber security
  • Demonstrated verbal/written communication and presentation skills
  • Working knowledge of cryptography, key management and security concepts and solutions
  • Experience maintaining and operating public key management and certificate solutions, with specific experience working with PKI discover and management platforms (Venafi preferred)
194

Cyber Security Analyst Resume Examples & Samples

  • Hands on data analysis experience, preferably in the Access Management domain. Perform analysis of risk assessments, governance violations related to privilege access, and other data to identify operational risks and trends
  • Ability to absorb information and data from multiple sources, apply strong analytical skills, and provide thoughtful and strategic recommendations to deliver tangible business value
  • Good general understanding of the data concepts (Data Quality, Data Modeling, etc.) with emphasis on Metadata
  • Demonstrated high proficiency in SQL, MS-Excel and MS-Access
195

Cyber Security Analyst Resume Examples & Samples

  • Utilizes COTS/GOTS and custom tools and processes/procedures in order to scan, identify, contain, mitigate and remediate vulnerabilities, and intrusions
  • Candidate will develop, test, and evaluate computer system interoperability and execute detailed computer systems analysis and design. Additional Tasks may include: — Configure and maintain IDS/IPS systems
  • Continuously monitor networks for defense and abnormalities
  • Periodic and monthly inspection/scans of networks to validate/update network devices and systems
  • Support projects during execution events with: 1) installing and operating cybersecurity tools on event networks, 2) scanning and providing residual risk statements for hosted mission systems, and 3) CND support at off-site locations and visitor/device management during on-site events
  • Generate and review accreditation package artifacts in accordance with DoD 8510.01 and NIST 800-53R4 Required
  • Must meet at least one of the following requirements and the experience must have been obtained within the past three (3) years
  • Two (2) years’ experience in classified and unclassified computer hardware and software diagnostic procedures, Windows 7/8/10 including Servers 2008R2, 2012R2, UNIX, and knowledge in LINUX Red Hat or later operating systems and environment
  • One (1) year experience in computer diagnostic, file defragmentation, file backup, file recovery, and LAN management procedures used in fault isolation of hardware and software
  • One (1) year experience in Virtual Environments
  • Manage and maintain CND tools, including scanning systems, IPS and IDS systems. Perform cyber vulnerability management (Windows, Linux, Solaris, etc.)
  • Support Cybersecurity team in preparation of accreditation packages
  • Track and enter system IAVA compliance in CMRS or EMASS
  • Experience analyzing operating systems (Microsoft, Linux, Solaris) for compliance with DISA STIGs
  • Experience with CND tools, including commercial scanning tools i.e. Nessus, HBSS, and ACAS
  • Effective communication skills and basic technical writing experience
196

Mceits Cyber Security Analyst Resume Examples & Samples

  • Maintain DIACAP/RMF package throughout and provide inputs to the customer
  • Use IA scans so that security remains high
  • Update DIACAP/RMF packages (NIPR/SIPR) to meet DIACAP and USMC policies
  • Produce a report of the weekly scans and detail issues or concerns
  • Create ATO POA&M entries for items (such as patches) that will take additional time to research to prevent potential negative effects by testing changes to the environment prior to implementation
  • 8570 Information assurance technician (IAT) level II or III
  • DIACAP/RMF experience
  • ACAS
  • DISA Stig Viewer, DISA SCC Tool, SCAP Tools
197

Cyber Security Analyst Intern Resume Examples & Samples

  • Detect threats or anomalous behavior within the network, for users and on hosts
  • Assess the risk posed by the threat or anomalous behavior
  • Take appropriate actions required to, contain, remediate the threat and reduce risk to the organization
  • Identify critical situations that need to be escalated to the special operations group and/or the incident response team
  • Experience with vulnerabilities and remediation
  • Experience with threat and attack methodologies
  • Experience with DLP solutions
  • Experience with scripting (Python preferred)
  • Experience analyzing OS security event logs
  • Experience with malware detection
198

IT Cyber Security Analyst Resume Examples & Samples

  • Design a matrix of the legislative and policy requirements mapped against security deliverables. Identify audit points that can validate compliancy and work with Compliancy teams to establish ownership and audit points throughout the year
  • Where appropriate, attend weekly project, program, and change meetings with the Service Providers (SCPs), the client, and its customers. Provide guidance, coordination, and communications to aid in all aspects of security delivery, process development, and maintain a cohesive security delivery environment
  • Integrate the Service Provider's Logical Security Administration process with client's, client's customers, other Service Component Provider's, and Third Party Vendor(Vendors)' Logical Security Administration processes, where the processes interact
  • Develop a Client Security Guiding Committee to discuss the Security Program. Establish a formal quarterly meeting schedule for the exchange of current security information between all members
  • Integrate SCP Security plans into a single Client plan for maintaining security across the entire support environment. Audit for compliancy and update annually at a minimum. Deliver appropriate Security Plan documentation outlining our high-level activities such as security assessment, security governance, security awareness training, Client assistance, Roles and Responsibilities, auditing, systems and tools, cross-tower relationships and communication paths, and security DB development and reporting
  • In conjunction with the Client and its customers, identify KPI's for effective execution of the Security Plan. Develop a dashboard for monitoring KPI's
  • Work with the SCPs to provide reporting on management and the execution of the Security Plan
  • Provide SCP oversight for the regularly review, capture learning and improve on Security, and the execution of the Security Plan
  • Develop a forward-looking schedule for the planned Security testing, assessments, and analysis
  • Provide for and facilitate the annual risk assessment. Guiding the SCPs, provide for security evaluations, which include conducting internal audits, supporting external audits, conducting self-assessments, and evaluating security incidents. Create a security risk register for the consolidation and documentation of risk management and assessment activities
  • Cooperate and assist with efforts by the Client, Client Customers and/or representatives of the Client for security tests (e.g. audits, Third Party security tests, the annual Control Penetration Test)
  • Provide for vulnerability scans for all network assets at least once per year
  • Engage Finance, Purchasing, and other towers where required to develop solution alternatives, identification of costs, and vendor negotiations for alternative cost models. Monitor activities being progressed to address shortfalls in Security for Services
  • Provide detailed descriptions of the potential benefits and exploitation opportunities that exist for planned technology upgrades and the effort required to realize these benefits
  • Document and identify security risks associated with the Services, and in support of Risk Management. Recommend solutions or mitigation for vulnerabilities or weaknesses in services
  • Work closely with Change Management and application development and implementation teams for reviews during the technology reviews and SDLC
  • Ability to self-manage with little interaction from other management staff
  • Flexible and able to adapt to manage a fast-changing environment
  • Ability to Multi-Task
  • Ability to pull diverse teams
199

Lead Cyber Security Analyst Resume Examples & Samples

  • 5 to 7 years of experience in system / network / product penetration testing
  • Having Bachelors in any discipline
  • Knowledge of attack frameworks like VASTO, Virtualization Assessment Toolkit to exploit virtualization systems
  • Knowledge of Specific virtualization platform attacks and exploits
  • Good communication & Negotiation skills
  • Knowledge on domain understanding about the HVAC control systems, controllers, sensors etc
  • CEH Certification is Mandatory. Additional certifications such as OSCP, CCSP, CCSK will be highly desirable
  • Strong software engineering skills
  • Ability to manage multiple initiatives simultaneously
200

Cyber Security Analyst Level Resume Examples & Samples

  • Collect, analyze, and disseminate relevant cyber threat intelligence
  • Obtain and disseminate threat actor knowledge
  • Analyze current cyber events in the media
  • Document attacks, work with investigators, and combine with external intelligence
  • Provide technical data gathered about intel
  • Provide new rule sets to security tools not managed by our team
  • Oversee process to manage whitelists and blacklists
201

Lead Cyber Security Analyst Resume Examples & Samples

  • Large scale implementation of McAfee DLP endpoint technology for the entire company and accountable for the availability, reliability and performance of the platform
  • Implementation of Discover and file permission solution across the organization and define process to mitigate access control issue
  • Collaborate with IT infrastructure/Application teams and business security leaders to define and gather Data protection requirements
  • Consolidate and validate business assumptions relevant to the solution strategy, prior to initiating and throughout the process
  • Understand the company’s IT Infrastructure/Applications, Business model/processes, Security controls and develop detection models
  • Publish global and business level deployment metrics reporting dashboard
  • Having 6-8 years of hands-on experience on McAfee DLP, Varonis, Stealth bits
  • Hands on experience in configuring and implement DLP rules across venues Data in motion, Data at rest and Data in use
  • Hands on experience in implementing Discover solutions like Symantec, McAfee, Kazeon or Stealthbits
  • Strong troubleshooting skills in fixing McAfee DLP endpoint issues
  • Strong knowledge on Linux or UNIX platform
  • Ability to write scripts in Perl or python
  • Good knowledge on Office 365 features and security controls
202

Senior Cyber Security Analyst Resume Examples & Samples

  • Provide technical expertise and mentoring to peers
  • Strong experience with handling malicious code and management of anti-malicious code technologies
  • Strong experience with managing email, Internet and anti-virus security controls
  • Understand security requirements for ICS (industrial control systems)
  • Strong oral and written communication, and presentation skills
  • Ability to work with a cross functional team and handle multiple tasks and priorities
  • 5+ years of experience in a hands-on security analysis or security engineering role
  • Specific understanding of application and operating system hardening, vulnerability assessments, security auditing, TCP/IP & network fundamentals, intrusion detection systems, firewalls, VPNs, WAFs
  • Solid understanding of hybrid-cloud environments and how they present specific challenges to the security field
  • Expertise with network firewalls, PKI, vulnerability scanners, zero-day/ATP, anti-virus, forensics, email security technologies, forensics software, SIEM, HIDS/NIDS//IPS, malware analysis and protection, content filtering, identity and access management, data loss prevention, content filtering technologies, application firewalls, security incident response techniques
  • Expertise with threat hunting and threat assement
  • Knowledge of NIST 800-53 controls
  • Background with ITIL/ITSM processes
  • CISSP, CEH, CSSLP or equivalent is a plus
  • Works well under pressure and can resolve complex problems
  • Excellent communication skills, presenting, listening and informing. Can communicate up, down and across the organization
  • Adhere to eCPGI Core Values: Accountability, Integrity, Efficient, Effective, Fulfillment, Respect, Positivity, Commitment to Excellence
  • Work with subcontractors and commercial vendors in the selection and evaluation of secure operating systems, cybersecurity applications, networks, hardware, databases, etc
  • Present information in a positive manner to management and customers
  • Works in a collaborative fashion, elevates team results over individual results
  • Work on multiple simultaneous tasks
  • Apply advanced technical principles, theories, and concepts to solutions
  • Work on unusually complex technical problems and provide solutions which are highly innovative
203

Cyber Security Analyst Resume Examples & Samples

  • Experience in Identity and Access Management implementations
  • Agile Experience
  • Strong communication skills as position will require effective to communication to business stakeholders
  • Demand Management experience
  • Application on-boarding experience preferred
204

Cyber Security Analyst Resume Examples & Samples

  • 0-2 years of knowledge of common enterprise applications, e-mail, web, cloud, client/server required
  • Knowledge of information systems security concepts and current information security trends and practices including security processes and methods
  • General knowledge regarding NIST, HIPAA, FIPS, and other recognized industry security standards and best practices
  • General understanding of DLP and DLP technologies
  • Working understanding of the anatomy of an attack
  • General understanding of using Microsoft windows workstation and server, Unix/Linux and network OS’s
  • Proven ability to use Internet Technologies including DNS, routing, SMTP, HTTP, DHCP, and FTP etc
  • Written/verbal interpersonal communication skills with the ability to interact effectively with a broad and diverse group of peers, users, and executives
  • Proven ability to prioritize work while multi-tasking on assigned work
  • Ability to perform and conduct Incident Response and participate in security incident and post incident response process
  • Ability to break down highly complex technical topics into language and diagrams understandable to a wide audience
205

Cyber Security Analyst Resume Examples & Samples

  • Implement mitigation measures to ensure that appropriate treatment is applied depending on the nature of the security threat perceived as well as ensure that the customers and management notifications as is appropriate
  • Take proactive measures to manage all security perimeter equipments, intrusion detection systems, manage identity and access programs, data correlation tools and or system components as may be required to interrupt or affect the above threats
  • Completion of University or College program in Computer Science or three years of equivalent industry experience in the information systems field
  • Knowledge of security event/incident management systems
  • General comprehension of mitigating system controls, networks and applications (VPN, Firewalls, Intrusion detection, server hardening and encryption technologies)
206

Internal Cyber Security Analyst Resume Examples & Samples

  • A bachelor’s degree in Computer Science, Information Security or a related subject or equivalent industry experience
  • Broad knowledge of a wide range of Information Technology systems and a deep understanding of the inherent security risks associated with these technologies
  • Ability to present security topics to a non-technical audience and presenting the business value of security
  • Excellent interpersonal skills with the ability to build and influence teams; and Self-motivated and able to deal with multiple projects
  • Fluent in English, German is a strong plus
207

Cyber Security Analyst Resume Examples & Samples

  • Install, maintain, monitor, troubleshoot, and decommissions sensor devices
  • Configured in accordance with DOT and SOC standards
  • Maintain configuration control of all signatures and test them before being deployed in the operational environment
  • Evaluate and test all upgrades and patches prior to deployment in production
  • Identify requirements for additional sensor locations which will enhance the situational awareness capability
  • Underlying factors affecting the expansion of sensor deployment will be the results of the ongoing Network Mapping task and the continued installation of Intrusion Detection Sensors
  • Coordinate and assist local personnel in the installation of network intrusion detection systems as approved by the COR or SOC management
  • In addition to required education or equivalent experience
  • Minimum three (3) years IT experience
  • Experience with the following
208

Cyber Security Analyst Resume Examples & Samples

  • Analyze reports to understand threat campaign(s) techniques, lateral movements and extract indicators of compromise (IOCs)
  • Understand and convey of the lifecycle of the network threats, attack vectors, and network vulnerability exploitation
  • Maintain awareness of directives, orders, alerts, and messages
  • Maintain situational awareness of cyber activity in the Information Technology (IT) by reviewing open source reporting for new vulnerabilities, malware, or other threats that have the potential to impact the organization
  • Familiar with signatures, tactics, techniques and procedures associated with preparation for and execution/implementation of such attacks
  • Experience with intelligence briefings
  • Experience with intelligence products
  • Experience with early indications and warnings
  • Experience with Open Source intelligence techniques
  • Experience working in a network security incident response team, such as a Security Operations Center (SOC), Computer Emergency Response Team (CERT), Computer Incident Response Team (CIRT), Computer Incident Response Center (CIRC) or Cyber Security Incident Response Center (CSIRC)
209

Junior Cyber Security Analyst Resume Examples & Samples

  • Minimum four (4) years IT experience
  • You must have previous experience working in a network security incident response team, such as a Security Operations Center (SOC), Computer Emergency Response Team (CERT), Computer Incident Response Team (CIRT), Computer Incident Response Center (CIRC) or Cyber Security Incident Response Center (CSIRC)
  • Infrequent (<5%) local travel, infrequent (<5%) long distance travel
210

IT Security Analyst / Cyber Security Analyst Resume Examples & Samples

  • Acts as the lead ISSO for the IT Operations team
  • Liaison between Cyber Security Team and ITO
  • Manages Cyber Security compliance roles for the IT Operations team including risk compliance, vulnerability/patching, standard operating procedure & processes, configuration compliance and related roles
  • Supports development and upkeep of relevant System Boundaries and including authorization packages, progress reporting, etc
  • Manages and maintains POAMs
  • Manages technical hardware / software inventory as it relates to security
  • Coordinates physical security management and monitoring for department assets
  • Coordinates IT Operations team participation in support of security incident response
  • Prepares monitoring and management reports, as necessary, in support of relevant responsibilities
  • Participates as a fully integrated member of assigned project teams, responsible to the delivery of successful solutions
  • Contributes to the team support for ITO event management including investigation, troubleshooting, reporting, resolution, root cause analysis and corrective action management
  • Monitors system performance, security and stability – takes action to identify trends and proactively inform management of issues
  • Information Security, 4 - 6 Years
  • Infrastructure Platforms (PC, Client/Server. Mainframe), 4 - 6 Years
  • Server Infrastructure, 4 - 6 Years
  • GM-ISP&P-Information Systems Security Policies & Practices, 4 - 6 Years
  • IT Security Administration, 4 - 6 Years
  • Relevant work experience in the areas of Security Compliance, Vulnerability Management and/or related disciplines
  • Demonstrated experience supporting Infrastructure Services in an enterprise environment
  • Demonstrated success participating and/or leading complex enterprise-level projects with focus on disciplines related to Servers, Storage, Mainframe, and/or End User Computing
  • Experience leading security-focused change initiatives within complex technical teams including process development, compliance monitoring and team coordination
  • Results-oriented member of technical support teams; the successful candidate is a self-starter, able to manage complex incidents, proactively identify opportunities for improvement and develop innovative solutions
  • Excellent time management skills including ability to multi-task and effectively prioritize work
  • Excellent work ethic; willing to extend the extra effort and time required to meet critical deadlines
  • Strong oral and written communications skills; able to articulate ideas and listen effectively; professionally communicates with all customers, vendors and technical support staff, including remote customers and team members in foreign countries
  • Strong analytical, and problem-solving skills
  • Accomplished analyst able to manage complex technical problems through identification, design, solution definition and implementation
  • Demonstrated experience managing vendor relationships related to incident management, project coordination, relationship development and SLA maintenance
  • On call support required for incident management
  • Hands-on team member willing to work in heavy industry/plant environments when required (very limited)
  • Demonstrated experience managing, supporting and/or developing Cyber Security compliance for technical project teams with focus in the areas of
  • Lean / Six Sigma practice (Green belt or greater preferred)
  • Hands on experiences using and/or developing compliance and monitoring process using the RSA Archer toolset
  • Experience with Cyber Security framework (NIST)
  • Vulnerability scanning and related tools (Nessus)
  • Cyber Security or other related professional certifications
  • X86 Server Management and Administration
  • Symantec Endpoint protection
  • Landesk management suite
211

Cyber Security Analyst Resume Examples & Samples

  • Conduct vulnerability/compliance assessments, to include analysis on AF/DoD systems
  • Assist team with defining, implementing, and documenting IT and cybersecurity policies and tactics, techniques, and procedures for conducting assessments and resolution
  • Demonstrate an ability to methodically and proactively analyze problems and identify solutions
  • Candidate must also be able to adequately report how a vulnerability was exploited and quantify the overall impact would be to the particular system
  • US citizen with active DoD Top Secret clearance and be SCI eligible
  • Possess an active ISC2 CISSP certification or possess a CompTIA Security+ certification and willing to obtain a CISSP certification to meet DoD 8570 IAM Level 3 requirement
  • Familiarity with Oracle and My SQL databases
  • Well versed in common Cyber Threat terminology, vulnerability and penetration test principles and methodologies, possess basic knowledge of cyber incident and response, and related current events
  • Familiarity with DISA STIGs, NIST SP800-53.x requirements, and experience in conducting DoD vulnerability/compliance assessments
  • Minimum 5 years working with and in a network systems security environment with a focus on security and information assurance
  • Willing to complete pre-screen assessment, comply with contract and customer training and certification requirements
  • Possess strong written and verbal communication skills to include the ability to render concise reports, summaries, and formal oral presentations
  • Well versed with the Microsoft Office Suite (MS Word, MS Excel, MS PowerPoint)
  • Minimum Bachelor’s degree in related field
  • Experience with Power Shell, SED, AWK, Perl, Python, bash, etc
  • Experience with Networking and storage solutions such as NetApp
  • Experience with shell programming and the UNIX environment
  • Experience or familiarity with military operations and/or supporting a mission system
212

Cyber Security Analyst Resume Examples & Samples

  • Respond to incident and perform root cause investigations for access service systems and the supporting infrastructure, often in partnership with other teams
  • Manage change coordination and validation, including OS, database and middleware patching / upgrades, application releases and other infrastructure changes
  • Produce reports and dashboards regarding system health and other operational metrics
  • Lead projects as related to technology refresh/evaluation such as Load Balancing and SSL technology. Implement tools, infrastructure and other capabilities to automate / optimize Access systems operations. Research corrective measures (long-term solutions) needed for any chronic issues identified that compromise security of particular systems or platforms
  • Advanced installation, administration and maintenance knowledge of UNIX and/or Windows Server operating system; web technologies; communication protocols; security standards; and technical project management
  • Excellent knowledge of relational databases (Oracle, SQL Server, Sybase) and SQL
  • Solid experience in the administration and performance tuning of application stacks (e.g., Tomcat, JBoss, Apache)
  • Solid scripting skills (e.g., shell scripts, Perl, PowerShell, Python)
  • Solid networking knowledge (LAN/WAN concepts, OSI network layers, TCP/IP)
  • Experience with directories and LDAP protocols
  • Desirable hands-on experience with implementing / supporting one or more of these products
213

Cyber Security Analyst Resume Examples & Samples

  • Analyzes problems associated with the mission
  • Builds stable working relationships internally and externally
  • Professionally applies company policies and procedures to resolve routine to complex issues
  • Identifies creative ways to solve problems related to the mission and works with other analysts and the program manager to implements the solutions
  • Works with other analysts, managers, customers, and sponsors regularly, and creates a reputation for technical prowess and leadership skills
  • Works independently and with project teams easily
  • Principles and practices of network security monitoring
214

Senior Cyber Security Analyst Resume Examples & Samples

  • Experience building and managing SIEM platform, use cases, and content
  • Escalation point for security services incidents or complex changes
  • Training of peers, briefing customers, and other Seattle Genetics organizations outside operations
  • Planning and overseeing security patching, signatures, and code upgrades
  • Stay abreast of cyber security issues by research of industry trends, viewing watch lists, and by other means to keep Seattle Genetics’ security posture up to date
  • Excellent customer services skills, proven technical expertise in Information and Network Security, and well-rounded understanding and command of the fundamentals of network routing, TCP/IP and Network Security
  • Monitoring and analyzing logs and alerts from a variety of different technologies (IDS/IPS, Firewall, Proxies, Anti-Virus, etc…), across multiple platforms
  • Assessing the security impact of security alerts and traffic anomalies on networks
  • Creating comprehensive security write-ups which articulate security issues, analysis and remediation techniques
  • Gather, maintain, and analyze cyber-security data and other key performance indicators for regular executive review
  • Responding to technical security questions and concerns from the business
  • Maintaining a strong awareness and understanding of the current threat landscape
  • Occasionally supervise and direct junior analysts during incident triage and investigation
  • Use technical dexterity to choose the right tool and how to use it effectively across a range of security scenarios
215

Senior Cyber Security Analyst / , V-soc Resume Examples & Samples

  • This position could be a salary grade 3 or 4 depending on combined level of education and work experience
  • Can demonstrate critical thinking and problem solving skills
  • Possess good time management and written and oral communications skills
216

Cyber Security Analyst Hbss Resume Examples & Samples

  • Analyze and report HBSS incidents to CERT responders
  • Deploy and configure McAfee point products such as VirusScan Enterprise, Rogue System Detection, Policy Auditor, and Data Loss Prevention / Device Control Module
  • Performs analyses at all levels of total system product to include: concept, design, fabrication, test, installation, operation, maintenance and disposal
  • Assists in ensuring that customer or product requirements are converted into total systems solutions
  • Bachelor’s degree in related field or equivalent; advanced degree preferred
  • Minimum of 8 years work related experience with at least 4 years of related HBSS technical experience
  • Candidates must have a DoD SECRET level security clearance
  • Current DoD 8570 IAT level II certification (Security+ or equivalent)
  • Experience managing and certification in Windows or Linux OS
  • Strong SQL skills and experience
  • McAfee / Intel Security Certified Product Specialist Certification
217

Cyber Security Analyst, Associate Senior Resume Examples & Samples

  • Provide subject matter expertise on enterprise cyber security risks, threats, technologies, and potential impact
  • Interview customer IT leadership and technical personnel regarding cyber security controls and processes
  • Assist in designing and implementation of cyber maturity models to evaluate the effectiveness of an organization’s cyber program
  • Translate technical discussions and information into non-technical material for presentation to leadership
  • Mentors and supports peers and junior staff in technical growth
  • Experience conducting assessments or evaluations using security frameworks
  • Knowledge of cyber security technologies across the industry. Experience in evaluation or comparisons of various technology verticals is preferred (such as firewalls, HIDS, IDS/IPS, malware analysis, end point protection)
  • Strong skills using Microsoft Office Suite (Word, Excel, Outlook)
  • Experience working with SIEM, packet capture solutions, endpoint solutions, API integrations, virtual infrastructure, system hardening, and forensic technologies
  • Ability to clearly communicate technical information to a non-technical audience
  • Advanced knowledge of Windows, Linux, and Mac infrastructures
  • Work effectively as part of a cohesive team or as an individual contributor
  • Familiarity with security concepts like risk, vulnerabilities, data management, confidentiality, access controls, etc
  • 3+ years of cyber operations, engineering, and / or architecture experience
  • 1+ years government related cyber security experience
218

Cyber Security Analyst Resume Examples & Samples

  • Experience working with NIST
  • Experience with the Risk Management Framework
  • Experience analyzing data
  • Experience with security compliance for web applications
  • Good communication skills and experience interfacing with technical teams for compliance purposes and non-technical clients
  • Needs to be detail oriented, needs to like documentation
219

Cyber Security Analyst Resume Examples & Samples

  • 3+ years of experience with Cybersecurity and vulnerability risk assessments
  • Experience with DoD Operational Test Agencies (OTA)
  • Experience with Cybersecurity as it relates to DoD acquisition life cycle
  • Experience with the principles of IA, including confidentiality, integrity, non–repudiation, availability, and access control and security testing
  • Ability to perform in a military environment
  • Ability to travel for approximately 25% of the time to stateside and international locations
  • Ability to analyze and write technical documents
  • Experience with an Air Force or DoD Certification and Accreditation program, developing or analyzing POA&M’s, SIP, DIP, and security test and evaluation reports
  • Experience with evaluating IA compliance of a system against current DIACAP, Risk Management Framework, and DoD Cybersecurity policy
  • Experience with penetration testing and Blue or Red Teams
  • Knowledge of DoD networks and communications
  • Knowledge of TCP/IP and networking
  • BS degree in a technical field, including Computer Science, Engineering, Math, Science, or a related field
  • DoD 8570 Compliant Certification, including Security+ and Certified Ethical Hacker (CEH)
  • Offensive Security Certified Professional (OSCP) Certification
220

Cyber Security Analyst Resume Examples & Samples

  • Strong understanding of IT operations: help desk, end-point management, and server management
  • Strong understanding of security operations concepts: perimeter defense, BYOD management, data loss protection, insider threat, kill chain analysis, risk assessment, and security metrics
  • Strong analytical and Diagnostic skills
  • Understand architecture, administration, and management of operating systems, networking, and virtualization
  • Enthusiastic and highly adaptable
  • Detailed knowledge in two or more of the following
221

Cyber Security Analyst Resume Examples & Samples

  • Conduct Perform vulnerability and risk assessment on Information Systems to ensure they are in compliance with security standards and measures utilizing Assured Compliance Assessment Solution (ACAS) and Nessus Scanner
  • Perform risk assessments on systems, applications, and baselines in support of Risk Management Framework (RMF) for DoD Information Technology (IT) Department of Defense Instruction (DoDI) 8510.01 of HQ networks and systems
  • Prepare risk assessment report for submission to the Authorizing Official (AO)
  • Assist enforcement of Authorization, Assessment, and connection standards for HQ’s and Theater’s networks and systems
  • Maintain ACAS SecurityCenter by installing SecurityCenter updates, patches and plugin definition
  • Maintain ACAS RedHat Operating System by applying OS patches
  • Perform review, analysis, and documentation for the life cycle security requirements of applications, systems, and networks within HQ USCENTCOM
  • Review and update ACAS tactics, techniques and procedures (TTPs) and Standard Operating Procedures (SOPs)
  • Review current intelligence for relevant threats and develop appropriate actions/response
  • Assist with tracking of compliancy reporting for USCENTCOM orders
  • Analyze network or system changes/reconfigurations for security impacts
  • Coordinate and participate in Cyber Security risk analysis and assessments, as required
  • Must meet DoD 8570.01-M minimum of IAT Level II Certification (i.e. Security +) upon hiring
  • Must have demonstrated experience with Assured Compliance Assessment Solution (ACAS) and Nessus scanner to include creation of dashboards and providing analysis of vulnerabilities
  • The candidate must of have experience with Risk Management Framework (RMF) for DoD Information Technology (IT) Department of Defense Instruction (DoDI) 8510.01
  • Candidate must have an understanding of vulnerabilities, exploits, and practical working knowledge of DoD Cyber Security program
  • Must be able to read and understand DoD Cyber Security orders, policies and procedures
  • Must have experience within the USCENTCOM AOR and must be familiar with its mission
  • Candidate must have strong communications skills both verbally and in writing
  • Military Experience (Active Duty or Reserves)
  • Experience with Cyber Security in a Joint and Coalition Partner environment
222

Cyber Security Analyst / , Vsoc Resume Examples & Samples

  • This position could be a salary grade E01 or E02 depending on combined level of education and work experience
  • Demonstrated understanding of computer networking and operating systems
  • Demonstrated understanding of current threats, vulnerabilities, and attack trends
223

Cyber Security Analyst / , Vsoc Resume Examples & Samples

  • This position could be a salary grade E03 or E04 depending on combined level of education and work experience
  • Demonstrated to advanced experience with computer networking and operating systems
  • Demonstrated to advanced experience of current threats, vulnerabilities, and attack trends
  • Experience with one of the following: Splunk, NetWitness, Arcsight, McAfee NSM, and other related tools
224

Cyber Security Analyst Resume Examples & Samples

  • Analyze and respond to information security events to protect company personnel, assets and data
  • Research and provides technical summaries of attack techniques, vulnerabilities and security controls
  • Author and maintain operational processes, procedures and standards
  • Maintain servers, workstations, networking equipment, mobile devices and infrastructure devices
  • Assist in designing security awareness campaigns and outreach
  • Bachelor's degree in Computer Science, Computer Engineering, Information Technology or Information Assurance
  • CompTIA Security+, CompTIA Network+ or equivalent technical knowledge
  • CISSP, CEH, GIAC, CISA, CRISC, MCSE or equivalent certification, a plus
  • Strong interest in information security, hacking and secure design principles
  • Strong technical skills with Microsoft Office suite
  • Capacity to manage multiple engagements and competing priorities
225

Cyber Security Analyst Resume Examples & Samples

  • 1+ years of experience with RMF or DIACAP processes
  • 01M Compliant IAM Level II Certification, including CAP, CASP, CISM, CISSP or Associate, or GSLC or IAT Level II Certification, including CCNA-Security, GICSP, GSEC, Security+ CE, or SSCP
  • Experience with the implementation of DoD STIGs
  • Experience with supporting security control selection and other activity in support of RMF-specific steps
  • Knowledge of the Navy's Cybersecurity policies and procedures
226

Cyber Security Analyst Resume Examples & Samples

  • Prior experience working in one of the following: Security Operations Center (SOC), Network Operations Center (NOC) or Computer Incident Response Team (CIRT)
  • Experience in the detection, response, mitigation, and/or reporting of cyber threats affecting client networks and one or more of the following: Computer intrusion analysis and incident response or Intrusion detection/protection systems
  • Familiarity with packet analysis to include: HTTP Headers & Status codes; SMTP Traffic & Status codes; FTP Traffic & Status Codes
  • At least one of the following certifications: CISSP, PMP, CCNP or related advanced IT certification
227

Cyber Security Analyst, Senior Resume Examples & Samples

  • Level 2: Minimum 2 years (in excess of degree requirements stated above) of progressively responsible experience in IT security
  • Level 3: Minimum 5 years (in excess of degree requirements stated above) of progressively responsible experience in IT security
  • Level 4: Minimum 8 years (in excess of degree requirements stated above) of progressively responsible experience in IT security
228

Cyber Security Analyst Resume Examples & Samples

  • Assist with administration of web content filters/proxies, email security, IDS/IPS, SIEM, DNS security, firewalls, network access control, and anti-virus software
  • Leads the effort to manage the deployment of security patches and configuration changes to protect UGI information assets
  • Coordinate resources to ensure security patches are applied and properly tested in a timely manner
  • Assist in security incident response and remediation
  • Configure, monitor, and audit security appliances
  • Analyze traffic flows, system logs, and packets using security appliances (e.g., QRadar)
  • Assist with development, evaluation, and maintenance of IT security policy and procedures
  • Contribute to cyber security initiatives to protect systems and information
  • Participate in ongoing cyber security training to promote security awareness and improve operational efficiency
  • Collaborate with other IT security staff as necessary to identify potential threats, respond to reported violations, and ensure consistent application of IT security policies and procedures
  • Three (3) years of IT security related experience
  • Proficiency with vulnerability scanning, remediation, and reporting
  • Demonstrated proficiency with Windows and Linux operating systems
  • Working Knowledge of data security, network security, systems and applications security
  • Experience administering firewalls, IDS/IPS, SIEM, and other security technologies
  • Experience with NIST and ISO Industry Standards
  • General knowledge of Information Security concepts, policies, and procedures
  • Excellent verbal, written, analytical, and interpersonal skills
  • IT security certifications (Security+, CISA, CISSP, or GIAC)
229

Cyber Security Analyst Resume Examples & Samples

  • Experience with privilege identity management processes required
  • Knowledge and use of CyberArk or privilege account management product
  • Experience related to credential management, non-human identity, and privilege access management work stream (specifically, developing and managing project schedules and dependencies resources, defining and managing risks and issues, writing and delivering project status, and coordinating across work streams)
  • Must have proven record of accomplishment in successful problem solving
  • Proactive learner and creative problem solver who enjoys being in a fast-paced environment and providing customer success and satisfaction
  • Must have ability to analyze current business workflow and align new strategy to the large user base across different divisions
  • Ability to influence senior management on business critical decisions
230

Cyber Security Analyst Resume Examples & Samples

  • Use complex analytics to correlate information from multiple sources to detect advanced threat actions
  • Train IT admins and web developers on common industry security best practices
  • Run security awareness campaigns
  • Perform vulnerability and penetration testing
  • Validate information security policy compliance
  • Support investigations and perform forensic analysis
  • Keep up to date on latest security whitepapers, incidents, tools, and tactics for defending against advanced threats
  • Attend Security conferences
  • Lead Division Security Operations
  • Must demonstrate intimate knowledge and understanding of network protocols, multiple operating systems, web development, and network and domain architectures
  • Must demonstrate knowledge of latest cyber threats and tactics, techniques, and procedures used to infiltrate computer networks
  • Demonstrated ability to document and report on gathered analytics and risk analysis
  • Must be able to demonstrate using shell scripting and tools to query and parse log data
  • Degree must be in a relevant field (e.g. IT, Computer Science, Computer Engineering, Information Security, Information Assurance, or related degree)
  • Must have one or multiples of the following: OSCP, OSCE, OSEE, OSWE, GSEC, GCIH, GCIA, GPEN, GWAPT, GCWN, GCED, GXPN, CEH, CHFI, ECSA, ECIH, ECSS, CISSP, CSSLP, CCFP or LPT
  • Travel up to 15%
231

Senior Cyber Security Analyst Resume Examples & Samples

  • Coordinate with technology subject matter experts to maintain currency of the system’s technical description and control implementation statements
  • Perform a security impact analysis for each proposed change to the system’s configuration
  • Maintain the GSS system’s security artifacts and security documentation library
  • Review work instructions and operational procedures for compliance with security requirements and policy Interpret security principles and requirements for technical teams
  • Monitor remediation of system vulnerabilities discovered by scanning tools
  • Provide expertise and assistance in the development of the security policies and procedures and also assist ensuring compliance with those policies and procedures
  • Active CompTIA Security+ or ISC2 CISSP certification
  • Demonstrated experience and knowledge of use of BigFix as well as knowledge of system analytics
  • Broad understanding of security protections typical in enterprise environments, including security hardening, firewalls and input filtering, architectures and boundary/endpoint best practices
  • Familiarity with Splunk, Symantec Endpoint Protection, Tenable Security Center and IBM Endpoint Manager (IEM) and SourceFire IDS/IPS tools
232

Intern, Cyber Security Analyst Resume Examples & Samples

  • Participate in security tool implementation, integration, and performance evaluation
  • Review of security tool outputs, alerts, alarms, and reports
  • Security log and event analysis
  • Analyze system events, security alerts, and network activity, evaluate detection mechanisms
  • Participate in cyber security activities, communication, and coordination across the Sony Enterprise
  • Work with the various teams to gather, evaluate, analyze, and report on metrics to ensure performance of security service delivery and identify trends
  • Working towards an undergraduate degree in Computer Science, Cyber Security, Information Technology or related subject matter
  • Fluency in another language (particularly Japanese) a plus
  • Available at least 20 hours per week
233

Senior Cyber Security Analyst Resume Examples & Samples

  • Service delivery of cyber security tools, capabilities, and programs for the global monitoring and detection framework
  • Assess performance and maturity of detection and monitoring architecture, tools, and processes, and make recommendations for improvements
  • Interface with Sony Operating Companies globally to assess cyber security, monitoring, and reporting requirements and deliver tailored solutions to support the requirements
  • Prioritize multiple tasks and formulate responses/recommendations to internal customers and team members in a fast-paced environment
  • Apply technical acumen and analytical capabilities to speed and enhance monitoring, detection, and response capabilities
  • Interpret, develop, and implement metrics collection to measure performance of security capabilities
  • Mentor other team members
  • Provide assistance to other security teams as needed
  • Support investigation of incidents using SIEM and other data, event graphs, annotations, cases, and reports
  • Assist in the development of advanced detection and monitoring content for Sony’s global infrastructure, systems, and applications
  • Bachelor’s degree in Computer Science or similar field is preferred, or other equivalent experience
  • Minimum of 8 years’ experience in Information Technology with 5 years’ experience in one or more of the following areas: information security, network operations or system administration with a significant security element
  • Advanced experience with log management solution Splunk in the following areas
234

Cyber Security Analyst Resume Examples & Samples

  • Remedy Tasks (IA validation using ACAS)
  • Perform Audit Reviews
  • Perform manual STIG checks
  • Setup and Run SCAP/SCC scans
  • Perform vulnerability analysis in ACAS
  • Download ACAS reports and post to sharepoint site
  • Create reports in ACAS
  • Monitor and track OPDRs, IAVMs, MCD, and MARADMINs
  • Track and create Plan of Action & Milestones (POA&Ms)
  • Create work instructions and standard operating procedures
  • Review and update security documentation
  • Proactive work ethic, can work as an individual or as a team
  • Xacta / RSA Archer Experience
  • Strong problem solving skills- solutions driven
  • Sys Admin and Engineering Background
  • MCSE
235

Cyber Security Analyst Resume Examples & Samples

  • Syslog SIEM Update/Integration/Reporting
  • Articulate encryption standards, deployment strategies and technologies
  • File Server AV Monitoring
  • Malware Monitoring
  • Metrics reporting
  • Log Sources and Management with the SIEM
  • AMP for Endpoints Malware Alerts management and escalation
  • Certificate management
  • Powerbroker understanding and client side software installation reviews
  • Helpdesk Tickets
  • Security Incident handling
  • Scanning/Policy/Compliance
  • Change control reviews approvals/rejections
  • Version/Maintenance/Release monitoring of various security tools
  • Software license tracking
  • Alert – Threat Bulletins
  • Manage third party risk, specifically IT
  • Escalate security related incidents
  • Basic SIEM knowledge, preferably LogRhythm
  • Basic regulatory understanding covering GDPR and various US regulations
  • Demonstrable English proficiency
  • Basic Cisco Security product knowledge including ASA’s, ThreatGrid and network fabric
  • Basic Intrusion Prevention and Detection technology understanding
  • ISO 27001/2:2013 certification
  • University degree preferably in Computer Science field
  • Be able to work in a pressurized situation and set priorities accordingly
  • Ability to build strong relationships with key stakeholders across the organization
  • Ability to think logically to analyze, troubleshoot and resolve complex issues
  • Must be professional, courteous and enjoy working with people; critical thinking, creativity, and independent judgment are expected
  • Strong interpersonal skills and the ability to work within a team
  • Ability to work in a fast paced, high pressure work environment
236

IT Cyber Security Analyst Resume Examples & Samples

  • Bachelor degree or equivalent experience
  • 2+ years IT security experience
  • Local to Austin or willing to relocate to the area (we do not provide relocation assistance)
  • Project Management skill-sets are a requirement
  • LI-CV1
237

Senior Cyber Security Analyst Resume Examples & Samples

  • Bachelor’s degree in Computer Engineering, Computer Science or related field or equivalent work experience, required
  • 5 years’ experience in Information Technology Security & Network, or related are, required
  • GCIH – Global Certified Incident Handler, required
  • OSCP – Offensive Security Certified Professional, required
  • Advanced knowledge of Compliance Frameworks: PCI-DSS, ISO 27001/27002, NIST CSF
  • Advanced knowledge of Programming Languages: Java, C/C++, Python, Perl, Verilog, VHDL, PHP, Assembly
  • Advanced knowledge of Operating Systems: Linux, Solaris, OS X, Windows XP, Windows 7/8/10, Windows Server 2003/ 2008/2012
  • Advanced knowledge of malware analysis
  • Advanced knowledge of Point of Sale systems payment technologies such as P2PE and Tokenization
  • Advanced knowledge of internal and external penetration testing
  • Advanced knowledge of application code and platform configuration reviews
  • Advanced knowledge of VoIP security assessments, social engineering, and wireless security testing
  • Advanced knowledge of global penetration testing designed to meet PCI requirements
  • Advanced knowledge of planning and implementing risk management programs
  • Advanced knowledge of cyber-crime remediation
  • Advanced knowledge of incident response handling, social engineering, and forensic analysis
  • Display empathy, understanding and patience with employees and external customers
238

Cyber Security Analyst Resume Examples & Samples

  • Experience with Windows and Linux servers with GPOs, IAVMs and STIGs
  • Recent experience creating and updating Python scripts
  • Experience with ClearQuest and ClearCase
239

Cyber Security Analyst Resume Examples & Samples

  • Provision/ De Provision User Access Across Multiple platforms: Windows /Unix/AS400/Oracle
  • CyberArk PIM Suite including but not limited to provisioning for; Secure Document Vault (Secure repository and sharing infrastructure), Enterprise Password Vault (Privileged Accounts at OS and DB levels), Application Identity Manager (App2App credentials and encryption keys), Privileged Session Manager (Control and monitor privileged accesses)
  • Coordinate system and application configuration and management tasks
  • Coordinate integration services, product updates, change requests and Tier-3 support
  • Provide timely response to address server and client-server application performance and/or availability issues
  • Lead, coordinate and participate in process improvements as they relate to IdM infrastructure and system
  • In conjunction with business and department priorities and directives, conduct vendor and product research on software and systems products to address business needs
  • Tier 3 support for all service desks using NAMCK VPN
  • RSA – server / application support / provisioning
  • Privileged User Access Review
  • CyberArk – Server / Application Support
  • Knowledge of core security principles
  • Highly skilled in Running/providing services on a Linux/UNIX platform
  • Demonstrated knowledge of Windows AD
  • Knowledge of AutoIt scripting
  • Ability to establish goals, objectives, and work plans
  • Ability to understand the business and technical requirements while developing the associated content and documentation
  • Proficiency in upgrading various software and hardware platforms
  • Detail-oriented, self-motivated and disciplined, with excellent time management skills
  • Experience with all of the following platforms: Windows, Unix, AS400, Oracle, Tandem, Mainframe
  • Previous Cyberark Administrative support
  • A history of workstation support
  • A history of call center or relevant customer interfacing roles
  • Relevant security certifications (CISSP, CISA, GIAC, Security Plus)
240

Senior Cyber Security Analyst Resume Examples & Samples

  • Monitors system availability and performance
  • Reacts to customers escalations
  • Determine sophistication, priority, and threat level of identified malware
  • Conduct log and system analysis for various system, and network and security devices capabilities to including NexGen Firewalls, WAFs, Database monitoring solutions, Identity Management Solutions, Virtualized platforms, Linux/Unix and Windows operating systems. include routers, Windows, Linux, and UNIX
  • BS/BA degree or equivalent combination of related work experience required
  • 5 years of SOC experience delivering security solutions to an enterprise or with a security services organization is required
  • Prior security analysis experience is required
  • Managed Security Services (MSS) experience HIGHLY DESIRED!
  • 1 or more certifications include, Security+, CEH, GCIA, GCIH, CISSP or similar
  • Experience in analyzing security logs generated by Intrusion Detection/Prevention Systems (IDS/IPS), firewalls, Anti-Virus, and/or other security logging sources
  • Experience performing security analysis utilizing SIEM technologies
  • Experience performing analysis utilizing IDS consoles
  • Strong understanding of general cybersecurity concepts
  • Excellent verbal and written communication skills in language to be supported
  • Phone and remote support experience. Knowledge and resolution ability
  • Ability to mentor new analysts
241

Cyber Security Analyst Resume Examples & Samples

  • Degree/Diploma in Computer Science, Computer Engineering, Electrical Engineering, Management Information Systems or equivalent certifications (MCSE, MCP, Oracle/MCDBA, HP-UX, CCNA, CCNP, SNIA)
  • Minimum of 1-2 years’ experience within IT Operations, infrastructure services support (Systems NT, UX, Backups, DB’s, IT Security or Network management), operations monitoring and end user support
  • Minimum of 1-2 years’ hands-on technical knowledge of the applicable technology platform that you will be responsible for: Network management, Security and HP Open View Products. Must be able to demonstrate troubleshooting and problem solving skills
  • SIEM knowledge will be considered an advantage
  • Strong interpersonal and security skills
  • Clearly and in a timely manner with all customers, partners and users, internal and external
  • Team player. Ability to collaborate and cooperate with members of team and members of other teams
  • Understanding of 24x7 mission critical enterprise computing environments and the impact of service disruption on a company’s bottom line
  • Ability to pro-actively learn new technology, processes and other skills
  • Able to pro-actively search for solutions from knowledge bases, support, documentation and other information
  • Keen interest in continual learning and professional development
  • Time management skills and ability to multi-task and prioritize assigned tasks, problems and requests in a high pressure environment
  • Flexible, self motivated with the ability to work under pressure in an international and culturally diverse organization
  • Technical skills (procedures and documents the employee has to be acquainted with)
  • Good knowledge of IT Operations, infrastructure services support (Systems NT, UX, Backups, DB’s or Network management), operations monitoring and end user support. Good understanding of ITSM/ITIL processes
  • Part in a team that has established itself as a preferred partner for Hi-tech Services & Support throughout EMEA
  • Competitive remuneration package
  • 4 days additional paid leave (total:24 days)
  • Food vouchers
242

Cyber Security Analyst Resume Examples & Samples

  • Reviews security and network events that are populated in a security information and event management (SIEM) system
  • Investigates intrusion attempts and performs in-depth analysis of exploits
  • Provides network intrusion detection expertise to support timely and effective decision making of when to declare an incident
  • Conducts proactive threat research
  • Analyzes a variety of network and host-based security appliance logs (Firewalls, NIDS, HIDS, Sys Logs, etc.) to determine the correct remediation actions and escalation paths for each incident
  • Independently follows procedures to contain, analyze, and eradicate malicious activity
  • Documents all activities during an incident and provides leadership with status updates during the life cycle of the incident
  • Creates final incident report detailing the events of the incident
  • Provides information regarding intrusion events, security incidents, and other threat indications and warning information
  • Assists with the development of processes and procedures to improve incident response times, analysis of incidents, and overall SOC functions
  • University Degree (Equivalent to Bachelor degree) in Computer Science, Information Systems Security, or a related disciplines plus generally four years of experience with security operations, computer network defense, or intelligence analysis
  • Higher Secondary Education plus two years of experience or training in the accounting field
  • Minimum two years of experience in NID monitoring and incident response
  • Industry recognized professional certification such as CISSP, GCIH, GCIA, Security+.Past experience with or current understanding of government intelligent processes and systems
  • Direct experience with Malware analysis techniques and methodologies.Working knowledge of the Linux Operating system (CentOS, Red Hat, Ubuntu).Scripting Skills (e.g. PERL, Python, shell scripting, VBS)
  • Familiarity with network security methodologies, tactics, techniques and procedures.Experience with IPS/IDS, SIEMS, and other computer network defense security tools.Experience reviewing and analyzing network packet captures
  • Possess a comprehensive understanding of TCP/IP protocol, security architecture, and remote access security techniques/products
243

Cyber Security Analyst Resume Examples & Samples

  • Demonstrate a deep interest in learning new technology platforms for security testing, and forensics
  • Keep abreast on latest security news/trends
  • Conduct security tests using automated tools, ad-hoc tools and manual testing
  • Conduct penetration testing against different technological domains including, but not limited to, web products, hardware products, wireless products, software, cloud based software, smart device applications
  • Assess and calculate risk based on vulnerabilities and exposures discovered during testing
  • Create required information security documentation technical reports and formal papers on test findings, and complete requests in accordance with requirements
  • Handle and complete customer projects to the defined requirements in the timeframe required by customer with the highest quality and integrity of work
  • Meet and exceed customer’s expectations with projects and other related tests and activities
244

Cyber Security Analyst Resume Examples & Samples

  • Ability to grasp information quickly
  • Strong analytical and critical thinking skills demonstrated by the ability to make sound decisions independently
  • Ability to execute on tasks and lead projects as needed
  • Demonstrate excellent communication and collaboration skills in order to effectively work with clients, IT management, and staff
  • Demonstrate knowledge of, and ability to communicate about, the information security threat landscape
  • Thorough understanding of all layers of the OSI model
  • Strong SIEM utilization skills
  • Strong programming knowledge in Python and/or C# (.NET). Other languages a plus
  • Ability to produce well commented code and clearly articulated documentation
  • Analyze, correlate, and data mine network traffic and event logs to identify malicious activity
  • Conduct research and development focused on the detection of tools, tactics and procedures leveraged by modern threat actors and malware
  • Participate in or lead customer facing meetings and projects, including those that involve technical topics or technical service delivery
  • Comprehensively understand networking protocols and infrastructure designs; including routing, firewall functionality, host and network intrusion detection systems, encryption, load balancing, and other network protocols
  • Understand strategic objectives and vision, and work towards those goals
  • 2-5 years of professional information security experience
  • Software development experience involving automation and/or APIs
  • Data science, machine learning, and/or statistical modeling experience that can be applied to anomaly detection
245

Cyber Security Analyst Resume Examples & Samples

  • Bachelor’s degree and 2 years of experience in information systems and IT security. An additional 6 years of experience will be considered in lieu of degree
  • Currently possess or be able to obtain a public trust clearance
  • Experience identifying when threats to the network should be communicated to management, and the ability to formally document and communicate the threat in a report
  • Be capable of interpreting task requirements and selecting appropriate methodologies to complete task and carry it through to completion
  • Strong interpersonal, organizational and communication skills
  • At least one year of experience performing NIST-based Security Assessment and
  • Authorization (formerly called Certification and Accreditation) activities in direct support of Federal information systems
  • Experience with real time threat awareness/continuous monitoring that includes: operational experience, firewall management, security information and event management (SIEM), and the ability to identify threats to the network
  • Relevant professional certifications from recognized industry consortiums including ISC2, ISACA, CompTIA, and GIAC specifically Security+, CAP, CISSP or equivalent
  • Experience with Tenable Security Center
246

Siem Cyber Security Analyst Resume Examples & Samples

  • Develop, test and coordinate the implementation of innovative and enhanced security SIEM content solutions
  • Develop and analyze SIEM content performance metrics for actionable items
  • Investigates incidents using SIEM technology, packet captures, reports, data visualization, and pattern analysis
  • Produce and revise documentation of ArcSight developed content
  • Understand and maintain the appropriate knowledge of Security Technologies, (AV, HIPS, NIPS, SIEM, WAF/DAM, DLP), security procedures, and services within the SOC
  • Minimum of 4 years of direct experience in the analysis of security events from the SIEM platform
  • Minimum of 4 years in building content in the SIEM ArcSight technology
  • Good knowledge in building flexconnector
  • Good knowledge in building ArcSight logger report
  • Ability and experience in writing clear and concise technical writing specifically in event analysis and incident handling documentation
  • Good understanding of network infrastructure protection systems
  • Create technical documentation around the content deployed to the SIEM
  • Good understanding of operating systems security measures
  • Good understanding of application protection systems. (WEB)
  • Experience in Intrusion Detection or Prevention Systems
  • Experience with the TCP/IP stacks
  • Excellent communications and vulgarization skills
  • Takes initiatives, has leadership and organizational skills
247

Expert Cyber Security Analyst Resume Examples & Samples

  • Applies the concept of operations set of disciplines for the planning, analysis, design and construction of information systems across a major sector of the organization
  • Develops analytical and computational techniques and methodology for problem solutions
  • Performs strategic systems planning and business information planning for specific projects
  • Performs process and data modeling in support of the planning and analysis efforts using both manual and automated tools
  • Applies reverse engineering and re-engineering disciplines to develop strategic and planning documents
  • Applies business process improvement practices to re-engineer methodologies/principles and business process modernization projects
  • Applies, as appropriate, activity and data modeling, transaction flow analysis, internal control and risk analysis and modern business methods and performance measurement techniques
  • Assists in establishing standards for information systems procedures
  • Develops and applies organization-wide information models for use in designing and building integrated, shared software and database management systems
  • Constructs sound, logical business improvement opportunities consistent with the CIM guiding principles, cost savings, and open system architecture objectives
  • Must have current/active TS/SCI with Polygraph
  • Requires at least 11 years of relevant experience. Applicable degrees/certifications will count toward relevant experience as follows
  • Demonstrated on-the-job experience with Sponsor or Sponsor partner networks and systems
  • At least two years of demonstrated on-the-job experience with vulnerability assessment tools (hands on experience) and cyber security engineering
  • Demonstrated on-the-job experience performing in-depth analysis on reports produced from vulnerability assessment tools and the ability to communicate those results effectively to other project stakeholders
  • Demonstrated on-the-job experience communicating and collaborating effectively with program leads and Technical SMEs in support of program milestones or projects that require extensive collaboration over long periods of time
  • Demonstrated on-the-job experience coordinating program remediation plans for addressing vulnerability findings
  • Demonstrated on-the-job experience recommending reciprocity risk management principles that standardize security assessments where possible
  • Demonstrated on-the-job experience assessing and guiding the implementation of identified corrections associated with technical vulnerabilities
  • Demonstrated on-the-job experience providing guidance and direction on the maintenance of security configuration control of hardware, systems, and application software where needed
  • Demonstrated on-the-job experience participating and provide support for program reviews
248

Senior Cyber Security Analyst Soc-mtl Resume Examples & Samples

  • Investigate security events and incidents
  • Perform malware analysis and reverse engineering
  • Perform Network Security Monitoring
  • Review and interpret alerts and provide diagnostics during incident management and analysis to support clients. (as a LVL3)
  • Adhere to best practices for security management
  • Provide 2nd and 3rth level response to security threats and vulnerabilities and able to analyze event logs, syslogs, and other data sources to determine the root cause of security events and provide a recommendation to resolve the event
  • Analyzing security events, incidents and problems to provide recommendations on action
  • Maintaining the relationship to keep clients and management informed and throughout the incident, problem and change management cycles
  • Proactive monitoring of client environments using specialized security applications
  • Ongoing training and certification to maintain your technical skills at the highest level
  • Participation in a weekly after hours on-call rotation
  • Participate to monthly calls with customers
  • Competence in using an internal and external ticketing system for ITIL-based incident, problem and change management
  • Methodical and creative approach to problem-solving
  • Proven experience in the implementation, daily management and troubleshooting of firewalls of multiple vendors
  • Proven experience in the daily management and troubleshooting of the intrusion prevention systems (IPS)
  • Knowledge of NIST, ISO 27001, ITIL, SAS70 (or 5970) and/or other compliance frameworks
  • Experience in building UseCases within Arcsight
249

Cyber Security Analyst Resume Examples & Samples

  • To demonstrate a deep interest in learning new technology platforms for security testing, and forensics
  • To keep abreast on latest security news/trends
  • To conduct security tests using automated tools, ad-hoc tools, and manual testing
  • To conduct penetration testing against different technological domains including, but not limited to, web products, hardware products, wireless
  • To assess and calculate risk based on vulnerabilities and exposures discovered during testing
  • To create required information security documentation, technical reports and formal papers on test findings, and complete requests in accordance
  • Candidate must be a self-motivated individual that is dedicated to exceeding client expectations, be willing to contribute to team efforts, and possess
  • Experience with cybersecurity testing of products and software to identify weaknesses and flaws is a plus
  • Experience installing and using various OS distributions and application packages
  • Hands-on experience with commercial, open source and free security solutions such as AppScan, Fortify, Maltego. Kali Linux, Nessus, OpenVAS,
  • Security related certifications a plus: CISSP, CISA, CEH, GIAC
  • Strong expertise in testing in two or more of the following domains: Embedded software, embedded security, industrial control systems / SCADA,
250

Cyber Security Analyst Resume Examples & Samples

  • Experience or training in the IA governance , technical hardening and / or accreditation & certification frameworks and Information Security program Security Plans, STIGS, Center Internet Security baselines for Networking ,OSes, Application and Database components, NIST standards for Risk Management and Cybersecurity frameworks specifically
  • Experience in the use of Service Now or service request ticketing systems, and MS Word , Excel, Power Point and SharePoint,
  • Experience using eGRC, SEIM, and Vulnerability Scanning tools
  • Experience with NIST SPs for SSPs, DFARs, Encryption and other International security and regulatory standards
  • Experience in the use of MS Project, MS, Visio, SCCM,FIM/ MIM and other Microsoft products, Archer and SPLUNK eGRC /SEIMs and other MVM / Nexus security tools