Lead Security Analyst Resume Samples

4.5 (80 votes) for Lead Security Analyst Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the lead security analyst job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
RS
R Schultz
Reggie
Schultz
41288 Carley Coves
San Francisco
CA
+1 (555) 144 8743
41288 Carley Coves
San Francisco
CA
Phone
p +1 (555) 144 8743
Experience Experience
Philadelphia, PA
Lead Security Analyst
Philadelphia, PA
Stracke, Kessler and Dibbert
Philadelphia, PA
Lead Security Analyst
  • Works with management to develop information security policies, standards, procedures and guidelines across multiple platform and application environments
  • Coordinate, plan, and execute change management procedures
  • Manage and operate all security solutions and technology used in cyber security to provide protection and regulatory compliance
  • Assists with development of meaningful security metrics
  • Analyze the cross-functional process and propose improvements. Collaborate with vendors and cross-functional teams effectively
  • Perform advanced security event detection and threat analysis for complex and/or escalated security events
  • Implement Privilege Identity Management solutions
New York, NY
Security Analyst Lead
New York, NY
Jacobson-Ernser
New York, NY
Security Analyst Lead
  • Responding to alerts and investigating potential security incidents
  • Performing analysis on logs and technical security equipment rules to provide recommendations to engineers
  • Performing analysis on logs to help detect alerting gaps
  • Ensure that investigations and compliance tasks are properly evidenced in ticketing system
  • Lead the security analysts in developing or augmenting processes, procedures for log and alert review
  • Provide mentoring for Security Analysts
  • Daily review of logs and alerts from technical security equipment, including IDS/IPS devices, Data Loss Prevention equipment, web content filtering equipment, SEIM
present
San Francisco, CA
Operations Security Analyst Lead
San Francisco, CA
Conroy-Bauch
present
San Francisco, CA
Operations Security Analyst Lead
present
  • Troubleshooting missing log sources or sourcetypes
  • Fluent with Splunk searches; can set up searches with regular expression, alerts and reports
  • Regular expression knowledge
  • Broad knowledge of logs gathered from server systems, OS, anti-virus, software applications, network elements (firewalls, load balancers, routers and switches), cloud and web
  • General knowledge of attacks and exploits
  • Python scripting knowledge
  • Web application structure/architecture knowledge
Education Education
Bachelor’s Degree in Technology
Bachelor’s Degree in Technology
University of Florida
Bachelor’s Degree in Technology
Skills Skills
  • Develop approaches to address the implementation of Identity and Access Management (IdAM) solutions as part of enterprise security services including mobile devices
  • Experience with security event response from key security products and services (network traffic analysis, PC forensics, kill chain, windows event analysis, etc...)
  • Experience with Network security tools such as NAC, Antivirus, File Integrity Management, Intrusion Presentation, Network Firewalls, Application Firewalls, Web Proxy, WAF, Logging & Monitoring, and DLP
  • Analyze sensitive authentication activities and privilege combinations that could lead to abuse; monitor privileged access activity for possible abuse; monitor suspicious and/or inappropriate web activity; assess data leakage vulnerabilities; and establish baseline usage information and trends
  • Good ability to perform data analytics
  • Expert knowledge of configuration and operation of security solutions, including Firewalls, IDS, Internet Filters, DLP, Vulnerability Scanners, Anti-Malware Solutions etc
  • Good knowledge of malware investigation/reverse engineering
  • Strong knowledge of computer forensic tools
  • Strong ability to play a leading role in the development, set up and documentation of SOC processes and procedures as well as on-boarding devices and data sources, and SIEM configuration
  • Able to identify gaps in processes and strong problem solving skills
Create a Resume in Minutes

15 Lead Security Analyst resume templates

1

Security Analyst, Tech Lead Resume Examples & Samples

  • Reports to the Director of IT
  • Oversees the 3rd Level Support Staff
  • Perform reviews and mentor as needed to the group
  • Track time in Workday and Clarity
  • Act as escalation point for all Network related issues
  • Communicates with Management as needed as it relates to Network issues
  • Creates and maintains the afterhours support schedule
  • Oversees network projects and reports progress to management
  • Provides input for the IT budget as it relates to network needs
  • INTL Foundations Certification
  • MCSE, CCNA
  • 5 to 10 years of related work experience in large enterprise environments
  • Experience with leading a technical staff in a fast moving enterprise environment
  • In-depth knowledge of networking technologies (i.e. routers, switches, load balancers, firewalls, network and routing protocols)
  • Proven hands on experience designing and maintaining enterprise networks
  • Experience with Microsoft Active Directory networks
  • Good understanding of ITIL/Service Management processes
2

Lead Security Analyst Resume Examples & Samples

  • Develop approaches to address the implementation of Identity and Access Management (IdAM) solutions as part of enterprise security services including mobile devices
  • Implement Privilege Identity Management solutions
  • Work with Attribute-Based Access Control (ABAC) solution
  • Consult developers on security requirements and utilize common components to meet them
  • Maintain documentation of design patterns/recipes for common security requirements
  • Ensure that issues identified are appropriately prioritized and addressed in future product releases
  • Architect, design, implement, support, and evaluate security focused tools
  • BS degree or higher in Computer Engineering or in a STEM major (Science, Technology, Engineering, or Math)
  • Minimum of 3 years IT experience, preferably within Identity Management
  • A general understanding of supporting technologies including SOAP, OAuth, SAML, OpenID Connect, HTTP, XML, LDAP, SQL, and XACML
  • Experience with IAM solutions like Cyber-Ark, Ping Identity, Siteminder, Attribute Exchange Network
  • Contribute to and lead discussions and communications within the team and outside, including customers and other business units
  • Demonstrated experience in IT Security, system administration, LDAP, and scripting
  • Experience in large service provider environments
  • Scripting skills (e.g., Perl, shell scripting)
  • Experience with web-based applications and/or web services-based applications, especially at large scale
3

Lead Security Analyst Resume Examples & Samples

  • Bachelor’s Degree in Computer Science or other technical field
  • Preferred Certifications: ITIL, CISSP, GSEC, CEH, CCSP, JNCIS-FWV, GCIA, GCIH, Security +
  • Preferred Technologies: Remedy, WireShark, ArcSight, Juniper, Cisco, Bluecoat, SourceFire, FireEye, McAfee
4

Lead Security Analyst Resume Examples & Samples

  • BS in Computer Science or related field preferred with 10 + years networking and security experience preferred
  • Extensive knowledge of network captures and analysis tools, IPSec including site-to-site and client-to-site implementations, network intrusion detection and prevention skills, network level troubleshooting via device and sniffer logs
  • Hands-on experience in network troubleshooting – ability to read and interpret low level diagnostic output at lower levels and quickly translate to high level implementation and engineering goals
  • Experience with large (5,000+ node multiple site) multi-site networks and complex IP routing infrastructures and routing protocols, and VPN interoperability
  • Ability to work independently and also lead technical systems and projects
  • Willingness to develop and to follow change control procedures
  • Willingness to perform operational duties related to infrastructure and availability for on-call security incident response
  • Ability to communicate progress, issues, and plans in writing and orally
  • Expert working knowledge of firewalls, switches, routers, VPN devices, SIEM, anti-malware, endpoint security, security devices, and technologies
  • Multi-platform security experience, Microsoft, Linux, UNIX, and Mac systems concepts and networking-related IT operations requirements and systems
  • Experience with design and operations of security on large networks, including multiple datacenters
  • Working knowledge of application development lifecycle and tool sets
  • Experience acting as a consultant with application teams
  • Previous work in an FDA-regulated environment
  • Understanding of mobile devices and including application security
  • Familiarity with relevant compliance standards such as Mass Data Privacy Law, FISMA
  • Experience with Network Security Operations and Processes
  • CISSP, CISM, CISA, CEH, CEPT, GIAC or similar relevant information security certifications preferred
5

Lead Security Active Directory Analyst Resume Examples & Samples

  • Assessing and introducing new technology to keep pace with the dynamic threat landscape
  • Design and maintenance of secure Active Directory enviornment
  • Lead projects and proof of concepts for security improvements
  • Serve as a Subject Matter Expert for Active Directory to other functions within Global Information Systems as projects require
  • Participate in troubleshooting and problem solving as situations arise
  • Manage vendor relationships to ensure adherence to standards and proper environment support
  • Maintaining and developing documentation for Whirlpool’s Active Directory environment
6

Lead Security Analyst Resume Examples & Samples

  • CISSP, GIAC, or other security credentials are preferred
  • Experience with reverse engineering of malware is a plus
  • Scripting experience is a plus
7

Operations Security Analyst Lead Resume Examples & Samples

  • Set up Splunk searches, alerts, reports and dashboards on security events from server systems, OS, anti-virus, software applications, network elements (firewalls, load balancers, routers and switches), cloud and web
  • Troubleshooting missing log sources or sourcetypes
  • General understanding of security concepts, principles and practices related to server systems, OS, software applications, network, cloud and web
  • To read Java code and SQL code
  • Knowledge of application servers (Tomcat) and DB servers (Oracle)
  • Python scripting knowledge
8

Lead Security Analyst Resume Examples & Samples

  • Assist with digital forensics and incident response investigations, acting as a technical lead
  • Investigate, analyze and contain malware incidents
  • Lead the resolution of security issues through working with resolver groups
  • Evaluate and recommend new security practices and solutions
  • Ensure SIEM and underlying security architecture and solutions correctly configured and maintained to provide necessary input feeds into the SOC
  • Develop, maintain and implement SOC processes and procedures including use cases, indicators of compromise, run books etc
  • Act as an escalation point for Level 2 analysts and provide coaching and mentoring
  • Conduct proactive penetration testing and vulnerability assessments identifying vulnerabilities and recommended remedial action to be taken by resolver groups
  • Act as a security expert to provide advice to resolver groups
  • Analyze information from threat intelligence sources and recommend and implement requisite actions in line with this information
  • 8+ years experience in an IT environment, with at least 5 years in a SOC or incident response capacity
  • Expert knowledge of configuration and operation of SIEM Solutions preferably McAfee Enterprise Security Manager (formerly Nitro)
  • Expert knowledge of configuration and operation of security solutions, including Firewalls, IDS, Internet Filters, DLP, Vulnerability Scanners, Anti-Malware Solutions etc
  • Excellent understanding of Operating System, and Application logs from a variety of platforms
  • Strong ability to play a leading role in the development, set up and documentation of SOC processes and procedures as well as on-boarding devices and data sources, and SIEM configuration
  • Strong knowledge of computer forensic tools
  • Strong communication skills, especially in taking technical security information and communicating it to a non-security audience
  • Good knowledge of malware investigation/reverse engineering
  • Good knowledge of Windows and Unix/Linux operating systems, and TCP/IP networking
  • Good ability to perform data analytics
  • Professional security designation such as
9

Lead Security Analyst Resume Examples & Samples

  • Utilize endpoint products to identify malicious activity on the network
  • Review daily and weekly reports generated by Level 1 & 2 security analysts for actionable tasks for the Monitoring team
  • Perform Cyber Security Audits and Penetration Tests as well as mitigation of Cyber Security Vulnerabilities
  • Develop and maintain a working relationship with 3rd Party service providers responsible for providing technology consulting. Work with business unit executives and service providers to introduce required Cyber Security functionalities into the environment
  • Perform Cyber Investigations and maintain forensic evidence as needed
  • Provide guidance and training to internal staff including project managers, other Xcel Energy technical areas as well as customers and trade allies on cyber security issues and requirements
  • 8+ years of experience working in Security or a related discipline
  • Demonstrated ability to effectively communicate information and recommendations to management
  • Must possess a broad knowledge relating to I/T infrastructures and have in-depth and up-to-date experience with multiple operating systems and desk side integration
10

Security Analyst Lead Resume Examples & Samples

  • Daily review of logs and alerts from technical security equipment, including IDS/IPS devices, Data Loss Prevention equipment, web content filtering equipment, SEIM
  • Lead the security analysts in developing or augmenting processes, procedures for log and alert review
  • Ensure that daily compliance tasks are completed in a timely fashion and tracked in the appropriate ticketing system
  • Develop or augment prioritization process to support investigation and compliance tasks
  • Performing analysis on logs and technical security equipment rules to provide recommendations to engineers
  • Develop or augment analysis method, mechanics or cadence
  • Develop relationships with security and operational Concur teams
  • Managing time to appropriately balance rule review, operational incidents and log analysis
  • Provide mentoring for Security Analysts
  • Escalating issues about process or technology where a need is identified
  • 7 to 10 years security experience performing log analysis, endpoint protection, threat intelligence analysis
  • 7 to 10 years’ experience using technical security equipment
  • 7 to 10 years’ experience with writing reports, documentation or other written communication experience
  • Technical security certifications, such as the CISSP, OSCP or similar
  • 7 to 10 years’ experience with firewalls, IDS and IPS systems, both commercial and open-source
  • 5 to 10 years’ experience with a scripting language
  • An understanding of network design principles and common enterprise technologies
11

Senior / Lead Security Policy & Data Analyst Resume Examples & Samples

  • Research, develop, and brief policy and governance recommendations
  • Research and analyze relevant data in response to queries
  • Consult with the customer and update and/or develop new capabilities as necessary
  • Extract and analyze data from the system to answer specific questions
  • Operate, maintain, and update a small computer system
  • Experience in research and data analytics
  • Analyst skills to extract and organize raw data, as well as basic statistical and graphical analysis techniques
  • Programming skills in Visual Basic For Applications (VBA) or other languages used in Windows environment
  • A TS/SCI or better is required for the execution of this role
  • Experience with VBA in the Microsoft Office environment
  • Experience with organizing data and performing basic analysis
  • Experience with the Intelligence Community IT infrastructure
12

Lead Security Analyst Resume Examples & Samples

  • Security incident handling involves investigating issues to determine if there is a real security incident or a false positive, notifying customers as needed, and sending customers standardized emails specifying the steps they need to take to fix the problems. You may be the first to see an issue or the issue may have been escalated from another team/management
  • Device and health monitoring involves troubleshooting network connectivity problems concerning managed security devices, often time working with Advanced Support Team engineers and/or vendors/partner technology teams on device replacement/reconfiguration
  • Prepare Shift turnover and Shift Report to ensure continuous smooth continuous workflows between shifts
  • Support Customer Audits
  • Update and Maintain process documents as needed
  • Work with the customer supporting STIG, POAM, ATO and CTO Certification and remediation plans. Assess network changes for vulnerabilities. Address Incidents/Scenarios dealing with PII, information spills, and stolen assets. Address insider threat, malware, policy violations following customer Policy
  • Special projects from management
  • 3+ years of experience as a security analyst with health and alert monitoring, payload/packet analysis, and experience with the following (or similar) tools: ArcSight, Splunk, Sourcefire, BlueCoat, FireEye, Cisco ASA, JunOS, Fortinet, Tripwire
  • The ability to obtain a government issued security clearance; an active clearance is highly desirable
  • Experience dealing with customer service requests and experience operating under service level agreements
  • Bachelor’s Degree in computer science, network security, or other technical field
  • CompTia Security+ CE Certification or CCNA Security Certification
  • Bachelor’s Degree in Computer Science, Network Security, or similar technical field
  • Active technical certifications in the Security field
13

Lead Security Analyst Resume Examples & Samples

  • Provide guidance, identification, evaluation, design, development, implementation and integration of security controls and processes that will provide protection of information and systems while meeting regulatory and contractual compliance requirements
  • Perform regular testing of security controls as required by regulatory and contractual compliance
  • Perform and participate in regulatory, contractual and internal audits as required
  • Maintain policies, standards and procedures that drive compliance with regulatory and contractual requirements
  • Perform Cyber Forensic Investigations as required
  • Work closely with other business and technical teams and service providers to assure new functionalities are secure and meet regulatory and contractual requirements
  • Provide compliance training and the creation and maintenance of compliance training materials
  • Provide governance oversight of security controls effectiveness that are owned and operated by other business or technical areas
14

Lead Security Analyst Resume Examples & Samples

  • Develop strategy and direct execution of data security analytics program
  • Lead and mentor a team of security analysts through applying tools, technique and processes
  • Translate strategy into valued actionable tasks and activities for the team
  • Analyze sensitive authentication activities and privilege combinations that could lead to abuse; monitor privileged access activity for possible abuse; monitor suspicious and/or inappropriate web activity; assess data leakage vulnerabilities; and establish baseline usage information and trends
  • Perform historical analysis of defined security devices and logs to look for threat trends (past 7 days, past 30 days, past 90 days)
  • Evaluate the quality of provided data sources and recommend improvements to the sensing capabilities and coverage
  • Perform triage activities on potential threats discovered during historical analysis
  • Implement and maintain novel analytic methods and techniques for incident detection
  • Appropriately apply proprietary and public threat intelligence to enhance the analytic model(s) and security of the enterprise
  • 3+ years of experience leading an information security team
15

Lead Security Analyst Resume Examples & Samples

  • Monitor all network and end-points within ROSS environment and provide incident response support. Track, document and update the incidents in a timely manner and not exceeding the SLA’s
  • Analyze the cross-functional process and propose improvements. Collaborate with vendors and cross-functional teams effectively
  • Continuously tune the log aggregation and correlation system to reduce the false positives and improve effectiveness in detecting incidents. Experience with SEIM or MSS is necessary
  • Discuss findings with respective teams and getting alignment on improvement is a must
  • Collect and design metrics related to security operations and incident response. Meetings with respective teams to get alignment on the changes
  • Experience with Network security tools such as NAC, Antivirus, File Integrity Management, Intrusion Presentation, Network Firewalls, Application Firewalls, Web Proxy, WAF, Logging & Monitoring, and DLP
  • Experience with Malware detection tools (i.e. FireEye NX, EX, HX etc.), Anti-Virus and host anomaly detection tools for investigation and remediation
  • Experience with security event response from key security products and services (network traffic analysis, PC forensics, kill chain, windows event analysis, etc...)
  • 3 years of experience with Information/Network security/Security Operations. Total of 5+ years IT experience is needed
  • Experienced incident management, evidence handling and communication protocols
  • Effectively identify, communicate, and remediate risks to the environment
  • Able to work independently and creatively solve complex technical problems
16

Security Analyst, Lead Resume Examples & Samples

  • 5+ years' experience in information technology
  • Recent direct experience working within an information security function
  • Direct experience managing one or more of the following: Identity and Access Management; Single Sign-on, SSL & PKI, LDAP, Active Directory, and PowerShell. Experience with ForgeRock OpenIDM/OpenAM, Oracle security products, or F5, or firewalls, and experience with AWS infrastructure and services a plus
  • Bachelor's Degree strongly preferred. Master's level degree a plus
  • Experience working in an organization that provided exposure across multiple IT functional areas (i.e., infrastructure, networking, security, data management, and application development)
17

Lead Security Analyst Attack Analysis Resume Examples & Samples

  • Correlate log data from multiple sources and develop "detect" to identify adversary behavior
  • Assist in the creation of processes/procedures, technical documentation, as well as completion of projects
  • Extensive experience working in a security role performing Security Analysis, Incident Response, Attack Analysis, or Computer Network Defense (CND) capacity in a in a large, mission-critical environment
  • In-depth knowledge of SIEM products and the ability to develop advanced correlation rules
  • Solid understanding network protocols and experience conducting packet analysis using appropriate tools (e.g. tcpdump, wireshark, tshark)
  • Comprehensive understanding of regular expressions
  • Previous experience working in an incident response position
  • Familiarity with multiple operating systems (e.g., Windows, Unix, Mac)
18

Lead Security Analyst Resume Examples & Samples

  • Leads IT projects, including planning, obtaining customer input and projecting resource requirements
  • Reviews system requirements with customers and translates requirements into specific functions or deliverables
  • Analyzes flow chart processes and recommends ways to reduce steps and increase efficiency through use of technology
  • Plans, schedules and manages multiple projects requiring computer resources including project scheduling
  • Education and Information Technology experience as listed above OR at least nine (9) years of recent applicable experience implementing Information Systems
  • Experience with implementing and supporting a major information system in a systems analyst role
  • Technical team lead experience with a background in IT security
  • IT security, compliance, risk, and/or governance experience preferred
19

Lead Security Analyst Resume Examples & Samples

  • Conduct active real-time security monitoring
  • Perform advanced security event detection and threat analysis for complex and/or escalated security events
  • Coordinate with SIEM Architects and/or Shift Lead for high priority incidents
20

Team Lead, Security Analyst Resume Examples & Samples

  • This position requires strong analytical skills, which will allow them to both implement solutions and advise how best to respond to abnormal network/system behavior
  • Ability to clearly articulate technical or procedural risk to other business leaders and staff throughout the organization
  • Planning and implementing security measures to protect enterprise information systems
  • The position will interface across the department and organization as well as with Senior Executives. Strong communication skills both written and verbal are required
  • In order to protect our Information Systems from intrusions, a successful candidate must have an understanding of offensive security techniques
  • Participate with and conduct risk assessments on Fidelis information systems & external third-parties
  • Participate with project teams to ensure Information Technology best practices are being followed and recommend risk mitigating techniques
  • Become an integral part of the incident response team & the vulnerability management program
  • Help to define information security standards, review existing controls, and identify weaknesses
  • Identify opportunities that can improve the efficiency of information security processes across environment
  • 7+ years of direct Information Security experience or course work required in at least one or multiple of the following areas, network security, system security, application security, or offensive security
  • BA/BS - Bachelor’s Degree or equivalent, required
  • Any of the following certifications are a plus: CISSP – Certified Information Systems Security Professional. CEH – Certified Ethical Hacker, CompTIA Security +
  • Knowledge of common security assessment frameworks such as NIST, HITRUST, COBIT etc
  • Subject matter expert level experience with Information Security technologies such as but not limited to SIEM, IPS/IDS, Vulnerability Management Software, User Behavior Monitoring, Password Management Solutions, Unstructured Data Monitoring tools or Internet Content Filters
  • Experience in a health care environment, is a plus
  • Experience in a diverse and fast paced environment.This position will require strong time management, interpersonal skills, attention to detail and an ability to manage multiple priorities
21

Lead Security Analyst, Incident Response Resume Examples & Samples

  • Act as a subject matter expert for security incident investigations, coordinating the activities of operational groups to assist as required
  • Function as a liaison between the company’s Information Security function, IT and other operational groups responsible for assisting in security incident handling (including remediation)
  • Provide communication updates to incident stakeholders and interested parties as required
  • Perform triage and initial situation assessments to understand the nature and scope of incidents, and to recommend a specific course of action as a result
  • Identify, collect and preserve digital evidence to support incident investigation
  • Perform basic malware analysis where required (full reverse engineering ability is not required)
  • Conduct a ‘root cause’ analysis where feasible and make recommendations on future prevention of same/similar classes of incident
  • Contribute to the continuous improvement of security processes, tools and techniques to counter threats faced by SITA and our customers
  • 5+ years experience in an IT environment
  • At least 1 year in a security incident response related role
  • Degree in a technical discipline (e.g. Information Security, Computer Science, Engineering, Mathematics, etc.) or sufficient work experience to demonstrate proficiency at this level
  • Required: At least one professional security designation such as CISSP, CISA, GIAC, etc
  • Strong understanding of the incident handling lifecycle, key activities and responsibilities at each stage
  • Strong understanding of triage and analysis techniques such as memory analysis, timeline establishment, artifact analysis, etc
  • Strong knowledge of Windows systems including events/event logs, common malware artifacts (registry, files, etc.)
  • Good knowledge of common containment strategies for ongoing incidents
  • Good communication skills, especially in taking complex technical information and presenting it to a non-technical audience
  • Good understanding of evidence collection techniques, including forensic disk imaging and memory imaging
  • Good interpersonal skills, including the ability to influence and work with teams with different reporting lines
  • Ability to remain calm and methodical under pressure