Information Systems Security Analyst Resume Samples

4.5 (99 votes) for Information Systems Security Analyst Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the information systems security analyst job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
JF
J Franecki
Jany
Franecki
9712 Everardo Mountains
New York
NY
+1 (555) 237 6657
9712 Everardo Mountains
New York
NY
Phone
p +1 (555) 237 6657
Experience Experience
Detroit, MI
Information Systems Security Analyst
Detroit, MI
Grady, Wiza and Herman
Detroit, MI
Information Systems Security Analyst
  • Perform procedural tasks found within other security processes, such as information management, classification and protection; policy management
  • Assist in developing policies, procedures, or processes that add to the overall effectiveness of the information security program
  • Analyze new threat vectors and make recommendations for improved security countermeasures
  • Create reports that can be used to identify trends and establish metrics
  • Gap analysis within existing workflows, processes and procedures that may impact information security
  • Facilitate, and promote activities to create information systems security awareness within the company
  • Possesses and applies broad knowledge of concepts and principles; exhibits technical expertise in a specific area; seen as a thought leader
Chicago, IL
Senior Information Systems Security Analyst
Chicago, IL
Abbott, Rohan and Simonis
Chicago, IL
Senior Information Systems Security Analyst
  • Acting as a security liaison and technical point of reference to the engineering and project management groups
  • Adhere to all security, change control and MHBE Project Management Office (PMO) policies, processes and methodologies
  • Leading the incident response team, including directing engineers and analysts in triaging security incidents and keeping the Security Manager appraised of incident status
  • Develop and maintain new or existing web sites, applications, and databases
  • Assist in developing and maintaining Master System Security Plans (SSP), security profiles, Network Security Plans (NSP), and maintain configuration management plans
  • Develop online forms that take data input from users and store it in SQL databases
  • Document and maintain DISA STIGS, IRS/CIS Benchmark style hardening checklists to establish system security baseline documentation
present
Boston, MA
Intermediate Information Systems Security Analyst
Boston, MA
Hilll-Hudson
present
Boston, MA
Intermediate Information Systems Security Analyst
present
  • Recommending changes to procedures and systems to comply with the Global information security standards
  • Participating in risk assessment with key business partners in the division and creates the Executive Summary Findings Report from the workshops
  • Assisting in identifying security risks and exposures by participating in security reviews, evaluations, and risk assessments
  • Providing expert level research and analysis for planning, organizing, and managing divisional security functions
  • Participating in day-to-day information security activities such as questions, problems, exceptions, etc
  • Provides expert level research and analysis for planning, organizing, and managing divisional security functions
  • Effectively applies fundamental concepts; works on assignments of moderate scope and complexity, with limited oversight; makes recommendations for changes to procedures, and performs varied work, requiring some originality or ingenuity
Education Education
Bachelor’s Degree in Information Security
Bachelor’s Degree in Information Security
Tulane University
Bachelor’s Degree in Information Security
Skills Skills
  • Ability to handle multiple tasks simultaneously and switch between tasks quickly
  • Excellent "soft skills" when communicating with employees to work through difficult and sometimes frustrating security issues
  • Good understanding of the core concepts of IT security along with best practices and understanding of industry trends
  • A highly motivated work ethic with the ability to work efficiently as part of a fast-moving team
  • Experience working with domain structures, user authentication, user profiles and digital signatures
  • Windows security basics
  • Solid understanding of Federal security regulations, policies, guidelines and procedures (NIST, OMB, FedRAMP)
  • Demonstrated ability to analyze issues and provide effective problem solving
  • Security technologies such as Palo Alto Firewalls and VPNs, Rapid7 Nexpose Vulnerability Scanner, Varonis, FireEye, Avecto, McAfee VirusScan, McAfee Device Control, McAfee ePolicy Orchestrator, Bradford NAC
  • Excellent analytical and problem solving skills related to networking, operating systems, and malware analysis
Create a Resume in Minutes

12 Information Systems Security Analyst resume templates

1

Information Systems Security Analyst Resume Examples & Samples

  • Enable employees and the business to continue to perform their roles efficiently without compromising information security
  • Build and maintain strong relationships with all Information Systems departments to ensure effective communication and efficient workflows between Security, Operations, Infrastructure and Software QA
  • Work effectively within the Information Systems Security team while continuously supporting and collaborating with the R&D, Chief Technology Office, Chief Risk and Compliance Office and NDIS(Network Design) security teams
  • Ensuring timely attention and response to raised incidents and work
  • Highly skilled at developing and maintaining relationships with key vendors and employees from all business units and levels of management
  • Excellent "soft skills" when communicating with employees to work through difficult and sometimes frustrating security issues
  • Good understanding of the core concepts of IT security along with best practices and understanding of industry trends
  • A highly motivated work ethic with the ability to work efficiently as part of a fast-moving team
  • Gap analysis within existing workflows, processes and procedures that may impact information security
  • Windows security basics
  • Windows Active Directory and Group Policy creation and maintenance
  • Scripting or programming in a Windows, OSX or Linux environment
  • Security technologies such as Palo Alto Firewalls and VPNs, Rapid7 Nexpose Vulnerability Scanner, Varonis, FireEye, Avecto, McAfee VirusScan, McAfee Device Control, McAfee ePolicy Orchestrator, Bradford NAC
  • Familiarity with threat vulnerability management, security architecture and secure application development
  • Experience with establishing and/or executing security policy, procedure and process in alignment with an organization's regulatory, legal, risk and operational requirements
2

Intermediate Information Systems Security Analyst Resume Examples & Samples

  • Recommending changes to procedures and systems to comply with the Global information security standards
  • Participating in risk assessment with key business partners in the division and creates the Executive Summary Findings Report from the workshops. Determines the most critical assets for the division and documents areas of concerns, threats, vulnerabilities, and impacts for these assets
  • Maintaining an understanding of current and impending legislation, regulations and security best practices to ensure the security program incorporates and addresses key issues
  • Assisting in identifying security risks and exposures by participating in security reviews, evaluations, and risk assessments
  • Providing expert level research and analysis for planning, organizing, and managing divisional security functions
  • Participating in day-to-day information security activities such as questions, problems, exceptions, etc
  • Complying with IMSA Code of Ethics if required by division
  • Effectively applies fundamental concepts; works on assignments of moderate scope and complexity, with limited oversight; makes recommendations for changes to procedures, and performs varied work, requiring some originality or ingenuity
3

Intermediate Information Systems Security Analyst Resume Examples & Samples

  • Take an active role in creating an environment of innovation, collaboration, transparency, accountability and trust
  • Participating in risk assessment with key business partners in the division and creates the Executive Summary Findings Report from the workshops
  • Determines the most critical assets for the division and documents areas of concerns, threats, vulnerabilities, and impacts for these assets
  • Maintains an understanding of current and impending legislation, regulations and security best practices to ensure the security program incorporates and addresses key issues
  • Assists in identifying security risks and exposures by participating in security reviews, evaluations, and risk assessments
  • Provides expert level research and analysis for planning, organizing, and managing divisional security functions
  • Participates in day-to-day information security activities such as questions, problems, exceptions
  • Complies with IMSA Code of Ethics if required by division
  • Other duties as assigned based on divisional needs
  • Conforms with and abides by all regulations, policies, work procedures, instruction, and all safety rules
4

Information Systems Security Analyst Resume Examples & Samples

  • Gathers research covering latest security threats and vulnerabilities. Identifies weaknesses and exposures. Recommends protection and mitigation strategies for peer review, input and feedback. Presents recommendation to key stakeholders for further input, feedback and/or approval
  • Manages BCM activities as defined within the Business Continuity Program, such as management of Business Continuity and Business Impact Analysis plans and procedures; oversees tests and exercises, including explanation of results and improvement plans; directs BCP coordinators; manage disaster recovery requirements; may be a point of contact for a crisis as requested by Crisis Management Team
  • Administers awareness and training activities, such as coordination of learning and awareness content and awareness week. Presents to target audiences relevant and clear information to educate and increase awareness
  • Organizes and maintains certain procedural tasks found within cyber threat management processes, such as reviewing and analyzing threat intelligence, oversees vulnerability data and actions, reviewing and analyzing consolidated data from security monitoring technologies, supporting and recommending countermeasure planning
  • Organizes and maintains certain procedural tasks found within event and incident response processes, such as identifies and analyzes issues and recommends actions, reviews and analyzes artifacts and evidence, oversees coordination of tasks
  • Tracks current and impeding laws, regulations and industry requirements and best practices, such as data protection, data privacy, cyber security and information security. Translates requirements into practical solutions, and coordinates improvement plans
5

Information Systems Security Analyst Resume Examples & Samples

  • Must have a Top Secret Clearance with SCI Eligibility (SSBI within the last 5 years)
  • U.S. Citizenship required
  • Demonstrated experience maintaining operational security posture for the program to ensure information systems security policies, standards, and procedures are established and followed
  • Demonstrated experience assisting with the management of security aspects of information systems and performing day-to-day security operations of the system
  • Expertise evaluating security solutions to ensure they meet security requirements for processing classified information
  • Experience with Certification and Accreditation (C&A)
  • Experience with the following network protection devices: Firewalls, intrusion detection and prevention systems (IDS/IPS), log analysis, malware analysis, network traffic flow and packet analysis
  • Experience and/or familiarity with Secure Technical Implementation Guides (STIGs), Information Assurance Vulnerability Alert (IAVA), DCID 6/3, Federal Information Security Management Act (FISMA) and other tools using industry best practices
  • Experience or familiarity with Agile development methodology
  • Manage changes to system and assesses the security impact of those changes
  • Prepare and review documentation to include System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (C&A) packages, etc
  • Experience leading security analysis teams
  • Perform analysis on large data sets
  • Provide security services for certification and accreditation (C&A) requirements, including developing and maintaining information assurance documentation for all network components
  • Support continuous monitoring and FISMA compliance
  • Conduct bi monthly vulnerability scans and reconcile results, and report all findings
  • Experience with one or more of the following: Netezza, Mantra Centrifuge, Aginity Workbech, LYNXeon Cyber Solutions, VIAssist, IN-SPIRE, CyberSource, iClass, SPSS, Max Mind, Quova, etc
  • SourceFire experience desired
  • Six (6) or more years of cyber security or similar experience required
6

Information Systems Security Analyst Resume Examples & Samples

  • BS in a technical field or equivalent combination of education and industry experience
  • An understanding of virtualization technologies such as OracleVM, VMware, and HyperV
  • Familiarity with SAN and AWS/Cloud technology
  • Strong understanding of network fundamentals
  • At least 4-5 years of Enterprise Windows experience with a security focus. Experience with AD GPO's a must
  • Competency in one or more scripting languages such as python/powershell would be an asset
  • Experience with GrayLog an asset. Syslog experience a must
  • Must work heavily with the application groups to vet out security concerns along the application life cycle. Providing input on issues, and working to improve the overall security of out Business Systems development and apps, along with other Non-IS Business Apps
  • In-depth exposure to any of the following technologies would be an advantage
7

Senior Information Systems Security Analyst Resume Examples & Samples

  • Develop and maintain new or existing web sites, applications, and databases
  • Manage several SQL databases to include data input, manipulation of data (specific query’s) as needed and delivery back to admin users
  • Automate processes relating to weekly system audits, media reviews, anti-virus management, system upgrades/downgrades, configuration management, and establishment of new user accounts
  • Enhance and maintain automated tools used to track and retain records of accreditation requests and approvals
  • Develop online forms that take data input from users and store it in SQL databases
  • Perform certification and accreditation activities on various types of systems to include WANs, LANs, standalones, and virtual environments
  • Assist in developing and maintaining Master System Security Plans (SSP), security profiles, Network Security Plans (NSP), and maintain configuration management plans
  • Validate configurations of UNIX, Linux, Windows, and Virtual environments in accordance with DSS, DISA, and NSA guidance
  • Prepare for and support inspections, self-inspections, and system reviews
  • Experience in web page development
  • Experience working with SQL databases (both back end data manipulation and front end user interfaces)
  • Knowledge of ASP, HTML, Visual Basic, Microsoft SQL Server, C# (or equivalent), automation scripting and product life cycle
  • Working knowledge of UNIX, Linux, Windows (all versions) and network architecture
  • Strong analytical, troubleshooting, and organizational skills
  • Possess and maintain a current DoD 8570 certification (i.e. CISSP, Security+, CISM, CASP, GSLC, or CAP, etc.)
  • Exposure to any of the following: NISPOM, ISFO, DoD IA standards and Certification and Accreditation (C&A) processes
8

Senior Information Systems Security Analyst Resume Examples & Samples

  • As the Senior Information Systems Security Analyst, you will evaluate, implement, maintain, and monitor IT security measures utilized by Xerox’s Client. You will work on existing systems while also supporting a variety of new IT initiatives. You will quickly and easily analyze and understand the department and organization needs to effectively exercise technical leadership over Xerox’s Client’s security topology and processes
  • Complete and update Security Plans on a regular basis as systems change
  • Ensure that application security roles, when application roles are changed, are properly documented in required format
  • Maintain a POA&M for the infrastructure and assure that the issues are being addressed, tracked and mitigated within the required timelines
  • Provide information security audit support when required
  • Acting as a security liaison and technical point of reference to the engineering and project management groups
  • Leading the incident response team, including directing engineers and analysts in triaging security incidents and keeping the Security Manager appraised of incident status
  • Validating remediation efforts of findings related to vulnerability and system configurations
  • Responding to day-to-day IT operations and internal requirements requiring security support
  • Conduct daily/weekly security audit log reviews, and report any suspicious activities
  • Conduct security impact analyzes of controls on proposed system changes
  • Review and update systems security documentation and artifacts such as SSP, ISRA, PIA, SSR, CAP and POA&Ms
  • Create and track POA&M requirements for resolving security findings
  • Perform vulnerability scanning of infrastructure, applications, and external assessment
  • Assess and evaluate information systems to recommend changes, mitigate threats, risks, and vulnerabilities
  • Document and maintain DISA STIGS, IRS/CIS Benchmark style hardening checklists to establish system security baseline documentation
  • Working knowledge of security architecture technology solutions including SIEM, vulnerability scanning and management, anti-virus management, database monitoring and encryption, and Web Application Firewall
  • Adhere to all security, change control and MHBE Project Management Office (PMO) policies, processes and methodologies
  • Possess either of the following certifications: CISSP, CEH, CISM, CISA
  • 2 years or more of IT network knowledge/implementation experience (e.g., firewalls, secure topologies/architectures, intrusion detection/analysis, Microsoft/Linux/OS security, vulnerability assessments)
  • 2 years or more of experience with administering firewalls and leveraging working knowledge of system administration for Linux and Microsoft operating systems
  • Understanding of application assessment software (WebInspect, HP Fortify, ZAP or others)
  • Experience implementing and or managing SIEM systems
  • MS Office professional tools suite experience and strong writing and editing skills
  • Ability to make informed decisions quickly and leverage communication abilities to implement them
9

Information Systems Security Analyst Resume Examples & Samples

  • Lead the deployment, maintenance, and operation of a portfolio of security systems and related technology including firewalls, proxy servers, Virtual Private Networks (VPNs), encryption tools, Web filtering, email security, Security Information and Event Management (SIEM) tools, Intrusion Detection/Prevention System (IDS/IPS), network monitoring and sniffing, firewall monitoring, vulnerability and threat management
  • Actively hunt for and oversee mitigation of network traffic anomalies, SIEM events, IDS/IPS events, endpoint malware alerts, critical and high severity issues from vulnerability assessments, and other events that pose a risk to the environment
  • Perform threat and vulnerability assessments
  • Work with personnel to ensure systems meet security policies and standards
  • Perform security risk assessments, and recommend mitigating controls
  • Lead incident responses and guide staff and keep management informed; oversee and validate remediation activities
  • Provide input on technology projects and implementations to ensure compliance with policy
  • Document security tools and systems and provide training to information technology staff
  • Participate in a Xerox security committee
  • 5 years of security engineer related work experience
  • Knowledge / hands on experience with security- and related- systems and tools including: encryption, security logging, SIEM, IDS/IPS, network monitoring and sniffing, routers/switches, firewalls, proxies, vulnerability and threat management tools, certificate management, VPN, advanced malware detection, URL filtering, dual factor systems, Windows and Unix security
  • Strong communication and organization skills, ability to multi-task, strong attention to details, excellent problem solving and follow-up skills
  • Ability to work independently and make sound decisions
  • Objectivity in stressful or potentially charged situations
  • Ability to complete high quality deliverables
  • Ability to mentor staff
10

Senior Cyber Information Systems Security Analyst Resume Examples & Samples

  • Able to provide network security, technical, configuration, and architecture support to the Government IA representatives as required
  • Experience with DIACAP, RMF, DCID 6/3 Certification and Accreditation Process, ICD 503 guidelines, process, and procedures, and other IA/Cybersecurity Tools
  • Must comply with DOD 8750.01m Information Assurance Work Force Improvement for Information Assurance Level 1 certifications by obtaining a Security+, GISF, or GSLC certification
11

Information Systems Security Analyst Resume Examples & Samples

  • A Bachelor of Arts/Science degree and 5 years related experience or an Associate of Arts/Science degree and 10 years of related experience is required
  • Must have five or more years of relevant information assurance experience
  • Must be familiar with NIST Certification & Accreditation (C&A) processes, NIST policies and documents, NIST Risk Management Framework, Federal Information Processing Standards (FIPS) and FISMA requirements. The preferred candidate can answer questions on issues pertaining to FISMA requirements and the FAA security processes
  • Must be able to write and edit technical documents with little to no supervision
  • Must have excellent written and verbal communication skills with the ability to communicate with colleagues with varying levels of technical expertise
  • Must have experience using Microsoft Office tool suite (Word, Excel, Access, PowerPoint, Project and Visio) tools
  • Ability and willingness to travel. Travel required is less than 25 percent
  • Experience and familiarity with FAA programs and system security policies
12

Information Systems Security Analyst Resume Examples & Samples

  • Designs, tests, and implements secure operating systems, networks, security monitoring, tuning and management of IT security systems and applications, incident response, digital forensics, loss prevention, and eDiscovery actions. Conducts risk and vulnerability assessment at the network, system and application level
  • Conducts threat modeling exercises
  • Involved in a wide range of security issues including architectures, firewalls, electronic data traffic, and network access
  • Researches, evaluates and recommends new security tools, techniques, and technologies and introduces them to the enterprise in alignment with IT security strategy
13

Information Systems Security Analyst Resume Examples & Samples

  • Designs, tests, and implements secure networks, security monitoring, tuning and management of IT security systems and applications, incident response, digital forensics, loss prevention, and eDiscovery actions. Conducts risk and vulnerability assessment at the network, system and application level
  • Conducts threat modeling exercises. Develops and implements security controls and formulates operational risk mitigations along with assisting in security awareness programs
  • Involved in a wide range of security issues including architectures, firewalls, electronic data traffic, and network access. Researches, evaluates and recommends new security tools, techniques, and technologies and introduces them to the enterprise in alignment with IT security strategy
  • Represents organization as prime technical contact on contracts and projects. Interacts with senior external personnel on significant technical matters
  • Often requiring coordination between organizations
  • Strong analytical and creative problem solving skills for design, creation and testing of complex systems
  • Develops technical solutions to complex problems which require the regular use of ingenuity and creativity
14

Information Systems Security Analyst Resume Examples & Samples

  • Ability to provide 8x5 On Site and 24x7 On Call Support
  • Answers customer questions and resolves issues. Refers other issues/questions to appropriate personnel/service area/manager for follow up, testing and troubleshooting
  • Makes recommendations for preventive measures as necessary
  • BS or equivalent + 2 yrs related experience, or MS + 0 yrs experience
15

Information Systems Security Analyst Resume Examples & Samples

  • · Bachelor's Degree preferred
  • · Familiar with a variety of field's concepts, practices and procedures. Possess strong interpersonal communication, critical thinking and problem solving skills. Must have comprehensive understanding of application implementation, training and support strategies. Understand process analysis and process improvement strategies. Must have strong skills in Microsoft desktop applications. Knowledge of some report writer software preferred
  • · CISSP, CISA, CISM, or GIAC or other relevant security certifications are desirable but not mandatory
16

Information Systems Security Analyst Senior Resume Examples & Samples

  • Assesses assigned system to determine system security status. Designs and recommends security policies and procedures to implement; ensures compliance to policies and procedures
  • Designs audits of computer systems to ensure they are operating securely and that data is protected from both internal and external attack
  • Experience working with internet, web, application and network security techniques and working with relevant operating system security (Windows, Solaris, Linux, etc.)
  • Operates, maintains, and manages Host Based Security Systems (HBSS) suite of services
  • Provides technical consultation on highly complex tasks; may assist and/or provide limited direction to lower level technical personnel
  • Knowledge and experience working with Host Based Security System HBSS
  • Interpersonal and communications skills to interact with customers and team members
  • Experience supporting US DoD or US Navy customers and organizations
  • DoD 8570 IAT Level II Baseline Certification
  • MCP-WIN 7\WINDOWS 2008 OR HIGHER Certification\Training
17

Senior Information Systems Security Analyst Resume Examples & Samples

  • A minimum of 8 years of relevant experience
  • Proven history of managing project plans, requirements, and managing compliance
  • Required Travel 10%
  • Must be able to obtain a ITILv3 within 6 months of start
  • Must be able to obtain a security certification within 12 months of start
18

Information Systems Security Analyst Resume Examples & Samples

  • Knowledge of supporting Information Assurance activities as a Systems Administrator
  • Familiarity with Risk Management Framework and Certification & Accreditation processes
  • Knowledge of configuring security settings on Windows computers
  • Experience with Windows products and a knowledge of UNIX operating systems
  • Ability to obtain a DoD 8570.01 compliant security certification such as CISSP or Security+ within 6 months of hire
  • Position requires candidate to obtain a TOP SECRET level security clearance and be able to maintain access eligibility for Special Access Programs. Must have at least an interim secret security clearance
  • Bachelor’s degree from an accredited college in Information Technology, Information Assurance, Cyber Security or related disciplines
  • Strong problem-solving and analytical skills and an understanding of modern computer systems
  • Previous experience configuring computer systems in a domain or standalone environment
  • Knowledge of Windows security features, patch management, and audit log analysis
  • Ability to perform technical certifications for Windows and UNIX operating systems
  • Excellent organizational and communication skills
19

Information Systems Security Analyst Resume Examples & Samples

  • Performs computer and/or network security vulnerability assessments to identify, evaluate and mitigate security risks, threats and vulnerabilities
  • Designs, implements, integrates, configures and tests computer and network security solutions to manage the network/system’s firewalls and intrusion detection systems
  • Bachelor’s Degree or 4+ years relevant experience
  • Ability to obtain EOD clearance
20

Information Systems Security Analyst Resume Examples & Samples

  • Implementation, integration, and monitoring of security systems
  • Monitor and respond to risk alerts generated by security systems in accordance with the company incident response plan
  • Analyze new threat vectors and make recommendations for improved security countermeasures
  • Assist in developing policies, procedures, or processes that add to the overall effectiveness of the information security program
  • Monitor security systems and reports to maintain compliance with multiple regulations such as PCI-DSS, HIPAA, and DHS CFATS
  • Create reports that can be used to identify trends and establish metrics
  • Facilitate issue identification and resolution through the appropriate business units
  • Provide direction to infrastructure teams, end-user support, application teams, and business units on best security practices
  • Analyze vulnerability reports to create and implement remediation action plans
  • Bachelor’s degree in management Information Systems, Computer Science, and/or Business, or equivalent work experience
  • 3-5 years experience with enterprise class and open source security tools such as Tenable Security Center, Tripwire, Symantec Endpoint Protection, Nmap, and OWASP ZAP
  • 5-7 years experience in IT systems administration with a firm understanding of how systems interact with each other
  • Holds at least one vendor neutral security certification
  • Experience with complex implementations that include packaged software and custom development
  • Excellent analytical and problem solving skills related to networking, operating systems, and malware analysis
  • Experience communicating and reporting to all levels of management up to and including C suite executives
  • High degree of proficiency with the Microsoft Office Suite and Microsoft Visio is required
  • Demonstrated ability to analyze issues and provide effective problem solving
  • Willingness and ability to travel as required
  • Spends 70% of the time sitting, and 30% of the time either standing or walking while in the office
  • Occasionally stoops, kneels, crouches, climbs, balances, crawls, and reaches
  • Oral and auditory capacity enabling interpersonal communication as well as communication through automated devices such as the telephone
  • Visual capacity enabling frequent use of computer equipment
  • Frequent use of eye, hand, and finger coordination enabling the use of automated office machinery
  • Must be able to work in a smoke-free and drug-free workplace
  • The noise level in the work environment is usually moderate and the work environment is an office or home office setting
21

Information Systems Security Analyst Resume Examples & Samples

  • Teams and cross-trains with other security analyst members and security personnel on the account and in corporate
  • Manages vulnerability analysis tools such as IBM AppScan and McAfee Vulnerability Manager (MVM) to be performed on occasional weekends for production environments
  • Initiates customer service tickets and assigns to appropriate personnel for remediation based on scan results
  • Assists with development and implementation of security policy, standards, guidelines, and procedures to ensure ongoing maintenance of security
  • Assists with the provisioning ID’s and roles to the user
  • Assists with the investigation of security incidents as required
  • Assists with log reviews and other detective controls
  • Assists with access control for authentication and authorization and the quarterly ID review process
  • Conducts risk assessments and risk analyses to help the organization develop security standards and procedures that support strategic, tactical and operational objectives on a cost-effective basis
  • Assists with the Information Security Incident Reporting program for containment and correction of security incidents
  • Participates in resolving problems with security violations
  • Assists with the development and delivery of information security and privacy training
  • Validates that IS systems meet predetermined security requirements based on established and approved standards
  • Works with vendors and user departments to enhance information security
  • BA or BS in Computer Science, Information Management, or related field
  • Core understanding of risk analysis from a security perspective
  • At least one security certification such as Security+, CEH, CISM, and SSCP is required
  • At least 2 years of progressive experience in computing and security, including experience with Internet technology and security issues
  • Past experience with help desk and troubleshooting functionality is preferred
  • Experience with using vulnerability analysis tools such as IBM AppScan, McAfee Vulnerability Manager (MVM aka Foundstone) is desired. Prod is scanned on some weekends taking approx. 2 of time depending on the number of the scans
  • Ability to work and effectively prioritize in a highly dynamic work environment
  • Experience with log reviews, assisting in audits, risk analysis, as well as contract and vendor negotiation experience is desired
  • Knowledge of security hardware and software products that comply with current industry standards
  • Knowledge and understanding of technology-related state and federal regulations, in particular HIPAA/HITECH
  • Good understanding of ISO 27001/2 and NIST 800-53
22

Information Systems Security Analyst Resume Examples & Samples

  • Possess CISA or CISSP industry certification
  • Actively pursuing CISA or CISSP industry certification
  • Possess related IT Security industry certification
  • Five years of related experience in information systems / security technologies and systems
  • Demonstrated understanding of information security related regualtions (e.g. HIPAA/HITECH I.S. Security and Privacy regulations, and the I.S. Security aspects of other regulations including: PCI DSS, SOX (MAR FRC), FRCP, JCAHO and JCAHO Alert 42, GLBA, State Breach, FERPA, and FCRA, etc
  • Demonstrated understanding of I.S. security vulnerability assessment tools and techniques
  • Demonstrated strong analysis and attention to detail, problem resolution, judgment, and decision-making skills
  • Demonstrated ability to effectively prioritize and execute tasks in a high-pressure environment
  • Demonstrated effective leadership and communication skills
  • Demonstrated presentation skills and the ability to work well with others
  • Results oriented, self motivated, and self directed professional
  • Demonstrated strong customer service orientation
23

Information Systems Security Analyst Resume Examples & Samples

  • Advising in the creation of IT security policy and the implementation of that policy across large, autonomous IT environments
  • Identifying and implementing improvements to the enterprise security architecture, including
  • Solid understanding of Federal security regulations, policies, guidelines and procedures (NIST, OMB, FedRAMP)
  • Understanding of US Government’s Continuous Diagnostics and Monitoring initiative, requirements, and tools
  • Experience working with domain structures, user authentication, user profiles and digital signatures
  • Experience working with security system strategies and tactics
  • Certified information security systems professional (CISSP) certification (Preferred)
24

Information Systems Security Analyst Resume Examples & Samples

  • Implement and manage the company’s information systems security program, consistent with policies that support business objectives and requirements
  • Ensure system compliance to security policies, standards, and practices. Recommend and direct the implementation of solutions for non-compliant systems
  • Maintain and administer the company’s vulnerability management program to identify security risks and recommend corrective actions by the responsible system managers
  • Work with business and project managers as new projects and processes with IT reliance are designed. Identify, record, and assist in recommendation of remediation to align compliance and risk
  • Facilitate, and promote activities to create information systems security awareness within the company
  • Complete risk assessments to identify the company’s critical computing and data assets, and ensure they are protected
  • Stay current with the latest cyber security threat landscape, IT Risk and compliance tools and technology and advise the IT management team of applicability to the company’s systems
  • Monitor third-party service providers for compliance with information security policies and procedures
  • Assist reviews and assessments with the internal and external auditors. Track open IT audit findings or compliance deficiencies to ensure prompt resolution and risk mitigation
  • Manage the company’s information security compliance initiatives, including but not limited to PCI-DSS, HIPAA, and DHS CFATS
  • Minimum of three years in an information systems senior security analyst role for a large, publicly traded organization; minimum of seven years in information systems technical roles, such as IT system administration or Network Ops
  • 3-5 years’ experience with enterprise class and open source security tools such as Tenable Security Center, Tripwire, Symantec Endpoint Protection, Nmap, and OWASP ZAP
  • Extensive knowledge of and experience in information systems security
  • Experience with risk analysis and the implementation of vulnerability management programs and related tools and systems
  • Experience with developing and providing an information security awareness and training program
  • Technical experience in network administration, system administration, application development, database administration, and/or data center operations
  • Knowledge of information security and compliance related issues involving PCI-DSS, Sarbanes-Oxley, data privacy, and similar policies and laws
  • Certified Information Systems Security Professional (CISSP) certification is a plus
  • Bachelor’s degree in Computer Science, Information Assurance, Management Information Systems or other relevant area
25

Information Systems Security Analyst Senior Resume Examples & Samples

  • Review and develop a plan for remediation of Independent Verifications and Validations (IV&V) Reports
  • Perform reviews of existing and future technologies and standards, and advise the Senior Management of the implications that such technologies and standard may have on Customer IT security. Drafting multiple slides for multiple customer reviews
  • Track various O&M activities and projects to ensure a timely delivered result, and improve efficiency
  • Serve as a liaison between multiple internal and customer divisions
  • Formulate operational procedures for inter-divisional communications
  • Collaborate with Change, Problem, and Release Management for security impacts to the environment
  • Review new security solutions designs and specifications to validate they are ready for existing security operations environment
  • Conduct technical policy and contract reviews as requested and advise the Senior Management accordingly
  • Provide an accounting of hardware and support life-cycle to both Senior Management and the Customer of the existing IT infrastructure. This includes the following list of technologies
  • DoD SECRET Clearance
  • 5+ years of experience in network, host, data and/or application security in multiple operating system environments
  • Experience with security tools and architecture to include advising on security related changes to them
  • Understanding of, and experience applying industry security policies, regulations and guidelines such as NIST, FISMA, SANs top 20 controls, etc
  • Knowledge of key security capabilities such as e-forensics, logging/SIEM, risk management, PKI, vulnerability management, C&A, continuous monitoring, disaster recovery, network and endpoint security
  • Good communication and presentation skills at all organization levels
  • Strong analytical and problem solving skills to troubleshoot and resolve network/operating system security issues
26

Senior Cyber Information Systems Security Analyst Resume Examples & Samples

  • Education: BA/BS in Information Systems Management, Computer Science or related discipline. In lieu of formal education, at least 13 years of related experience. Applicable Discipline Certification in accordance with the DoD Information Assurance Workforce Improvement Program (DoD 8570.01-M). (DoD 8570.01-M) IAT-II (CISSP) certification is strongly desired. Experience with certification and accreditation activities on both US Navy operational and R&D systems and networks
  • Experience: Ten (10) years’ experience, to include applicable security discipline principles, practices, and procedures
  • Progressive Experience: Prefer at least six (6) years’ experience maintaining computers, software, and networks
  • Looking for a candidate with RMF, eMASS, and Navy Accreditation process experience
  • Must have an active Secret clearance and be able to upgrade to a TS/SCI level if required
27

Information Systems Security Analyst Senior Resume Examples & Samples

  • Provide an accounting of hardware and support life-cycle to both Senior Management and the Customer of the existing IT infrastructure. This includes the following list of technologies: o Devices: Firewalls, NIDS, Proxy o Applications: Antivirus, Content Filtering, HIDS, Logging
  • Review all RFCs, MDR voting member, provide MDR report to IAD, and attend SCCB meetings Oversee the of Review design, installation, management and implementation of requested changes to the following components of the IT security infrastructure in accordance with Customer policy, DHS Enterprise Architecture guideline, and other Federal guidelines such as NIST
  • 5+ years of experience in network, host, data and/or application security in multiple operating system environments Experience with security tools and architecture to include advising on security related changes to them