Cyber Security Analyst Resume Samples

4.5 (104 votes) for Cyber Security Analyst Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the cyber security analyst job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
AP
A Parisian
Aliyah
Parisian
761 Lindgren Corner
Houston
TX
+1 (555) 577 2756
761 Lindgren Corner
Houston
TX
Phone
p +1 (555) 577 2756
Experience Experience
Phoenix, AZ
Cyber Security Analyst
Phoenix, AZ
O'Reilly LLC
Phoenix, AZ
Cyber Security Analyst
  • Work with developers, system/network administrators, and other associates to ensure secure design, development, and implementation of applications and networks
  • Perform network traffic analysis using raw packet data, network flow, Intrusion Detection Systems (IDS), and custom sensor output from communication networks
  • Assist the Cyber Security Manager with the development of the IA related Procedures, and Work Instructions
  • Tracks performance metrics and provides timely updates to CSOC management
  • Develop, improve and help implement best practices for risk reduction across a broad range of enterprise applications, systems, networks and interfaces
  • Assists with the development of processes and procedures to improve incident response times, analysis of incidents, and overall SOC functions
  • Works with clients to implement system security measures, assists with computer security plans and documentation and provides technical guidance and training
Los Angeles, CA
Lead Cyber Security Analyst
Los Angeles, CA
Wolf and Sons
Los Angeles, CA
Lead Cyber Security Analyst
  • Provide technical and operational leadership for cyber-security incident response
  • Assist with triage, prioritisation and response to cyber-security events and incidents
  • Act as technical incident lead during major cyber-security incidents
  • Continuously improve maturity and operational efficiency of the team – including methodologies, processes, detection use cases and response playbooks
  • Maintain an up-to-date knowledge of cyber threats
  • Drive continuous learning and knowledge sharing within the team
  • Work in a 'business hours + rostered on-call' environment
present
Boston, MA
Senior Cyber Security Analyst
Boston, MA
Kuphal-Feil
present
Boston, MA
Senior Cyber Security Analyst
present
  • Provide SME level input for APS
  • Working in a SIEM environment
  • Provide SME level input support for SC Administrators and HBSS Support Admin's
  • Provide ATO Certification & Accreditation artifacts for ACAS and CMRS capabilities
  • Provides incident remediation and prevention documentation
  • Provides performance metrics as necessary
  • Provides customer service that exceeds our customers’ expectations
Education Education
Bachelor’s Degree in Computer Science
Bachelor’s Degree in Computer Science
Adelphi University
Bachelor’s Degree in Computer Science
Skills Skills
  • Ability to compress knowledge to an easily understandable level for organization circulation
  • Knowledge of common application frameworks Strong attention to detail
  • Proven accountable, dependable and reliable work ethic
  • Demonstrable knowledge of application security, risk assessment, validation of security pen test results, and vulnerability resolution
  • Demonstrable knowledge of secure coding practices and the ability to conduct security assessments and analysis of applications
  • Ability to break down highly complex technical topics into language and diagrams understandable to a wide audience
  • Strong attention to detail
  • Strong knowledge of network protocols, network analysis tools, and network architecture
  • Excellent business analysis skills, including strong communication abilities
  • Ability to perform basic malware analysis to develop network based indicators and custom protocol decoders
Create a Resume in Minutes

15 Cyber Security Analyst resume templates

1

Csfc Core Team Cyber Security Analyst Resume Examples & Samples

  • Provide cyber threat analysis to support development and research teams
  • Bachelor’s degree plus 3+ years or Master's degree plus 2+ years working in a cyber-security operations or information security space
  • 1+ years leading a cyber-threat analysis related function
  • Knowledge of three-tier Internet application architecture
  • Experience in packet capture analysis using tcpdump or wireshark
  • Knowledge of HTTP, IP, TCP/UDP, BGP, MPLS, and OSPF protocols
  • Should have an knowledge of the following areas
  • Denial of Service attacks
  • Malware analysis
  • Knowledge of Network Forensic tools and analysis techniques with a proven ability of identifying malicious traffic and infection vectors
  • Experience working with SAP BusinessObjects is a plus
  • Understanding of the tools such as, Splunk, ArcSight, Map Reduce, and the sources available to conduct cyber security alerting, analysis, and enhanced situational awareness
2

Csfc Core Team Senior Cyber Security Analyst Resume Examples & Samples

  • Work with Security Operation teams to collect data for incident metrics reporting
  • Bachelor’s degree or equivalent work experience. Masters is a plus
  • 5+ years working in a cyber-security operations or information security space
  • 3+ years leading a cyber-threat analysis related function
  • Working experience in analyzing Netflow, DNS, Proxy and web access logs
  • Extensive experience in packet capture analysis using tcpdump or wireshark
  • Should have an extensive knowledge of the following areas Cyber crime
  • Computer Forensics
  • Network monitoring, IDS/IPS, Firewalls, Proxy servers, load balancers
  • Must be a self-starter, self-motivated and able to work independently with little oversight
  • Significant experience working with SAP BusinessObjects
  • Strong understanding of the tools such as, Splunk, ArcSight, Map Reduce, and the sources available to conduct cyber security alerting, analysis, and enhanced situational awareness
3

Cyber Security Analyst Resume Examples & Samples

  • 3 years of experience as an information assurance analyst on DoD projects or systems of similar scope
  • 3 years of experience in working with the DoD IA driving policies, including DoD 8510.01 (DIACAP), DoDI 8500 series (Information Assurance), or CNSSI 1253
  • Knowledge of existing USSTRATCOM systems and missions
  • Ability to analyze system requirements and develop technical solutions
  • Experience with establishing security policies and procedures
  • Experience with developing training and instructional documentation
  • Knowledge of command and control and communications systems
4

Cyber Security Analyst, Senior Resume Examples & Samples

  • 10 years of experience with information assurance, including information assurance system evaluations, system security penetration testing, security information management, or security event management
  • Experience with testing tools, including Nessus, Metasploit, nmap, BurpSuite, Kismet, Nipper, Wireshark, or BackTrack
  • Experience with configuring, administering, and troubleshooting operating systems, including UNIX, Linux, Windows, iOS, or Android 6
  • Experience with network vulnerability assessments and penetration testing
  • Experience with analyzing results, writing assessments, and test reports
  • Experience with Cyber forensics a plus
  • Experience with the project management framework
  • Knowledge of databases, applications, and Web server design and implementation
  • Possession of excellent team leadership, development, and client relationship skills
  • BS degree in Information Assurance, CS, or Computer Engineering
  • Certified Information Systems Security Professional (CISSP), CISM, or other recognized technical Cyber Security Certification preferred
5

Cyber Security Analyst, Mid Resume Examples & Samples

  • Under direct supervision, provides technical support to the organization's internal users of computer applications and client hardware
  • Answers routine questions regarding system procedures, online transactions, systems status and downtime procedures
  • Assists network services, software systems engineering and/or application development in order to restore service and/or identify problems
  • Maintains a troubleshooting tracking log ensuring timely resolution of problems
6

Cyber Security Analyst, Senior Resume Examples & Samples

  • Experience with configuration and management of network systems, network design, and integration of security technologies
  • Experience with identifying security flaws and misconfiguration from multiple data sources using trend analysis and automated and manual test results
  • Experience with analyzing results and writing assessments and test reports
  • Ability to communicate in Arabic
  • BS degree in Information Assurance, CS, IT, or Computer Engineering
  • Experience with Cyber forensics
  • Ability to demonstrate industry recognition and publication a plus
  • MA or MS degree in Cyber Security, Information Security, or CS
7

Cyber Security Analyst, Mid Resume Examples & Samples

  • 5+ years of experience I working with computer network devices and operating systems
  • 4+ years of experience with information assurance and security practices
  • 3+ years of experience with writing SSPs or other security related policy
  • 3+ years of experience with DoD 8500.1, DoD 8500.2, DoD 8510.01, or NIST 800-53
  • 1+ years of experience with resolving security findings discovered on network devices and OS
  • 1+ year of experience with C&A package review for CA or DAA making risk-based recommendations
  • CISSP, CISM, or GSLC Certification, including DoD 8570 IAM Level III
  • Experience with FISMA reporting and spreadsheet and DB coding
  • Knowledge of DoD acquisition policy
  • Knowledge of Service Orientated Architecture (SOA)
  • MS degree in a related field
8

IT Cyber Security Analyst Resume Examples & Samples

  • Performing competitive analyses and maintain knowledge of emerging technologies in both the automotive and consumer electronics field
  • Actively work with Security Partners, Research, Government, Advanced Engineering for information sharing, joint project development, and reporting
  • Scope includes all portions of the connected vehicle ecosystem from vehicle systems, backend cloud infrastructure, to mobile platforms
  • Some travel expected to cover critical Cyber Security Conferences or meet with home base in Dearborn
9

Cyber Security Analyst Resume Examples & Samples

  • Monitor global NIDS, Firewall, and log correlation tools for potential threats Initiate escalation procedure to counteract potential threats/vulnerabilities Provide Incident remediation and prevention documentation Document and conform to processes related to security monitoring Provide performance metrics as necessary Provide customer service that exceeds our customers’ expectations
  • Research and identify key indicators of malicious activities on the network and end user workstations
  • 4 years of hands-on experience in a security operations center (SOC) environment Strong command of Linux systems administration
  • Hands on experience with tools such as Wireshark, Hex Rays, IDA Pro or Hex workshop. Experienced in computer security incident response activities Advanced capability to analyze malware, including: worms, viruses, trojans, rootkits and bots Experience with network monitoring and packet analysis tools Strong understanding of TCP/IP An attitude of providing FANATICAL support to the end users! Strong analytical / problem solving skills Strong decision making / risk assessment capability
  • GCIH certification/and/or penetration testing experience is highly desired/
  • We are offering a competitive hourly rate plus a bonus structure and shift differential for qualfied hours!* **
10

Cyber Security Analyst Resume Examples & Samples

  • Manage & triage daily cases presented in the Brand Protector application tools
  • Prepare case studies for internal Under Review and Legal meetings pertaining to infringements that you have researched
  • Issue and continuously follow-up on Cease and Desist Notifications to infringers for timely case closure
  • Maintain a thorough knowledge of the types of brand infringements and the proper disposition processes available to you as a Brand Protection Analyst for JPMorgan Chase
  • Track and monitor the Brand Protection caseload through various reporting methods available to you
  • Perform periodic quality assurance checks of Brand Protection databases
  • Perform research regarding new technologies used by the firm and brief entire team
  • Assist in additional research and executing additional functions within the Cyber Security IT Risk group as required
  • B.A. or B.S. preferred
  • 2 years of financial services, risk management, technology, digital services or legalfacing experience
  • Basic understanding of Cyber Security, Information Security and Risk Management
  • Technology experience or technology risk background is a plus
  • Strong PC skills, including MS suite are a must (MS Access a plus)
  • Web analytics and web design knowledge are a plus
  • Attention to detail and strong organizational skills required
  • Goal oriented, independent thinker, self-starter
  • Excellent interpersonal communication skills (written and verbal) are a must
  • Demonstrate an ability to work effectively in a large complex corporate environment
  • Demonstrated ability to work independently on projects and produce required results in a time-sensitive environment
11

Senior Cyber Security Analyst Resume Examples & Samples

  • Carry out triage of security events and elevate their priority to incident when required
  • Review and remediation of data loss prevention incidents and issues
  • Advanced capability to analyse malware, including: worms, viruses, trojans, rootkits and bots
  • Provide guidance and mentoring to new and existing members of the team
  • Typically a Bachelor’s degree or suitable industry experience
  • Strong command of operating systems administration – Windows, LINUX and UNIX
  • Good understanding of common protocols and services such as FTP, HTTP, SMB, LDAP and SSH
  • Strong time management skills with the ability to multi-task
  • Strong decision making and risk assessment capability
  • Ability to multitask and be flexible, in an environment of rapid change
12

Cyber Security Analyst Resume Examples & Samples

  • Day-to-day usage of industry standard security tools (SIEM,IDS, IPS, traffic analyst, etc.)
  • Research and identify key indicators of malicious activities on the network and end-user workstations
  • Initiate the escalation procedure to counteract potential threats/vulnerabilities
  • Provide incident remediation and prevention documentation
  • Provide performance metrics as necessary
  • Provide subject matter expertise on security projects and ensure security controls are implemented according to defined policies
  • Participate in business security awareness and training initiatives
  • Bachelor’s degree or suitable industry experience
  • Strong understanding of TCP/IP
  • Experience of vulnerabilities, exploits and network attacks
  • Experience of Packet analysis tools
  • Hands-on experience in a security operations center (SOC) environment
  • Security certifications (as provided by SANS, ISC2, ISACA, E-Council, etc.)
13

Senior Cyber Security Analyst Resume Examples & Samples

  • Lead CSFC EMEA cyber threat analysis, alerting, and reporting based on intelligence and information gathered from both internal and external sources globally
  • Drive cyber security research projects using multiple data sources, perform analysis and disseminate findings to both technical and non-technical consumers throughout the Citi enterprise
  • Work daily with different Information Security counterparts to gather intelligence and data for analysis and to formulate changes in technology, policy or procedure that may reduce the risk to information security with an emphasis in the EMEA region
  • Actively monitor and research cyber threats with a direct or indirect impact to the Citi brand, regional business operations, technology infrastructure and client trust
  • Supervise daily interactions with the Cyber Security Fusion Center and collaborate with Cyber Intelligence Center staff to fuse threat intelligence with risk, impact, mitigation and recovery assessments
  • Maintain a routine business integration with the CSFC leaders in Warren, NJ, USA and Irving, TX, USA
  • Bachelor’s degree and significant equivalent work experience
  • Proven ability to review information to determine its significance, validate its accuracy and assess its reliability to technical and non-technical audiences
  • Expertise or significant working knowledge several of the following areas
14

Cyber Security Analyst Resume Examples & Samples

  • Perform CSFC EMEA cyber threat analysis, alerting, and reporting based on intelligence and information gathered from both internal and external sources globally
  • Conduct research using multiple data sources, perform analysis and disseminate findings to both technical and non-technical consumers throughout the Citi enterprise
  • Work daily with different Information Security teams to gather intelligence and data for analysis and to formulate changes in technology, policy or procedure that may reduce the risk to information security with an emphasis in the EMEA region
  • Interact daily with the Cyber Security Fusion Center and collaborate with Cyber Intelligence Center staff to fuse threat intelligence with risk, impact, mitigation and recovery assessments
  • Maintain a routine business integration with the CSFC teams in Warren, NJ, USA and Irving, TX, USA
  • 3+ years working in a cyber-security operations or information security space
  • Exceptional written and verbal communication and presentation skills to internal and external customers, ability to speak and write in multiple languages a plus
  • Should have expertise or working knowledge in the following areas
15

Csirt Cyber Security Analyst Resume Examples & Samples

  • One or more of the following technical certifications: GIAC Certified Incident Handler (GCIH), GIAC Certified Forensic Analyst, EnCE or equivalent certification in these areas
  • Strong technical expertise in
  • Ability to document and explain technical details clearly and concisely to both technical peers and senior (non technical) business management
  • Ability to manage multiple projects under tight deadlines
  • Solid attention to details
  • Ability to think “outside the box” and identify opportunities to improve current processes
16

Cyber Security Analyst Resume Examples & Samples

  • Bachelor's Degree with 2-3 years of Information Security experience or an Associate's Degree with equivalent technical certifications
  • Strong technical skills across cyber security technologies including; scripting skills and an understanding of network traffic flows, and vulnerability management
  • Computer literacy with proficiency in Windows Server, Windows 7, and Microsoft Office Suite
  • Ability to effectively interact with customers, support staff, outside vendors and various levels of management
  • Demonstrate ability to work in teams in a manner consistent with Company objectives
  • Intrusion detection/prevention systems, web application/database firewall systems experience
17

Cyber Security Analyst Resume Examples & Samples

  • Working knowledge of security related technologies and practices, including: authentication and authorization, endpoint protection, encryption, segmentation strategies, vulnerability management, secure remote access, and firewalls
  • Holds one of the following certifications: CISSP, CISM, EnCE, GCIH, GCIA, GREM, GCFA, GPEN, SSCP, CCFP, or equivalent
  • Experience with regulatory compliance issues such as: FFIEC, OFCC, SEC and Federal Reserve plus: SOX, GLBA and PCI
18

Senior Cyber Security Analyst Resume Examples & Samples

  • Provides incident remediation and prevention documentation
  • Provide training and mentorship to lower-level security analysts
  • Malware Detection
  • Network Monitoring Tools
  • Email Security
  • Bachelor’s degree in Computer Science or equivalent combination of education and experience required
  • GCIA, GCIH required. GCFE, CISSP, Security +, Network +, CEH, RHCA, RHCE, MSA, MCP, or MCSE preferred
  • Experience creating Snort signatures required
19

RIC Palo Alto IT Cyber Security Analyst Resume Examples & Samples

  • Research and develop concepts around related Cyber Security incidents reported in industry and research organizations.Lead technology and feature Security projects delivering to internal customers.Development and maintenance of tools (e.g. Fuzzing) for use in internal vehicle penetration testing.Threat Analysis and Risk Assessment tool/modeling against connected vehicle concepts.Development of security specifications and tools as needed for connected vehicle features and testing
  • 5+ years of experience in IT, product development, or research with 1-2 years experience in a security related field
  • The ideal candidate will have exceptional planning, research and investigative skills, and the ability to work within the framework of security, privacy, usability, and reliability constraints in the automotive environment
  • The candidate will contain a working knowledge of industry IT security and controls efforts as well as embedded security tools and processes (ideally automotive)
  • We collaborate extensively within Ford and with external partners, thus we require exceptional communication and collaborative skills
  • Strong knowledge of Security and Controls, CPMM, Supplier Relationship and Contracts Management Experience
  • Strong ability to work independently, work on all aspects of a project, take follow-up on project deliverables, go above and beyond the task at hand
  • Ability to develop and maintain technical documentation as required for projects at hand
  • Ability to influence teams towards a desired outcome with varying degree of authority requiring strong facilitation, active listening, and team-building skills
  • General understanding of CAN network, firewalls and primary/secondary bootloader architecture within microcontrollers
  • Knowledge with cryptographic algorithms and protocols
  • Knowledge with PKI management
  • Knowledge of industry standard security protocols, tools, processes
  • Experience with Secure Coding Techniques
  • Experience with embedded hardware and software and coding experience with one or more platforms (see below)
  • Knowledge of digital communication and familiarity with communication technologies such as TCP/IP, Ethernet, Bluetooth, WiFi, DSRC and CAN
  • Mobile web/in-vehicle application development
  • Embedded experience (Windows/QNX/Linux/Microcontroller) is a plus
  • Strong programming experience (C/C++/CS/Python/Lua/Qt)
  • Azure Cloud Security, general Web services / object oriented development experience are a plus ( C++, CS, Qt, Lua, Perl/Python )
  • Knowledge with common programming frameworks such as .NET, Android SDK, and/or iOS SDK
  • Familiarity with in-vehicle network architecture, modules, and protocols (CAN etc.) are a plus
  • Electrical or System Engineering background will be a plus for module-related work, but not required
  • Mobile Phone Application Programming, Bluetooth, Networking familiarity a plus, but not required
  • Penetration testing and tools experience is a plus
  • PKI experience on medium to large deployments is a plus
20

Senior Cyber Security Analyst Resume Examples & Samples

  • 5 years of Security Analysis (SOC) experience with significant previous Information Technology experience with network technologies, specifically TCP/IP, and related network tools is required
  • Knowledge of common network tools (e.g., ping, traceroute, nslookup)
  • Knowledge of Windows command line (e.g., ipconfig, netstat, dir, nbtstat)
  • Comprehensive knowledge of network design, defense-in-depth principles and network security architecture
  • Experience in host forensics
21

Cyber Security Analyst Resume Examples & Samples

  • 3-5 years of IT experience
  • 1-3 years of security-related experience
  • Strong knowledge of network protocols, network analysis tools, and network architecture
  • Ability to analyze raw PCAP data to validate security events, interpret network traffic, and extract indicators
  • Ability to perform basic malware analysis to develop network based indicators and custom protocol decoders
  • Knowledge of common attacker tools, malware families, and known attacker group TTPs
  • Ability to write tools and automate tasks in scripting languages such as Python
  • Experience hunting for unknown threats, as well as tracking existing campaigns and adversaries to see how they evolve over time
  • Experience writing snort/suricata/YARA signatures
22

Cyber Security Analyst Resume Examples & Samples

  • Monitor for intrusions and insider threats
  • Determine severity and impact of Cyber Threat scenarios
  • Perform second-level analysis, remediation and escalations
  • Assist engineers in developing cyber defense tools and procedures
  • Identify and model new threat scenarios
  • Support investigations of wrong doing by internal or contracted staff
  • Flexibility for possible after hours escalations from our first tier Cyber Security Operations Center
  • Possible participation in the ongoing development and enhancement of our Insider Threat Program and security metrics program
  • Collaborate directly with peers outside of security team to resolve urgent matters in a constructive and thoughtful manner
  • 3+ years experience within a Security Operations Center (SOC) resolving events related to malicious intrusion, data loss and/or user behavior anomalies
  • Knowledge of malware propagation, behavior, and how machines get infected
  • Strong technical understanding of
23

Senior SOC Cyber Security Analyst Resume Examples & Samples

  • Comprehensive Knowledge of TCP/IP, IPv6, UNIX, Windows, HTTP
  • Ability to conduct packet analysis and decode
  • Knowledge of intrusion detection methodologies and techniques for detecting host and network-based intrusions via intrusion detection technologies
24

Cyber Security Analyst Resume Examples & Samples

  • Monitor individual workstations and laptop activity to identify any attacker or event that violates current policy. Document all activity violating policy, assign criticality and escalate to the end user based on the severity of the occurrence
  • Identify new vulnerabilities in TCF’s environment using internal assessments defined by TCF policy. Deliver incident reports documenting the new vulnerabilities weekly to the appropriate avenues based on severity
  • Update TCF employees’ outdated antivirus versions, and monitor the aging of antivirus definitions on TCF network endpoints
  • 2 year college degree or equivalent industry experience
  • 1 year of experience either working in IT Security or Information Technology
  • Familiarity with network security applications, protocols, and associated hardware
25

Cyber Security Analyst Resume Examples & Samples

  • Monitors global NIDS, Firewall, and log correlation tools for potential threats
  • Initiates escalation procedure to counteract potential threats/vulnerabilities
  • Highly proficient in intrusion analysis and incident response
  • Ability to handle high-pressure situations in a productive and professional manner
  • Strong time management, skills with the ability to multitask
  • Packet and log analysis
  • General knowledge and experience and expertise with ethical hacking, firewall and intrusion detection/prevention technologies, secure coding practices, and threat modeling
  • Web Security Gateway
26

Cyber Security Analyst Resume Examples & Samples

  • 1+ year of previous Cyber Security experience
  • Working knowledge of Sharepoint
  • Investment Bank / Compliance / Regulatory Reporting background
27

Cyber Security Analyst Resume Examples & Samples

  • Evaluating assigned IT areas for cyber security risks
  • Identify risk areas and work with team for possible resolutions
  • Implement and test safeguards implemented to ensure functioning as designed
  • Report to top management findings and new design requirements
  • Degree in technical field
  • Experience with large data platforms
  • Minimum of 3 years experience in network information security coupled with mobile applications
  • Certifications in IT Security a major plus
28

Lead Cyber Security Analyst Resume Examples & Samples

  • Assist program sponsor in planning the delivery of the overall program and its supporting strategic projects and run initiatives to achieve program strategic goals and demonstrated success against goals
  • Assist in the definition of projects scope and objectives, involving all relevant stakeholders and ensuring technical feasibility
  • Providing subject matter expertise to the supporting program team and program sponsor to support the success of project/initiative delivery against established scope
  • Report and escalate to executive management by forming supportive relationships to ensure ongoing visibility of project success and progression toward strategic goals
  • Facilitate development of new initiatives to support the strategic direction of the program and establish support through the project budget planning cycle
  • Provide technical subject matter expertise to support the execution of the program portfolio of projects
  • Provide support to Cybersecurity Program Management Office and Strategy team to connect overall Cybersecurity strategy, service management and Program Management while fostering an environment of continuous improvement
  • Bachelor’s Degree or equivalent in computer science, management information systems or equivalent discipline from an accredited college or university required
  • Minimum 5-7 years’ of overall experience in Information Technology
  • Minimum 5-7 years’ experience in IT Risk Management, Information
  • Minimum 3 years’ experience with Cyber security SIEM tools
  • Security Consulting, Information Security
  • Demonstrated experience in understanding of Cyber Analytics in support of Cybersecurity programs such as Insider Threat/Cyber Investigations/Identity & Access Management
  • Working knowledge and understanding of project management processes
  • Proven success in leading project/programs driving execution based on strategic direction
  • Master’s Degree or equivalent in computer science, management information systems or equivalent discipline from an accredited college or university
  • Strong process orientation and understanding of technology and financial services
  • Proficient use of data analytics tools
29

Cyber Security Analyst Resume Examples & Samples

  • Monitor individual workstations and laptop activity to identify any attacker or event that violates current policy. Document all activity violating policy, and assign criticality based on the severity of the occurrence
  • Identify new vulnerabilities in TCF’s environment using internal assessments and industry standards. Deliver incident reports documenting the new vulnerabilities weekly to the appropriate avenues based on severity
  • Monitor the TCF enterprise network for malicious activity through the Endpoint Protection tool. Identify any trends in malicious network behavior, such as an increase in attacks or a new virus emerging. Utilize daily automatic reports and create manual reports to send to the appropriate management team
  • Complete analysis of reported vulnerability data on a daily basis using internal tools and vendor partner tools. Monitor data for cyber attacks on TCF’s network
  • Document and investigate more complex Security incidents as defined by TCF policy. Escalate incident reports to IT management in order to maintain compliance with security related regulatory requirements
  • Maintain current knowledge of industry best practices and regulations such as Community Emergency Response Teams (CERT) and SysAdmin, Audit, Network and Security (SANS)
  • 4 year college degree or equivalent industry experience
  • 2-3 years of experience either working in IT Security or Information Technology
  • Experience or knowledge of how to conduct intelligence analysis
  • Excellent written and verbal communication skills, with an emphasis on relationship building
30

Cyber Security Analyst Resume Examples & Samples

  • Scoping of penetration tests, use cases, and timing
  • Development of ‘rules of engagement’ with partners
  • Performing ethical hacking tests within explicit bounds
  • Capture test findings, communicate repeatable process steps
  • Develop and communicate recommendations on findings remediation
  • Creation of testing reports and delivery of results to management
  • Continuous improvement of testing processes and methodologies
  • Coordinate and function as an SME to third-party penetration testing efforts, as needed
  • Bachelor’s Degree in Computer Science or other field of study
  • 2+ years of penetration testing experience
  • Master's Degree in Computer Science
  • 1-5+ years of experience and knowledge of ISO27001
  • CEH - Certified Ethical Hacker Certification
  • Deep experience in IP based networking
  • Strong encryption background
  • Broad Operating System knowledge
  • Previous Security Experience with Cellular Carriers
  • Demonstrable Threat Modeling experience
  • This role will span both traditional IP based infrastructure as well as in-vehicle technologies - working knowledge of vehicle-based security protocols is a big plus
  • CISSP - Certification
31

Senior Information & Cyber Security Analyst Resume Examples & Samples

  • Establish, implement, monitor, review and improve a suitable set of controls for the prevention of threats to the security of our information assets, ensuring the business objectives of the organization
  • Act as security relationship manager to our Digital Technology team. Providing them support, advice and direction related to the security of our digital assets
  • Assist with the operation of controls operated by information security
  • Ensure all staff are: able to identify and respond to threats, aware of the threats we face and practiced in responding to cyber events
  • Oversees one of the BCIS workstreams. The Information and Cyber Security Analyst will be expected to lead one workstream and participate in all facets of the BCIS programme
  • Assist with the gathering and dissemination of security intelligence
  • Assist with the development and testing of effective IT recovery plans ensuring the availability of critical applications
  • Assist with the development and testing of effective business continuity plans
  • Assist with the development and testing of crisis management plans
  • Participate in and / or lead as required incident response, from discovery through to recovery, lessons learned and remediation
  • Analyze IT infrastructure and operations and help to design controls to ensure the security of corporate information assets
  • Help business units understand and establish acceptable levels of risk, reducing the potential for incidents that pose security threats
  • Help business application teams integrate sound security components into their systems
  • Protect data privacy and information integrity in response to business needs and compliance requirements
  • University degree (or equivalent). Math, science or computer science preferred
  • Proven experience in an information security role
  • Excellent, demonstrable, customer service skills
  • Excellent communication (spoken and written) and interpersonal skills
  • Good influencing skills. Able to deal with all levels of the organization
  • Able to take the initiative. Positive ‘can do’ attitude and a determination to succeed
  • Diligent, able to work to deadlines while managing multiple priorities
  • Inquisitive, able to solve problems and come up with solutions
  • Curious, innovative, willing to challenge conventional approaches and test new ones
32

Cyber Security Analyst Resume Examples & Samples

  • Managing and performing on teams that conduct analyses related to forensic investigations, cybercrimes, and/or cyberattacks; and supporting various and dynamic security analysis needs of the team
  • Analyzing security logs, monitoring logs, firewall logs, intrusion prevention system logs, and network- and core-related logs
  • Analyzing and developing baselines for all related risks from Security Analytics and/or other log management tools, emphasizing security analysis of critical system logs and network protocols
  • Managing analyses of logs, traffic flows etc. to identify malicious activity, design rules that trigger response to malicious activity, analyzing the findings on malicious activity and preparing reports; developing response procedures for addressing potential security threats and driving the on-boarding of new logs into Security Analytics
  • Utilizing cyber forensics knowledge to analyze and draft findings, articulating this information to various internal and external audiences and levels
  • Utilizing Netwitness and security analytics, including Security Information and Event Management (SIEM) products such as Q1Labs, ArcSight, and Nitro
  • Conducting analyses of evidence of network penetrations and data theft using firewalls, active directory, Windows operating systems, intrusion detection/prevention systems, proxy servers, breach indicators, and log aggregation technology
  • Utilizing creative problem-solving and written and oral communication skills to articulate, explain, and deliver technical concepts and issues to non-technical business leadership; researching pertinent technical matters with an attention to detail, and innovating new solutions and processes, incorporating new technologies, when warranted
  • Exhibiting capabilities to multitask, perform and deliver results as both part of a team and independently
  • Adapting to ever-changing schedules and work assignments, including the ability and willingness to work extended hours and conduct business travel domestically and/or globally; and,
  • Willingness and motivation in taking the initiative for individual and team professional growth and development
33

Cyber Security Analyst Resume Examples & Samples

  • Network Analysis, Host Forensics Analysis, Malware Analysis
  • SIEM Experience
  • Use of threat intelligence sources
  • Experience with Forensics toold (enCase, MIR, CarbonBlack etc.)
  • Splunk experience (OR other big data platforms)
  • Scripting/software development skills
  • Working knowledge of common intrusion analysis models
34

Cyber Security Analyst Resume Examples & Samples

  • Formal incident response efforts - coordinated responses to major intrusions or exploits
  • Provide consistent and repeatable methods to resolve security incidents
  • Allow management to envision additional threats and incorporate improvement activities
  • Daily analysis of multiple data sources (host and network activity) with the ability to determine if a threat applies to Ford or not
  • 2+ years’ professional experience in an IT related field
  • 3+ years’ experience with infrastructure development or operations
  • Experience with reviewing system language log files, data correlation, and analysis (i.e. firewall, network flow, IDS, system logs)
  • In depth knowledge of servers, clients, various computer peripherals, network and/or Storage technologies
  • Strong deductive reasoning, critical thinking, problem solving, and prioritization skills
  • Customer service including the resolution of escalations, incident handling, and response
  • Experience in a fast paced, high stress, support environment, able to work with a sense of urgency and pay attention to detail
35

Senior Cyber Security Analyst Resume Examples & Samples

  • Coordinate and perform security testing activities (penetration testing, vulnerability scanning, application security testing), report on results, track metrics & trends, and drive remediation
  • Coordinate and perform proactive security monitoring, event analysis, incident response, and trending
  • Participate in and respond to internal and 3rd-party security audit & assessment activities
  • Engage in security architecture reviews
  • Design & implement new security solutions & projects
  • Assist with contingency planning and disaster recover processes
  • Maintain security policies & procedures
  • Assess adherence to security requirements and manage exceptions & mitigations
  • Provide on-the-job security education & training for junior security team members
  • Create and maintain software security resources for the software engineering team
  • Develop and enhance security awareness training for employees and contractors
36

Cyber Security Analyst Resume Examples & Samples

  • Prepare quarterly briefings for the Information Security Steering Committee and track the progress on actions coming out of the meetings
  • Develop and maintain IMS strategy & roadmaps to address risk landscape
  • Develop and manage portfolio of IM&S projects. Ensure the right strategic investments are made. Drive the execution of IM&S projects through the assigned project managers
  • Broad Information Security experience
  • Experience developing and implementing security strategies and security patterns
  • Depth and breadth across all the core bodies of information security knowledge including threat, vulnerability, risk, and controls
  • Excellent English oral and written communication skills
  • Experience in working in a global, multinational organisation
  • CISSP, ISSAP, or SABSA certification
  • Broad foundation of on the job IT technical knowledge
37

Senior Cyber Security Analyst Resume Examples & Samples

  • Having Bachelors degree in any discipline
  • Demonstrated manual product penetration testing experience; for example, you must be able to simulate a SQL injection without tools, simulate XSS attack, X-Path Injection, etc
  • Knowledge on domain understanding about the HVAC / Fire control systems, controllers, field instruments, cameras, industrial networks, sensors etc
38

Lead Cyber Security Analyst Resume Examples & Samples

  • Having 3+ years of hands-on experience on Data Classification, Encryption & IRM technologies
  • Good Understanding of Data Classification Standards & Technology such as Boldon James
  • Good knowledge on NIST and other industry standards
  • Good knowledge on Networking and Linux, Basic Knowledge on Active directory and LDAP
  • Ability to write scripts either in Python or Perl
  • Good knowledge on server maintenance activities
  • Basic knowledge on Windows, NetApp filer and SharePoint technologies
  • Knowledge on Information Security fundamentals is added advantage
39

Lead Cyber Security Analyst Resume Examples & Samples

  • Technical lead for the Behavior Analytics platform for the entire company and accountable for the availability, reliability and performance of the platform
  • Collaborate with IT infrastructure/Application teams and business security leaders to define and gather Analytics requirements
  • Consolidate and validate business assumptions relevant to the solution strategy, prior to initiating and throughout the analytical process
  • Identify and gather the relevant and quality data sources required to fully answer and address the problem for the recommended strategy
  • Integrate/transform disparate data sources and determine the appropriate data hygiene techniques to apply
  • Understand the company’s IT Infrastructure/Applications, Business model/processes, Security controls and develop Threat Detection Models within the Behavior Analytics platform
  • Define the global and business level metrics reporting dashboard
  • Having 5+ years of hands-on experience on UEBA Domain ( Securonix)
  • Ability to write scripts SQL and good knowledge on DBA administration tasks
  • Hands-on experience on Linux or UNIX platform
  • Hands-on experience on McAfee or Symantec DLP events analysis
  • Strong knowledge on server administrator tasks
  • Good knowledge on HR and proxy systems
  • Good in troubleshooting data integration issues
  • Hands-on experience on Building threat model with various transmission channels like USB, Email etc
40

Cyber Security Analyst Resume Examples & Samples

  • Proven team player, will be working individually and with other staff members, on both long-term projects and rapid response under tight deadlines
  • Ability to work with local and remote IT staff/management, vendors and consultants
  • Ability to work independently and possess strong project management skills
  • Demonstrated proficiency in
  • Implementation and maintenance of SIEM (ArcSight, IBM Qradar, McAfee NitroSecurity, etc.)
  • Forensic analysis tools (MIR, EnCase, FTK)
  • Malware analysis tools (dynamic and static)
  • Vulnerability assessment tools (Qualys, ISS Scanner, nmap, etc.)
  • Secure Web Gateway (BlueCoat, Microsoft Forefront)
  • Network sniffers and packet tracing tools (DSS, NAI SnifferPro, Ethereal and tcpdump)
  • Encryption technologies (PGP, PKI and X.509)
  • Directory services, LDAP, and their inherent security (Active Directory, CA Directory)
  • Proxy and caching services
  • Client/server platforms including Sun Solaris, Windows, Linux
  • Operating system hardening procedures (Solaris, Linux, Windows, etc.)
  • LAN/WAN routing and high availability (OSPF, BGP4/iBGP, EIGRP and NSRP)
  • Bachelor’s degree in Computer Science, Engineering, or other related field
  • Minimum five years of information security experience, preferably in the financial services industry
  • Minimum three years hands-on security operations experience including interdisciplinary experience with four or more of the following: Cyber Threat Analysis, Digital Computer Forensics, Incident Response, Application Security, Operating Systems Security, Cryptographic Controls, Networking, Programming languages
  • Technical experience and comprehensive knowledge of threat actor capabilities, intentions, methodologies and motives
  • Familiarity with computer network exploitation and network attack methodologies while maintaining an understanding of the relationship these activities have with the financial services industry and critical infrastructure
  • Industry knowledge of leading-edge security technologies and methods
  • Shift work and working in an on-call response capacity is required including availability for 24 x 7 on-call support responsibilities
  • Previous people/project management experience is a plus
  • Government Security Clearance is a plus
  • Strongly prefer at least one of the following certifications: CISSP, GCIA, GCIH, CHFI, GCFA, CCE, CFE
41

Cyber Security Analyst Resume Examples & Samples

  • Monitor information system activity, collect, review, and retain audit logs to include system logs and records and determine actions to be taken when discrepancies are detected
  • Performs analyses to validate established security processes and recommend additional security steps to ensure compliance with applicable DOD IA requirements and baseline IA controls
  • Conduct network security vulnerability assessments using DoD provided scanning tools and liaison with network administrators to correct identified problems
  • Review Information Assurance Vulnerability Alerts (IAVA) for applicability and impact to the range networks. Ensure that all systems are patched and report compliance
  • Evaluate information systems for compliance with Defense Information Security Agency (DISA) Security Technical Implementation Guideline (STIG) and review measures needed to bring systems into compliance
  • Conduct vulnerability scanning for new information system deployment or systems temporary connected to support training events or testing
  • Verify all Virus Signatures are kept up to date, and Automated and Manual Virus Scans are documented, scheduled and are being completed
  • Assist in evaluation of Information Systems for compliance with Government statutes, DoD 8500.2 IA Controls, DoD FISMA directives, policies and regulations
  • Assist the Cyber Security Manager with the development of the IA related Procedures, and Work Instructions
  • Information System Security
  • Risk Analysts
  • Network Security Auditing
  • Host Based Security System (HBSS) Administration
  • Assured Compliance Assessment Solution (ACAS) Administration
  • VMware Administration
  • DoD Certification and Accreditation
42

Cyber Security Analyst Resume Examples & Samples

  • Provide administrative support for the DoD Information Assurance Certification and Accreditation Process (DIACAP)
  • Maintain system accreditation status in Enterprise Mission Assurance Support Service (eMASS) by performing quarterly updates and updating documentation
  • Review DISA Application Security and Development Security Technical Implementation Guide (STIG) checklist items and perform remediation/mitigation activities as required
  • Support Cyber Security Inspections three times a year
  • Conduct annual contingency plan and disaster recovery reviews for specific systems
  • Report activities on a Monthly Status Report
  • Bachelor's degree or four (4) years of additional experience in lieu of degree
  • Previous experience supporting the Department of Defense is preferred
  • Three (3) years of experience with Department of Defense Information Assurance Certification and Accreditation Process (DIACAP) Certification and Accreditation packages, reviewing, interpreting, identifying and resolving (remediation/mitigation) Defense Information Systems Agency (DISA) Security Technical Implementation Guides (STIG) checklist items
  • Three (3) years of experience with DISA Security Content Automation Protocol (SCAP) Content program and SCAP benchmarks and DISA STIG viewer
  • Three (3) years of experience with securing and configuring Windows Server 2008 operating system and related products (SQL Server, Internet Information Services, Active Directory, etc.)
  • One (1) year of experience managing packages with the Enterprise Mission Assurance Support Service (eMASS) system
  • Experience with Department of Defense Information Assurance Risk Management Framework Assessment and Authorization Process (RMF) packages
43

Cyber Security Analyst Resume Examples & Samples

  • Develop, write, and review certification and accreditation (C&A) documentation per Department of Defense (DoD), Risk Management Framework (RMF) for DoD Information Technology (IT) (formerly DIACAP)
  • Perform the duties of Navy Validator for all NNSY accreditation submissions and assist other Naval Shipyards and the corporation on these duties when required
  • Evaluate and test information systems and networks to determine compliance with CS requirements
  • Conduct evaluation, test, and accredit various Industrial Plant Equipment (IPE) that contain computer technology to ensure full compliance with Navy and DoD requirements
  • Assist with office clerical work; assist users with Cyber Security (CS) related issues, and provide other CS support as the need arises (e.g., auditing, contingency planning, CS awareness training,
  • Bachelor’s Degree in Cyber Security, Information Technology or related field and a minimum of three (3) years direct experience in the IT field
  • Institutional knowledge and a minimum of 3 years’ experience, on the mission critical procedures, systems, and processes, as they pertain to the Public Naval Shipyards’ Information Technology and Cyber Security requirements
  • Qualified and registered as a Navy Validator IAW DoN Memorandum 5239, Ser 5.0/1274 dated 18 Mar 10, Subj: QUALIFICATION STANDARDS AND REGISTRATION PROCEDURES FOR NAVY VALIDATORS
  • Experience in certifying and accrediting DON information systems and networks, as well as Platform IT
  • Expert knowledge of and experience with CS requirements as defined by Public Laws, National, DoD, and DON guidance [e.g., Federal Information Security Management Act (FISMA), DoDD 8500.1, DoDI 8500.2, DoDI 8510.01 (Risk Management Framework (RMF) for DoD Information Technology (IT)), DODINST 8570/01M INFORMATION ASSURANCE WORKFORCE IMPROVEMENT PROGRAM. SECNAVINST 5239.3, OPNAVINST 5239.1, NIST Special Publications Series 800, etc
  • Expert knowledge and experience with the requirements outlined in OPNAVINST N9210.3 Safeguarding Naval Nuclear Propulsion Information
  • Ability to move and maneuver up to 50 pounds of weight (computer hardware, accessories, support equipment, etc.)
44

Cyber Security Analyst Resume Examples & Samples

  • Serve as an individual on the Cyber Security Team
  • Develop Cyber Security documentation validating software quality, security, reliability and maintainability attributes. Identify gaps in Cyber Security/CND posture and assess risks
  • Participate in development and review of DIACAP/RMF documentation, Networthiness Documentation, and ensure STIG compliance and validation
  • Provide quality assurance specialist support including formulating, coordinating, directing, and executing all quality assurance policies, tools, and training programs; conducting internal controls reviews to ensure product assurance competency and the effectiveness of surveillance activities
  • Develop strategies, goals, tasks, roles, responsibilities, and information needs for Cyber Security surveillance and oversight
  • Review information systems for compliance with applicable DoDI 8500.01 and DoDI 8510.01
  • Provide IS security advice and guidance in accordance with applicable regulations, and directives and guidance to Government and DoD partners for the protection of data at all classification levels including SCI
  • Evaluate and recommend approval, disapproval, or waiver(s) for IS processing national security data
  • Provide input or consideration in the promulgation of future security policy
  • Support and/or conduct site visits and assessments to inspect and verify IS reports and plans at various locations, and provide a written report for review and approval
  • Prepare reports and memoranda, to include, but not limited to: Memoranda for the Record (MFR), Memoranda of Agreement (MOA), Authorization To Proceed, and status and technical briefs for review and approval by government Cyber Security
  • Update data on Government-provided databases with current information about IS status
  • Prepare, review, and record notification and status messages to indicate A&A state of systems to system owner or programs
  • Ensure IS security requirements, including applicable RMF directives and guidance, are addressed and applied; appropriate documentation prepared by the system owners or programs inclusive of the Security Assessment Package, Concept of Operations (CONOPS) Plan, System Security Plans, System Requirements Traceability Matrix, Risk Management Matrix, Test Results, interface control documents, requests for changes, test plans, and other related program security documentation
  • Track completion of the Security Assessment Package and report status
  • Provide preparation of the Security Assessment Report (SAR). The SAR contents include, but not limited to, the Summary of Assessment results and Authorization Recommendation
  • Bachelor's degree preferably in a Technical Computer Field (Computer Science, Management Information Systems, Information Technology, Networking). 8 years applicable experience may be considered in lieu of degree
  • Experience with XACTA, DIACAP, Risk Management Framework (RMF), NIST, eMASS, SCAP Scanning, IAVA’s methodologies, STIG’s and ACAS
  • · - Minimum 5 years data/network/information system assurance and system design, information security assessments, C&A, Plan of Action Milestones (PoAM) remediation, Information Assurance Vulnerability Alerts
  • Experience performing Information Assurance functions in a Capability Maturity Model Integration (CMMI) Maturity Level 3 (or better)
  • Required Certifications: Currently possess DoD 8570 certification, Security +
  • In depth knowledge of Information Assurance auditing, continuous monitoring, and analysis
  • Possesses strong analytical skills and good interpersonal and communications skills in dealing with multiple contractor and government organizations
  • Must currently possess TS/SCI
  • NSA Information Assurance Guidelines
  • Certifications: CompTIA Security +, CISSP, CEH, GSEC, GCIH, CISA, GCED, SSCP, and/or CISA
  • Familiar with multiple operating systems including Linux and Windows
  • Virtualization experience with technologies such as KVM and VMWare VSphere
45

Senior Cyber Security Analyst Resume Examples & Samples

  • Minimum Certification as a DoD 8570 IAM II, must possess or able to obtain from hire date, within 6 months IAT Level II certification related to the Information Assurance field
  • Demonstrated exceptional ability to troubleshoot complex systems required
  • 5 years IT experience
  • 2+ years administrating servers
  • 4+ years with vulnerability scanners
  • Knowledge and experience in working with ACAS
  • Knowledge and experience in working with NESSUS Scanner
  • HBSS APS working knowledge
  • Support Risk Management Framework
  • EMASS
  • Upload information, documentation, and artifacts into the eMASS application for Army tracking of RMF compliance
  • POA&Ms
  • Coordinate with IASOs, IMOs, and system owners to establish POA&Ms
  • Track POA&M progress and coordinate with IASOs for updates
  • Develop routine POA&M approval package and brief the Authorizing Official Representative
  • Develop and track Privacy Impact Assessments
  • Develop and track System Interconnection Agreements
  • Routinely Review System Security Plans
  • Routinely Review System Standard Operating Procedures
  • Maintain FISMA Compliance Reporting
  • Perform routine FISMA Technical Control Reviews
  • Document findings and coordinate with owners to establish POA&Ms
  • Perform routine FISMA Continuity of Operations Reviews
  • Perform routine FISMA Security Control Reviews
  • Participate in annual Information Technology Continuity Planning
  • Per new RMF standards, support more frequent external 3rd party assessments required for Army Assessment and Authorization Official Representative
  • Perform physical security inspections Minimum Qualifications
  • Must possess at least 5 years of hands on technical experience with a minimum of 4 year of experience in Information Assurance or a Master’s degree and 3 years’ experience
  • Must be able to work independently and provide timely status updates, as well as be able to manage multiple tasks
  • Must be a highly effective communicator (both verbal and written) and possess excellent analytical and problem-solving skills
46

Cyber Security Analyst Intern Resume Examples & Samples

  • Pursuing bachelor's degree, preferably in Computer Science, Cyber Security, Information Technology, Computer Engineering, or related IT discipline
  • Strong technical skills including understanding of software development principles
  • Hands-on experience through coursework or internship
  • Ability and obtain and maintain a SECRET Security Clearance
  • Willing to live and work in the Charleston, SC area
  • Computer based training system development
  • Ability to quickly adapt to a changing environment
  • Ability to quickly learn new concepts and software is necessary
  • Candidate should be a self-motivated, independent, detail oriented, responsible
  • Ability to multi-task& support multiple priorities
  • Ability to handle multiple clients and multiple team members with confidence
47

Cyber Security Analyst Resume Examples & Samples

  • Maintain DIACAP/RMF IA controls so that security posture remains high
  • Participate in the Cyber Security Working Integrated Product Team (WIPT) and provide updates
  • Conduct verification tests for system upgrades to maintain the high security posture
  • Create ATO POA&M entries for items (such as patches) that will take additional time to research to prevent potential negative effects by testing changes to the environment prior to implementation. The IA analysts will work with the System Administrators and Database Administrators (DBAs) to develop a remediation plan, including a schedule, mitigation strategy, and details to enable the IAM and AO to understand the risk
  • Support Cyber Security auditing, continuous monitoring and analysis
  • Scan the environment with vulnerability assessment tools such as ACAS/Nessus
  • Prepare Cyber Threat Analysis, POAMs, and IAVM reports
  • Bachelors degree or equivalent experience (4 years) and 5 years or more experience
48

Information Cyber Security Analyst Resume Examples & Samples

  • Performs routine to moderately complex cybersecurity incident analysis including technical investigations, evidence gathering, log events analysis, stakeholders' interviews and threat mitigation
  • Monitors systems to identify and respond to anomalous activity such as worms, Trojans, viruses, and malware. Investigates ongoing internal and external vulnerability assessments for the purpose of identifying vulnerability trends and makes recommendations to address issues
  • Utilizes ticketing system to ensure that logged incidents and/or requests are resolved in a timely fashion
  • Performs research to identify and report on the intentions and capabilities of external threat actors
  • Performs cybersecurity-related risk assessments and communicates results Information/Cyber Security Manager
  • Keeps current and maintains an understanding of industry threats, vulnerability landscape and applicable exploits
  • Conducts research on emerging products, services, protocols, and standards in support of cyber security enhancement and development efforts
  • Performs special projects and additional duties and responsibilities as required. Where applicable and when performing the responsibilities of the job, employees are accountable to maintain Sarbanes-Oxley compliance and adhere to internal control policies and procedures
  • Thorough knowledge and understanding of information security systems and appliances
  • Knowledge and experience supporting, reviewing, or administrating security technologies such as IDS/IPS, log aggregators, Internet and email filters, and next generation threat prevention platforms
  • Experience with system vulnerability scanning tools and ability to analyze associated scan results
  • Experience with administration of application whitelisting systems is preferred. Working knowledge of current attack methodologies, such as man-in-the middle, sniffing, phishing/vishing, cross site scripting, SQL injection and DDoS; as well as monitoring methods used to identify and respond to anomalous activity such as worms, trojans, virus', and malware
  • Strong analytical and troubleshooting skills. Strong written and verbal communication, interpersonal, and organizational skills
  • Ability to work both independently with sole responsibility and as part of a team to deliver high quality work product in a fast-paced environment
  • Ability to multi-task, prioritize projects, and exercise strong professional judgment. Ability to work well with people from different disciplines with varying degrees of technical experience
49

Senior Cyber Security Analyst Resume Examples & Samples

  • Develop Risk Management asset protection framework and asset classification processes that enable mitigation of risk to HP’s most critical assets & ecosystems. To include issue/gap management framework, including supporting processes and procedures
  • Provide consultative advice to internal customers that enables them to make informed risk decisions and develop acceptable risk mitigation strategies
  • Generate succinct and actionable reporting to Risk Owners that provides a current status on all open issues, including remediation plans or exception requests
  • Conduct periodic touch bases with GRC and Business Unit Sr. Leadership risk owners to ensure accountability and visibility of all open issues and to verify progress is being made towards previously committed remediation plans
  • Communicate information security risk and compliance assessments (e.g., vulnerability scans, penetration tests, PCI DSS, risk assessments, etc.) results to management, both verbally and in writing
  • Gather documentation and technical information in support of issue remediation efforts and audit requests
  • Work with GRC Team to enhance or streamline existing eGRC tool, issue management, & risk register workflows as appropriate
  • As the Sr. GRC Analyst & leading be example, must keep abreast of latest security and privacy legislation, regulatory, advisories, alerts, and vulnerabilities
  • 5 years of Information Security, Cyber Security, &/or GRC related experience required
  • Excellent prioritization and multitasking capabilities
50

Cyber Security Analyst Resume Examples & Samples

  • Experience in developing processes and technology standards Ability to train and mentor staff
  • Exceptional attention to detail and strong focus on quality
  • High knowledge of or exposure to ANZ teams and systems
  • Experience in IT Security tools
  • Basic Regex Coding Skillset
51

Cyber Security Analyst Resume Examples & Samples

  • Execute (thru providers) pen-testing on our products
  • Understand and prioritize security findings and risks
  • Work with upper management, architecture and engineering teams on resolution
  • Advanced understanding of access control (Identity, provisioning, authentication, authorization)
  • Advanced understanding of security monitoring (logging, error and exception handling as part of application lifecycle)
  • Advanced understanding of operational security, e.g., security of hosting environments (firewalls, Intrusion Detection Systems), key management, key revocation, rotation
  • Experience in interaction with pen testing providers in order to identify the risk associated to security findings. Basic understanding of pen testing and related frameworks
  • Experience with the definition of security policies (e.g., input validation, hosted services configuration) and implementing good security practices
  • Basic understanding of automated security testing frameworks (e.g., fuzz testing)
52

Senior Cyber Security Analyst Resume Examples & Samples

  • Lead efforts in intrusion detection, malware analysis, and APT analysis
  • Design and execute remediation efforts within the "Response" phase of cyber incident lifecycle across functions, business units and regions
  • Continuously engage intelligence team in a two way conversation: Develop, refine, and maintain intelligence requirements to focus intelligence in support of detection operations, and provide feedback on detection indicators and intruder tactics, techniques, and procedures
  • Mentor and provide direction to junior analysts, conduct additional triage on escalations from those analysts
  • Conduct forensic investigations of internal or external threats based on a working knowledge of IT environments including: Microsoft Windows, Apple MAC, Linux, mobile devices and infrastructure components such as firewall technology, Active Directory, and operational log and event console activity
  • Champion use of processes, standards, governance, and disciplined execution
  • Evaluate and use advanced IR products and services to improve efficiency and effectiveness of incident response
  • Lead projects to enhance CSIRT capabilities up to region or sector level
  • Analyze and reverse engineer malware
  • High School Diploma or GED from an accredited institution is required
  • Minimum 5 years of experience in cyber security incident response, security operations, or a graduate of Eaton's Leadership Development Program is required
  • Must reside within a 50 mile radius of work location or work remotely; no relocation benefit offered
  • Bachelor’s or Master’s degree in a technical discipline such as: B.E / BTech / MCA / Equivalent (EITC) or B.S. Comp Science / Mathematics / Engineering / Equivalent
  • Excellent proficiency with the English language (written and verbal). Additional language capabilities are a plus
  • 10 years of IT experience in information technology
  • Deep understanding of multiple Information Security disciplines with relevant work experience and/or relevant certifications (e.g. GCIH, CSIH, GREM, etc.)
  • Deep understanding of common threats, penetration/intrusion techniques and attack vectors
  • 3 years of experience with security technologies (e.g. IPS, IDS, SIEM, DNS, proxies) and detection techniques (e.g. forensics, malware analysis, packet analysis)
  • 3 years of experience in correlating events from multiple sources to detect suspicious and/or malicious activity
  • 3 years of application development and secure programming techniques
  • 3 years of solution design and architecture
  • 3 years of experience in internet technology and remote access control systems
53

Senior Cyber Security Analyst Resume Examples & Samples

  • Previous experience as an IT Security Analyst or related field as typically acquired during 6 to 8 years in a similar position
  • Three to five (3 to 5) years of healthcare information technology industry experience preferred
  • Previous experience providing cyber security support by planning, coordinating, integrating and synchronizing cyber defense and prevention activities
  • Proven experience ensuring compliance with all applicable state and federal cyber laws and regulations
  • Significant experience creating comprehensive and accurate reports that are used to communicate Sutter Health’s risk profile impact to peers and management
  • Thorough knowledge of information systems security concepts and current information security trends and practices including security processes and methods
  • General knowledge of Federal and State IS security and privacy-related regulatory requirements and laws
  • In depth knowledge regarding NIST, HIPAA, FIPS, and other recognized industry security standards and best practices
  • Detailed understanding of DLP and DLP technologies
  • Detailed understanding of data movement in a large healthcare system and typical healthcare business processes
  • In depth knowledge of cyber security solutions, policies and technologies
  • Understanding of the lifecycle of a network threat and network vulnerability exploitation in a healthcare environment
54

Cyber Security Analyst Resume Examples & Samples

  • Minimum of 10 years of work related experience required
  • Prior work experience specifically-related to Cybersecurity/IA with demonstrated understanding of applicable DoD Cybersecurity/IA guidelines, instructions, and directives is required
  • A Secret Security clearance is required
  • Program management experience is required
  • Prior supervisory, task management, technical management, or project leadership experience in the areas of Cybersecurity/IA
  • A thorough understanding of cyber stakeholders and the process/procedures for integration
  • Ability to develop briefings and present them to high level officials
55

Cyber Security Analyst, FCC Resume Examples & Samples

  • Three (3)+ years in the IT field
  • Security+, CISSP, GWAPT, GPEN, GCIH, CISM/CISA is a plus! ISO27001 Lead Auditor is also a plus
  • Support the development of risk evaluation criteria; prioritize the risk register that identifies trends; communicate common view of the categories of security risk
  • Assist in implementation of new security solutions
  • Conduct and participate in vulnerability audits and assessments
56

Cyber Security Analyst Resume Examples & Samples

  • Monitor NASA agency sensors and SOC (Security Operations Center) systems for incidents and malicious activity
  • Generate high quality reports
  • Coordinate with both Tier 1 and Tier 3 teams while providing incident handling and response support for the agency
  • BS degree in relevant field/technology or equivalent years of experience
  • Experience reviewing and analyzing large amounts of raw log data (firewall, network flows, IDS, system logs),
  • Track record of being motivated to learn and thrive on challenges
  • Commitment to Excellence; Thirst for Knowledge
  • Experience working in a mission critical security operations team, preferably 24x7
  • Experience with enterprise level security incident event management tools such as ArcSight or Splunk
  • CEH, Security+, GCIA are desired certifications
57

Cyber Security Analyst, Lead Resume Examples & Samples

  • 10+ years of experience with information assurance or Cybersecurity, including 3 of the following areas: systems requirements, operational requirements, test and evaluation, or training
  • 3+ years of experience in a technical security role, including network security, operating system security, Internet or Web security, Data Loss Prevention (DLP), anti-malware, IDS/IPS, and penetration and vulnerability testing
  • Experience with designing and implementing a Cybersecurity program for a federal agency and documenting and championing technical requirements that result from business processes or organizational change recommendations
  • Knowledge of security concepts and security management practices, security architecture, security operations, and security modeling
  • Knowledge of Certification and Accreditation (C&A) activities in accordance with the NIST, OMB, and DOE processes
  • Ability to analyze the security architecture of IT systems for compliance with federal and agency policies and manage multiple priorities and projects, deliverables, and stakeholders
  • Ability to influence peers and management, team cross-functionally, and form relationships to achieve objectives
  • 3+ years of experience with the Department of Energy
58

Senior Cyber Security Analyst CND Tools Data Integration TS Resume Examples & Samples

  • 10-15 years of related experience in data security administration
  • Must be DoD 8570: IAT III (either CISA; GCIH; GCED; CISSP; CASP) and CND-SP Specialty: CND-IS
  • Work location Reston
59

Weapons & Tactics Cyber Security Analyst Resume Examples & Samples

  • IAT Leave II Certification required. Certified Ethical Hacker, Net+, CCNA, and Windows/Linux certifications highly desired
  • Must complete self-assessment questionnaire, customer pre-screen, skills assessment lab, and pass the training and certification program(s) as directed by the customer, and remain Mission Ready qualified
  • Must have experience working with and in a network systems security environment with a focus on security and information assurance
60

Intermediate Cyber Security Analyst TS Resume Examples & Samples

  • Serves as technical team or task leader
  • 10-15 years of directly related experience in network analysis and design
  • Requires Relevant Certifications: DoD 8570 IAT III (CASP; CISSP; GCIH; GCED; CISA) and CND-IS (CEH; SSCP)
  • Must be willing to obtain & maintain a CI polygraph
61

Senior Cyber Security Analyst CND Tools Data Integration Lead TS Resume Examples & Samples

  • Broad scope of tasks to include O&M and tuning of cyber defense tools, integration of Splunk, Forescout, Fire Eye, Tanium and other tools, security architecture design, implementing new cyber capabilities, implementing regional based IPS, designs and defines system architecture for new or existing computer systems
  • Performs functions to include but not limited to systems engineer, audit/inspection, infrastructure support, certification and accreditation, vulnerability management, detection and response support services
  • Lead and manage a team of cyber experts
  • 10-15 years of related experience in data security administration (5+ years computer network defense and information assurance experience)
62

Intermediate Cyber Security Analyst TS Resume Examples & Samples

  • Analyze data communications networks; including planning; designing; evaluating; selecting; and upgrading operating systems and protocol suites and configure Firewalls; IPS/IDS and other defensive capabilities as needed
  • Have specialized knowledge in computer network theory and understand IT standards; including but not limited to the OSI model; and the methods of exploiting those standards
  • Plan network layouts and configures cyber defense systems to protect the network
  • Analyzes network topologies and traffic and capacity requirements
  • Serve as Firewall and IPS/IDS engineer
  • Have experience with multi-tasking providing on ground support to a critical Security Operations center
  • Have excellent oral and written skills creating programmatic documentation; standard operating procedures and granular process checklists
  • Conduct special projects by request
  • Requires Relevant Certifications: DoD 8570 IAT III (CASP; CISSP; GCIH; GCED; CISA) and CND-IS (CEH; SSCP) 2. Must be willing to obtain & maintain a CI polygraph
63

AIS / Cyber Security Analyst Resume Examples & Samples

  • A.S./A.A or B.A. Degree with ten (10) years of experience in IT disciplines may substitute for the Bachelor's Degree requirement
  • Five (5) years of cyber security related experience
  • Working level knowledge of DoD cyber security practices/procedure is required
  • Three (3) years of specific DIACAP/DIARMF related experience
  • Experience in briefing DoD Executive Leadership (0-6/GS-13 and above) a plus
  • SME level knowledge current DoN cyber security practices/procedure is highly desirable
  • CISSP is highly desirable
64

Cyber Security Analyst Resume Examples & Samples

  • Active TS/SCI
  • Bachelor’s degree from an accredited institution and 7 years of direct experience or an additional 4 years of direct relevant technical experience may be substituted for education
  • Fully Qualified Navy Validator (FQNV)
  • Compliant with DoD 8570.01-M Information Assurance Manager Level III requirements (GSLC, CISA, CISSP)
  • Prior experience with NIST 800-53 Controls
  • Strong communication, coordination, and collaboration skills
  • Hold (or be able to obtain) at least one of the following certifications: Cisco Certified Network Associate (CCNA), Microsoft Certified System Engineer (MCSE), Red Hat Certified Systems Administrator, and/or Oracle Certified Solaris Administrator (OCSA)
  • Experience with the Assured Compliance Assessment Solution (ACAS) Solution and Security Compliance Automated Protocol (SCAP) tools
  • Experience with Security Technical Implementation Guides (STIG) and associated Checklist
  • Experience in completing, submitting, and tracking accreditation packages for Navy Programs of Record (POR), sites, and/or systems
  • Prior experience with Risk Management Framework (RMF)
65

Cyber Security Analyst Resume Examples & Samples

  • Incident handling (guiding customers, directing resources through intelligence-based response process)
  • Environment monitoring and development of thorough incident reports
  • Delivering threat awareness and education briefings
  • Maintaining technical proficiency in the use of tools, techniques and countermeasures
  • Maintaining professional knowledge of trends in computer and network vulnerabilities and exploits
  • Participation in the production of cohesive technical intelligence reports
  • Adherence to the highest standards of ethical and professional conduct
66

Cyber Security Analyst Resume Examples & Samples

  • Development of thorough incident reports
  • With computer security concepts and best practices
  • With networking, system administration and security best practices
  • Using Unix/Linux operating systems including command-line tasks and scripting
  • Writing formal reports and other technical documentation
  • With analyzing and investigating computer network intrusions
  • With malware analysis
  • With conducting data analysis
  • Ability to obtain and maintain appropriate DoD Secret level security clearance
  • Current DoD Secret level security clearance
  • Experience providing enterprise incident handling support
  • Experience researching and tracking Advanced Persistent Threat (APT) campaigns
  • Experience performing programming/scripting tasks
  • Experience using Digital Forensics techniques and tools (Encase, FTK, File Systems)
  • Experience performing forensic analysis tasks (Intrusions and/or Incident response)
  • Experience with Cyber Kill Chain and Intelligence Driven Response
  • Experience with Reverse Engineering of malware
  • SANS GIAC GGCIH/GCFA, or CISSP certification(s)
  • Experience mentoring junior level employees
  • Effective customer service skills
67

Cyber Security Analyst Resume Examples & Samples

  • Demonstrated experience with networking, system administration, architectures and security elements
  • Ability to obtain and maintain appropriate DoD clearance
  • Demonstrated excellent customer service and teaming skills
  • Malware/ Reverse Engineering experience
  • Enterprise incident handling experience
  • Forensic analysis experience
68

Cyber Security Analyst Resume Examples & Samples

  • Using the big data toolset Splunk, analyse security incidents for evidence of malicious behaviour . (Training on Splunk provided)
  • Carry out analysis to determine the root cause of events, with the support of big data, enterprise wide forensic toolsets and intelligence processes
  • Using enterprise wide forensic toolsets, carry out threat hunting activities, looking for trouble. Ingest, analyse and contextualise data and turn that into intelligence for threat assessment and risk management
  • Applying scientific and analytical skills, develop big data algorithms for detection and reporting of threats against the organisation and sector
  • Reverse engineer malware and malicious code to determine the risk and impact across differing platforms, from enterprise to field equipment, then feed that information back into the architecture for security enhancement
  • De-obfuscate code to determine actions of scripts and malware
  • Perform protocol analysis for the detection and investigation of command and control traffic
  • Analysis packet level data for the detection and analysis of covert exfiltration mechanisms
  • Provide advice on configuration of network security devices for service and security enhancement
  • Liaise with UK Government agencies for intelligence sharing
  • Participate within the Global Thales security community
  • Perform vulnerability assessments and penetration tests of systems to determine risk and recommend mitigating actions
  • Carry out first responder actions, triaging and containing breaches
  • Identify service inadequacies and contribute to the Customer Service Improvement Plan
  • Maintain an understanding of current and emerging threats and vulnerabilities and security technology developments
  • Candidate will need to become familiar with, adhere to and ensure implementation of all Thales security policies and standards and the change control environment
  • Support client facing / end user helpdesk and other IT Support Team’s
  • Ensuring support tickets are fully updated with the most current data. Provide proper escalations and hand overs to management and support staff
  • Experience or skilled in one or more of the following areas: Cyber security, network security, forensics, vulnerability assessment, data analytics or big data techniques
  • A technical degree, PhD or equivalent experience
  • Knowledge of myriad of operating systems, from the latest to legacy Windows, Unix and embedded SCADA platforms
69

Team Lead, Cyber Security Analyst Resume Examples & Samples

  • Partners with cyber security researchers on data analysis, prototype implementation, collaboration, and feedback
  • As necessary, shares knowledge with external entities including law enforcement, intelligence and other government organizations and agencies
  • Must be able to obtain a federal security clearance
  • Keen ability to anticipate and recognize cyber security threats
  • Clearly communicating technical information in various forms to senior management, peers, and customers
70

Cyber Security Analyst Resume Examples & Samples

  • Develop IT security policies, procedures, standards, and guidance as required by the Federal government and Federal customers
  • Provide IT security policy and methodology recommendations to Federal customers
  • Ensure information systems are operated, used, maintained, and disposed in accordance with Federal customer security policy, procedures, standards, and guidance
  • Support implementation of cybersecurity and risk management frameworks to drive technical solutions for Federal customers
  • Conduct oral and written communications on cybersecurity project status and issues with IT Manager and Team Lead to facilitate project planning and control of relevant task orders
  • Communicate technical topics to management and non-technical audiences, as well as interface with the Federal customer when required
  • Become knowledgeable on the HIPAA policies and procedures for the program and ensure awareness of HIPAA breach process. Understand your role in HIPAA compliance and be able to execute that role in an effective manner
  • Bachelor’s degree and 9 years related work experience, Master’s degree and 7 years of experience; or 13 years of experience across multiple IT disciplines including cybersecurity, information security auditing, and information assurance in lieu of a degree
  • 3 years’ experience in developing, implementing, or evaluating IT security policies and procedures, system security plans, configuration management plans, security audit plans, and security risk assessment plans
  • Must be a US citizen or green card holder
  • “Big Four” audit and management consulting experience supporting Federal government contracts
  • Experience in FISMA, GAO FISCAM, NIST Cybersecurity Framework, NIST information security standards and guidance including FIPS 199, FIPS 200, NIST SP 800-53, and NIST SP 800-53A
  • Solid understanding of Access Control, Audit and Accountability, Configuration Management, and, Identification and Authentication control families in NIST SP 800-53
  • Solid understanding of SSA operations
  • Strong team player committed to excellence and adherence with Northrop Grumman values, ethics, and standards of conduct
  • Strong written, verbal, and interpersonal communication skills
71

Principal Cyber Security Analyst Resume Examples & Samples

  • Responsible for tuning and filtering of events and information, creating custom views and content using all available tools following an approved methodology and with approval and concurrence from management
  • Notify the Customer of significant changes in the security threat against the Customer networks in a timely manner and in writing via established reporting methods
  • Coordinate with the O&M team to ensure production systems are operational
  • Produce daily/weekly/monthly/quarterly reporting as required by management
  • Maintain system baselines and configuration management items, including security event monitoring “policies” in a manner determined and agreed to by management. Ensure changes are made using an approval process agreed to in advance
  • Coordinate with appropriate organizations regarding possible security incidents. Conduct intra-office research to evaluate events as necessary, maintain the current list of coordination points of contact
  • Produce reports identifying significant or suspicious security events to appropriate parties. Include latest security threat information and tie back to specific intrusion sets of nation state actors when possible
  • Review and evaluate network modifications and recommend security monitoring policy updates
  • Establish procedures for handling each security event detected
  • Be able to create and add user defined signatures, or custom signatures, to compensate for the lack of monitoring in threat areas as warranted by threat changes or as directed by the customer. This includes creating content in Arcsight as needed
  • Maintain a network diagram depleting the relevant security checkpoints in the network
  • Develop and implement a methodology using Arcsight Use Case UML processes that identify procedures for correlating security events. Analysis should all be able to create custom content and develop new use cases to better correlate security event information
  • Develop and utilize “Case Management” processes for incident and resolution tracking. The processes should also be used for historic recording of all anomalous or suspicious activity
  • Identify misuse, malware, or unauthorized activity on monitored networks. Report the activity appropriately as determined by the customer
  • Maintain proficiency and skills through relevant training, conventions, conferences, and on-the-job training
72

Cyber Security Analyst Resume Examples & Samples

  • Science related Bachelor's or Master's degree with a GPA 2:1 or above (UK) or GPA of 3.0 or above (US) or First Class/2nd Upper Honours (Singapore)
  • Technical background in cyber security is not mandatory but demonstration of interest and passion for the field will be advantageous
  • Ability to deliver under pressure and to tight deadlines
  • Excellent organisation and time management
73

Cyber Security Analyst Resume Examples & Samples

  • Conduct platform or operating system vulnerability scans which assess exposure of system to attacks or hacking. Respond to questions regarding viral activity, concerns about spam/phishing etc. Produce reports
  • Serve as organization's POC for the third party certification of security procedures and use of cyber security protections. Ensure that system's security controls, policies and procedures examined, measured and validated against third party standards
  • Design, plan and implement test strategies to support the core infrastructure in the contingency environment for all critical business applications to ensure business continuity in the event of a major business interruption or disaster
  • Lead projects as related to technology refresh/evaluation such as Load Balancing and SSL technology. Research corrective measures (long term solutions) needed for any chronic issues identified that compromise security of particular systems or platforms
  • Participate in developing and testing of new methodologies and systems for recovery of the critical core business processes and the enterprise infrastructure
  • May serve as technical lead or project lead in projects involving testing defenses against hacking, Denial of service, spam, break-ins, or related attacks. Provide technical guidance to less senior staff or applications developers/systems administrators
  • Demonstrable knowledge of application security, risk assessment, validation of security pen test results, and vulnerability resolution
  • Demonstrable knowledge of secure coding practices and the ability to conduct security assessments and analysis of applications
  • Ability to identify security requirements for applications and services and to effectively communicate requirements to application development teams and application/business owners
  • Ability to review application source code for vulnerabilities, using both manual and automated code scanning techniques
  • Ability to identify and explain the risks associated with common application vulnerabilities, demonstrate exploitation, and recommend mitigation options
  • Ability to initiate and promote activities to foster Information Security awareness and education among application development
  • Information security and application security or application development experience
  • Ability to coordinate activity among multiple teams, both technical and non-technical
  • Strong verbal and written communications skills; comfortable briefing senior management
  • Strong interpersonal skills for developing relationships with individuals and teams across the enterprise
  • Strong understanding of fundamental Application Security concepts, including common types of attacks and exploitation techniques
  • Experience with various application security tools
  • Familiarity with emerging applications security exploits and willingness to research them
  • Solid understanding of frequently used web application security testing tools
  • Solid understanding of common web and systems application vulnerabilities
  • Familiarity with key security concepts/frameworks such as OWASP, CVE, and CVSS
  • Thorough understanding of application architecture and supporting component
74

Cyber Security Analyst Resume Examples & Samples

  • Perform monitoring, research, assessment and Attack analysis on Intrusion Detection and Prevention tools as well as Anomaly Detection systems, Firewalls, Antivirus systems, proxy devices
  • Follow pre-defined actions to handle BAU and High severity issues including escalating to other support groups
  • Identifying weaknesses and vulnerabilities within the system
  • Execute daily ad hoc tasks as needed
75

Cyber Security Analyst, Senior Resume Examples & Samples

  • 5 years of experience with Cyber threat analysis
  • DoD 8570 complaint IAT II certification
  • GXPN: GIAC Exploit Researcher and Advanced Penetration Tester, GREM: GIAC Reverse Engineering Malware, GCFA: GIAC Certified Forensic Analyst, GWAPT: GIAC Web Application Penetration Tester, GPEN: GIAC Certified Penetration Tester, GCIA: GIAC Certified Intrusion Analyst, or GCIH: GIAC Certified Incident Handler Certification
76

Cyber Security Analyst Resume Examples & Samples

  • Assessing the security impact of security alerts and traffic anomalies on customer networks
  • Escalating and explaining severe security incidents to clients verbally
  • Responding to technical security questions and concerns from clients
  • Possessing a deep understanding of hacker techniques, vulnerabilities, attacks and countermeasures
  • Conducting research on emerging security threats and potential customer impact
  • Strong knowledge of the TCP/IP protocol suite and related security concerns
  • Working knowledge of well-known security tools such as NMAP, Nessus, TCPDump, Wireshark, Netcat, and Backtrack
  • Working knowledge of common attacks and vulnerabilities
  • Strong understanding of common categories of malware and characteristics of each
  • Advanced college coursework in Computer Science or Information Technology, or equivalent experience
  • Bachelor's degree in similar field desirable
  • Relevant industry standard certifications preferred (SANS, CISSP, C|EH, Etc..)
  • Candidate expected to work towards SANS GIAC Certified Intrusion Analyst (GCIA) within 6 months of entry into this position
  • ====================​====================​
77

Senior Cyber Security Analyst Resume Examples & Samples

  • Bachelor’s degree in related field with 10+ years of experience in IT with a minimum of 5+ years in IT security. An equivalent combination of education, certification, and experience may be considered
  • IAT III Level certification, CISSP preferred
  • Knowledge of DIACAP and RMF processes and deliverables
  • Ability to understand the impact of cybersecurity on an information system and its organization and how risks may affect goals and objectives
  • Ability to meet and communicate effectively with management and technical staff
  • Knowledge of DIACAP and RMF processes and necessary forms and artifacts
  • Experience with vulnerability scanners, STIG, NIST SP, Retina, SRR, ACAS (Nessus)
  • Experience with security hardening, and maintenance
  • Knowledge of cybersecurity regulations, and policy, including federal mandates, FISMA, and service-specific regulations
  • Knowledge of NIST SP 800-30, 800-37, 800-39, 800-53, 800-53A, 800-60, and DoDI 8500 Series
  • Self-motivator with ability to work as part of a team or independently with little supervision or direction
  • Professional oral and written presentation skills
  • Attention to detail and effective problem-solving skills
78

Cyber Security Analyst Resume Examples & Samples

  • Conduct platform or operating system vulnerability scans which assess exposure of system to attacks or hacking. Respond to questions and issues raised regarding viral activity, spam/phishing etc. Produce reports
  • Participate in internal reviews by auditors, operational risk assessment staff, or compliance/reporting staff to prepare assessments or reports of operational risks associated with IT/IS infrastructure, access to systems, exposure to attacks, etc
  • Review commercial products available to enhance corporate hardware, platforms, applications and data. May test or evaluate products under consideration for purchase or licensing
  • 2 + years’ experience supporting Sail point’s Identity Governance products (IdentityIQ and IdentityNow)
  • Extensive experience with Java and J2EE application development and support
  • Demonstrate experience supporting Linux Operating System (SUSE and Red hat)
  • Demonstrate extensive experience with SQL query development
  • Knowledge and support of Oracle database
  • Knowledge of SDLC development Life Cycle and Configuration Management
  • Able to support JBOSS or Web logic application
  • Able to support Apache webserver
  • Good understanding of Privileged Account Security Solution with CyberArk PIM (Privileged Identity Management) preferred
  • Experience deploying and supporting Microsoft Windows Cluster preferred
  • Experience and supporting Microsoft IIS services is preferred
  • Experience installing, configuring, and supporting Microsoft Active Directory is preferred
79

Senior Cyber Security Analyst Resume Examples & Samples

  • BS in IT/Cyber Security or related field
  • 5-10+ years’ experience in multiple cyber security domains (Access Control, Network Security, Governance / Risk Management, Architecture & Design, Operations)
  • Demonstrated Experience with Incident Response
  • Demonstrated Experience with Network Reconnaissance
  • Demonstrated data mining experience (Data auditing, Aggregation, Validation and Reconciliation; Advanced Modelling Techniques; Testing, Developing, and Presenting outputs in clear and concise reports)
  • Familiarity with Defensive Cyber Operations (DCO-Teams) and Computer Protection Teams (CPT)
  • Familiarity with basic programming and scripting languages (i.e. Python)
  • Demonstrated Experience working in a Client Service environment
  • Knowledge of Security Best Practices: NIST, CIS, CISCO, Juniper, Checkpoint, Microsoft, Unix/Linux
  • Familiarization with large scale data analytics
  • Strong Analytical Skills
  • Experience Managing and Prioritizing Multi-Dimensional Technical Requirements
  • Military Cyber experiences within DoD preferred
  • MS in IT/Cyber Security or related field
80

Cyber Security Analyst Resume Examples & Samples

  • Demonstrated experience with the various phases of digital forensics that involves acquisition, examination, analysis and reporting
  • Relevant security knowledge and experience in two or more of the following areas: Digital forensics, Malware analysis, Incident response, network/host intrusion detection or security operations
  • Self-motivated and able to work in an independent manner
  • Solid working experience with any of the following tools/vendors is desired: Arcsight, Splunk, Wireshark, Riverbed, Sourcefire IDS or Cisco ASA. Certifications with these tools/vendors will be given extra consideration
  • Must have at least two (2) certifications in the field of information technology. ** Certified Intrusion Analyst Certification (GIAC) is preferred **
81

Cyber Security Analyst Resume Examples & Samples

  • BA/BS required: Master’s preferred. Focus areas include: Information Assurance, Cyber Security Science, Information Security
  • Between 7 - 10 years IA/Cyber Security experience developing and executing IA, CND, Cybersecurity policy and programs within DoD
  • Possess working knowledge of DoD policies, directives and instructions (i.e. 8500 series) and technical guidance
  • Host Security & Information Security Continuous Monitoring (ISCM), Risk Management Framework Implementation and Governance, DoD IA/CND Compliance Requirements, Federal Information Security Management Act (FISMA), Computer Network Defense Service Provider (CNDSP) Program, cyber security, knowledge of relevant DoD components, IA Portfolio and Governance Management, and Cloud Computing
  • Ability to support training and/or facilitation engagements with senior government personnel
  • CISSP, ITIL, PMP, CISM
82

Entry Level Cyber Security Analyst Resume Examples & Samples

  • Determine if security events monitored should be escalated to incidents and follow all applicable incident response and reporting processes and procedures
  • Ability to problem solve, ask questions, and discover why things are happening
  • Correlate data from intrusion detection and prevention systems with data from other sources such as firewall, web server, and DNS logs
  • Reporting outputs will be reviewed and approved to ensure quality and metrics are maintained
83

Principal Cyber Security Analyst Resume Examples & Samples

  • 7 years of operational IT experience
  • 5+ years’ experience with Network Security Monitoring, SIEM and/or other log aggregation and correlation tools
  • 4+ years’ experience with host-centric detection & response skills, as well as process automation
  • Excellent communication skills with the ability to drive technical change and constructively influence peers and leadership
  • Specific focus on Digital Forensics & Investigative Response (DFIR), cyber security, threat detection, penetration testing (red/blue) and vulnerability management
  • Experience leading small to medium-sized teams in focused, matrixed projects
  • Experience with Agile Management
84

Associate Cyber Security Analyst Resume Examples & Samples

  • Processing of Requests
  • Support of Entitlement Reviews and remediation of exceptions
  • Participation in Quality Reviews
  • Support the Develop and Maintenance of Internal Procedure Documentation
  • Identify security administration deficiencies, recommend improvements, and assist to implement corrective action
  • Secondary On-call responsibilities when assigned
  • Generally work is self-directed and not prescribed
85

Cyber Security Analyst Resume Examples & Samples

  • Software development lifecycle and JAVA development skills, code analysis
  • Security Testing (Functional testing)
  • Monitoring and Event Handling (1st, 2nd or 3rd Line)
  • Drafting and presenting quality documentation in good written English
  • Ability to explain findings in terms of technical and business risk
  • Analytical & Systematic Approach
  • Integrating COTS products
  • Embedded software and processor driven devices
  • Shell Scripting
86

Cyber Security Analyst Resume Examples & Samples

  • Conduct platform or operating system vulnerability scans which assess exposure of system to attacks or hacking. Aggregate vulnerabilities discovered during scanning process and produce reports
  • Participate in disaster recovery assessments, drills, or redundancy/backup assessments
  • Must have proven record of accomplishment in successful problem solving. Proactive learner and creative problem solver who enjoys being in a fast-paced environment, and who enjoys interactions that lead to ultimate customer success and satisfaction
  • Must have ability to analyze current business workflow and align new strategy to the large user base across different divisions; influence senior management on project strategy and identify business opportunities, acting as an escalation point and advocate for critical customer issues, collaborating with other departments as needed
  • Must have experience engaging and coordinating cross-functional resources both internally and with customer organizations to align on problem solving activity; deriving primary pain points and objectives for stakeholder groups including key data elements used in business processes, unique technical specifications and opportunities for high impact changes
  • Must have ability to solve and document solutions for usage of other technicians and customers
  • Must have ability to coordinate and communicate to large diverse groups of both technical and non-technical stakeholders leveraging strong command & control skills
  • Must have excellent verbal and written communication skills with demonstrated experience communicating with technical and non-technical audiences
  • Knowledgeable of Credential management, non-human identity and Privilege access management work stream
87

Cyber Security Analyst Resume Examples & Samples

  • Bachelor’s Degree in Math, Science, Engineering or Computer Science and 8 years previous experience with security configurations of Windows, Linux, and Cisco operating systems in an enclave. 4 additional years of experience can be substituted for the degree
  • Candidate must have a DoD Top Secret security clearance
  • Experience building, configuring, STIGing, and administering HBSS and ACAS
  • Understand principles of information assurance, DOD Risk Management Framework (RMF), NIST 800-53 security controls, and cybersecurity best practice
  • Ability to analyze IA test results, identify system weaknesses and develop a risk analysis/evaluation
  • Experience documenting RMF artifacts, procedures, processes, and documentation to support system accreditation
  • Perform as the team’s cybersecurity operations lead responsible for managing cyber status and reporting of Cyber Task
  • Excellent interpersonal skills, selfmotivated, with keen attention to detail
  • Must have CISSP or equivalent certification under DoD 8570.01-M in an ISSO/IAM-III role
  • Knowledge intrusion detection and firewall system architecture and management; Windows, Linux, and Unix operating systems; IAVM Program; and NIST accreditation process; CAC/PKI technology; security incident handling; software testing and evaluation; Common Criteria requirements; FIPS 140-2 standards
  • Specific expertise includes but is not limited to: utilizing
88

Cyber Security Analyst, Mid Resume Examples & Samples

  • 3+ years of experience in Cybersecurity policies, processes, and guidance
  • Experience with SAP, Citrix, Excel, Business Process Procedures (BPP's), and Change Management
  • Knowledge of federal IT security requirements and technical knowledge of the implementation of security controls and practices on an array of technical environments and applications
  • Knowledge of SAP security and maintaining user management security roles
  • BA or BS degree in IT or CS
  • Experience with Heat, Quality Center, QA Tools, UPerform, and Dimensions
  • Experience in the area of configuration management and request for change processes
  • Possession of excellent oral and written communications skills in the preparation of client-ready, executive-level briefings and reports
  • Windows Server 2008 R2 OS Training
89

Cyber Security Analyst Resume Examples & Samples

  • Develop and deliver business specific opportunities to minimise costs
  • Be capable of acting as the escalation point for critical issues when required
  • Ensure quality outcomes are provided by the team to internal stakeholders
  • Provide escalation support to issues encountered in day to day operations
  • Mentor staff on internal processes and technology to improve methodologies and up skill resources
90

Cyber Security Analyst Resume Examples & Samples

  • Security Analysts will assist in the creation of processes/procedures, technical documentation, as well as completion of project tasks
  • Provides regular monitoring, triage, and response to automated security alerts
  • Provide timely detection, identification, and alerts of possible attacks/intrusions, anomalous activities, and misuse activities, and distinguish these incidents and events from benign activities
  • Identifies false-positives and false-negatives from alerting
  • Provides regular feedback to enhance our security monitoring and controls
  • Work with others to resolve computer security incidents and vulnerability compliance
  • Examine network topologies to understand data flows through the network
  • Provides mentorship to Security Technicians
  • Proven Information Technology experience with network technologies, specifically TCP/IP, HTTP and related network tools is required
  • In depth understanding of regular expressions
  • In depth understanding