Security Analyst Resume Samples

4.6 (53 votes) for Security Analyst Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the security analyst job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume by selecting wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
OW
O Wiza
Ova
Wiza
20935 Maye Locks
Houston
TX
+1 (555) 580 4065
20935 Maye Locks
Houston
TX
Phone
p +1 (555) 580 4065
Experience Experience
09/2016 present
Philadelphia, PA
Security Analyst
Philadelphia, PA
Security Analyst
09/2016 present
Philadelphia, PA
Security Analyst
09/2016 present
  • Tuning – regularly performing tuning and filtering SIEM alerts and monitoring components to ensure only relevant security data is gathered
  • The Security Analyst Team Lead leads the daily shift operations within the Security Operations Centre(s). This involves working with global analysts, engineers, clients, and other security personnel to identify, triage, escalate and manage the response to incidents impacting or threatening the organisations information assets. The SOC is a 24/7 shift-scheduled security operations environment. The Team Lead liaises with local and remote resources in multiple time zones to successfully ensure delivery of service to our clients
  • Assisting senior analysts with
  • Provide support to HP partners on investigative programs, with key functions including but not restricted to data collation and analysis, investigations management, interviewing of witnesses and subjects, and intelligence database and information systems management. The key areas of focus will be the Supply Chain Security Program. Investigative support may also be provided to other security functions, including other areas of Brand Security and IP related investigations
  • Performing portions of technology architecture and infrastructure design activities
  • This is a TIER II SOC type role. This person will be heavily involved with incident response, and resolving issues related to: compromised systems, phishing, data loss, PII, and intrusion analysis
  • Provide the reports regularly to stakeholders
03/2013 03/2016
New York, NY
Security Analyst
New York, NY
Security Analyst
03/2013 03/2016
New York, NY
Security Analyst
03/2013 03/2016
  • Share knowledge with the peers for self and team development
  • Performing security evaluations
  • Project management
  • Problem Management
  • Supporting the company’s sector and enterprise crisis management teams by providing incident tracking and reporting
  • Drafting policies, standards and processes to optimize and ensure secure project data management
  • Developing risk analysis methods for game production environments
Education Education
Bachelor’s Degree in Computer Science
Bachelor’s Degree in Computer Science
Kent State University
Bachelor’s Degree in Computer Science
Skills Skills
  • Experience in working with security guides, procedures, policies, methodologies, frameworks and standards such as ISO/IEC 27001, NIST 800 series, FISMA, DISA IA Policy
  • This is a TIER II SOC type role. This person will be heavily involved with incident response, and resolving issues related to: compromised systems, phishing, data loss, PII, and intrusion analysis
  • Experience with Malware Protection software and IDS/IPS tools (they have cisco AMP and Cisco FireSIGHT in their environment)- The person should be comfortable with security investigation using these tools and remediation
  • 1+ year experience conducting investigations on end-points. The knowledge of knowing where to look when doing an investigation
  • Hands-on experience with SIEM platforms, such as RSA Security Analytics, Splunk, or ArcSight; also Firewalls, Intrusion Detection/Prevention Systems (Snort, Bro, McAfee IPS, Sourcefire), Proxies, WAF (Impreva, F5 ASM), FireEye and/or Pen Testing
  • Capability to effectively muti-task, prioritize work, and handle competing interests
  • Vulnerability assessment
  • Clear and concise written and oral English, including that ability to create technical and procedural documentation
  • Good analytical and logical skills
  • Excellent English language skills
Create a Resume in Minutes
1

Security Analyst Resume Examples & Samples

  • Experience in Proxy technology
  • Experience with SSL decryption
  • Experience in Firewall technology
  • Experience in load balancer technology
  • Strong understanding of security exposures and mitigating designs
  • IT Standards, Methodologies, CMM & audit requirements
  • In depth and current technical knowledge of IP Internetworking and the security exposures and mitigating designs and processes associated with them. Thorough understanding of traditional and next generation firewalls, secure web gateways, network throttling, application delivery controllers / load balancers and how they inter-operate to deliver service to the end user while accessing the internet
  • Communication Skills
  • Presentation Skills
  • Risk Assessment & Quantification methodologies
2

Security Analyst Resume Examples & Samples

  • Common vulnerabilities
  • Common exploits
  • Authentication
  • Authorization
3

Security Analyst Resume Examples & Samples

  • Monitor and investigate IT infrastructure privileged access logs & alert queues
  • Track and report the related security incidents, retain and store the evidences
  • Share knowledge with the peers for self and team development
  • Take responsibility and actively contribute to driving monitoring service to offer the best level of available service to our customer base
  • Act as technical first point of contact internally and externally for technical queries and escalate as appropriate
  • Represent the team at technical and management meetings as required
  • Promote the use of Technical standards, procedures and best practice and maximize the use of toolsets and automation
  • Bachelor Degree with a Science or Engineering would be beneficial
  • 4 to 5 Years’ experience in Infrastructure Support
  • Mandatory to work in rotating shift including night shift
  • Knowledge of operating systems, deep understanding of system generated logs, troubleshooting experience in any one technology such as Middleware, Networks, Mainframe, AS/400, OpenVMS, Tandem, Windows, UNIX, Databases Oracle, BD2, etc. (preferably administration)
  • Knowledge of the access monitoring tools (e.g. Cyber Ark, Power Broker etc.)
  • Confident and able to communicate effectively different levels of technical understanding
  • Understanding of ITIL Foundation
4

Security Analyst Resume Examples & Samples

  • Governance over data leakage management and reporting as well as 3rd party service providers including brand protection services, malware detection and forensics as well as a variety of technologies such as anti virus and Internet content filtering
  • Assist support groups in root cause analysis of production problems including recommending, coordinating and managing necessary fixes, and upgrades
  • The Analyst will serve as liaison between LoBs and ITS departments as well as maintaining necessary documentation in the support of various core services
  • The analyst will ensure resolution of reported incidents of medium and high complexity in accordance with established standards, policies, procedures, and configuration guidelines
  • Escalates security events to management and consult with LoBs on DLP policies
  • Coordinates and participates in any testing and quality checks centered on the resolution of security technology issues
  • 3 – 4 years hands on experience with various DLP solutions
  • In depth knowledge of data leakage prevention applications, anti-virus, internet content filtering and other various platforms
  • Possess excellent communication skills
  • Ability to balance multiple priorities and meet deadlines in a fast-paced and changing environment; must be flexible
  • Ability to understand business impact and prioritize issues/projects
  • Demonstrated ability to work effectively with others, particularly in teams
  • Strong analytical skills, managerial skills and skills interfacing with end-users
  • Assume on-call responsibilities as part of the CSIRT rotation
  • During incidents, the position require work outside or normal business hours including weekends
  • CISSP and other security related accreditations is an asset
5

Security Analyst Resume Examples & Samples

  • Serves as front line support to customers’ inquiries ensuring all service level agreements are met
  • Possesses a university degree/college diploma in Computer Science or equivalent work experience, and/or 1 to 3 years of experience in IT environment
  • Completion of a Security related certification is considered an asset (CISSP, CISA, CISM, GIAC)
  • Demonstrates basic knowledge of the T&O standard operating platforms, system administration, development process, intrusion detection, and Internet architecture
  • Displays some knowledge of programming and/or networking
6

Security Analyst Resume Examples & Samples

  • Serves as front line support to customers’ inquiries, complaints and problems, ensuring that customer needs are met or exceeded by resolving complaints and problems in a timely and effective manner
  • Supports the Department’s Service Level in the fulfillment and governance of access requests through delivery of secured, trusted and professional services
  • Enhances security operational methods and workflows by identifying, recommending and implementing process improvement initiatives
  • Basic organizational understanding an relationships within TD/EI
  • Displays basic knowledge of security processes, requirements and industry standards in relation to one of the following: - Access and authentication controls in relation to add, change, delete of user id’s
  • Illustrates basic knowledge of Access Certification concepts
  • Possesses good written and verbal communication skills
  • Good reporting skills
  • Speaking knowledge of French desireable
  • Is analytical with basic organizational skills
  • Demonstrates a commitment to continuous learning in a dynamic environment
7

Security Analyst Resume Examples & Samples

  • Solid understanding of Layer 3 and the function of firewalls
  • Ability to document technical requirements for small efforts
  • Applies basic and increasing knowledge in system features and technology standards
  • Assists on engagements with engineers to design low to medium risk solutions
  • Ability to work well in a ticketing system
  • May work on small, low risk configurations for specific, assigned tasks
  • Assists in testing and troubleshooting
  • Updates technical specs based on testing, prioritized defects, or post release lessons learned
  • Supports communication for application/system deployment
  • Investigates root cause of production issues
  • Documents technical solutions to identified problems
  • Assists in ensuring application availability for supported technologies
  • Minimum of 1 year of networking and/or security support
  • Proven track record of providing exceptional customer service
  • Ability to work autonomously, when required
  • Ability to build and maintain effective working relationships with employees, management, vendors and regulatory agencies
  • Strong Project Management and organizational skills and demonstrated ability to meet strict deadlines
  • Build expertise quickly in new domains
  • Strong internal customer orientation, ability to empathize and build rapport
  • Detail oriented and ability to focus on granular level compliance and security issues
  • Ability to use critical thinking skills to proactively assess a project or process
  • Effective communication, both orally and in writing
  • Ability to maintain effective working relationships with employees, management, vendors and regulatory agencies
8

Security Analyst Resume Examples & Samples

  • Monitors and executes access requests on corporate systems managed by the team
  • Provides support, planning and co-ordination for the administration, configuration and maintenance of security applications/infrastructures
  • Participates or leads in testing, evaluation, upgrading and implementation of new and existing security applications to combat emerging threats and vulnerabilities
  • Co-ordinates, monitors and reviews the effective testing of new security software and hardware within the department
  • Interfaces directly with peers and management with respect to information security requirements and measures, and the effective implementation of the same
  • Participates in systems development and operational improvement projects to ensure proper security capability is maintained or enhanced
  • Bachelor’s degree in the field of Computer Science or Information Technology, and/or 5+ years’ equivalent work experience
  • Strong analytical and problem solving skills and ability to work independently and effectively under pressure
  • Sound knowledge of information security requirements and industry standards in relation to user provisioning and access management
  • Some exposure to technology and processes related to Anti-Virus, IPS, Encryption, DLP, Content Management, Email/Web Filtering, Vulnerability Management and Incident Response
  • Minimum 2 years’ proven working experience and excellent knowledge in at least 2 of the following: Top Secret/RACF, Windows/UNIX/Linux Security, Cisco ASA/NAC/VPN technologies and RSA Secure Authentication
  • Excellent working knowledge of MS Office Excel, Word and PowerPoint. Working experience in Windows Scripting and Visual Basic is an asset
  • Regarded as an ethical and trusted person who works with integrity and takes great pride and ownership in all things related to the position
  • Available for on-call support
9

Security Analyst Resume Examples & Samples

  • Day-to-day Operational support for various security products including: Customer and Systems Support, solution identification, solution implementation, process improvements and also assist with creating system deployment plans for enterprise-wide technical solutions
  • Design and documentation of troubleshooting and support procedures
  • Coordinate systems installations, upgrades and configuration of infrastructure changes
  • Provide reports for actions and procedures
  • IT security knowledge with a focus on computer forensics, incident response, malicious code/exploits, and anti-virus
  • Knowledge of the current security threat landscape, especially network and web-based threats
  • Familiarity with Windows exploits malware and malicious code trends
  • Strong knowledge of TCP/IP
  • Knowledge of securing systems and investigating security incidents
  • Log and data analysis experience
  • Ability to prioritize and multi-task across numerous work streams
  • Strong verbal and written communication skills, with an ability to express complex concepts to both technical and non-technical staff
  • Highly motivated with a willingness to take ownership/responsibility for their work and the ability to work alone or as part of a team
  • Knowledge of one or more programming / scripting languages is helpful but not required
10

Security Analyst Resume Examples & Samples

  • Bachelor’s degree in Computer Science or 5+ years of equivalent work experience
  • 4+ years of experience with IS technical and information security, MS Windows Platforms, SCCM, Linus, Endpoint Management, Full Disk Encryption software, AAA strategies and Radius
  • Experience with security products, as well as vulnerability analysis and log analysis (SEIM)
  • Knowledge of HIPAA security rule, HITECH and other federal information security acts
  • Industry certification, CISSP
  • Must have healthcare experience supporting IT and familiarity with clinical applications requiring security reviews
11

Security Analyst Resume Examples & Samples

  • Intrusion detection - Analyze network and host based security events from our corporate and production environments
  • Perform initial triage, identify when an event has become an incident, escalate and continuously monitor for further activity
  • Analyze logs, write new rules, and improve upon existing detection rules (host and network)
  • Perform basic malware analysis, add new indicators to our internal monitoring systems
  • Build event playbooks and continuously develop best practices
  • Assist in building out our custom network intrusion detection and analyst portal platforms
  • Further develop and build out our network and host intrusion detection capabilities. Iterate and improve our existing capabilities
  • Work closely with the Incident Response team
12

Security Analyst Resume Examples & Samples

  • Governance of 3rd party service providers including brand protection services, malware detection and forensics as well as a variety of technologies such as anti virus, data leakage and Internet content filtering
  • The Analyst will serve as liaison between departments as well as maintaining necessary documentation in the support of various core services
  • Escalates inquiries to other support partners, or Tier 3 specialists to resolve system issues and acts as a liaison until problem is resolved
  • Working knowledge of anti virus, DLP and Content Filtering technologies and other various platforms
13

Security Analyst Resume Examples & Samples

  • Analyse and assess security incidents and escalate to client resources or appropriate internal teams for additional assistance
  • Manage all customer interactions in a professional manner with emphasis on client satisfaction
  • Handle client requests and questions received via phone, e-mail, or an internal ticketing system in a timely and detail-oriented fashion in order to resolve a multitude of information security related incidents
  • Utilise internal guidelines in order to properly handle client requests and questions
  • Well-known networking protocols and services (FTP, HTTP, SSH, SMB, LDAP, etc.)
14

Security Analyst Resume Examples & Samples

  • Develops and maintains security awareness training programs and materials
  • Research and recommend internal information security process improvement projects
  • Experience with current information security industry tools (RACF /Database Security / Oracle / Active Directory)
  • Ability to work with moderate supervision and meet prescribed deadlines
  • Three years experience in application development including database environment, knowledge of designing application security controls, Data Management and Data analysis with in knowledge of JCL and TSO
15

Security Analyst Resume Examples & Samples

  • Review and audit implementation of security controls
  • Implement process improvement and best practices for secure software development and secure infrastructure
  • Train project teams on security best practices
  • 5+ years of experience reviewing and auditing website and application security in federal and commercial environments including FISMA compliance
  • 2+ years of experience leading incident response coordination and communication in an IT environment
  • 2+ years leading software development process improvement efforts related to secure software development
  • Experience developing mitigation plans and leading incident response and communications
  • Authorization to work for any U.S. employment
  • Certified Ethical Hacker
  • Ability to prioritize tasks, to work simultaneously on multiple projects
  • Ability to work collaboratively, including with geographically dispersed team members
16

Security Analyst Resume Examples & Samples

  • Reviews and interprets alerts and provides advanced security response, analysis and incident management
  • Performs comparative analysis on results collected against threats, vulnerabilities and other malicious technological programs launched through the internet
  • Based on the nature of the security threat, assesses and establishes mitigating steps to ensure appropriate treatment and ensures customer and management notifications as appropriate
  • Proactively manages all associated VPN, Firewall, Intrusion detection and prevention Systems, Managed Identify and Access programs, security information event management systems (SIEM), data correlation tools and/or system components as may be required to interrupt or affect the above threat
  • Configure, implement, manage and maintain security devices and appliances as well as provide general knowledge and recommendations for security best practices
  • Develop documentation for the complex shoring trends analysis, design solutions and operating guides or other deliverables agreed with customers
  • Adheres to strict security protocols associated with all levels in the management of security
  • Authenticates all requests for services by applying authentication techniques
  • Knowledge of offensive and defensive security operational tactics and supporting SIRT tactics
  • Understanding of NIST, ISO 27001, ITIL, SAS70 (or 5970) and/or other compliance frameworks
  • Demonstrated experience designing, implementing, and troubleshooting security solutions including authentication, authorization, encryption and audit capabilities as part of an overall system design
  • Comprehension of mitigating system controls, network, and application level (VPN, Firewalls, Intrusion detection and prevention, security information event management systems (SIEM), server hardening and encryption technologies)
  • Experience with tools used for Security (Arcsight, Tuffin, Provider1)
  • Experience in building UseCases within Arcsight or Nitro
17

Security Analyst Resume Examples & Samples

  • Monitor and review IT security controls to identify operational effectiveness
  • Assist with implementation of Security Risk Assessment methodology, policy, strategy and process
  • Assist with mapping controls to policies, procedures, and processes to ensure adequate coverage
  • Perform process and control walkthroughs and document control narratives as assigned
  • Perform third party security risk assessments
  • Assist with access control management and reviews
  • Assist with IT remediation efforts and track completion status of deficiencies
  • Assist in the on-going maintenance and process improvements of compliance programs (e.g. PCI DSS, ISO27001, etc.)
  • Support the Security Transformation Program as assigned
  • Provide security consulting services to the internal business owners and stakeholders
  • Maintain clear communications, documentation, and timely support for security policy and compliance activities
  • Update project and status reports as needed
  • Assist with policy and standards research, development, review and maintenance
  • Assist with data governance program
  • Preferred 2+ years’ experience in Information Security or Information Technology field. Internship may be substituted for experience
  • Bachelor’s degree in Computer Science, IT or Information Security
  • Experience working within a team to deliver and track solutions
  • Ability to identify, monitor and remediate security compliance issues
  • Hands-on experience working with GRC tools a plus
  • Ability to complete assigned work on time and to specifications
  • Strong verbal and communication skills with all levels of the business on security issues
  • Willingness to acquire in-depth knowledge of security best practices, technologies and products and continuously improve these skills
  • Must be self-motivated, able to work independently, and multi-task effectively
  • Experience in using tools and techniques for planning, organizing and implementing projects
  • CISSP preferred or willingness to obtain
18

Security Analyst Resume Examples & Samples

  • Process requests for PKI services, cryptographic keys, SWIFT Relationships, and access to limited systems
  • Troubleshooting issues with the implementation of Certificates, Keys and other functions
  • Ensure cryptographic key requests adhere to the Bank's crypto policies and standards, Industry best practices and rules of the Regulatory bodies
  • Produce, review and update documentation, logs and reports to ensure the integrity, and completeness of the life cycle management of the certificates and keys
  • Maintain continuity of critical processes by participating in contingency exercises and off-hours support as needed
  • Possesses a university degree/college diploma in the field of Computer or Information technology or equivalent work experience, and/or 1 to 3 years of working experience in a customer oriented IT environment, exhibiting basic problem diagnosis and resolution techniques
  • Network security knowledge
  • Displays basic knowledge of security processes, requirements and industry standards in relation to Cryptographic keys management, PKI management, S.W.I.F.T. operations
19

Security Analyst Resume Examples & Samples

  • Manage daily customer change requests to their security infrastructure
  • Prepare changes on security equipment such as: VPN and firewalls; prevention, detection and intrusion systems; identity management and access equipment etc
  • Participate in the project implementation of new clients and services
  • Reviews and interpret security alerts in order to provide advanced security response/diagnostics, analysis and incident management
  • Take proactive measures to manage all security perimeter equipment or associated components that may be interrupted or affected as a result of threats and vulnerabilities
  • Develop documentation associated with production releases and maintain them
  • Completion of University or College program in the information systems field
  • Aptitude to work on multiple clients and security technologies
  • Capacity to work under pressure (essential during incidents)
  • Excellent communication, written and presentation skills
  • Excellent communication skills in English (written and verbal)
20

Security Analyst Resume Examples & Samples

  • 70% Incident Response, Investigation and Analysis
  • Respond to security issues or concerns escalated from other departments
  • Identify and preserve all relevant evidence pertaining to security incidents and investigations
  • Ensure chain of custody, retention and deletion procedures are followed for all test security data
  • Conduct investigative research using the internet and online databases
  • Collaborate with test sponsors on joint investigations as required
  • Coordinate corrective actions, enforcement actions and appeals involving candidates and test centers
  • Identify and submit requests for system enhancements or new tools needed to meet the evolving needs of the security team
  • Facilitate regular and ad hoc operational security meetings with program mangers and test sponsors
  • Education and Experience: *
  • Research and/or investigative experience in corporate or fraud investigation, paralegal research, litigation preparation, loss prevention or information security preferred
  • Ability to multi-tasks
21

Security Analyst Resume Examples & Samples

  • Knowledge of FireEye Web and Email Security Solutions and how they work on an enterprise level
  • Ability to apply FireEye Web and Email Security Solutions on a enterprise level
  • Understanding of security postures/policies
  • Understanding of DNS and SSL Certificate
  • Understanding of spam and content filtering for blacklisting and whitelisting
  • Security terminologies
  • Ability to troubleshoot issues with FireEye Web and Email Security product
  • Ability to troubleshoot and triage Messaging events/incidents
  • Comprehensive knowledge of networking terminologies
  • Comprehensive knowledge and experience with different Messaging products including but not limited to Exchange, Domino
  • Comprehensive knowledge of messaging and communication protocols such as SMTP and TLS
  • Extensive knowledge and experience in configuring content filtering and anti-spam policies
  • Extensive knowledge and experience with Web and Email Security products and appliance including but not limited to FireEye Cloud Email Security (ETP) and FireEye Web Security Appliance on an enterprise level
  • Excellent verbal and written 'English' skills
  • Vendor and third party supplier liaison skills
  • Team relationship skills
  • Customer relationship skills
  • Problem and Change management skills
  • High degree of analytical ability and creativity in resolving 1st and 2nd level Security problems
  • Understanding of SLA’s
22

Security Analyst Resume Examples & Samples

  • Ability to apply Websense Email Security Solutions on a enterprise level (SL 4)
  • Understanding of DNS and SSL Certificate (SL 4)
  • Understanding of spam and content filtering for blacklisting and whitelisting (SL 4)
  • Ability to troubleshoot and triage Messaging events/incidents (SL 4)
  • Comprehensive knowledge of messaging and communication protocols such as SMTP and TLS (SL 4)
  • Demonstrated ability to work under pressure (SL 4)
23

Security Analyst Resume Examples & Samples

  • Operate as second level support to a 24x7 managed security operations centre
  • Alert clients regarding intrusions and potential intrusions that may compromise their network infrastructure
  • Maintain an inventory of the procedures used by the SOC and regularly evaluate the SOC procedures and add,
  • Actively investigates the latest security vulnerabilities, advisories, incidents, and penetration techniques and notifies clients when appropriate
  • Assist in incident determination, ticketing and incident response, prevention and remediation
  • Self-directed and independent individual
  • Customer Service oriented - Meets commitments to customers; Seeks feedback from customers to identify improvement opportunities
24

Security Analyst Resume Examples & Samples

  • SIEM Tool Monitoring
  • Monitor vendor sites for latest antivirus
  • Monitor sites for regular security news and updates
  • Issue alerts on critical security updates to respective teams
  • Investigate and report violations to the centre's information security policies and compliance standards
  • Generate daily and weekly reports on applicable virus definition, updates, patches etc
  • Assess the security risk of identified events and alert
  • Analysis of the Patches released by the vendors
  • Review operational logs and event console activity to determine cause of security-related events or to identify potential security related events
  • Raising incident tickets in the incident tracker tool
  • Basic Networking
  • Ability to work with minimal levels of supervision or oversight
25

Security Analyst Resume Examples & Samples

  • Facilitating business objectives through the identification and promotion of solutions and innovation
  • Acting as an evangelist for CTIR and continually strive to learn from and mentor others
  • Security Operations Center tasks
  • Threat Analysis
26

Security Analyst Resume Examples & Samples

  • Business Systems
  • Documents detailed business requirements and user stories
  • Defines minimum feature set and user acceptance criteria
  • Engages with engineers to design low to medium risk solutions
  • May work on small, low risk configurations, primarily on specific, assigned tasks
  • Updates requirements based on testing, prioritized defects, or post release lessons learned
  • 2+ years of analytical work
  • 2+ years of supporting security functions in an enterprise atmosphere
  • Able to demonstrate understanding of key security principals and how they relate to the business
  • Ability to demonstrate effective partnering skills with different technology teams
  • Experience in OS platforms, networking, application development, and incident management
  • Must be available for scheduled on-call rotation, which involves periodic 24-hour support
27

Security Analyst Resume Examples & Samples

  • Support implementation and execution of a centralized intelligence and security analytics program
  • Research, author, and deliver assessments and recommendations to global business leaders on emerging risks, threats, and trends
  • Develop training curriculum and tools for the C3 Analysts and future program model
  • Deliver strategic research projects, analytical reports, and assessments to drive enhanced decision-making for the CS team
  • Focus on local, regional, National, and international issues of interest for the company (re: local crime/cyber/terrorism/etc)
  • Formalize tradecraft and procedures for the Command and Control Center (C3)
  • Influence CS team to develop and implement intelligence-led strategies; integrate innovate research to support team maturation
  • Deliver baseline and sustained metrics program; solicits consistent feedback on all products and deliverables
  • Responsible for the development, implementation, and governance of ongoing collection plans, source inventory, and archiving program
  • Organize quantitative and qualitative data to support a comprehensive decision-making processes
  • Lead and manage various research and open-source benchmarking projects
  • Bachelor’s degree; Minimum five years direct experience working within the field of intelligence, security, or strategic research
  • Superior communication and organizational skills; ability to communicate with impact across all mediums
  • Mastery of computer software programs and online intelligence analytic tools (ex: MS Office products (Visio/Excel), social media, & i2/Analyst Notebook/etc)
  • Exceptional ability to deploy progressive analytical tools, technologies, and tradecraft; extensive social media and data mining experience a must
  • Demonstrated experience, internship, or direct experience leading innovative, creative, and transformational research/intelligence projects
  • Proven experience working within a start-up/new business environment
  • High degree of integrity, ethics, responsibility and dedication
  • Must be willing to work irregular hours in support of mission; on-call requirements. Light travel possible (mostly within CA)
28

Security Analyst Resume Examples & Samples

  • Installation, testing and implement systems software including: customization, documentation resolution and support
  • Basic understanding of networking and including routing, architecture, and design
  • Ability to partner with other departments within the organization to implement web based solutions to business challenges
  • Basic understanding of the functions of programming languages
  • Preventive Maintenance Program, Certified Information Systems Security Professional and/or
  • Demonstrated project management experience
  • Microsoft certification
29

Security Analyst Resume Examples & Samples

  • Actively investigates the latest security vulnerabilities, advisories, incidents, and penetration techniques and notifies the manager when appropriate
  • Experience with Security Information & Event management (SIEM) tools
  • Incident Handling and Incident Response experience
  • Excellent vulnerability assessment experience
  • Knowledge in the following: Firewalls, Intrusion detection and prevention systems, antiâ€�virus and content filtering, URL filtering, authentication solutions, switches, routers, VoIP, DMZ
  • Should have knowledge in Linux & scripting Languages(Shell Script, Vb script, Python etc)
30

Security Analyst Resume Examples & Samples

  • Implement the Security Risk Assessment methodology, policy, strategy and process
  • Map controls to policies, procedures, and process to ensure adequate coverage
  • Coordinate external audits
  • Manage remediation efforts and track completion status of deficiencies
  • Provide security consulting services to the business owners and stakeholders
  • Extensive knowledge of security technology and risk assessment methodologies, policies and processes
  • Must have experience implementing or assessing security in a cloud hosted environment
  • 5+ years of experience working within the technical arena with 3 plus years of information security work experience
  • Knowledge/Experience in LANS, WANs, Routers, firewalls, IDS systems - Ability to scan large networks using vulnerability scan tools and write risk mitigation plans according to the assessment
  • Requires knowledge in the following areas
31

Security Analyst Resume Examples & Samples

  • Strong working knowledge of security tools such as firewalls, IDS/IPS, A/V, anti-spam, content management, server and network device hardening, etc
  • Flexibility to participate in a 24x7 shift rotation
  • BS or equivalent work experience
  • Security-related certifications desired (CISSP, GIAC, etc.)
32

Security Analyst Resume Examples & Samples

  • Professional with experience in information security and other general IT functions
  • Bachelor degree in computer and/or IT related disciplines
  • Experience in a Security Operations Center environment
  • Certifications in information security preferred (eg. CISSP, GCIA, GCIH, GREM, CEH)
  • Technical Analysis
  • Outreach and Communications
  • Experience in performing investigation and triage activities of security related events
  • Experience in all aspects of Security Operations Center and how the organization supports/ adds value to the rest of the organization
  • General working knowledge of financial systems
  • Strong collaboration, conceptual and innovation skills
  • Strong analytics and reporting experience
  • Strong technical writing aptitude
  • Strong ticketing skills/experience
  • Strong platform knowledge including Microsoft Windows and Unix/Linux Operating Systems
  • Strong Networking knowledge with TCP/IP packet level knowledge
  • Strong analytical and complex problem-solving skills
  • Thorough understanding of SIEM technology and operations
  • Understanding of common exploitation techniques
  • Knowledge of Incident Handling and forensics skills
  • Knowledge of relevant technology
  • Knowledge of IT Standards and Methodologies
33

Security Analyst Resume Examples & Samples

  • Bachelor’s degree in Information Security, Computer Science or related technical field; or equivalent work experience
  • Broad work experience that spans one or more of the information security functions - policy development, education, executing penetration testing and application vulnerability assessments, risk analysis and compliance testing
  • Working knowledge of information security and computer network/system access technologies
  • Broad hands-on knowledge of firewalls, intrusions detection/prevention systems, anti-virus software, data encryption and other industry-standard techniques and practices
  • Very good understanding of security controls, monitoring systems and regulatory/business drivers that impact security policies and practices
  • Familiarity with technology risk assessment/SOX IT General Controls requirements and/or other related regulatory requirements
  • Ability to influence and lead across the Organization
34

Security Analyst Resume Examples & Samples

  • Operates access control and facility monitoring systems and provides round the clock coverage for alerts and emergencies
  • Oversees intrusion detection and video coverage and related records, and prepares physical security reports as necessary
  • Notifies appropriate US based resources of situations that require response or remediation
  • Excellent verbal and written communication skills in the English language
  • Ability to work in a team oriented environment and to help identify and solve problems
35

Security Analyst Resume Examples & Samples

  • Experience managing Problem Management processes
  • Good process engineering skills
  • Identify the work required and organize, facilitate and / or perform the work with only limited guidance from line management
  • Good analytical skills, structured and methodical approach
  • Highly organized, with the ability to plan ahead for short- to medium-term objectives
  • ITIL Certification preferred
36

Security Analyst Resume Examples & Samples

  • BS in Information Technology or related field
  • 5+ years of related experience
  • ArcSight SIEM and Symantec Endpoint Protection
  • GISP, SCTS, NSCP, SCNP
37

Security Analyst Resume Examples & Samples

  • Developers create code to protect against many risks, such as operator error, system errors, etc. In this environment, the code must also be able to withstand attacks from intelligent adversaries and their automated programs
  • Identify available security controls are available, when to use them, and how to use them
  • Ensure current security best practices are applied and security tests are integrated into the SDLC
  • The Security Analyst shall have a deep understanding of secure coding best practice, including, but not limited to
  • Modeling data instead of string usage, Using string wrappers and narrowing what they can contain,
  • Ensuring modern DLLs, APIs, and other common code sources are used
  • Using white list input validation,
  • Preventing “bad practices/environments” (e.g. in-line Javasript),
  • Ensuring patching to include frameworks and libraries
38

Security Analyst Resume Examples & Samples

  • Documents and conforms to processes related to security monitoring
  • Advanced experience with Mac OS, Windows, and Unix systems
  • Conduct computer evidence seizure, computer forensic analysis, and data recovery
  • Knowledge Base
  • Anti-Virus
  • Vulnerability Identification
39

Security Analyst Resume Examples & Samples

  • Relationship Management skills required for managing the bank interactions with customers and the service provider
  • Information Management skills required to collect and manage information from one or more sources and the distribution of that information to one or more audiences
  • Active issue management required to manage business issues
  • Strong reporting and analytical skills for preliminary analysis and proposing good and effective solutions
40

Security Analyst Resume Examples & Samples

  • At least 1 to 2 years of overall IT and/or business experience
  • Ability to effectively communicate both written and oral and have strong organizational skills
  • Must be self-motivated/self-starter in a fast paced environment with the ability to work either independently or in a team to resolve problems with limited information
41

Security Analyst Resume Examples & Samples

  • Understanding of security procedures (e.g. ISO 270001)
  • Preferred Skills and Abilities
  • ITIL certificate or equivalent
  • Security tools – centralised logging, file integrity monitoring and access management
  • Education and Work Experience
  • Educated to degree level ideally in Information Technology or similar
42

Security Analyst Resume Examples & Samples

  • Learn, adapt to and support the Governance, Risk and Compliance objectives for Nordstrom
  • Engage in compliance consulting and assessment activities for requests assigned
  • Contributes to decisions which influence and impact the success of cross-team initiatives
  • Applies program management principles across disciplines with insights and knowledge across other disciplines
  • Experience of successful delivering solution of high impact scope, risk and complexity
  • Ability to influences stakeholder expectations
  • Resolves or provides recommendations to leadership on issues/changes
  • Provides leadership within project team
  • Understanding of common regulatory or standards based control frameworks such as: PCI-DSS, ISO 27001/2, NIST 800-53, etc
43

Security Analyst Resume Examples & Samples

  • Act as a subject matter expert for SIEM solutions that offer enterprise class log collection, aggregation, and correlation capabilities for a wide variety of platforms
  • Define customer requirements with a focus on SIEM solutions at an Enterprise level
  • Participate in the implementation of SIEM solutions meeting customer requirements
  • Configure and validate SIEM connections, test use cases and identify security gaps
  • Contribute to continuous growth of the security solutions practice through mentorship, Identification of new opportunities and development of SIEM solutions
  • Completion of University or College program related to networking/IT Security or at least 5 years experience working with SIEM solutions
  • Solid working knowledge of syslog and SNMP
  • Ability to translate complex and ambiguous requirements into actionable SIEM components
  • Ability to lead less experienced analysts through a solution
  • Holds a vendor or industry professional-level certification in at least one network or security discipline
44

Security Analyst Resume Examples & Samples

  • Must have a broad understanding of managed security services solutions
  • Will maintain thorough knowledge of both technical and operational network security best practices for a wide variety of technology platforms and security services
  • Will act as a point of escalation for technical issues that may occur during off hours
  • Must have top-notch communications skills (both verbal and written)
  • We are seeking a highly motivated and qualified individual to fill a Security Analyst position within our team, specializing in McAfee security solutions. The successful candidate will
  • Act as a subject matter expert for McAfee endpoint protection solutions
  • Define customer requirements with a focus on endpoint protection solutions at an Enterprise level
  • Determine system specifications and working parameters for hardware/software compatibility
  • Develop detailed endpoint protection plans, perform requirements analysis and produce design documents including functional and technical specifications
  • Configure, validate and test security products and systems to identify security weaknesses
  • Be responsible for endpoint protection configuration and maintenance
  • Participate in the implementation of endpoint protection solutions that meet customer requirements
  • Provide technical support services to develop and maintain integrated endpoint protection solutions
  • Contribute to continuous growth of the security solutions practice through mentorship, identification of new opportunities and development of endpoint protection solutions
  • Completion of University or College program related to networking/IT Security or at least 5 years experience working with McAfee endpoint protection solutions
  • Ability to translate complex and ambiguous requirements into actionable components
45

Security Analyst Resume Examples & Samples

  • Design and implement solutions for network security
  • Test and deploy new security technology
  • Monitor security service requests
  • Resolve or escalate production security issues
  • Implement all changes to security infrastructure in accordance with standard procedures and change control policies and procedures
  • Serve as a member of the security team working on all aspects of compliance
  • Assist the Director of Security with audits and compliance status updates
  • Experience or interest in network and system security
  • Strong background and interest in statistics and/or analytics
  • Working knowledge of network administration and network management protocols
  • Basic understanding of network security protocols, concepts and practices
  • Some experience with commercial network security products a plus
  • Excellent communication skills, especially writing
  • Enthusiasm to learn and grow with the role
46

Security Analyst Resume Examples & Samples

  • Learn, adapt to and support the Vulnerability Management objectives for Nordstrom, including vulnerability scanning, prioritization, and remediation
  • Ability to speak to the OWASP Top 10 vulnerabilities and explain their remediation to development teams
  • Actively investigates the latest in security vulnerabilities, advisories, and incidents and escalates when appropriate
  • Supports the health and operation of the scan servers, including upgrades, maintenance, and reporting
  • Demonstrate excellent customer service as you work with application and network teams to make suggested fixes and explain the issues so they can be accurately prioritized
  • 1-2+ years of experience in security operations and/or incident response
  • Integrates working knowledge in vulnerability scanning disciplines to create innovative solutions
  • Ability to understand/modify scripts using Perl/Python/Powershell to automate tasks a bonus
  • Knowledge of network traffic analysis and IDS/IPS
  • Knowledge of networking protocols: TCP/IP, HTTP/HTTPs, FTP, DNS, etc
  • Wry sense of humor a plus
47

Security Analyst Resume Examples & Samples

  • Monitor Customer security systems
  • Work with client to help remediate and answer questions regarding their security environment
  • Participate in client calls
  • Make recommendation to clients to improve security posture
  • Manage, troubleshoot, and maintain host and network Intrusion Detection Systems (IDS)/Intrusion Protection Systems (IPS) and Unified Threat Management (UTMs) for a wide variety of vendor technologies
  • Manage, troubleshoot, and maintain vendor specific management stations related to security platforms
  • I/T related Security certificate, education or experience in security field
  • Basic knowledge/familiarity in Network Troubleshooting and fundamentals
  • Basic knowledge/familiarity with Intrusion Detection/Prevention
  • Basic knowledge/familiarity with Windows and Linux operating systems
  • At least 1 year experience in Customer Service
  • Bachelor's Degree in Information Technology
  • At least 1-2 years experience in Network Troubleshooting
  • At least 1-2 years experience in Intrusion Detection/Prevention
  • At least 1-2 years experience in Operating System Skills
  • Certified in GCIA
  • Certified in CEH
  • Certified CCNA
48

Security Analyst Resume Examples & Samples

  • At least 3 years experience implementing NIST 800-53 up through rev4
  • At least 3 years experience identifying and resolving software and network vulnerabilities
  • At least 3 years experience as a Security SME for policy and security requirements and techniques for applications and network operations
  • At least 3 years experience supporting of one or more SA&As
  • At least 3 years experience developing or reviewing SOPs
  • At least 1 year experience in implementing and configuring security components
  • At least 1 year experience in how to run a Patch and Vulnerability Management Program
  • At least 1 year experience in computer security combined with risk analysis, audit and compliance objectives
  • At least 3 years experience in dedicated information security where responsibilities include planning, deploying, managing, and maintaining enterprise security systems such as vulnerability management
49

Security Analyst Resume Examples & Samples

  • Partner with peers to identify areas of improvement within the IT department and the company-at-large, providing solutions in the form of new standards and procedures
  • Simulate or recreate operating difficulties, recommending system modifications and communicating with other IT departments to correct core issues
  • Working knowledge of all Microsoft Office applications, including Word, Excel and Access
  • Experience with IT Security
50

Security Analyst Resume Examples & Samples

  • Monitor and report on Security posture
  • Establish and maintain security and privacy processes that support industry compliance [Sarbanes Oxley (S-OX), Payment Card Industry (PCI) and the Office of the Controller of the Currency (OCC)]
  • Monitor and report compliance throughout the year to insure success at annual reporting cycles
  • Maintain the established principles of the Information Technology Mission, Vision, Values & Principles (MVVP)
  • Establish and maintain actionable metrics for the department
  • Assess application and infrastructure changes and provide security guidance to the project teams
  • Maintain and develop appropriate security policies and procedures
  • Maintain and document security controls
  • Monitor security controls for possible breach activity and follow appropriate incident response procedures
  • Provides direct support to the business and IT staff for security related issues
  • 6-8 years of combined IT and security work
  • CISSP or other security certification is a plus
  • Ability to conduct and participate in the evaluation of IT products and services as required
  • Excellent communication (oral and written) and presentation skills
  • Keen problem solving skills, ability to deal with complex situations and recommend a course of action
  • Must be flexible and able to respond to rapid change to meet business needs
  • Strong analytic, problem-solving, and business acumen
  • Participate in building of vendor relationships
51

Security Analyst Resume Examples & Samples

  • Bachelor's degree in Criminal Justice, Criminology, Business, Sociology, Homeland Security, History, Government, or other related field
  • 2-5 Years of investigative experience
  • Reliable form of personal transportation and flexibility to travel
  • Valid U.S. driver's license and eligibility to obtain a U.S. Government Security Clearance
  • Active federal security clearance with a TS/SSBI is preferred; but not required
52

Security Analyst Resume Examples & Samples

  • Hands-on Black Box and White Boxpenetration testing
  • Increasing Testing Efficiencythrough automating tools and procedures
  • Running state-of-the-artsecurity and vulnerability assessment tools
  • Use of Security Tools including Nmap, Nessus, OpenVAS, Qualys, Codenomicon Defensicsand an understanding of their limitations
  • Networking (all levels of OSI 7-layer model)
  • Experience in working with non-Windows platforms
  • Technical presentation/writing skills
  • Scripting/programming skills in Python/Perl/bash
  • Programming skills in C, C++ and Java
  • Static analysis including usage of tools such as Coverity
  • Telecommunications experience (protocols and topologies)
  • One or more of CEH, OWASP, GIAC or OSCP certifications
  • Embedded systems design, development or testing
53

Security Analyst Resume Examples & Samples

  • Assist platforms on risk assessments, job safety analysis. Generate processes and / or projects to mitigate risks
  • Support eye of tiger (odt) and safety seven on each platform, analyze trends and propose corrective and preventive actions. Follow up
  • Implement, validate and follow up safety programs on the work floor
  • Provide training according with yearly plan and on-boarding for new employees
  • Apply continuous improvement methodologies to investigate incidents and accidents with multifunctional teams. Propose, execute and follow up corrective and preventive actions. Trends analysis
  • Ensure compliance in all policies, programs, and participation in all activities oriented to the prevention of injuries, illness and environmental sustainability, modeling safe behaviors, aligned with k values, accountability and the believe that all injuries can be prevented
  • Bachelors on Sciences
  • Knowledge of continuous improvement
  • Travel 10%
54

Security Analyst Resume Examples & Samples

  • Two years of experience in security incident response, security applications administration or operating system support
  • In lieu of degree consideration will be given to an equivalent combination of related education and required work experience
  • Experience in a diverse systems environment
  • System integration, system administration, and computer security experience
  • Experience with technologies generating security alerts (i.e., IPS/IDS, SIEM, etc.)
  • Programming skills such as C/C++, Python, Ruby, shell scripting
55

Security Analyst Resume Examples & Samples

  • Security monitoring and monitoring the environment for alerts
  • Intrusion detection and prevention
  • Providing information relating to our security environment to management
  • Responding to security events and collecting forensic information
  • Root cause analysis and mitigating risk
  • Handling evidence for cyber investigations
  • Conducting computer forensic investigations, data recovery and electronic discovery under occasional guidance
  • Conducting small and medium scale vulnerability assessments and threat analysis for the environment
  • Troubleshooting and resolving complex security issues
  • Core Accountabilities
56

Security Analyst Resume Examples & Samples

  • Perform security audits and test key areas of the organizational network and IT infrastructure and maintain security systems while administering security policies to control access to systems
  • Maintains firewall and utilizes applicable encryption methods
  • Perform Third-Party Security Program (TSP) review procedures and analyze results to ensure that WSP Global information security standards and policies are understood and followed by third-party organizations providing services to WSP Global
  • Perform incident response and investigation activities as needed or requested over security incidents and/or security breaches
  • Perform the deployment, integration and initial configuration of all new security solutions and of any enhancements to existing security solutions
  • Assist in the execution of Third-Party Security Programs (TSP) and policies to ensure eligibility to receive and manage organizational information assets
  • Analyze, query, report and present network traffic from packet captures
  • Perform non-routine analytical/reporting queries and programming as required by IT or business unit
  • Assist with day-to-day administration of security & legal tools and software to help ensure we maximize our security investment and maintain alignment to the needs of our teammates
  • Perform continuous vulnerability assessment and remediation
  • Maintain and continually evaluate cyber threat intelligence sources for changes that increase overall effectiveness and timeliness
  • Document, monitor and maintain information security standards, policies and protocol to ensure organizational data and resources, including email and cloud services, are protected from unauthorized and inappropriate use or access
  • Research attempted efforts to compromise security protocol and recommends solutions
  • Create information security documentation related to work area and completes requests in accordance with company requirements
  • Identify opportunities and execute plans to improve workflow and understand and quantify business impacts of those improvements for communication to manager
  • Assist in monitoring compliance with information security policies and procedures
  • Continuously review security bulletins and related news; stay apprised of current threats and trends
  • Provide data and root cause analysis for each service impacting incident with all possible corrective actions for improvement
  • Document results received from vulnerability, penetration and disaster recovery tests and lead remediation efforts, as applicable
  • Act as liaison with assigned business units to promote security awareness and identify/recommend quality business solutions that not only meet data protection and system resiliency requirements, but preserve a quality user experience
  • 8-10 years related experience in a security analyst or similar position
  • Bachelor's degree or equivalent in Information Technology, Computer Science, Engineering or related field
  • Knowledge of networks technologies (protocols, design concepts, access control, routing, switching)
  • Knowledge of security technologies (encryption, data protection, network intrusion prevention, host intrusion prevention, firewalls, privilege access, etc.)
  • Knowledge of security best practices with relation to applications, network and client setups
  • Knowledge of network design and engineering
  • Knowledge of enterprise IT security concerns and technologies, including but not limited to VPNs, network security, encryption, authentication, application-level network protocols, PKI, IPSec, Firewall, SSH, SSL, DES, LAN/WAN, and TCP/IP
  • Experience with Scripting (Python, PERL or similar)
  • Experience with LDAP/Directory management
  • Experience with Single Sign-on Web Access Management experience
  • Knowledge of information security regulations applicable to WSP Global
57

Security Analyst Resume Examples & Samples

  • Monitoring and analyzing logs and alerts from a variety of different technologies (IDS/IPS, Firewall, Proxies, Anti-Virus, SIEM, etc…), across multiple platforms
  • Assessing the security impact of security alerts and traffic anomalies on CNO networks
  • Filter, classify, and organize cyber threat intelligence such that indicators of compromise maybe be easily extracted by operational security teams
  • Review and respond to security events that are detrimental to the overall security posture; analyze and detect sophisticated and nuanced attacks, discern false positives
  • Perform day-to-day security log review and analysis in adherence with SOX & PCI requirements, as well as industry security best practices. The log reviews includes, but not limited to, the following systems
  • Operating System (i.e. Windows, Unix, Linux)
  • Applications
  • Network (Firewalls, Switches, Routers, Wireless)
  • Works with the Security Architects to tune and maintain the SIEM (Security Information and Event Management) as needed; develop SIEM use cases to enhance monitoring capabilities
58

Security Analyst Resume Examples & Samples

  • Conducts advanced in-depth data analysis using publically available information in social media platforms, open sources, and commercial databases to support national security objectives
  • Develops online research methodologies and techniques to analyze trends, explore geo-tagged social media content, and leverage big datasets
  • Provides mentorship to less experienced analysts
  • Researches and writes in-depth reports and advisories on security risks to employees and operations worldwide
  • Provides guidance to business leaders with regard to risk mitigation
  • Provides rapid assessments of potentially imminent security situations, sensitive developments and complex threat issues
  • Identifies, tracks, and monitors emerging security threats and trends
  • Keeps abreast of changing geopolitical events which could impact stability and operations
  • Provides research, analysis, coordination, publishing and briefs on security threats, non-technical risks and geo-political issues in diverse geographical areas in foreign countries or domestic operations that have the potential of affecting the organization’s businesses and employees
  • Assesses unforeseen threat developments and recommends changes in security direction and approach
  • Prepares briefs on strategic intelligence issues for senior management
  • Maintains internal and external contacts that focuses on threat and risk issues
  • Manages and conducts research into various reference archives and databases to extract information contributing to threat and risk analysis or due diligence and background investigation research
  • Maintains liaison throughout appropriate Company functional entities and external counterparts
  • Creates, tracks, and reports periodically on Global Security metrics
  • At least 3-5 years previous work experience relating to research and analysis
  • Demonstrated ability to conduct research and write analytic reports
  • Strong web-based research skills
  • Previous experience with social network analysis tools and methods
  • High proficiency in using a variety of social media platforms
  • Previous work in the Cyber Arena required
  • Previous experience with research design and methods with a focus on incorporating open source and public records data analysis
  • Demonstrated ability to snynthesize data and create and present intelligence briefing reports
  • Law enforcement experience with training from the FBI, CIA, NSA, DOD preferred
  • Proven ability to work in a team environment
  • Experience with mapping software
  • Programming and technical skills
  • Ability to conduct complex analysis and present data in a meaningful way
  • Strong organizational skills and detail orientation
  • Open minded, flexible, and willing to listen for other people’s opinions
  • Interpersonal skills necessary to effectively communicate over the phone with a variety of individuals at all technical levels are required
  • Ability to adapt to the challenges of working virtually with team members in remote locations (e.g. UK, India, Hong Kong) using virtual meeting tools such as Skype
59

Security Analyst Resume Examples & Samples

  • Static Code/Software Security Analysis
  • Java development language
  • .NET development language
  • IBM AIX
  • Red Hat Linux Enterprise
60

Security Analyst Resume Examples & Samples

  • Continuous real-time monitoring, assessment, and in-depth analysis on potential threats, as well as analytical support to Security Shift Lead as needed
  • Effectively utilizing analytic tools, such as the company’s asset and threat visualization/mapping software and providing ITRIP Security support
  • Maintaining an information network of website and other sources to facilitate an in-depth knowledge of the company’s footprint
  • Compliance with relevant GAC operating procedures and practices; including desktop procedures and Knowledgebase articles
  • Utilize the Security Shared Service call center tools (case management system, IVR, knowledgebase, Agent Dashboard) to support incoming calls from employees requiring assistance outside the US
  • All duties and responsibilities are coordinated with the Shift Lead and/or Site Manager of the Security Global Assistance Center
  • Bachelor's degree in related field plus 1 year relevant experience
  • Proven customer service, teamwork and process improvement skills
  • Ability to work 1st, 2nd or 3rd Shift as needed; including Holidays and weekends
  • Regional expertise, experience with command center visualization software, experience in a security operations or fusion center, experience in incident management and analysis
  • Ability to clearly speak, read, and write the English language
  • Able to grasp complex information quickly and probe effectively where additional information
  • Must be able to adapt in a highly charged and challenging work environment
61

Security Analyst Resume Examples & Samples

  • Functions as front-line representative of security group, partnering with the business to understand and assess complex initiatives impacting the security and integrity of data
  • Provides security-based risk assessments for the most complex business and technology sponsored projects and initiatives, including engagements with third parties
  • Leads activities during analysis, design, construction and testing phases of large scope, complex projects or projects of significant business risk or impact
  • Partners with Security Engineering and others as appropriate to ensure all security aspects of initiatives are addressed
  • Provides expert advice on best practices, policy and practice, regulatory and legal compliance in the area of security
  • Monitors compliance with security policies and procedures
  • Evaluates security controls and identifies risk, developing and following up on mitigation plans
  • Monitors and reports on security activities, escalating as required
  • Drives a security mindset and culture by communicating and reinforcing the organization’s mission, values and philosophy in the area of security
  • Minimum of eight years’ overall experience in information technology, including experience with a diverse set of platforms and technologies
  • Minimum of five years’ experience in information security
  • Demonstrated knowledge of information security discipline via relevant industry certifications such as CISSP, CAP, CISM, GSEC, GSNA, etc
  • Expert understanding of IT related regulations, like SOX and PCI, and frameworks, like NIST and ISO 27001
  • Ability to take initiative, work independently, and effectively manage multiple projects
  • Ability to build and maintain high credibility with all business partners
  • Strong verbal, written communications and task management skills
  • Strong analytical and problem resolution skills with the ability to react quickly
  • Proven self-starter and willing to accept additional responsibilities as position expands
62

Security Analyst Resume Examples & Samples

  • Design and operation of security systems and systems engineering for product development data
  • Develop, implement and operate tools to support corporate data security requirements
  • Evaluate operational models in methods and process for opportunity in improvements
  • Lead and support development, validation, deployment and continuous improvement of process and engineering digital design tools that help systematically align product definition to design rules, requirements and corporate standards
  • Actively collaborate with Business, IT, Engineering and Software Vendors to develop and deliver optimal solutions to operational and deployment issues and Instruct commodity/program engineers in process usage and maintain process integrity in execution
  • BS or BS/BA in Engineering or Computer Science
  • 1+ years of experience with Teamcenter and or Programming/Software
  • 3+ years Security Systems and Product Development
  • Experience with the following software (ex/ C++,C#, Python, Linus, Visual Studio, SQL, Java, Waterfall,Network Security, Software Testing, Software Development, SAS, QT Creator, XML, Visual Basic, Unity, Unreal, Camtasia, Studio, Flowcharts)
  • Additional advanced degree complete or in progress
63

Security Analyst Resume Examples & Samples

  • Assist in continuous security monitoring activities such as software and hardware reconciliation and user entitlement reviews
  • Contribute to writing technical policies and procedures
  • Consult with clients and partner with internal teams about industry security standards, best practices and trends
  • Create/maintain security policies and procedures and provide feedback on internal policies, procedures, standards and guidelines
  • Conduct security assessments across multiple IT functions (e.g., change management, risk assessments, continuous monitoring)
  • Recommend and document remediation techniques for all risks identified during audits and assessments
  • Windows or Linux operating systems
  • How applications, networks, systems and databases work
  • Industry best practices and compliance frameworks such as ISO 27002, SOC 2, NIST 800-53 or PCI
  • Strategic problem-solving skills and the tenacity to hunt down a solution
  • Bachelor’s degree in computer science, information technology or related area or three years of relevant system administration experience
64

Security Analyst Resume Examples & Samples

  • ITILv3 Foundation certification or ability to obtain within one year
  • Experience working in an ITIL environment considered a plus
  • Current SANS or EC Council certification
65

Security Analyst Resume Examples & Samples

  • Employ advanced computer tools, applications and analytical methodologies including analysis of competing hypotheses to understand relationships and inter-dependencies to develop finished analyses to enhance proactive and predictive approach to risk management
  • Conduct analytical, operational, and investigative functions to identify, deter, and defend against threats and vulnerabilities to Honeywell and share with relevant partners to produce actionable results
  • Support timely and effective identification, collection, analysis, and dissemination of potential threats to Honeywell’s employees, products, infrastructure and intellectual property/critical business knowledge
  • Produce analytical products highlighting risk management aspects of supply chain events, fraud detection, illegal activities, regulatory infractions, violations, and sanctions
  • Support collaboration and coordination efforts and working groups between Honeywell and other liaison partners
  • Must have or be eligible for a TS/SCI security clearance due to contractual requirements
  • 1+ years of IC/DoD or related analytical experience
  • Bachelor degree in international relations, strategic security, intelligence, criminal justice, economic crime management, behavioral psychology or related field desired
  • Current TS/SCI clearance highly preferred
  • Ability to write clear, concise, and well-organized reports that are accurate and grammatically correct with Microsoft Word, PowerPoint, and Excel
  • Hands-on experience with analytical tools and advanced analytical methodologies associated with the collection, analysis, investigation, and reporting of internal and external threats
  • The ability to publicly speak with confidence
  • Counterintelligence, counterespionage, and/or counterterrorism collection experience
  • Knowledge of research, development, and acquisition functions and the ability to identify critical program information
  • Be a self-starter and be able to engage with minimal supervision
  • Proficiency in a foreign language
66

Security Analyst Resume Examples & Samples

  • Installs new software releases, system upgrades, evaluates and installs patches and resolves software related problems
  • Perform system backups and recovery
  • Maintains data files and monitors system configuration to ensure data integrity
  • Administrator VMware environment
  • 5 years of relevant experience
  • Bachelor’s degree in computer science, electronics engineering or other engineering or technical discipline is required
  • 8 years of additional relevant experience may be substituted for education
  • The Security Analyst has experience in the concepts, terms, processes, policy and implementation of information security
  • Must have experience and knowledge of the latest security measures at all stages of an information system life cycle
  • Must have the ability to solve complex problems involving a wide variety of information systems
  • Must be able to understand and differentiate between critical and non-critical systems and networks
67

Security Analyst Resume Examples & Samples

  • Performs Network and application penetration testing to dissect any system, any ports, services either internal or external to ACI
  • Performs Web application testing focused on http/https vulnerabilities, TLS, application level like XSS, SQL, cross site scripting
  • Gathers security related information across multiple electronic, computer and development environments. Identifies, summarizes, reviews, and reports potential/actual actions that may jeopardize information security environments
  • Assists with ongoing information security awareness and training program
  • Researches, recommends and implements changes to procedures and systems to enhance information systems security. Participates in the development of information security systems, enhancements, and support processes
  • Performs security quality assurance testing
  • Performs detailed security evaluations associated with designing and installing owned and third party software, systems, components, and hardware
  • Certifications: OSCP, CISSP,GCIH, Incident Response, ITIL, etc
68

Security Analyst Resume Examples & Samples

  • Monitoring of security events received through alerts from Security Incident and Event Monitoring or other security tools
  • Review alerts escalated by the Help desk
  • Performing Level 1 analysis of security issues
  • Performing initial assessment of the priority of the event (Classification)
  • Performing initial determination of incident to determine risk and damage (Triage)
  • Performing appropriate routing of security or privacy data request and notifying appropriate contact for security events and response (Escalation)
  • Monitoring of alert and downstream dependency’s health
  • Takes an active part in the resolution of incidents, even after they are escalated
  • Work assigned via ticket queue
  • Security Essentials – SEC401 (GSEC certification) or equivalent
  • Intrusion Detection In Depth – SEC503 (GCIA certification) or equivalent
69

Security Analyst Resume Examples & Samples

  • 2+ years of network operations experience
  • Familiarity with common system and network attack vectors
  • Strong, demonstrable knowledge of common LAN/WAN technologies such as STP, VPN, VLAN, 802.1x, wireless controllers, firewalls, VoIP, TCP/IP, OSPF, QoS, MPLS and enterprise 802.11 as implemented with Cisco equipment
  • Experience analyzing, troubleshooting, and investigating information security incidents from a variety of reporting platforms such IPS/IDS, NAC, DLP, SIEM, and vulnerability monitoring systems
  • Network and System (Windows, Macintosh, and mobile platforms) Security Best Practices
  • Odd hours and on call-duties are required
  • Physical demands are described as medium (exert up to 50 lbs. of force occasionally, and/or up to 20 lbs. of force frequently, and up to 10 lbs. force constantly to lift, carry, push, pull, or otherwise move objects, including the human body)
  • Must have one or more of the following certifications
  • Bachelor’s degree in Information Technology, Information Security, Computer Science or a related field
  • Ability to script or code in a compiled language
70

Security Analyst Resume Examples & Samples

  • Maintain a Dashboard to track entitlement reviews, including status and metrics reporting
  • Works directly with Business Units and Solution Owners to obtain entitlement review data
  • Facilitates access reviews via an access review application
  • Proficiency in time management, communications, decision making, presentation and organizational skills
  • Proficiency in the suite of Microsoft Office applications
  • Basic decision-making and problem solving skills
71

Security Analyst Resume Examples & Samples

  • Provide information assurance and technical expertise in support of company CIS security policy, strategy and systems
  • Maintain the accreditation of Company CIS, carry out audit and evaluation activities and risk assessments
  • Provide technical expertise as client side adviser to major system developments, developing business and technology requirements and managing delivery of cyber security technology projects
  • Liaise with staff at all levels from both technical and business backgrounds
  • Respond to client requests, anticipating and meeting client expectations using innovative approaches where applicable
  • Produce technical documents to increase the internal knowledge base where required
  • Analyse and interpreting system, security and application logs
  • Liaise with industry leaders, external organisations and trusted partners to share ideas and best practice
  • Liaise with Company US cyber security teams to leverage the capabilities of the wider group: utilising and evaluating technologies and toolsets as used within the Company
  • Provide ad hoc support to the core IT team (system administrators, IT technicians, Network team) to ensure the successful transition of new capabilities into the live environment
  • Provide security administration to the Company CIS assets
  • Detailed knowledge of the following areas
72

Security Analyst Resume Examples & Samples

  • Key resource managing our clients annual external security testing programme
  • Excellent knowledge of SIEM based technologies, preferably LogRhythm. Ability to be use, manage and enhance solution
  • IP data networking with Checkpoint, Cisco, Fortinet & Palo Alto firewalls, Cisco, Brocade and VMWare switches. Understanding and application of firewall policy
  • Vulnerability discovery (perhaps with Nessus) and testing and exploitation
  • Security incident response including identification, preservation and interpretation of computer evidence, especially in a VDI environment, and investigation tools
  • Experience with modern computer security technical systems. Including network (Firewalls, proxies, IDS) host (build & execution control, AV, administration) development (secure coding, release control) and access control (provisioning, approvals and certifications, permissioning) among others
  • Good knowledge of platforms including Windows and AD, VMWare, View VDI, Sharepoint, Excel, MS-SQL, Appsense and Unix-style OS
  • Scripting and programming, perhaps in Java, C#, Python or others, particularly for compliance
  • Assessment and approval of changes, designs and systems for policy compliance
  • 5+ years within a technical IT Security role
  • CISSP certificated (or equivalent)
73

Security Analyst Resume Examples & Samples

  • Daily review of logs and alerts from technical security equipment, including IDS/IPS devices,
  • 3 to 5 years security experience performing log analysis, endpoint protection, threat intelligence analysis
  • 3 to 5 years’ experience using technical security equipment
  • 1 to 5 years’ experience with writing reports, documentation or other written communication experience
  • Desire to develop deep technical security knowledge
  • Experience in a network engineering, endpoint protection, monitoring and analytics
  • Ability to pass a background check
  • Understanding of security leading practices, threats, mitigating techniques and the ever-evolving security landscape
  • Ability to work as part of a team, and individually
  • 3 to 5 years’ experience with firewalls, IDS and IPS systems, both commercial and open-source
  • 1 to 5 years’ experience with a scripting language
  • Prepared to work out of hours, or be on-call, should the need arise
74

Security Analyst Resume Examples & Samples

  • Coordinate, perform and document Cyber Security Vulnerability & Penetration Tests and wireless audits as well as mitigating Cyber Security Vulnerabilities
  • 3-5 years of experience in I/T including 1 year direct experience in cyber security
  • Ability to excel in a team environment
  • Good investigative, conflict resolution and negotiation skills
75

Security Analyst Resume Examples & Samples

  • Provide log/network/malware/device analysis and making recommendations for remediation of security vulnerability conditions
  • Coordinate with Senior Analysts and/or Duty Manager for high priority incidents
  • Must have a minimum of 2 - 5 years of experience in a security monitoring/incident handling position
  • Capability to effectively multi-task, prioritize work, and handle competing interests
  • SANS or other Security industry certifications such as GCIA, GCIH, GREM, or GPEN
76

Security Analyst Resume Examples & Samples

  • Prepare (in conjunction with the technical experts and level 3 support engineers) the expected major and minor releases for the forthcoming period
  • Develop and maintain Project Plans and track progress to deliver on time
  • Coordinate delivery dates taking into account customer expectation and ability to deliver
  • Task relevant groups with responsibility to deliver
  • Ensure and audit that only authorized and tested version are installed
  • Chair all regular client review meetings and data collections internally
  • Liaise with the relevant parties involved with an approved change to ensure activities are co-ordinated and carried out according to plan
  • Semi-Technical ability in being able to read data from specifications that will help with the identification of potentially affected technical teams
  • Must be able to think logically about potential issues and threats that could affect the organization and design appropriate release templates, communication and schedules
  • Strong analytical skills balanced with effective communication and excellent customer service skills along with the ability to say no when appropriate
  • Excellent knowledge of IT processes and procedures
  • Knowledge of Project Management skills
  • Is effective in influencing management
  • Is an effective facilitator
77

Security Analyst Resume Examples & Samples

  • Support security organization as an Oracle Cloud Security Analyst
  • Tune IDS systems to eliminate false-positive and false-negative alerts
  • Assist investigative tasks as part of specific incidents
  • Identify and recommend process improvements
  • Three years previous experience managing enterprise scale IDS solutions
78

Security Analyst Resume Examples & Samples

  • Prepare, validate, and maintain security documentation including, but not limited to: system security plan (SSP), risk assessment (RA), contingency plan (CP), privacy impact assessment (PIA), eAuthentication assessment, FIPS categorization
  • Collaborate with the CGI Federal project team to support security assessments (Security Assessment and Authorization [SA&A] or Certification and Accreditation [C&A] activities) and audits
  • Be able to work with all levels of CGI Federal and client project team members and establish and maintain a strong customer-focused working relationship
  • Identify and mitigate security business and system risks
  • Be a team player with the ability to work independently and proactively while being flexible and prioritizing competing priorities, often under time constraints
  • Evaluating security and privacy controls to determine which are applicable and which have changed
  • Providing direct support to a client ISSO
79

Security Analyst Resume Examples & Samples

  • Work with IT delivery teams to identify, prioritize and track tasks needed to fulfill agreed level of compliancy
  • Analyzing and mapping the data within Vulnerability Management Services
  • Communicate effectively within the security team and with other teams
  • Driven by improving the process flow
  • Vulnerability Management: for internal and external network scanning Server Hardening
  • Security awareness and knowledge sharing among Delivery teams
  • University degree in Computer Science or related subject
  • Passion for technology
  • 1-2 years IT experience in any field - programming, IT administration, testing or help-desk support
  • ITIL process (would be a plus)
  • Basic IT Security knowledge
  • Team player and very good communication abilities
  • Must possess strong interpersonal skills in order to work in a dynamic and fast-paced environment
  • High sense of priority, works on multiple tasks simultaneously and deliver the expected results within the agreed timelines
  • Initiative and fast learning Abilities
  • High Customer Focus
  • Choose the country (Romania), then the desire position and click Apply Now
  • Complete the registration process
  • Attach your CV and Letter of Intent
80

Security Analyst Resume Examples & Samples

  • Interact with dedicated Security Analysts
  • Processing of security alerts, events, and notifications (e.g. via email, ticketing, virus warning, intelligence feeds, etc.)
  • Notification of internal and/or external teams according to agreed alert priority levels, and escalation trees
  • Ownership to create and drive adoption of security operations procedures for detection and monitoring attacks. Be hands on, SME for attack and anomaly detection and continuous monitoring technologies
  • Automation and scripting of common tasks to increase efficiency
  • Configuration and maintenance of security tools and of security event management tools
  • Monitoring client’s IT infrastructure within contracted service levels
  • Coordinating and liaising with all relevant Dimension Data resources, Carriers and Clients to obtain information and/or action to enable resolution
  • Provide details about threat mitigation and remediation to customers
  • Ability to perform actions to determine cause and possible mitigation measure for security events with minimal supervision
  • Analyse and comment on monthly security reports to identify trends, vulnerabilities, and general concerns
  • Monitor events for suspicious events, investigation, and escalate where applicable
  • Prioritise threat analysis based on risks associated with each threat and working with the appropriate teams to ensure related communications are in line with company best practice and recommendations
  • Support senior cyber intelligence experts to provide additional subject matter in understanding new and emerging threats and providing initial high-level analysis of potential intrusions
  • Good understanding of malware forensics, network forensics, and computer forensics also highly desirable
  • Ability to statically and dynamically analyse malware to determine target and intention
  • Ability to uncover and document tools, techniques, procedures used by cyber adversaries in attacking managed infrastructure
  • Fluent English - spoken and written essential!
  • Experience with Wireshark, tcpdump, Remnux, decoders for conducting payload analysis
  • Knowledge of malware analysis, hacking techniques, latest vulnerabilities, and security trends
  • Understanding and experience in building SIEM rules and/or indicators of compromise for threat detection
  • Preferred: SANS/GIAC GCIA, GCIH, GCFA, GREM
  • Desirable: SANS/GIAC GPEN, GWAPT, ECSA, CEH, CHFI, CISSP
  • Desirable: Familiarity with threat intelligence and network forensic tools like ArcSight, Arbor, FireEye
  • Desirable: Previous experience in a SOC / CSIRT / CERT
  • Reliability to maintain focus on contracted deliverables at all times
  • Excellent interpersonal, co-ordination and problem solving skills
  • High level of initiative, accountability, professional diligence, attention to detail and ability to follow process
  • Ability to work un-supervised as well as being able to work as part of a team in a pressured environment
  • Proactive, flexible attitude to work with a willingness to constantly review and improve skills and process
  • Partnership, Personal Commitment and Multi- Cultural Strength
  • Excellent communication, interpersonal and coordination skills
81

Security Analyst Resume Examples & Samples

  • The Security Analyst Team Lead leads the daily shift operations within the Security Operations Centre(s). This involves working with global analysts, engineers, clients, and other security personnel to identify, triage, escalate and manage the response to incidents impacting or threatening the organisations information assets. The SOC is a 24/7 shift-scheduled security operations environment. The Team Lead liaises with local and remote resources in multiple time zones to successfully ensure delivery of service to our clients
  • Take responsibility for performance of daily business-as-usual delivery of our security monitoring service
  • Be hands-on to assist the team in delivery of security analysis, investigations, reporting, and tuning efforts
  • Ensure SLAs are met by the team in accordance with contracted deliverables
  • Help coordinate and schedule shift resources, prioritising daily security operations tasks
  • Leading security incident response efforts, and coordinate with clients and/or internal teams for ongoing security response actions. Perform follow-on root cause analysis and improvement plans
  • Maintain and optimise security operations process and procedure documentation
  • Manage and report on the team’s performance including morale, mentoring and coaching
  • Ensure the team alignment with overall business objectives
  • Conduct skill assessment sand gap analysis to determine training requirements
  • Handle internal and client escalations by engaging with key stakeholders
  • Oversee that the team follows published SOC policies and procedures
  • Be a subject matter expert across the business’ security monitoring service
  • Conduct verification and validation of reporting security incidents to minimise false positives and increase incident detection rates
  • Reports to Manager MSS Response Services
  • You have a broad knowledge of Security technologies and products (e.g. SIEM systems, Security Analytics, end-point protection solutions, firewall technology, IPS, WAF, etc.)
  • Prior experience working in a SOC/CSIRT for at least 3-5 years
  • Product Certifications in SIEM, Security Analytics, AV, Log Management
  • Strong knowledge of security standards including ISO27001, ASD, PCI DSS
  • Extensive experience dealing with malware, attack vectors and the ability to perform pattern analysis
  • Bachelor degree or equivalent combination of education and (work) experience
  • Wish to have
  • Industry Certifications: CISSP, CISM, CISA, CEH, CHFI
  • SANS Certifications: GCIA, GCIH, GREM, GCFA
  • Positive attitude with exceptional customer service skills
  • Excellent communications skills
  • Ability to influence and challenge employees
  • Ability to take decisive action, based on the available information, in a timely manner
  • Must be open, friendly, and a team-player to successfully drive the team to achieve greatness
  • Experience in managing stress & workload to ensure success & continuity of security operations
  • Ability to juggle multiple projects, tasks, and personnel concurrently
82

Security Analyst Resume Examples & Samples

  • Monitor reports and incident reports, analyze, and resolve problems in order to assist with information security
  • Professionally maintain relationships with internal and external customers
  • Acquire and enhance understanding of product knowledge
  • Support and participate in projects.and products
  • AS or Equivalent Experience
  • Organization and analytical skills
  • Written and oral communication skills
  • Knowledge of LEXIS-NEXIS procedures and products
  • PC & technical knowledge
  • Ability to represent LexisNexis and the Security team in a professional and positive manner
  • Ability to work as a valued member of a team
83

Security Analyst Resume Examples & Samples

  • Monitor the compliance of the Information Security program, including conforming to policies, standards and procedures in place to maintain operation stability, plus ensure associated company policy and regulatory obligations are adhered to
  • Implement, and maintain technical Cyber Security capabilities, including enhancing enterprise security monitoring, cyber-intelligence, incident response, data loss prevention, and other security processes and solutions
  • Continuously assess, rate, and report on internal and external threats to the company’s information security posture. Evaluate, recommend and implement reasonable security solutions to mitigate identified threats
  • Assist in the preparation of Information Security reports and measuring performance against Key Performance Indicators (KPIs), as directed by management
  • Act as security subject-matter expert (SME) by providing best practice guidance on how systems should be deployed or architected
  • Perform periodic risk and vulnerability assessments of critical systems and infrastructure to assess the information security risks to the Company. Recommend mitigating controls or procedures to eliminate or minimize identified risks
  • Promote information security training and awareness by developing, maintaining, and delivering information security training and awareness program
  • Represent information security considerations in approved System Development LifeCycle, Change Management, Production Support and technology-enabled projects
  • Monitor changes in the technical, legal and regulatory arenas affecting Information Security
  • Experience with Splunk (SIEM-Security Incident Event Management system)
  • Articulate on Information Security processes and principles
  • Security architecture hardening and configuration knowledge for applications, servers, database, and webserver-tier
  • Experience with performing risk assessments
  • Understanding of contingency planning, including Continuity of Operations Plans (COOP) and Disaster Recovery Plans (DRP)
84

Security Analyst Resume Examples & Samples

  • Monitor a strategic, comprehensive corporate and federal information security monitoring and operation program to ensure the integrity, confidentiality and availability of information owned, controlled or processed by the organization
  • Daily security activities related to the protection of corporate and other federal assets
  • Ensure that SoftLayer is in compliance with all applicable federal directives and policies regarding securing and monitoring of information
  • Assist in risk assessment duties including reporting and oversight of remediation efforts and change control
  • Detect and assist in security incidents and events to protect corporate and federal assets
  • B.S. in Computer Science or Engineering Preferred
  • GCIA, GCIH, or similar certification preferred
85

Security Analyst Resume Examples & Samples

  • Assist in the implementation, monitoring and support of access control, data protection, system integrity, system reliability, system audit, and recovery methods & procedures
  • Report on information security issues related to network and systems
  • Work with IBM on vulnerability management scanning of networks
  • Work with IBM on reporting and alerting with Qradar SIEM tool
  • Review internal security controls for the enterprise are appropriate and operating as intended
  • Work with senior security team members to support IT projects
  • Assist with forensic work utilizing tools such as McAfee and Cisco AMP
  • Work with IBM operational team on security issues and security requests in Americas APAC and EMEA regions
  • Identify and communicate to management the cause of all Security incidents, making recommendations as to how the specific incidents can be avoided in the future
  • Keep up-to-date on all the latest security trends and training
  • Perform other duties as assigned by management
  • Possession of/working towards a relevant BA/BS degree or equivalent experience
  • One to three years of experience in information technology and/or security
  • Working with vendors, endpoint and/or network security, and compliance testing are pluses
  • Must demonstrate strong skills in the areas of communication, analysis, and organization
  • Must be available during off-hours for participation in scheduled or unscheduled activities
86

Security Analyst Resume Examples & Samples

  • Developing risk analysis methods for game production environments
  • Monitoring and detecting potential risks along with counselling and proposing solutions
  • Drafting policies, standards and processes to optimize and ensure secure project data management
  • Contributing with the implementation of security measures within game projects
  • Raising awareness among game project stakeholders regarding security
  • Informing IT and Security & Risk Management teams of security related project needs
  • Supporting the implementation of anti-piracy protection solutions
  • Performing security evaluations
  • Facilitating operations and minimizing negative impacts in order to optimize ROI
  • Interpreting potential or realized risk brought forth by new technologies
  • Evaluating, developing and maintaining the physical security environment for the local studio
  • You probably have a degree in computer science
  • Experience from a similar position, not necessarily within the gaming industry
  • General IT knowledge
  • Experience with Microsoft and Unix operating systems
  • Knowledge of the main aspects of computer security, including processes and technologies
  • Pedagogical approach when interacting and communicating with representatives from different sectors and audiences
  • Ability to make decisions quickly in a constantly changing environment
  • Technical or audit certification in computer security (CISSP, CISA, ect.)
  • Experience in developing corporate policies or guidelines
  • Experience in maintaining physical security environments
  • Knowledge of Perl and Powershell
  • Knowledge of anti-piracy technologies
  • 2-3 years experience in auditing
87

Security Analyst Resume Examples & Samples

  • Provide support to HP partners on investigative programs, with key functions including but not restricted to data collation and analysis, investigations management, interviewing of witnesses and subjects, and intelligence database and information systems management. The key areas of focus will be the Supply Chain Security Program. Investigative support may also be provided to other security functions, including other areas of Brand Security and IP related investigations
  • Minimum 5-7 years of varied IP / brand protection investigation experience
  • Experience of research, intel and data analysis and IT systems would be an advantage
  • Bi-lingual English/Spanish
88

Security Analyst Resume Examples & Samples

  • 1) 3+ years of hand on experience working on an incident response/operational support team
  • 2) 3+ of experience working with monitoring tools
  • 3) 3+ years of experience working with scanning devices/applications
  • Perform analysis and make recommendations (e.g. in partnership with other organizations, evaluate vendor security products from an incident response life cycle perspective; review impact of information systems to determine if they add value in assessment of risk; review and comment on security architecture)
  • Manage solutions to accommodate new event sources, automate event analysis, and correlate events for investigations
  • Analyzing and assessing potential security risks, developing plans to deal with such incidents by putting measures in place such as monitoring and auditing systems for abnormal activity, and executing corrective actions
  • Industry and Customer Engagement (e.g. contribute in industry best practices in security operations; speak at industry conferences and participate on committees focused on security incident response; stay current on industry trends)
  • Online troubleshooting, upgrades, and break/fix
  • Produce high quality documentation (e.g. document design, code, and operationalize processes, standard operational procedures, operational "run books", etc... to ensure re-use / succession of ownership)
  • Evaluate and integrate new event source
  • Communicate status (e.g. report on progress against technical plan; timely escalation of issues and risks; ability to explain technical solutions to a non-technical audience)
  • Automate routine tasks
  • Bachelor Degree in Computer Science or Engineering
  • Technology solution deployment
  • Intermediate knowledge of security mechanisms such as authentication and authorization techniques, data validation, and the proper use of encryption
89

Security Analyst Resume Examples & Samples

  • ) Experience with Systems Analysis - the ability to look at Security data and decide what possible risks are posed and more importantly who you need to collaborate with to rectify the potential risk
  • ) Engineering experience implementing and troubleshooting SEIM tools
  • *NO CORP TO CORP***
90

Security Analyst Resume Examples & Samples

  • Perform incident response and/or analysis of security alerts; identify if alerts are false positive or not
  • Perform monitoring and analysis of the security environment through the use of a SIEM tool (ArcSight or QRader, for example)
  • Operates programs and processes such as Vulnerability Management, Third Party Assessments, System Hardening and Security Requests
  • Supports the technical execution of Incident Response and Event Monitoring
  • Research and prepare periodic and ad-hoc reports
  • Develop and maintain documentation for supported processes and procedures
  • 3+ years of experience in Information Security Required
  • 3+ years of experience in Active usage and/or support of Information Security systems and activites Required
  • Information Security certifications such as the CISSP,
91

Security Analyst Resume Examples & Samples

  • Must have the demonstrated ability to work with a diverse team and lead/assist in developing and improving an information security program of a large enterprise
  • Knowledge of, and experience with regulatory and compliance information security frameworks, standards, and best practices (NIST, COBIT, HIPAA, SOX, PCI-DSS, ISO 27000 series, etc.)
  • Full proficiency with vulnerability assessment and management tools (HP Web Inspect, Metasploit, CORE IMPACT, Qualys)
  • Excellent attention to detail and follow through
  • Strong verbal and written interpersonal communications skills and ability to deal effectively with business partners, peers and management
  • Competent knowledge of risk management and threat intelligence analysis
  • Ability to establish working relationships with ICS/SCADA vendors to understand and influence adoption of cyber security standards and leading practices
  • Advanced knowledge of ICS/SCADA industry, architecture, devices, equipment, and protocols
  • Specific knowledge of NIST 800-82, ISO 17799/27002
  • CEH, OSCP, GPEN, GCIH, GXPN, CISSP and related Security Certifications
92

Security Analyst Resume Examples & Samples

  • Experience with Cisco AMP (advanced malware protection) and CiscofireSIGHT(formerly known as Sourcefire) - The person should be comfortable with security investigation using these tools and remediation
  • Experience understanding and determining vulnerabilities
  • Experience monitoring and assessing security threats
93

Security Analyst Resume Examples & Samples

  • Configure/operate/audit various information security controls such as antivirus/antimalware, firewall, etc. to ensure control effectiveness and report/present results to management and technical staff
  • Analyze findings from security monitoring systems, such as Data Loss Prevention, Firewall, and Security Information Event Management consoles, to identify and respond to security incidents
  • Conduct vulnerability scans and penetration tests to identify security risks and report findings to system owners and advise on remediation as needed
  • Participate in security incident response by conducting forensic investigations, isolating malware, identifying attack vectors, and providing guidance on containment and remediation
  • Participate in organization's disaster recovery and business continuity planning, testing, and execution
  • Respond to service requests received from end users or other teams (e.g. for investigation of security events, reviewing change requests on systems impacting security, or addressing user access requests)
  • Assist in delivering security awareness training for the organization's staff and students as needed. Maintain knowledge and advise staff and students on organization's policies, standards, and procedures relating to information security
  • 24×7 on-call support rotation may be required
  • Performs other related duties incidental to the work described herein
  • Ability to configure operating systems commonly used in servers, desktops, and mobile devices
  • Knowledge of networking equipment and practices used in an enterprise IT environment
  • Excellent troubleshooting and problem-solving skills
  • Ability to analyze data using spreadsheets, databases, scripts, etc
  • Ability to work in a team environment and take direction and guidance
  • Ability to research and learn outside of formal training
  • Solid time management and organizational skills and ability to complete tasks as assigned
94

Security Analyst Resume Examples & Samples

  • 3+ years performing forensic analysis on windows or unix systems
  • 1+ years leading Intrusion Analysts in a SOC environment and interacting with vendors to support proof of concepts. Being over a team of analysts and sending a status update for the shift to upper management
  • 20% of this resources time will be spent coordinating with other external stakeholders to obtain critical information needed to gather correct evidence
  • 10% of this resource time will be spent meeting with upper management providing incident updates on a daily/weekly basis
95

Security Analyst Resume Examples & Samples

  • Experience with data quality controls
  • Basic understanding of database structures
  • Working knowledge of Microsoft suite of products
96

Security Analyst Resume Examples & Samples

  • Network and operating system troubleshooting
  • Vulnerability assessment and hardening of systems, network, and security devices
  • Anti-virus, anti-spam, and anti-malware
  • Secure electronic data transmission
  • Knowledge of security log reviews
  • O Experience in drafting information security policies and procedures in consultation with the Security Architect congruent with standards and industry best practices
  • Assist in defining information security policies and procedures
  • Operate and manage the vulnerability management toolkit to detect vulnerabilities and security risks proactively across IT assets
  • Work with extended IT teams to identify and define system security requirements, configure various security-monitoring tools, and monitor security events
  • Develop and execute corrective action plans and remediation plans for the identified risk in order to protect the company’s computer systems, networks, and vital information assets and mitigate the risk of exploitation
  • Review and determine which alerts are relevant and tune all security appliances for relevant alerting levels
  • Participate in event and incident responses, as needed
  • Maintain the risk register and drive to closure identified risks with owners and custodians
  • Develop scripts to simplify data collection and other laborious tasks that are necessary throughout the scanning and vulnerability assessment process
  • Prepare comprehensive reports, including assessment-based findings, outcomes, and propositions for senior management review and to further security enhancement
  • Liaison with security vendors for support and expert advice
97

Security Analyst Resume Examples & Samples

  • Proxy server/appliance infrastructure health and support
  • Incident Management and resolution
  • Problem Management
  • System upgrades, patching
  • Capacity management
  • Vendor case management
  • Vulnerability remediation
  • Disaster recovery planning and testing
  • Hardware end-of-life replacements
  • Controls verification
  • Managing and Maintaining the Forcepoint (Websense) infrastructure across multiple deployments worldwide, including the troubleshooting and upkeep of business-critical devices
  • PAC file modification and troubleshooting
  • Authentication method familiarity, specifically Kerberos and NTLM
  • Work-to-resolution issues with site delegation, proxy enforcement, port connectivity, performance degradation, DNS resolution etc
  • Professional aptitude with certificates, including Root CAs, Subordinate CAs, and the import process etc
  • Familiarity with Microsoft Threat Management Gateway (TMG) functionality, configuration, and utilization
  • Analysis of network captures collected via Wireshark or Network Monitor (TMG)
  • Pursue creative and innovative approaches with regard to solution implementation, root cause analysis, and proactive assessment of potential incidents, to accommodate the needs of a high-reliability production environment
  • Ability to work closely with key groups throughout the organization to delegate tasks appropriately and communicate effectively in a site-wide effort to resolve complex issues with great efficiency
  • Willingness to perform in, and adapt to, a rapidly changing environment with dynamic needs and ever-evolving demands
  • Ability to properly prioritize incoming issues based on their respective severity and business impact
98

Security Analyst Resume Examples & Samples

  • Monitor security events through alerts from SIEM or other security tools
  • Review alerts escalated by end users
  • Manage end user and security services customer initiated incidents and initiating trouble tickets
  • Understanding of common network services (web, mail, DNS, authentication)
  • Knowledge of host based firewalls, Anti-Malware, HIDS, endpoint security tools
  • In depth Desktop OS and Server OS knowledge
  • Strong analytical and problem solving skills
  • Knowledge / awareness of SIEM technologies and platforms such as Splunk, Arcsight, QRadar or others
99

Security Analyst Resume Examples & Samples

  • Excellent team work, passion and drive to succeed and combat Cyber threats
  • Knowledge of SIEM technologies and platforms such as Splunk, Arcsight, QRadar or others
  • Threat Intelligence / feeds platform integration in SOCs
  • Thorough knowledge of how the systems support Security Monitoring for the Analysts
  • Cyber Incident Response
  • Strong analytical and problem solving skills
  • Network monitoring technology platforms such as Fidelis XPS, RSA or others
  • End point protection tools, techniques and platforms such as CarbonBlack, Symantec, McAfee or others
  • Internationally recognized technical certifications in relevant areas
  •  Hands-on experience with TCP/IP, security concepts, WAN and LAN concepts, Routing Protocols, Firewall Security policies
100

Security Analyst Resume Examples & Samples

  • Knowledge of stand-alone automated configuration management systems (e.g.: Chef Solo, Ansible, Kickstart)
  • Knowledge of IT defensive best practices
  • Ability to pay attention to details, ensuring accuracy in documentation and data. (Individual positions within this labor category have additional qualification and competency requirements.)
101

Security Analyst Resume Examples & Samples

  • Perform assessments of current security technology and authentication systems and evaluate against HIPAA, Federal and State Information Protection and Privacy regulation, CHI Security Policies, and other relevant regulations and best practice controls pertaining to the protection of Enterprise information assets with respect to security and privacy
  • Develop and advance IT Security policies, standards and procedures in conjunction with the application and technology teams responsible for the day-to-day systems configuration and operation
  • Proactively audit the network security environment and provide actionable information pertaining to risk discovery and remediation technologies, techniques, and processes
  • Assess and review new and existing technology infrastructure to identify key risk areas, and ensure adequate levels of control are in place to address those risks and develop risk mitigation techniques and processes to ensure that all reviews as actionable by system managers and the operations staff
  • Consults, advises, and collaborates with department staff and personnel in IT departments to coordinate data security related activities
  • Assists senior IT Security analysts with developing and implementing of a security incident response process and the maintenance of all associated documentation
  • Must have experience and demonstrate knowledge and/or skills in the following areas
  • Unstructured Data Protection
  • Data At Rest Scanning
  • Experience in Windows, Linux, UNIX (AIX); TCP/IP, CISCO routers and switches, Encryption, Defense Strategies, and Hacker Techniques
  • Experience in packet analysis, routing protocols, access control, and syslog
  • Experience with network applications, such as Firewall Security and Virtual Private Networking
  • Experience with Ethernet and TCP/IP
  • Knowledge of voice communications (VOIP)
  • Adheres to and exhibits our core values
102

Security Analyst Resume Examples & Samples

  • Manage the daily customer requests for changes to their security infrastructure
  • Prepare changes for security devices such as firewalls, intrusion detection and prevention systems, identity access management etc
  • Participate in new customer integration projects and services and prepare implementations
  • Reviews and interprets security alerts and provide diagnostics in the management of incidents to support clients
  • Depending on the nature of the security threat, assess and develop mitigation measures to ensure that appropriate treatment is applied, and ensure that customers are informed
  • Take proactive measures to manage all perimeter security equipment or associated components which may be interrupted or affected as a result of threats or vulnerabilities
  • Configure, install, manage and maintain security devices and provide general information and recommendations on security best practices
  • Develop documentation associated with maintenance releases and keep them updated
  • Observe security management best practices
  • Thorough knowledge of devices and network security infrastructure (“hands-on")
  • Practical experience recognized in the implementation, daily management and troubleshooting firewalls from multiple vendors
  • Proven experience in the daily management and troubleshooting of intrusion detection and prevention systems (IPS)
  • Experience in troubleshooting security solutions including authentication capabilities, authorization, and encryption as well as securing devices access
  • Ability to work on multiple clients and multiple technologies
  • Be able to work under pressure (required during incidents)
  • Good communication skills, writing and presentations
  • Hands-on security certifications from major vendors
  • Experience working with the following security management consoles of Checkpoint, Juniper, Cisco, Tufin, Fortinet, Mc Afee, Arcsight etc
  • Knowledge of offensive and defensive security operational tactics
  • Knowledge of security information events management (SIEM)
103

Security Analyst Resume Examples & Samples

  • Must be admitted student in a recognized academic institute with at least 3 semesters left to graduation
  • Knowledge of Linux and opensource solutions
  • Good interpersonal communication skills and written communication skills in English
  • Self-motivated, proactive, and able to work in a fast paced environment with rapid project cycles
  • At least 2 years of experience with running PKI infrastructure
  • At least 2 years of experience with advanced configuration of monitoring systems
  • Good Knowledge of Security management and solutions
  • Knowledge of Amazon AWS systems
104

Security Analyst Resume Examples & Samples

  • Experience with Cisco network design and maintenance on an enterprise level
  • Knowledge of network security as it relates to firewalls and network devices
  • Experience with network security tools (fire eye, tanium, nessus, qualys, symantec, proof point, log logic)
  • 50%-60% of time will be spent applying technical security skills and the rest of the time will be spent on compliance and documentation
  • Experience with analyzing, designing, implementing, documenting, supporting, and reviewing information security solutions for mainframe systems, distributed systems, networks, and audit compliance
105

Security Analyst Resume Examples & Samples

  • Process requests for PKI services, cryptographic keys, SWIFT relationships and access to limited systems
  • Provide front line support for inquiries and issues regarding the requests for certificates, cryptographic services, SWIFT relationships and staff access
  • Troubleshooting issues with the implementation of any certificate, key, relationship and /or access
  • Ensure cryptographic key requests adhere to the Bank’s crypto policies and standards and industry regulations and best practices
  • Ensure concerns and questions about cryptographic keys and PKI are adequately addressed in terms of security standards, regulations and policies where applicable
  • Produce, review and update documentation and reports to ensure accuracy, completeness and compliancy to applicable standards and/or regulations
  • Efficient management of the Certificate Renewal and Key Life cycle
  • Maintain continuity of critical processes by participating in contingency
  • Possesses a university degree/college diploma in the field of Information technology or equivalent work experience, and/or 1 to 3 years of working experience in a customer oriented IT environment, exhibiting basic problem diagnosis and resolution techniques
  • Demonstrates basic knowledge of the evolving information security systems, network concepts and protocols, as well as Information security concepts/framework
  • Knowledge of Certificate Authority [CA] processes.Working Knowledge of Active Directory an asset
  • Displays working knowledge of security processes, requirements and industry standards in relation to one of the following
  • S.W.I.F.T. operations
106

Security Analyst Resume Examples & Samples

  • Operate as First/Second level support to a 24x7 Cyber Defense Response Centre
  • Act as the primary point of contact for reporting, monitoring, and tracking reported events and operational events
  • Ensure that all incidents are recorded and tracked to meet audit, compliance and legal requirements
  • Aware of Types of attacks (DOS, DDOS etc.)
  • Good Investigative, analytical and problem solving skills
  • Incident Handling and Incident Response experience preferred
  • Good Knowledge in vulnerability assessment
  • Knowledge in the following: Firewalls, Intrusion detection and prevention systems, anti�virus and content filtering, URL filtering, authentication solutions, switches, routers, VoIP, DMZ
  • Knowledge in Linux, Splunk & scripting Languages(Shell Script, Vb script, Python etc) is a definite plus
107

Security Analyst Resume Examples & Samples

  • Provide technical solution of to security remediation issues
  • Perform as an integral player in incident response plans
  • Participate in security design reviews during project transition
  • Manage web application firewall rules in non-production environments
  • Create & maintain operational security documentation repository
  • Create & maintain application security incident response plans
  • Understand and explain Static code analysis & penetration test results to teams
  • Proactively and reactively resolve business challenges using a combination of skills defined above
  • Active participant in incident, problem, and change management processes
  • Consider opportunities to automate manual processes
  • Participate as required to ensure project delivery for partners is successful. This may include providing project leadership and/or Subject Matter Expert accountabilities
  • LI-AJ2
108

Security Analyst Resume Examples & Samples

  • Bachelor's degree in Mathematics, Computer Science, Quantitative Social Science, Physics, Engineering, or other directly related field
  • Skills in Program Protection Planning
  • Experience working with ITAR related issues
  • Bachelors and six (6) years or more of related experience; Masters and four (4) years or more experience; PhD and 0 years related experience
109

Security Analyst Resume Examples & Samples

  • Minimum of 3 years IT experience within Identity Management
  • Minimum of 1 years IT experience with Identity Management solutions
  • Understands technical and business discussions relative to future architecture direction aligning with business goals
  • Understands concepts of setting and driving architecture direction
  • Familiar with elements of gathering architecture requirements
  • Demonstrated knowledge of security and protection of information protection data
  • Demonstrated skills in technology and infrastructure architecture
  • Demonstrated ability to provide clear guidance in complex and distributed environments
  • Minimum of 7 years of experience in application development/design and architecture, business planning, technology operations, and project management in an information systems environment
  • Knowledge of Enovia PLM and the security layer associated to it –knowledge of the 3D Experience platform
  • Working knowledge of Supplier Document Exchange, specifically requirements around sourcing access to internal data
  • Significant knowledge of Engineering function and IT operating environment
110

Security Analyst Resume Examples & Samples

  • Ensure users access only data and systems for which they are authorized and have a need-to-know, and assume only those roles and privileges for which they are authorized
  • Assist in IT audit, IT risk assessment, controls analysis and IT review process including planning, reporting, and making/writing recommendations
  • Responsible for managing and maintaining a variety of recurring tasks such as: user access reviews, policy updates, and testing
  • Own and maintain of Information Security Service Catalog
  • Develops detailed reports and metrics based on in-depth analysis and presents to the Security team on a periodic basis
  • Utilize various tools to perform internal security assessments
  • Analyze available data sources to identify anomalies and trends and make recommendations to enhance network, system and data security
  • Assist in accurate and precise real-time analysis and correlation of logs/alerts from a multitude of devices with a focus on the determination of whether said events constitute security incidents
  • Provide incident response support and identify and prioritize potential threats
  • Assist system monitoring, system auditing, and integrity check functions daily, monthly, quarterly, and annually as dictated in Information Security policies
  • Assist the monitoring of the infrastructure security and ensure secure user access
  • Promote a culture that considers cybersecurity in all activities
  • Support IT teams on deployment and maintenance of cybersecurity tools, techniques, and reporting
  • Participate in change and configuration control processes and reviews
  • Work with Security and Compliance Director to implement cybersecurity program encompassing directives of OCC, FDIC and FFIEC, as well as, other regulators within the financial services industry
  • Work with company vendors to ensure compliance with Vendor Management policy
  • Bachelor's degree from accredited college or university in Management of Information Systems (MIS), Computer Science or other technology related fields or equivalent working experience
  • Minimum of 5 years of demonstrated experience in information security programs
  • One or more information security certifications preferred (i.e., CISSP, CISA, GIAC, CFEC, CEH, etc.)
  • Network/systems administration, programming, or development background is required
  • Demonstrated work experience in the use of security principles; risk assessment policies and standards; information security best practices, products and technologies; and network technologies
  • Demonstrated work experience and proficiency in a broad range of operating systems, platforms, client/server and web applications, and security services such as authentication and encryption technologies in the areas of network security skills and knowledge of TCP/IP protocols and associated vulnerabilities
  • Demonstrated work experience in wireless security, virtualized security, and red teaming
  • Demonstrated work experience in the preparation of written reports, training materials, and conducting meetings and training sessions
  • Requires the understanding of risks associated with new technology and the ability to define appropriate controls
  • Requires proficient skills in the use of Microsoft Office software applications
  • Self-motivated with excellent organizational skills
  • Strong interpersonal skills to influence, motivate, persuade, mentor and train various groups or individuals
  • Experience working collaboratively with business owners, subject matter experts, Software Engineering and Infrastructure teams during implementation of security related requirements
111

Security Analyst Resume Examples & Samples

  • Security incident handling involves investigating issues to determine if there is a real security incident or a false positive, notifying customers as needed, and sending customers standardized emails specifying the steps they need to take to fix the problems. You are often the first to see an issue, or the issue may have been escalated from another team/management
  • Change management involves processing change requests relating to security devices such as firewalls, intrusion detection systems and RSA SecurID servers
  • Device and health monitoring involves troubleshooting network connectivity problems concerning managed security devices, often time working with Advanced Support Team engineers and/or vendors/partner technology teams on device replacement/reconfig
  • Focus on SLA attainment for your shift by ensuring ticket buckets have been "scrubbed" and that issues are followed through until completion or escalation
  • Assisting senior analysts with
  • 2+ years of experience responding to and investigating network threats
  • Experience analyzing packet capture/payload
  • Experience with ArcSight, Splunk, Cisco ASA, JunOS, Fortinet
  • Experience delivering on customer service requests
  • The ability to work an overnight schedule of either Sunday – Thursday OR Tuesday – Saturday from 11 p.m. – 7 a.m
  • The ability to qualify for a government security clearance
  • Associate’s or Bachelor’s Degree
  • Experience with Sourcefire, Checkpoint, Tripwire, Bluecoat Proxy
  • Knowledge of ITIL and/or previous work in an ISO operating environment
112

Security Analyst Resume Examples & Samples

  • Monitor systems to confirm functionality
  • Continued support for site admins as required
  • Assist if additional equipment is needed
  • Design systems based on Policy and/or code requirements
  • Work closely with projects who have need for new Physical Security equipment
  • Supervise vendors during installation of Physical Security equipment
  • Test and verify with Vendor that systems are functioning properly
  • Perform other duties as assigned by leadership
113

Security Analyst Resume Examples & Samples

  • Experience with cisco network design and maintenance at an enterprise level
  • Experience with network security tools (at least 2-3 of the following): fire eye, tanium, tripwire, siem, nessus, qualys, gfi, symantec, proof point, log logic, iron part
  • 50-70% of the time will be spent applying technical security skills and 30-40% of your time will be spent on compliance and documentation
114

Security Analyst Resume Examples & Samples

  • Microsoft technology stack experience
  • Server cyber security testing
  • Business software packages
  • Experience investigating, analyzing, testing, diagnosing, and correcting electronic systems
  • New application installation on secure server environment
  • Develop and update installation documentation
  • Cyber Security (STIG) testing
  • Engineering support and documentation of systems
  • Maintenance and logistics documentation
115

Security Analyst Resume Examples & Samples

  • Use enterprise vulnerability management tools to identify the systems that pose the greatest risk to the network and working with other teams to resolve identified security problems
  • Evaluate web applications for security vulnerabilities and communicate with owners to remediate concerns
  • Participating in a split-based security monitoring team (Basel, Switzerland and San Francisco, USA) that monitors for and responds to security events on Roche networks, working with external partners when necessary including external penetration testers and bug bounty participants
116

Security Analyst Resume Examples & Samples

  • Develops a comprehensive approach to performing security assessments and reviews
  • Leads the effort to identify and analyze security threats and trends
  • Owns the “Role Based Access Management” process, including interfacing with all areas of the organization to understand specific needs of each functional area
  • 7+ years progressive experience in information security, preferably in a healthcare environment
  • 7+ years network security experience
  • Strong knowledge of government and or industry regulatory requirements (HIPAA Security; NYS Rule 173, etc.)
  • BA/BS – Bachelors Degree or equivalent required
117

Security Analyst Resume Examples & Samples

  • Assisting in analyzing and documenting as-is capabilities of business processes, people and technology etc
  • Developing and testing new business processes / capabilities, and supporting technologies
  • Assisting in documenting the recommendations of subject matter experts
  • Developing deployment deliverables (communications, training, etc)
  • Designing activities (e.g. writing functional designs)
  • Providing insights and ideas to the project team by conducting primary or secondary research as needed
  • Performing portions of technology architecture and infrastructure design activities
  • Participating in portions of technology build, test and deployment activities
118

Security Analyst Resume Examples & Samples

  • Web Access Management such as CA SiteMinder or SecureAuth
  • Authentication such as Active Directory or SecurID
  • Vulnerability Management such as Qualys
  • Data Loss Prevention such as Symantec or RSA
  • Endpoint Security such as Symantec or McAfee
  • Enterprise encryption such as Venafi
  • Network Security such as Checkpoint or Stealthwatch
119

Security Analyst Resume Examples & Samples

  • Bachelor's degree, or an equivalent and relevant formal academic/vocational qualification
  • Knowledge and experience with scripting and programming (Python, Perl, and more) are highly preferred
  • CompTIA Security+, SANs GIAC Security Essentials (GSEC), GIAC Certified Security Analyst (GCIA), Carnegie Mellon SEI Certified Incident Handler, Microsoft Certified Solutions Expert, or Certified Ethical Hacker (CEH) certifications
120

Security Analyst Resume Examples & Samples

  • Position requires strict adherence to confidentiality as well as protecting the identity of callers, clients as well as company assets
  • Excellent interpersonal, customer service, communications, problem-solving skills
  • Must be able to make critical, independent decisions in volatile and emergency life threatening situations with minimal supervision
  • Excellent computer skills, including a working knowledge of Windows, Excel, Word, Outlook and Adobe PDF files
  • Familiarity with Verizon Corporate structure and the Verizon Code of Business Conduct
  • Bachelor’s degree or equivalent work experience. Generally requires a minimum of 2 years’ experience
  • Good working knowledge of wireline and wireless telephony network and operations
  • Possess a good working knowledge of Verizon legacy and web-based applications
  • Ability to read and understand legal documents including, but not limited to Subpoenas and Court Orders. Although not a requirement, some functions of the organization may require application and passage of U.S. Government Secret (F.I.S.A.) Clearance
  • The ability to work off shifts (as required) with minimal direct supervision and function effectively under stressful situations. Rotating shifts, nights, weekends and holidays are required as needs of the business dictate. Required to be accessible 24x7x365 days a year
121

Security Analyst Resume Examples & Samples

  • Tasked with diagnosing and resolving technical network issues
  • Plans and prepares detail practices and procedures on various technical processes
  • Designs and configures firewall network security policies related to enterprise network access
  • Designs and configures security threat management reports
  • Identifies and tests network vulnerabilities as well as conducts research in areas of information systems and network security
  • Analysis and research of security alerts
  • Provides end user network security instructions
  • On call support for centralized managed network security system
  • Maintains firewall administration, intrusion detection and virus protection systems
  • Subject Mater Expert(SME) on Wifi deployments
  • 5 years experience in Network Security
  • Knowledge of the financial industry and operational functions
  • Knowledge and experience in Meraki and Cisco deployments
  • Must be able to make decisions and solve problems that are general in nature and for which there may not be a precedent
  • Intermediate level of technical skills required to complete assignments
  • Comprehensive understanding of security concepts required
  • Strong written and oral communications skills required
  • Must be able to work independently and within a team
  • 20% average
122

Security Analyst Resume Examples & Samples

  • Exercise a technical advisory role; endorse a mentoring approach to other members of the Security Operations Management team
  • Coordinate projects and operational activities to enable the development of beneficial solutions for customers in the context of a high performance security operation
  • Supervise the implementation and the development of new technologies and new services, analysis of operational impacts and network management processes, training and management platforms plans
  • Analyze the effectiveness of the service and operational security processes and propose necessary adjustments
  • Perform comparative analysis on the results from the industry specific constant evolving threats, vulnerabilities and all other malware launched on the Internet
  • Take proactive measures to manage all security equipment under the responsibility of the team
  • Observe strict security protocols associated with all security management practices
  • Authenticate all requests for services by applying authentication techniques in constant evolution
  • Support sales as a subject matter expert and provide adequate assistance to meet the bid or help them provide the best possible solutions to meet the needs expressed
  • Design Bell Network to keep it secure of any type of cyber attacks
  • Select and/or approve new technologies
  • Perform security audits to evaluate possible breach of security. The audits include penetration test and scanning of the Network to identify vulnerabilities
123

Security Analyst Resume Examples & Samples

  • Bachelor's degree in management information systems, computer science, or related discipline is desired
  • Minimum 3- 5 years of experience in an information security discipline, with three or more years of practical experience in an incident response role
  • CISSP, SANS GCIH or GCFA, CISA, CISM, EnCER, ACE certification(s) and preferred but not required
  • Experience with forensic tools, such as Encase or FTK * Experience with investigating malicious code, including leveraging malware analysis tools and sandboxes * Experience with any scripting language, such as Python or Powershell * Experience with SQL databases * Experience with SIEM and/or log management tools such as LogRhythm or Splunk * Familiarity with security regulatory requirements and standards (such as NIST 800 series, ISO 2700x series, GLBA, FFIEC)
124

Security Analyst Resume Examples & Samples

  • Perform an assessment of government client to government agency's current IAM environment, processes and stakeholders
  • Work with client stakeholders to gather information needed for business application integration with SailPoint
  • Gather requirements and create system level requirements documents
  • Work with technical team to create system test cases and perform system testing
  • Create user acceptance test (UAT) scripts, set up UAT scenarios, and lead stakeholders through UAT
  • Document user guides and functional training materials based on vendor documentation tailored for specific clients
  • Deliver functional training in small group and "desk side" environments
  • Will work at various federal client sites throughout the DC metro area
  • Will be provided with training on SailPoint
  • Bachelor's degree in a related discipline and 7 years related experience
  • At least 1-3 years experience working directly with clients
  • P/IP, OSI model, operating system fundamentals (Windows, UNIX, mainframe), security technologies (firewalls, IDS/IPS, etc.) and application programming/scripting languages (C, Java, Perl, Shell)
  • Experience in process definition, workflow design and process mapping
  • Motivation to learn and seek guidance
  • 1-3 years experience with Identity and Access Management (IAM)
  • SailPoint
  • CISA, SIAM, CISSP or CAP a plus
125

Security Analyst Resume Examples & Samples

  • Monitoring & analysis of cyber security events from sources like SIEM, network and web application firewalls, EDR/AV, NAC
  • Incident Response (IR) activities, including investigating and escalating security events
  • Working with multidisciplinary teams and helping to improve protection processes
  • Providing initial response to security events like content filtering access requests, building security alerts, phishing emails and other social engineering attempts
  • Collaborating with other members of the Security team to perform root cause analysis and post-incident improvements
  • Responding to customer security questions
  • Building, managing and maintaining tools like SIEM, endpoint protection products, and vulnerability scanners
  • Maintaining, enhancing and contributing to the documentation around tools, processes & procedures
  • Interfacing with technical personnel and other teams as required
  • A general aptitude for problem solving. Above all, we value a Get [Stuff] Done attitude
  • Experience with SIEM, IDS/IPS, Firewall, Web Application Firewalls and Endpoint Protection technologies in a Security Operations Center (SOC) environment
  • BS or equivalent in an information technology related field (BSCS, BSEE, BSMIS) or 3+ years hands-on experience in the security operations field
  • Certifications including SANS/GIAC GCIH, EC-Council ECSA, CHFI, ECIH and similar are a plus
126

Security Analyst Resume Examples & Samples

  • Will be responsible for network and systems integrations relative to security
  • Duties and responsibilities may include vulnerability assessment and management, patch management, security monitoring, security information management (SIM), security tool tuning, drafting policies and procedures, review of firewall configurations, deploying security solutions, and network security design and implantation
  • Experience with firewalls and network security
  • A good understanding of systems and network infrastructure
127

Security Analyst Resume Examples & Samples

  • May function as a technical leader, either as a subject matter expert with proficiency in on or more defined area(s) of information security (network architecture, forensics, penetration testing, incident response, IT governance, risk management, etc) or as a generalist, with a broad knowledge of all aspects of the information security profession
  • May function as a team leader, responsible for supporting management in day-to-day personnel oversight and management activities
  • Through technical expertise, thought leadership, and effective communication, assists in developing and establishing the strategic direction for the information security program and development and enforcement of information security policies, standards, procedures, and processes
  • Actively surveys the external environment to identify emerging industry trends and technologies that are relevant to reducing the organization's information security risk. Conducts threat-modeling exercises and analyzes business objectives to identify, document, and establish security requirements for strategic IT initiatives
  • Leads complex information security initiatives, coordinating with project management and technical resources from other departments to achieve project objectives
  • Assists in the risk assessment and mitigation process by working with data owners and custodians to identify information assets, perform risk analysis, review or develop security plans, determine control objectives, perform control gap analysis, and recommend or implement solutions
  • Acts as a primary liaison to information security product and service vendors, escalating support issues and communicating product enhancement requests
  • As appropriate, participates in external professional organizations that are relevant to the objectives of the information security program
  • Develops and delivers training on information security policies, standards, procedures, and best practices for faculty, staff, students, and others
  • Identifies and assists in remediation of information security threats, including internal and external attackers, malicious software, malicious websites, social engineering, physical security, etc
  • Generally recognized comprehensive information security certification such as CISSP, CISM, GSEC, or equivalent
  • Experience in one of more technical domains of information security (network architecture, forensics, incident response, penetration testing, etc.)
  • One or more technical security certifications such as CEH, GCIH, GCFA, GCIA, CESA
  • One or more process/framework oriented IT certifications such as ITIL, COBIT, PMP, TOGAF
  • Experience with security compliance standards such as FERPA, HIPAA, PCI, GLBA
  • Experience with security standards or frameworks such as ISO, TAC202, SOX, PCI
  • Networking experience and/or certifications such as CCNA, CCNP, CompTIA
  • System Administration experience and/or certifications such as MCSE, CompTIA
  • Equivalent DoD experience and/or certifications for any of the above
  • Understanding of information system architectures
  • Broad experience and technical expertise in the design and use of state?of?the?art network security systems and concepts to produce high quality threat prevention, detection, and reaction
  • A demonstrated record of performing timely "fixes"
  • Troubleshooting and problem-solving skills
  • Knowledge of Linux or other operating systems is desired
  • Ability to work with little direction on projects associated with information system services
  • Ability to work in a team-oriented, collaborative environment; and maintain effective working relationships with those contacted in the course of work
  • Ability to take direction and guidance constructively
  • Ability to work closely with networking, systems, and application specialists
128

Security Analyst Resume Examples & Samples

  • Maintain an effective, courteous, and timely channel of communication with customers from initial inbound call or outbound contact to satisfactory resolution of all issues
  • Follow established identity assurance and access control procedures to guarantee the confidentiality and integrity of our customers’ sensitive data
  • Quickly and efficiently identify, troubleshoot, and resolve emergent customer network security issues with an objective of first-call-resolution
  • Monitor and manage multiple Event Monitoring and Incident Response ticket queues and triage/address as appropriate to meet established service level agreements for the systems in question
  • Maintain currency in ESOC and Windstream product and service offerings, as well as support objectives and requirements thereof
  • Fundamental understanding of the OSI model and the ability to apply concepts while troubleshooting individual customer issues. Understanding of IP Networking including, but not limited to, IPV4, IPV6, NAT, PAT and sub-netting
  • Ability to speak competently in regards to customer’s networks and network interconnects at all scales, and the Windstream Managed Network Security product suite
  • Troubleshooting and support of all features and functions of next-generation firewall devices, including: VPN configurations accommodating a range of topologies, integration of customer-owned AAA platforms, high-availability architectures of all kinds, and the full suite of Fortinet-supported UTM functionality
  • Basic understanding of all Managed Network Security platforms and the products and services supported by ESOC
  • Self-starter, highly motivated. Inclination toward self-study and continuing education preferred
  • Exceptional communication skills (written and verbal) and experience in a customer-facing service role
  • 1+ year experience in network monitoring (i.e., Netcool, HP OpenView, ArcSight, etc.)
  • 1+ year experience configuring and troubleshooting and basic firewall functionality, including IPsec
  • Experience with McAfee SaaS content filtering/web filtering products and/or McAfee IDPS products
  • Familiarity with basics of BGP and MPLS, with ability to understand basic packet flow from customer to Internet
  • Experience with basic networking concepts from host level to WAN
  • Familiarity with network security controls, policies, and procedures, and the role these play in a data network
  • Preference given to vendor-specific certifications (FCNSA, FCNSP, CCNA, CCNP, etc.)
129

Security Analyst Resume Examples & Samples

  • Enhance security team by operating software used to monitor and analyze information and raise awareness of events that go against company policies
  • Develop rules, alerts and reports based on team and business requirements
  • Provide information to IT teams, Corporate Security, Legal, Human Resources when requested
  • Upgrade systems to maintain support and to add fixes and new features
  • Update job knowledge by participating in educational opportunities and researching opportunities to further improve protecting company information
  • Enhance department and organization reputation by accepting ownership of inquiries and requests
  • Perform access reviews of unstructured data, file shares, etc and drive remediation by the data owners
  • Drive incident management process improvements
  • Interact with other IT teams, including assisting regional support efforts, and with vendors
  • Bachelors’ degree required (or equivalent work experience)
  • Minimum of 4 years’ experience in IT
  • Experience across different IT areas (e.g. networking, infrastructure, applications) preferred
  • Familiarity with several areas including, but not limited to: network protocols and standards, corporate IT Control Standards, and Active Directory
  • Strong analytical, communication and influencing skills. Conceptual skills and decision making ability
  • Demonstrated abilities to handle multiple assignments and perform in a cross-functional and global environment
130

Security Analyst Resume Examples & Samples

  • Two or more years of experience in a security monitoring/incident handling position
  • Strong communication skills and proven ability to engage with customers to understand their requirements
  • A Bachelor’s degree
131

Security Analyst Resume Examples & Samples

  • BS degree in safety, security, law enforcement or related degree is preferred
  • Five or more years of relevant experience to include technical knowledge of safety and security programs and procedures
  • Excellent communication skills with ability to manage multiple constituents is required
  • Ability to manage people and projects in a diverse and fast-changing environment with focus on client and customer services
  • Experience directing skilled, semi-skilled and non-skilled trade personnel is required
  • Ability to multi-task and solve problems
132

Security Analyst Resume Examples & Samples

  • LogRythm
  • RSA Netwitness
  • Symantec Message Labs
  • Fireray
133

Security Analyst Resume Examples & Samples

  • Help clients analyze key security and privacy issues and develop programs to meet business needs
  • At least 2 years experience in Federal PeopleSoft and Application Security Management
  • Current CISSP certification or other relevant security certification
134

Security Analyst Resume Examples & Samples

  • Effectively respond to case work relating to computer security vulnerabilities, phishing, malware, and forensic investigations
  • Ability to anticipate and respond to changing priorities, and operate effectively in a dynamic demand-based environment, requiring extreme flexibility and responsiveness
  • Investigate network anomalies and other cyber security events to determine the cause and extent of exposure and overall risk to the environment
  • Participate in forensic investigations as required, to include the collection, preservation of electronic evidence, analysis, and creation of a final report
  • Be familiar with current and proposed laws, regulations, industry standards, and ethical requirements related to information security and privacy
  • Coordinate with clients to resolve high or critical severity level incidents
  • Assist with annual SOX and SOC assessment and related remediation efforts
  • Bachelor’s degree in Information Systems preferred or a related technical field, or strong equivalent work experience in a technical environment
  • A minimum of 4 -6 years of experience in the field of information security.Strong working knowledge of information systems security standards and practices. Experience with one or more of the following: security monitoring, database security, policy and procedure, Active Directory, cryptography/PKI, application security assessments, risk assessments, security awareness, or related information security subject area
  • Possession of security certification(s): CISSP (highly preferred), SSCP, Security+, GSEC, MCSE, CISA, or CISM
  • Must be available on call 24x7x365 and able to quickly respond to problems affecting system security, occasionally requiring work outside normal business hours (i.e. evenings, weekends, or early mornings)
135

Security Analyst Resume Examples & Samples

  • Experience in conducting application entitlement reviews, understanding best practices
  • Documentation. Experience creating gap analysis, risk assessments, IT governance & regulatory compliance
  • Privileged Account Entitlement Review (gathering/analysis on IAM, UER, or role based access projects)
  • Experience with various frameworks and IT Auditing Experience (PII, PHI, HIPPA, NIST Framework, ISO, CMS, etc.)
  • Security governance, risk and compliance background
136

Security Analyst Resume Examples & Samples

  • Resolve incidents in que
  • Responsible for administering scripts (already written) then analyzing data in order to resolve or escalate
  • Work with senior Security Analysts to establish prioritization of work and assess severity of the incident
  • Previous desktop support roles
  • Command Line experience
  • Strong Microsoft experience
  • High aptitude for learning and looking to grow in role
  • Technology Savvy
  • IT Security background would be a plus but is not essential for this position
  • Database experience (high level SQL)
  • Webserver experience
  • Batch Scripting experience
137

Security Analyst Resume Examples & Samples

  • This position is responsible for reviewing candidate/employee supplied background data and completed background reports and deciding whether the data meets internal and external compliance requirements
  • The position has sole authority for determining the completeness and compliance of the data provided
  • The incumbent may collaborate with management with respect to criminal or financial issues which are undefined or on a compliance threshold with the understanding that many compliance decisions are extremely personal and nuanced. Therefore, even after consultation with Mgmt., the incumbent is fully responsible for owning the compliance decision they make with respect to the candidates on-boarding or an employee's continued employment with the understanding that their decision may place the enterprise at risk from human capital or in breach of contract, laws, or regulations bearing significant financial and reputational risk to the company from non-compliance
  • In addition to the standard responsibilities, the incumbent champions and implements new processes, standards and polices as necessary to support the Client's requirements
  • The incumbent's work is responsible for supporting the day to day operations of the company by acting as the gatekeeper to the organization and facilitates the planning of the workload balancing strategies in order to meet business objectives
  • Each incumbent works independently and self-paces their work and job responsibilities in order to meet the needs of the company and their Clients
138

Security Analyst Resume Examples & Samples

  • Knowledge of and familiar with network protocol, ASN, DNS, Domain registration process, phishing attack, domain infringment, parked & squatting domain name
  • Threat/Vulnerability Research
  • Excellent writing and speaking skills
139

Security Analyst Resume Examples & Samples

  • Account provisioning, SSO, password management, user and group self-services and synchronization with existing applications and systems
  • Configuration and management of IAM components
  • Installation of new software releases and system upgrades
  • Evaluate and install patches and resolve software related problems
  • Provide technical support by utilizing working knowledge of systems
  • Build application integration framework, provisioning workflows and processes
  • Assist with integration, implementation, and administration of systems
  • Integration with LDAP enabled directories (including Active Directory)
  • Familiarity with System Development Lifecycle (SDLC)
  • Occasional after-hours work and participation in on-call rotations is required
  • Experience with large-scale deployment, management, and support of enterprise IAM solutions; experience with PingFederate (SSO), Imanami GroupID (Group Management) and Core/Courion Access (Provisioning, User Self-Service, Approval Workflow) preferred
  • Strong Microsoft Active Directory experience essential
  • Working knowledge of Windows operating system
  • Familiarity with LDAP and SAML protocols
  • General scripting/coding knowledge with efficiencies in SQL, PowerShell, HTML, Javascript
  • Java, C or .NET programming knowledge is a plus
  • Bachelors degree required; experience in IT or related field may substitute for education
  • Minimum of 3 years IT experience, preferably in Identity Management or Information Security
  • Effective written and verbal communication skills required
  • Must be a strong team player with a willingness to share information and train others; act as a mentor to less seasoned team members
  • Must be highly organized and capable of prioritizing work loads
  • Must be experienced in developing and presenting solution recommendations
  • Project Management skills a plus
140

Security Analyst Resume Examples & Samples

  • Provides guidance/recommendations to team members and other technical stakeholders regarding security
  • Conducts technical presentations on Security domain
  • Work closely with project teams to translate technology direction into development activities related to security
  • Collaborates and accepts direction from Practice Architects, clients and other leadership stakeholders
  • Knowledge of OWASP top 10 and remediation’s of attacks against web applications. The ability to convey the risks to IT and business stakeholders
  • Familiarity with information system attack methods and Vulnerability management
  • Practical experience with Network and server hardening (Linux, Tomcat security configuration, etc.)
  • Being able to provide IT security policies and procedures
  • Experience with Disaster recovery planning
  • Managed network security: performed firewalls, switches, IDS/IPS configuration (Juniper, Cisco, Dell)
  • Run vulnerability management program using Nessus, Qualys, Acunetix, etc; assessed scan results and performed/facilitated remediation activities including software/firmware patching, configuration updates, code changes
  • Responsive on any emerging vulnerabilities such as VENOM, Logjam, FREAK, etc by providing mitigation strategies for corporate infrastructure
  • Handling 3rd party penetration testing of corporate production; infrastructure, worked on penetration testing findings remediation
  • Participate in DDoS mitigation solutions selection and deployment
  • Be able to recommend setting up centralized logging for network devices/appliances and servers in a new data center
  • Develop security guidelines for corporate software deployment on client premises
  • Perform security awareness trainings
  • Experience with microservices principles
  • Experience with RDBMS, NoSQL and Search engines
  • Proven ability to meet deadlines
  • Understanding of accountability and ownership
  • Experience with stream processing
  • Experience with Kafka
  • Experience with Elastic Search
141

Security Analyst Resume Examples & Samples

  • 5 years of professional experience and a bachelor's degree
  • Excellent oral, written, and electronic communication skills to include proficiency with Microsoft Office products such as PowerPoint and Excel
  • Ability to work independently and as a team member under tight deadlines with changing priorities
  • Demonstrated understanding of the geospatial intelligence mission and its contributions to the IC
  • Maintain a professional certification such as a Certified Information Systems Security Professional (CISSP), Security+, etc
142

Security Analyst Resume Examples & Samples

  • Enterprise Vulnerability Management
  • Enterprise Endpoint and Server Security
  • Writes security reports and make recommendations
  • Ensures compliance with organizational security rules and standards
  • Conduct research to keep abreast of latest security issues
  • Prepare compliance reports by collecting, analyzing, and summarizing data
  • Information Security best practices and common processes
  • Knowledge of Windows and UNIX/Linux vulnerabilities and exploits
  • Knowledge of network protocols, data flows, and vulnerabilities within a TCP/IP environment
  • Maintains confidentiality of information and uses information appropriately
143

Security Analyst Resume Examples & Samples

  • Bachelor's degree in Computer Science or related field and 5+ years experience, or equivalent combination of education and experience
  • 5+ yearss of experience in network, host, data and/or application security in a Windows/Unix/Linux operating environment
  • Understanding of Windows/Linux operating systems and command line tools
  • Experience with network security tools (e.g. Nessus, Wireshark, Snort)
  • Experience with host-based security tools (e.g. Firewalls, IDS/IPS, Proxies)
  • Experience reviewing raw log files, and data correlation (i.e. firewall, Netflow, IDS, syslogs)
  • Background in information security operations e.g. incident response and monitoring services
  • Experience with improving signature quality and detection through results analysis and team collaboration
  • Experience working with IP networking, networking protocols and understanding of security related technologies including encryption, IPsec, PKI, VPNs, firewalls, proxy services, DNS, electronic mail and authentication technologies
  • Possess one or more security related certifications, preferably GCIH or equivalent, CEH, etc
144

Security Analyst Resume Examples & Samples

  • Bachelor's degree in Computer Science, Information Technology is an advantage but not required
  • Must pass current job expectations and meet performance metrics
  • Very strong verbal and written communication skills with high attention to clarity and appropriate level of detail
  • Fully accountable for responsibilities – owns through to completion
  • Always acts with integrity
  • Calm under high pressure and demanding situations
  • Ability to retain focus while managing multiple competing tasks and priorities
  • Strong team player that works very independently yet knows when to reach out for assistance
  • Strong trouble shooting and problem diagnostic skill, and able to handle high complexity system
  • Ability to learn quickly and adapt to changes
  • An understanding of change control process is a plus
  • Strong organizational, planning and time management skills
  • Good knowledge of system platforms and system interactions
  • Ability to lead meetings independently with varying levels of staff participating
  • Preferably with 3-5 years relevant experience in Technical Analysis
  • Certification in and/or understanding of ITIL and Service Desk Practices
  • MS Office Applications (Excel, Word and PowerPoint)
  • Lotus Notes
  • MFConnect
  • Crystal Reports
  • LDRPS
  • Caseview Web
145

Security Analyst Resume Examples & Samples

  • Support establishment and growth of the SecOps team and the services provided, in line with defined plans and Mission
  • Act as an SME for SIEM technologies within the Security team
  • Ensure all SIEM technologies are deployed and managed in line with operational best practice requirements throughout their lifecycle, including change management and maintenance activities
  • Ensure monitoring services are delivered efficiently, based on high-quality, appropriate data sources and content
  • Support the establishment of new monitoring services by leading delivery in relation to data sources and content
  • Ensure threat cases used are maintained in line with current Situational Awareness
  • Develop and maintain content for internal monitoring solutions, based on current threat cases, ensuring analysts are presented with quality alerts
  • Ensure external Security service providers are effectively detecting threats through the provision of high quality data and the use of appropriate threat cases and content
  • Mentor junior analysts in the operation of SIEM technologies
  • Act as an escalation point for Level 1/2 Analysts
  • Ensure incidents are appropriately generated, prioritized in line with defined SLA’s and assigned for resolution
  • Assist in Incident Response activities as required, including threat hunting
146

Security Analyst Resume Examples & Samples

  • Analyze system logs to identify suspicious activities and take appropriate action
  • Coordinate with different groups to ensure that all application, network, and OS environments are patched on a regular basis
  • Provide recommendations to mitigate risks through the appropriate use of technical, procedural, and administrative controls in accordance with legal and regulatory compliance standards and established industry best practice
  • 2+ years of combined hands-on experience in analysis and security engineering, research and/or consulting
  • 2+ years of networking background; preferred experience with Cisco technologies
  • Experience understanding and determining vulnerabilities via industry standard tools
  • Understanding of enterprise, network, system/endpoint, and application-level security issues and risks
  • Understanding of network, system and application hardening techniques, processes, tools, standards and benchmarks
147

Security Analyst Resume Examples & Samples

  • Implement System Boundaries and develop a System Inventory
  • Implement an ISSO Framework
  • Create a process for tracking system weaknesses to closure
  • Implement and manage a POAM process
  • Create templates for deliverables included within a system authorization package
  • Implement a waiver process
  • Create weekly compliance reports
148

Security Analyst Resume Examples & Samples

  • Analyze potential network security incidents to identify security breaches
  • Investigate security breaches and recommendations for corrective action
  • Interface with other teams and organizations as necessary
  • Create content and operate a SIEM solution
  • Operate “Endpoint Detection & Response” solutions
  • It required work experience in security incident responder, network and/or system administrator and tech support
  • Intermediate/Advance written and oral English
  • Understanding of intrusion prevention/detection technologies
  • Understanding of network protocols & architecture
  • Understanding of computer incident response
  • Understanding of SIEM solutions
  • Understanding of computer operating systems, including server operating systems (Windows & Linux)
  • Security analysis skills, including ability to analyze logs to detect required information and patterns
  • Strong sense of ethics & values, ability to handle confidential situations with discretion
149

Security Analyst Resume Examples & Samples

  • Provide for day to day monitoring of the Information Technology environment for security incidents, and compliance with defined policies
  • Assist with risk assessments, vendor evaluations and internal or external audits of technology and security controls
  • Participate in breach detection, threat research, hunt teaming and incident response processes as needed
  • Assist in management of vulnerability testing and remediation processes with ownership for working with technology and business process owners as well as providing actionable improvement plans
  • Work with security engineers to analyze, integrate, communicate and respond to threat intelligence
  • Research and recommend improvements to security controls and policies
  • Monitor compliance with security configuration standards
  • Participate in all phases of the project life cycle as needed for corporate initiatives - design, build and operate ensuring security policy and procedures are implemented and followed
  • Participate in implementing and operation of control/compliance frameworks and security best practices such as ISO 27001/27002, NIST (800-30, Cyber Security Framework, 800-61, 800-62), COBIT, Critical Security Controls, CIS Configuration Benchmarks, and ITIL
  • Create/maintain documentation of security solutions, services, configurations and processes
  • Participate in the development of standard update reports, scorecards and trend summaries to communicate the performance and health of the security program at regular intervals
  • Participate in continued development and operation of security awareness processes to ensure that security and risk management continue to be integrated into the corporate culture
  • Work with the Information Technology group to facilitate problem resolution and define technology and security standards
  • Ability to analyze a project and help integrate appropriate controls into the various technical and logic/process layers
  • Ability to work off hours maintenance windows and participate in rotating on call shift
  • Provide Level II support for the Information Technology Help Desk as required
  • Provide for IT Sarbanes-Oxley Section 404 compliance related to project management, change management and security
  • Ability to work alone or function effectively as part of a team
  • Ability to follow change control processes
  • All other duties as assigned by management
  • Knowledge of common security tools such as Tripwire, SIEM platforms, Nexpose, Nessus, Varonis
  • Strong written and verbal communication skills are required as this position will be responsible for working directly with technical teams and business process owners
  • Ability to understand and integrate security into project and application lifecycles for enterprise IT systems
  • Minimum of 5 to 10 years’ experience in Information Technology focusing on engineering, architecture or operations roles for an enterprise IT environment. Previous experience working directly with an information security function is a strong positive
  • Previous experience with Tripwire, ArcSight, CSET and common GRC platforms are a strong positive
  • Familiar with the following technologies from a security perspective: Active Directory, database platforms, web server platforms, Middleware, PKI
  • Experience using statistical, quantitative and qualitative analysis techniques
  • Knowledge of the following concepts
150

Security Analyst Resume Examples & Samples

  • Provide on-the-floor support for tier-I analysts both to expedite resolution of customer issues and to expand the effective knowledge base of ESOC’s staff
  • Participate in a periodic on-call rotation with other tier-II personnel to facilitate operations outside of normal business hours
  • Advanced understanding of all Managed Network Security platforms and the products and services supported by ESOC
  • Experience authoring and/or editing technical documentation in a professional setting
  • 2-3 years advanced network traffic flow configuration/debugging/troubleshooting experience in general LAN and WAN environments
  • 2+ years configuring and troubleshooting basic to advanced firewall installations, including IPsec terminations, UTM, identity-based policy controls, etc
  • At least 1 year experience debugging and troubleshooting BGP, MPLS, and advanced failover setups
  • Familiarity with basic networking and computer concepts, and ability to utilize vendor documentation to augment knowledge on-the-fly during troubleshooting
  • Conversant in network security controls, policies, and procedures
  • Ability to identify networks whose operation intersects with regulatory frameworks such as PCI-DSS, HIPPA, etc
  • Vendor specific certifications (FCNSA, FCNSP, CCNA, CCNP, etc.)
151

Security Analyst Resume Examples & Samples

  • Cyber security professional with 3- 5 years of direct information security operations experience
  • University degree level education or equivalent in Computer Science / Data Communication
  • A Global Information Assurance Certification (GIAC) Certified Incident Handler (GCIH), GIAC Certified Intrusion Analyst (GCIA), or equivalent certification would be advantageous
  • Intermediate knowledge of Information Security fundamentals, technologies, and design principals
  • Knowledge of Security Compliance Framework(s) such as ISO 27001 and NIST 800 Series
  • Proven experience in securing Windows, Linux, Oracle and VM platforms
  • Proven Experience in writing technical and operational procedures
  • Proven experience of QRadar or similar Security Information and Event Management (SIEM) tools for analysing network and security incidents
  • Proven experience in Tenable Network Security Nessus, BeyondTrust Retina or similar Vulnerability Assessment (VA) scanner operations for identifying network and platform risks and mis-configurations
  • Willingness to learn new skills and be self-motivated
152

Security Analyst Resume Examples & Samples

  • Develop and deliver customer presentation regarding security and enhancing their security posture
  • Work with vendors and R&D teams to address new threats
  • Stay abreast of current and upcoming threats
  • Participate in regular meetings with teams to determine appropriate actions required to address new developing security threats
  • Work with customers during crisis time to help mitigate the crisis and improve client security posture to ensure crisis toes not occur again
  • Analyze traffic trends across customer base for large trends
  • Work with clients to help re-mediate and answer questions regarding security events
  • Identify trends in traffic and make recommendations to clients based on trends
  • Bachelor's Degree or similar
  • Strong communication and presentation skills in both English and Swedish
  • Swedish citizenship, no dual citizenship since this is a customer requirement
  • At least one certificate in either a security product or general security
  • Basic training in area of expertise (Animalware, SIEM, IDS/ISP, Security audit/Penetration testing, Forensics)
  • 2-4 years experience of IT Support
  • Experience of working in Microsoft Server OS and/or Linux/Unix OS
  • Experience of presenting basics reports to customers and co-workers
  • Basic understanding of common standards, ISO 9001, PCI-DSS, GMP, ISO 27001
  • Basic experience of security event analysis
  • Basic understanding of security incident response and programing concepts
153

Security Analyst Resume Examples & Samples

  • 2+ years of specific duties/skills to look for include intrusion detection, analysis, and prevention. We are looking for people that are actively monitoring security events. Not one specific tool to do this is required, but a few technologies/duties they have that would give them some solid experience to get this job would be Splunk, analyzing log data, IP Address Management, etc
  • Malware IOC's -- candidates should be able to explain various types of commodity malware IOC's and data points surrounding them. The questions asked during the interview are based on the fundamental understanding of network security. Knowledge of these questions comes from the application of basic security principals. Information every candidate interviewing for this position should possess and understand without hesitation. This is what separates a Security Analyst I and Security Analyst II in their eyes. If they can't communicate this, not a fit
  • ) Flexible Schedule -- The team provides coverage 7 days a week between 7:00 AM and Midnight EST. After an initial two week period for on-boarding (Monday - Friday, 07:00 - 16:00), the CDRC Analyst will be working 1pm - midnight Wednesday - Saturday. There is potential to change to other shifts as they become available, but this is what they will start with. Please make sure they are aware of this
154

Security Analyst Resume Examples & Samples

  • Proactively promote the enhancement of information/cyber security through the identification of risk themes by working collaboratively with all areas of the Group
  • Help define the Group’s information security program, policy, and standards. As assigned, guide operational areas across the Group on procedures, guidelines, and instructions to support the Group’s policy and standards and preparing materials for ongoing security knowledge transfer to staff (e.g., training)
  • Evaluate security alerts generated by internal systems (e.g., SIEM, DLP, firewalls, etc.), vendors, and other industry sources
  • Work with LSEG vendors and service providers to provide documentation for regulation compliance and adherence to applicable laws, Group policies, and security standards
  • Assist in the collection of system information and procedures required by internal and external audits and examinations; assist in drafting responses to audits
  • Provide support for management and staff using security, reporting, and risk management applications and systems
  • Independently assess, verify and observe operational performance in a broad oversight perspective for information security, and matters of cyber risk across the Group and carry out any special investigative requirements
  • Review assessment results for vulnerabilities, gaps, and control deficiencies and work with business stakeholders to establish plans for sustainable resolution
  • Determine potential impact of detected gaps and translate that into risk within the established framework
  • Develop situational awareness and stay informed of current technology and vulnerabilities
  • Assist in the security incident response management process at the Group: help manage the oversight of incident response, and the control of information events
  • Independently prepare reports for CISO and senior management on information security, information protection, and information risk matters
  • Support the implementation of Identity Access Management and Information Asset Register tools across the Group
  • Gather the data to support the proper reporting of security measures and metrics. With guidance, draft reports that highlight these metrics
  • Perform special tasks as assigned by the CISO or manager within Information Risk Management
  • Working knowledge of security domains, auditing standards and frameworks, and risk analysis frameworks including ISO 27001, NIST Cyber Security Framework, etc
  • Knowledge of UK, EU and international regulatory requirements (GDPR, etc.)
  • Ability to identify, assess and document the severity and potential impact of risks and communicate risk assessment findings to risk owners in a way that consistently drives objective, fact-based decisions
  • Demonstrable experience in network and/or security Administration is preferred
  • A level of technical knowledge and experience normally acquired through completion of a four year program in computer science, CISSP (or other relevant certification) or equivalent education, training, and experience
  • Ability to plan and implement ongoing testing and monitoring programs and knowledge of IT operational infrastructure
  • Knowledge of operational risk assessment methodology, mitigation development, monitoring and reporting
  • Proficient in MS Office products, including Word, Excel, and Visio
  • Excellent written and verbal communication skills and the ability to discuss complex technical issues with laypersons as well as highly technical individuals
155

Security Analyst Resume Examples & Samples

  • Demonstrated Ability to work independently as an individual contributor with minimal supervision
  • Prior experience working in a Security Operations Center (SOC) or Computer Emergency Response Team (CERT/CIRT)
  • Knowledge of operating system internals (virtual memory, paging, etc.) and techniques employed by malware to evade detection
  • Familiarity with common Web Application Security risks (e.g., Cross Site Scripting, SQL Injection, Authentication and Session Management)
  • Web vulnerability assessment and penetration testing experience
  • Experience performing application vulnerability assessments
  • Experience performing code review across a variety of programming languages
  • Expert understanding of application security and industry standards and best practices (OWASP / SANS / SAMM)
  • PCI DSS
  • Fundamental understanding of Cloud Technologies
  • Experience in Security Testing and Engineering
  • Experience with ITIL and data center processes
  • Minimum of 5 years of enterprise IT experience with a focus on information security
  • Minimum of 3 years’ experience in an information security or compliance role
  • Minimum of 3 years of experience in incident detection and response, malware analysis, or cyber forensics
  • Minimum of 2-3 years work experience in penetration testing and vulnerability assessments
  • Experience with security testing tools including Metasploit, NMAP, Nessus, Appscan or Burp Suite
156

Security Analyst Resume Examples & Samples

  • Collaborate with others to understand processes, procedures, applications, technologies
  • Drive application and technology compliance with corporate and regulatory policies/standards & industry best practices
  • Design and develop programs to improve security standards, processes, procedures and solutions; transfer knowledge to other Security Team Member roles
  • Participate in project work; perform security specific project tasks; lead large work streams
  • Lead and coordinate the activities of others within IT Security Nature and Scope: Daily work activity will be managed by the Principal Security Lead
  • Bachelor's degree program or equivalent degree in a field of study related to the job
  • 1-3 of relevant work experience, including familiarity with governance and policy compliance
157

Security Analyst Resume Examples & Samples

  • Two years related experience or equivalent combination of education and experience
  • A solid foundation in networking fundamentals, with a deep understanding of TCP/IP and other core protocols
  • Background working with data logging applications (e.g. Splunk)
  • Knowledge of internet security protocols and technologies
  • The ability to analyze event and systems logs, perform forensic analysis, analyze malware, and other incident response related data, as needed
  • Familiarity with intrusion detection systems (e.g., SourceFire, snort) and tools (e.g., tcpdump, Wireshark)
  • Knowledge of attack vectors, threat tactics and attacker techniques
  • Understanding of Windows and Linux operating systems and command line tools
  • Enterprise level analysis and defense experience are a plus
  • Security+, GSEC, GCIH, CEH, or GCIA certifications are a plus
158

Security Analyst Resume Examples & Samples

  • Experience using Nessus
  • Cisco Networking Security experience
  • Experience with Cisco firewalls, Command lines, ASBM (graphic interface)
  • A good understanding of Networks/Systems
  • Ability to assess a vulnerability and fill the necessary requirements
159

Security Analyst Resume Examples & Samples

  • Executes security controls to prevent malicious, unauthorized, or unintended misuse or compromise of company information
  • Under supervision, implement, install, and tune assigned security systems
  • Assists with daily management of IDS / IPS real-time alerts and incident response analysis, and assist in investigations in collaboration with global IT personnel
  • Stays current on threats applicable to The Results Companies environment and brand, and recommends mitigating actions or risk-reduction configurations or solutions
  • Ability to perform/manage Data Loss Prevention (DLP) monitoring and event analysis
  • Creates information security and compliance documentation in accordance with company requirements
  • Identifies opportunities for improvements to the Security and Compliance program, and communicates such opportunities effectively to management
  • Interfaces with user community to understand business needs and implements security procedures to accommodate them
  • Assists with Security Awareness program and ensures that user community understands and adheres to necessary procedures to maintain security
  • Bachelor's degree from a four year College or University on Computer Science or related field, or the equivalent combination of Education, Training, or Work experience
  • Basic Knowledge of security technologies (encryption, data protection, design, privilege access, etc)
  • Basic Knowledge of networks technologies (protocols, design concepts, access control)
  • Proficiency in time management, decision making, and organizational skills
  • Basic to intermediate decision-making and problem solving skills
  • Microsoft Windows Operating System knowledge
160

Security Analyst Resume Examples & Samples

  • Network security concepts & Information security best practices
  • Unix / Linux operating systems
  • TCP/IP networking
  • IP Tables/Packet filter firewalls
  • Cisco network security products
  • Fortinet security products
  • Palo Alto security products
  • Juniper / NetScreen security products
  • 1 or more years of information security or networking experience
  • Strong English communication skills (oral and written)
  • Self managed and team oriented
  • Deadline and detail oriented
  • Other major vendor network security products
  • Bi-lingual: Japanese and English, Demonstrated Fluency
161

Security Analyst Resume Examples & Samples

  • Manage and utilize commercial security products and tools such as multifactor authentication, spam gateways, vulnerability scanners, enterprise PKI, email encryption, network access control, intrusion detection/prevention systems, and centralized endpoint protection/antivirus tools
  • Analyze and correlate security data from various network, operating system, application, security devices, logs and alerts to make meaningful risk based decisions
  • Perform vulnerability assessments and provide remediation support
  • Participate in Incident Response process as a first responder, analyst or incident response manager
  • Assist in efforts to maintain NIST, ISO, PCI, and SOX compliance
  • Collaborate with internal IT and Security staff to establish and enforce IT security best practices, information protection objectives, process improvements and effective IT security controls
  • Properly assess risk and balance business requirements against necessary security controls
162

Security Analyst Resume Examples & Samples

  • A Bachelor’s degree in Computer Science, Information Security, or equivalent
  • 6 years of Information Security, IT Audit/Compliance, or related experience required; 4 years preferred
  • Highly motivated, competitive, and attracted to challenging opportunities
  • Demonstrates the ability to work in a fast-paced environment where organizational skills are essential
  • Demonstrates strong problem solving, analytical, interpersonal, and ownership skills
  • Possess excellent collaboration skills with a wide variety of internal team members
  • Is an intelligent, self-starting, self-confident individual with integrity and accountability
  • Comfortable presenting assessment results to executive management, both verbally and in writing
  • General knowledge of application security technical controls and common vulnerabilities
  • Experience in interfacing with multiple information technology application and infrastructure development and support areas within an enterprise
163

Security Analyst Resume Examples & Samples

  • Technical Degree in a related field from an accredited school or one of the following security certifications: Security+, GIAC-GISF, SSCP, CEH, CCNA-S or other security related certification
  • Possess a strong foundation in networking fundamentals with a deep knowledge of TCP/IP and other core protocols
  • Knowledge of common network based services and common client/server applications
  • Excellent communications and interpersonal skills
  • Experience with enterprise level security incident/event management tools such as Intel Security ESM, HP ArcSight or IBM QRadar
  • Experience with vulnerability scanning tools such as Nessus or Security Center
  • 1 year of experience utilizing SIEM platforms
  • 1+ years’ experience maintaining, utilizing, and troubleshooting Cisco ASA/PIX Platforms
  • 1+ years’ experience maintaining, utilizing, and troubleshooting HP TippingPoint, SourceFire, or Cisco IDS/IPS Platforms
  • 1+ years’ experience maintaining, utilizing, and troubleshooting Cisco IronPort
  • 1+ years’ experience maintaining, utilizing, and troubleshooting FireEye Product line
  • ITILv3
164

Security Analyst Resume Examples & Samples

  • Assist in identifying high value assets of VMware and conducting risk assessments on the assets
  • Assist the InfoSec risk management team in implementing risk management practices in VMware
  • Assist in measuring & reporting the InfoSec risk management metrics
  • Collaborates with other teams to gather accurate risk management data
  • Assist in documentation and facilitation in training of risk management framework and procedures
  • Drives continuous improvement of policies, procedures and technology related to risk management
  • Works effectively as part of a geographically distributed team
  • 79903BR
165

Security Analyst Resume Examples & Samples

  • Monitor and analyze network traffic and alerts generated by various security appliances in real-time, escalate and explain validated security incidents to customers
  • Investigate attacks against customer networks
  • Write up security incident reports detailing the threat, its characteristics and possible remediation activities
  • Routinely review security incidents and other customer deliverables for adherence to the established procedures and guidelines. Document, rectify and provide feedback to other Analysts as necessary
  • Articulating security issues to customers, both verbally and written
  • Extracting and analyzing log data
  • Conducting research on emerging security threats
  • Training new analysts
  • Identifying opportunities for process improvement
  • A passion for network security and protecting customers against security threats
  • Extensive IT or information security experience, with previous track record in an information security position – ideally focused on intrusion detection/network security monitoring and analysis
  • A strong understanding of the information security threat landscape, including detailed technical knowledge about the most prevalent vulnerabilities, threats, attack methods, and infection vectors
  • A solid foundation in computer networking fundamentals, including a detailed understanding of TCP/IP and other core Internet protocols
  • The ability to express themselves clearly and demonstrate strong verbal and written communication skills
  • Ideal candidates will also possess
  • Experience in an operational environment, including customer-facing responsibilities
  • Experience researching complex technical subject matter and clearly documenting the results/key findings for others to review
  • Hands-on experience with market-leading security products, including intrusion detection systems (Snort/SourceFire, IBM Proventia/ISS, McAfee IntruShield) and firewalls (CheckPoint, Cisco PIX)
  • Experience retrieving information and generating reports using SQL
  • One or more of the following certifications: GCIA, GCIH, OSCP, CISSP
166

Security Analyst Resume Examples & Samples

  • Responsible for taking action on alerts, events, and incidents escalated from the Level 1 Analyst
  • Act as a lead for a shift
  • Coordinate with other external stakeholders
  • Import new signatures from manufacturer
  • GIAC Certified Incident Handler (GCIH) or CISSP in good standing
  • Ability to assume leadership role on ad-hoc basis for managing Level 1 Analysts
  • Experience of working in a high volume and result-oriented operational environment
  • Possess solid understanding of enterprise grade technologies including operating systems, databases and web applications and applicable monitoring tools (e.g. SIEM, DLP, Internet filtering/blocking, IDS/IPS, firewalls, Anti-Virus, encryption technologies)
  • Must be a team player and self-starter
  • Flexible – able to meet changing requirements and priorities
  • Maintain current knowledge for all applicable technical areas
167

Security Analyst Resume Examples & Samples

  • Second or third year student in Computer Science / Software Engineering
  • Knowledge in web architecture
  • Knowledge in HTML, JavaScript
  • Thorough, responsible and organized person
  • Familiar with Regular Expressions
  • Familiar with SQL
  • Background is Security
  • Familiar with PHP
168

Security Analyst Resume Examples & Samples

  • Requires shift work in a 7x24 Cyber Security Operations Center
  • Perform initial triage and analysis of alerts and events to determine appropriate courses of action, with escalation as defined by established procedures
  • Provide support for and collaboration with higher-tier support teams to investigate escalated incidents
  • Assist in the development of new security operations policies as well as the refinement or improvement of existing policies
  • Monitor SOC ticket (or email) queue for potential event reporting from outside entities and individual users
  • Document investigation results, ensuring relevant details are passed to tier 2 for final event analysis
  • Update or reference SOC collaboration tool as necessary for changes to SOC process and procedure as well as ingest SOC daily intelligence reports and previous shift logs
  • Conduct security research and intelligence gathering on emerging threats and exploits
  • Perform additional auxiliary responsibilities as outlined in the console monitoring procedure
  • Course work in Cyber Security is strongly preferred
169

Security Analyst Resume Examples & Samples

  • Employee will participate as a member of integrated government/contractor teams of technical and functional experts
  • Duties include IA scanning and auditing, incident handling and response specifically targeted towards computer incident response and restoration of a secure operating environment, investigation of intrusion events and attempts and analysis of exploits
  • Analytical support will include research and development of IA/CND concepts, policies, and strategies, particularly within the national security framework
  • 5+ Years of experience in understanding and validating DISA Security Technical Implementation Guides (STIGs); DISA Security Requirements Guides (SRGs), National Security Agency Security Configuration Guides
  • 5+ Years of experience in understanding and validating NIST 800-53 Security Controls; CNSSI 1253 Security Controls and Overlays
  • Must be able to work independently and have briefing, writing and customer interface skills
  • Experience briefing senior military and civil service employees
  • Have a good understanding of the new Risk Management Framework for DoD Information Technology (RMF for DoD IT)
170

Security Analyst Resume Examples & Samples

  • A good understanding of IT infrastructure (networks/servers)
  • Experience with email monitoring
  • Hands on experience with network monitoring tools, incident response and incident investigation
  • Experience with web filtering
  • Hands on experience with IT security administration in an enterprise environment
171

Security Analyst Resume Examples & Samples

  • 1) 3+ years of Active Directory experience (creating groups, unlocking groups, file folders, shared permissions, etc.)
  • 2) 3+ years of any identity access management/provisioning related security experience
  • 3) Able to deal with a high ticket volume (on average they receive 70-150 tickets in their queue per day; 3000 requests per month)
  • 4) Any experience on the backend would be helpful (they use Oracle to run scripts on production and non production databases)
  • 5) Basic scripting experience would be highly preferred (Powershell or SQL Scripting)
  • Participating in the development of new, and the operation of, existing Information Security programs, procedure development and standards documentation
  • Operates formalized Information Security programs and processes such as Vulnerability Management, Third Party Assessments, System Hardening and Security Requests. Supports the technical execution of Information Security programs, such as Incident Response and Event Monitoring
  • Researches and prepares periodic and ad-hoc reports of Information Security program execution
  • Develop and maintain documentation for supported processes and procedures
  • Performs ongoing research of Information Security related topics
  • Performs additional duties as assigned
  • Ability to multi-task Advanced
  • Demonstrated negotiation skills Intermediate
  • Demonstrated problem solving skills Intermediate
  • Demonstrated written communication skills Intermediate
  • Demonstrated interpersonal/verbal communication skills Intermediate
  • Demonstrated analytical skills Intermediate---Other Strong decision making Intermediate
  • Good conflict resolution skills. Intermediate
  • History of working in collaborative, team-oriented environments with a commitment to results and a proven track record of accomplishments
  • Provides resolution to a diverse range of recognizable complex problems
  • Analysis is required to identify root cause
  • Uses judgment within defined boundaries to develop solutions
172

Security Analyst Resume Examples & Samples

  • Be a constant source of testing information and direction for the i3 Security team, analysing the impact of stories on end-end functionality and identify the test criteria for end-end coverage
  • Identify and write acceptance criteria for each user story
  • Collaborate with developers to ensure that completed user stories satisfy all the acceptance criteria and edge cases
  • Ensure user stories are analysed to consider the new functionality changes and regression impact on existing behaviour of product
  • Complete manual, exploratory and automation testing
  • Collaborate with developers notifying them of defects discovered
  • Collaborate with developers to set-up and maintain suitable test data
  • Manage and operate a QA environment including builds and deployment
  • Pursue learning and new skills
  • Share knowledge with the team
  • Participate in daily stand-up meetings, planning games, showcases, and retrospectives
  • Continuously challenge the ways of working to ensure continuous improvement within the team
  • Delivery experience within an agile approach
  • Solid Manual and Automation Testing experience, keeping up-to-date with the latest testing technologies
  • Ability to create automation frameworks from scratch and to understand existing frameworks
  • Good understanding of Version control and Deployments
  • Knowledge of penetration testing and vulnerability testing tools
  • Basic Java or Python skills
173

Security Analyst Resume Examples & Samples

  • Compliance with the enterprise’s security policies and procedures
  • Enforces the enterprise’s information security policies and ensures that the company complies with all requirement placed on it in accordance with GLBA
  • Responds to reported security violations received from all users and business units
  • Manages and configures appliance and software security protection tools
  • Investigates validity of all reported security violations – check appropriate logs, try to duplicate the security violations
  • Follows up with affected users regarding the causes of security violations incidents
  • Documents security incidents for the enterprise’s records. Responds to the functional units regarding the security incidents per the guidelines of the company
  • Monitors use of data files and regulates access following established procedures to safeguard information I computer files
  • Monitors current reports of computer viruses and malware to determine need to update protection systems
  • Documents computer security and measures, procedures and tests
  • Assist in the computer-related investigations at the request of the Information Security Manager
  • Performs risk assessments and executes tests of data processing system to ensure functioning of data processing activities and security measures
  • Confers with users to discuss issues such as computer data access needs, security violations, and programming changes
  • Complies with federal and state law/regulations relative to IT Information Security
  • Ability to complete high quality deliverables on time
  • Ability to perform hands-on execution risk assessment processes to maintain oversight of business line compliance with numerous regulations and control requirements
  • Scripting experience in a programming language
  • Ability to apply new concepts to solve complex challenges with data and systems integrations
  • Ability to participate in routine security audits in all environments ensuring that all users are appropriately equipped for their work function
  • Bachelors’’ degree in Information systems or related discipline
  • Minimum of Three years experience working in the Information Technology industry
  • Considerable knowledge of Information Security principles such as identity management, least privilege, risk management, and segregation of duties
  • Substantial exposure to data processing, hardware platforms, enterprise software applications, and outsourced systems
  • Good understanding of computer systems characteristics, features and common weaknesses
  • Experience with Active Directory support
  • Knowledge of Windows DNS and DHCP
  • Knowledge of group policy management and OU provisioning and permissions
  • Knowledge of federal and state laws/regulations relative to IT Information Security
174

Security Analyst Resume Examples & Samples

  • Run regular vulnerability scans on the entire network assists (Windows, Linux, Solaris, Printers)
  • Internal Server Ranges – RMB, FCC, RMB FNBInternal Desktop Ranges – RMB, FCC
  • External Facing
  • Internet Facing
  • External Domain
  • Run independent scans if requested to ensure vulnerabilities have been resolved
  • Export results and manipulate data to remove irrelevant information
  • Analyze data and provide technical reasoning on resolution procedures
  • Use custom in-house developed tool to log calls according to greatest risk and availability of operational staff
  • Define and assist Operational team with proper GPO process for bulk Vulnerability and Compliance related resolutions
  • Perform regular Nessus Updates
  • Provide relevant access in Nessus to dedicated operational team individuals. Local Nessus Groups and AD integrated users
  • Ensuring Compliance Files relevant to each scan is appropriately configured and has the correct values as per group standard security policy dictates
  • Update documentation relevant to each process and scan
  • Inform iMap (CMDB) owner of changes in the environment
  • Troubleshoot Nessus and Servers if scans have questionable results or errors
  • Liaise with vendor in case of system failure
  • Provide daily support to Operational teams if they have any issues related to the resolution of Vulnerabilities or Compliance issues
  • Provide insight of solutions that needs to be implemented to CAB if Operation Team cannot
  • Do regular research on all vulnerabilities and complaint issues and identify false positives
  • Enable and Disable Nessus Plug-Ins for best results
  • Provide ad-hoc reports as to what the status of the security impact is on all systems
  • Provide custom reports for special requests required by business
  • Provide weekly updates of progress
  • Business Science Degree or Information Security related degree or a closely related field
  • At least 3 – 5 years of technology experience, including trouble-shooting and performing root cause analysis of complex IT solutions
  • At least 1 – 2 years’ experience working in a SOC/CSIRT
  • Experience with intelligence analysis processes, including Open Sources
  • Intelligence (OSINT) and closed source intelligence gathering, source verification, data fusion, link analysis and threat actors
  • Experience in security incident management processes and tools
  • Research experience in tracking cyber threat and malware campaign activity
175

Security Analyst Resume Examples & Samples

  • 50% - Support and maintain systems and processes related to governance, risk and compliance functions
  • Collaborate with various Assurant GRC personnel to actively identify risks that will need to be added to and monitored via the risk registry
  • Support maintenance of the IT Risk Register
  • Escalate critical/high risk items to management in a timely manner
  • Track remediation/mitigation of identified risks
  • Conduct risk assessments on assigned initiatives
  • Participate in continuous process improvement of the IT risk management process
  • Maintain & report risk related metrics and documentation
  • 40% - GRC Platform Administration and Support
  • Maintain requirements and governance documentation for GRC implementation
  • Administer GRC Platform (hands on configuration, user management, etc.)
  • Model effective technical and professional skills, and share knowledge with others
  • Provides day-to-day monitoring of application and performance of GRC Platform
  • Identify and respond to GRC Platform events and incidents
  • Identify and resolve problems and issues in a timely manner
  • 10% - Project Support
  • Participate on medium to large projects
  • Manage multiple projects/issues concurrently
  • Organize and participate in meetings required for each project
  • Provide Lead Security Analyst or Manager with a weekly status report
  • Identify and inform Lead Security Analyst or Manager of any issues, concerns, or vulnerabilities within the project
  • Accountable for delivering project plans, test plans, tasks and communicating progress or issues on projects
  • 3+ years experience working with IT or Information Security/GRC, legal, audit, compliance
  • 1+ years of hands on Administration experience with a GRC Platform or tool
  • Experience working with Risk Management Frameworks like NIST RMF, COSO’s Enterprise Risk Management, ISACA’s Risk IT, etc
  • Experience contributing as a virtual team member
  • Familiarity with Industry Regulations & Standards such as HIPAA, GLBA, SOX, PCI-DSS, ISO, etc
  • Bachelor’s degree in Information Systems, Business Management, Computer Science, Engineering, Accounting, Finance, Audit
  • Professional certification(s) (CISA, Security+, MCSE, CNA/CNE, CISSP)
  • Strong knowledge of general controls and processes
176

Security Analyst Resume Examples & Samples

  • Strong Internal Candidate**
  • Collaborate with business clients and the SIS Team to define the user security model, system roles, data collection templates, and related business processes
  • Monitor service queues tracked in ServiceNow or JIRA and execute operations tasks in alignment with established service level agreements
  • Serve part-time as an embedded member of the Financial Systems Solutions (FSS) application services group to execute operations tasks, learn and document best practices for access administration, etc
  • Execute user access requests for internal team members and external users according to established policies and practices
  • Participate in Agile development teams to implement and test business solutions for student services functions, including quality assurance for complex data security test cases
  • Other duties as required to support the implementation project
  • BA/BS degree or equivalent experience
  • Proven ability to learn new technology applications and systems
  • Must have strong interpersonal and written/verbal communication skills
  • Must have strong organizational skills and attention to detail
  • Ability to prioritize, take initiative and work well under pressure
  • Advanced desktop application skills including Excel, Word, MS Project, PowerPoint and Visio
  • Knowledge of PeopleSoft and/or Oracle Business Intelligence highly desirable
  • Proven ability to quickly assimilate new tools/technology and/or applications required
  • Familiarity with SQL and/or other data analysis tools preferred
  • Demonstrate adaptability, flexibility and the ability to get up to speed quickly in the Harvard environment and the enterprise applications we support
  • Must have proven ability to initiate and manage multiple tasks under competing deadlines and shifting priorities
  • Able to work independently and within small and large teams
  • Able to communicate effectively without direct management supervision
  • ITIL v3/2011 Foundation desired (certification within six months of hire is required)
177

Security Analyst Resume Examples & Samples

  • Security incident handling involves investigating issues to determine if there is a real security incident or a false positive, notifying customers as needed, and sending customers standardized emails specifying the steps they need to take to fix the problems. You are often the first to see an issue, or the issue may have been escalated from another team or manager
  • Respond to security threats raised through the correlation and analysis of security events from sources such as firewalls, IDS/IPS devices, packet captures and security logs to include blocking IP addresses at the perimeter firewalls with near real-time response
  • Interpret and explain PCAP data and firewall logs
  • Device and health monitoring involves troubleshooting network connectivity problems concerning managed security devices, often time working with Advanced Support Team engineers and/or vendors and partner technology teams on device replacement/reconfiguration
  • Prepare shift turnover and shift report to ensure continuous and smooth workflows between shifts
  • Support, research, and help supply data for customer audits
  • Update and maintain process documents as needed
  • Work with a USARC customer supporting STIG, POAM, ATO and CTO Certification and remediation plans
  • Assess network changes for vulnerabilities, addressing incidents and scenarios dealing with PII, information spills, stolen assets
  • Address insider threat, malware, and policy violations according to customer policy guidelines
  • Perform security analytics of network traffic and providing incident response utilizing the following
178

Security Analyst Resume Examples & Samples

  • In-depth understanding of networking, data processing and related data security concepts for on premise and cloud architectures
  • A degree in Business, Computer Science or equivalent combination of education and relevant experience
  • Minimum of three (3) years experience in an information security or compliance individual contributor role and 5-7 years experience in system and network administration role
  • Experience maintaining support for multiple security technologies including data loss prevention, firewalls, security event information management (SEIM), security assessment, and monitoring of activity
  • Ability to work under stressful conditions
  • Ability to periodically work outside of standard business hours and be on-call
  • CISSP and/or GIAC certifications strongly preferred
  • Occasional travel (less than 10%) may be required
179

Security Analyst Resume Examples & Samples

  • May assist with administration of SAP roles and access through SAP GRC functionality, in conjunction with internal Audit
  • Assists in efforts to assess, mitigate, and prevent system malware attacks on corporate assets; maintains risk assessment of all systems and applications; and advises management on any critical security issues with recommended remediation
  • Participates in reviews of new or to existing systems to ensure security requirements are satisfied, prior to implementation, including risk assessment
  • Assists with compliance of Sarbanes-Oxley and audit requirements for all systems, working with internal audit staff with regular tests and audits
  • Assists with external security assessments and penetration tests with vendors
  • 2 - 5 years of security administration, including SAP
  • 2 - 5 years of network administration and/or disaster recovery experience
  • Working knowledge of Microsoft operating systems and Active Directory
  • SAP GRC administration a plus
  • CISSP certification strongly preferred
  • Microsoft Certified System Engineer preferred
  • Customer service oriented; excellent communication and analytical skills; and familiarity with SAP security
180

Security Analyst Resume Examples & Samples

  • Provide detection and response to security events and incidents within Box
  • Intrusion detection and prevention systems operations
  • Administrative and service account creation
  • Provide assistance to other core security teams
  • Bachelor's degree in a technical engineering or IT related field or equivalent and 2+ years related experience
  • Security monitoring experience -incident response and handling experience preferred
  • Experience with Linux system administration strongly preferred
  • Requires background in at least 2 of the following domains; security products and technologies; security engineering, networking protocols; security analysis and investigations, cryptography
  • Experience implementing scripting language such as Python, Go, Perl, bash for process automation, data transformation and code generation
  • Networking, GCIA, GCIH, OSCP certifications a plus
181

Security Analyst Resume Examples & Samples

  • ) Fully understand PCI Compliance and risk assessment. Candidates should have 2 plus years of experience in this area preferably in an enterprise environment
  • ) Have experience with hands on writing of policy and procedures within the IT Security field
  • ) Have excellent communications skills. They should have the ability to work with C level individuals and also student interns. This person needs to be able to command a room and run meetings if needed
182

Security Analyst Resume Examples & Samples

  • Capability to effectively multi-task, prioritize work, and handle competing interests Proactive in following up on customer issues TCP/IP networking skills to perform packet and log analysis
  • Experience with multiple attack vectors such as Malware, Trojans, Exploit Kits, Ransomware and Phishing techniques Unix/Linux command line experience
  • Linux, Perl, Python scripting SANS or other Security industry certifications such as GIAC, GSEC, GCIA, GCIH, GREM, GPEN or OSCP
  • Hands-on experience with SIEM platforms, such as RSA Security Analytics, Splunk, or ArcSight; also Firewalls, Intrusion Detection/Prevention Systems (Snort, Bro, Mcafee IPS, Sourcefire), Proxies, WAF (Imperva, f5 ASM), FireEye and/or Pen Testing
183

Security Analyst Resume Examples & Samples

  • Work with leadership in the development, implementation and maintenance of a multi-year security strategy to ensure company data is protected securely and efficiently. Collaborate with business and IT staff to understand strategic business and application requirements
  • Assist in the development of a comprehensive enterprise security architecture that will effectively scale and support regulatory and legal business requirements
  • Identify technology risks and independently evaluate the efficiency of complex information technology controls across IT infrastructure, cloud services, networks, and security support systems. Advise information security and operations leadership on current industry trends and practices to ensure a secure environment
  • Evaluate, prioritize, and communicate threats and risks to the security architect; perform validation and testing of complex technical enforcement of security directives, policies, standards, plans, and procedures
  • Develop project documentation including statements of work, detailed project plans, architecture designs, detailed implementation plans, deployment plans, project test plans, and operational training material
  • Ensure development and system support personnel receive/maintain security awareness and training
  • Maintain a positive work atmosphere by acting and communicating in a manner which facilitates the success of business operations in order to meet company demands and expectations
  • Skills: Conceptual and analytical thinker; ability to extract, analyze and document complex business and technical requirements/strategies from customers and IT members; ability to work effectively with a broad range of people and roles, including vendors, other IT support and business personnel
  • Education: Degree in IT related field preferred
  • Experience Required: Two (2) years in enterprise security or four (4) years of experience in systems (servers, operating systems, virtualization, and storage infrastructure) and networking technologies (communication protocols, network infrastructure)
184

Security Analyst Resume Examples & Samples

  • Developing appropriate security policies and governance processes
  • Developing appropriate measures for compliance with relevant technology security laws and regulations
  • Identifying and implementing security technologies
  • Consolidating and reviewing security logs
  • Responding to security incidents
  • Strong computing fundamentals including: networking protocols (TCP/IP, TLS, HTTP, LAN/WAN), program execution and control flow (processes, forking, syscalls, call stack)
  • Cryptography basics (symmetric ciphers, asymmetric ciphers, digital signatures, X.509 certificates)
  • Intrusion Detection and Prevention
  • ISO, ANSI, and NIST standards around cybersecurity
  • Working knowledge of security tools, including: NMAP, Nessus, TCPDump, Wireshark, Netcat, and Metasploit
  • ISO / IEC 27000 standards series, ISACA and COBIT
  • State and Federal laws governing public companies as related to Information Security
  • Special topics relevant to the media industry, such as malvertisement and bot traffic
  • A four-year college degree is preferable, but significant experience in a cybersecurity can be substituted
  • CISSP or other cybersecurity certification preferred
185

Security Analyst Resume Examples & Samples

  • Adheres to SYKES policies on ethics and integrity
  • Makes recommendations on reducing risk and improving security within SYKES
  • Maintains technical competence in security methods and best practices
  • Serves as a member of the SYKES security response teams as required
  • Conduct risk assessments and gap analysis, advocating security measures in line with contractual obligations
  • Provide operational support for the Security Operations Center during security incidents
  • Provides case management and ownership of security investigations
  • May perform other additional duties and responsibilities as assigned
  • Working knowledge of current industry trends and developments pertaining to security operations such as physical access controls, CCTV, phishing and social engineering threats
  • Understanding of business continuity elements and considerations such as power, data redundancy and emergency readiness
  • Knowledge of risk analysis approach and methodology preferred
  • IT infrastructure knowledge of enterprise environments
  • Sound judgment
  • Ability to read and interpret documents such as safety rules, operating and maintenance instructions, and procedure manuals
  • Ability to write routine reports and correspondence. Ability to speak effectively with clients, employees and internal departmental leadership
186

Security Analyst Resume Examples & Samples

  • Knows and applies the fundamental concepts, practices and procedures of IT security hardware, software, management software, and troubleshooting tools
  • Interfaces with user community to understand their security needs and implements procedures to accommodate them. Ensures that user community understands and adheres to necessary procedures to maintain security
  • Conducts evaluation of the level of security required. Provides management with status reports
187

Security Analyst Resume Examples & Samples

  • Network Security Experience
  • SIEM (Security Information & Event Management) Software
  • Firewall Rule Experience
  • Intrusion Detection & Prevention
188

Security Analyst Resume Examples & Samples

  • 1) Identify, measure, monitor and control risk through sound risk management
  • 2) Champion a strong risk culture throughout the organization to promote sound risk taking within our risk appetite
  • 3) Establish effective risk reporting to provide a clear understanding of our risk profile
189

Security Analyst Resume Examples & Samples

  • Conduct Vulnerability Assessments across network, end points and web applications
  • Provides support to the Incident Response Team
  • Remain up-to-date with latest computer crimes, security vulnerabilities and laws pertaining to information security
  • Collaborates on the implementation of new technology to ensure adherence to information security standards and best practices
  • Review and evaluate systems to determine where security improvements are required
  • Scans systems for known vulnerabilities and exposures using commercial and open source vulnerability scanning tools
  • Monitoring and administration of network and host based IDS/IPS systems and malware detection/prevention systems
  • Monitoring and administration of syslog servers and SIEM technology
  • Firewall audits including rule usage and configurations to ensure proper and secure firewalls
  • Manage security projects, as necessary
  • Create and maintain security documentation and standard operating procedures
  • Troubleshooting and triage possible security breaches
  • 3+ years in a technology support role with IT security responsibilities or equivalent experience
  • Excellent analytical, critical thinking and investigative skills
  • Knowledge of networking architectures and protocols including the OSI layer
  • Self-starter and active learner
  • 5+ years in the Information Security field
  • Familiarity in infrastructure and application security assessments using open source and commercial products using industry accepted methodologies
  • Comfortable with log management, vulnerability scanning, penetration testing, network and application risk assessments
190

Security Analyst Resume Examples & Samples

  • Heavy experience with PCI-DSS required. Previous QSA experience a plus
  • Experience with SOC1 and SOC2 audits and control objectives required
  • Experience working within and/or leading a security operations center is required
  • Experience authoring reports, data flow diagrams, and Visio drawings for security systems and networks required
191

Security Analyst Resume Examples & Samples

  • As required, recommend and implement corrective actions such as re-training, suspension or termination of testing centres, and revoking candidate results on request from the testing sponsors
  • Pro-actively monitor the EMEA testing channel for security risks by utilising existing reports or creating new reports to investigate new security trends
  • To run, investigate in conjunction with the global security teams as necessary, and report to EMEA based clients, the outcome of daily result hold reports
  • Be an ‘expert and spokesperson’ to all internal parties, to raise the internal awareness and mindshare of the security message, and also Data Protection legislation
  • Act as an escalation point for security issues and in turn, escalate where appropriate to the EMEA Investigations Manager
  • Key Tasks
  • What regular tasks do they have to complete to fulfil these responsibilities?
  • List any physical requirement needed for the role
  • Conduct thorough investigations into security risks and incidents, working with internal staff, systems and data, as well as third parties to assemble the required information
  • Implement effective corrective actions, post investigation such as -
  • Run the daily results hold reports and conduct investigations as appropriate, including collaboration with global security teams. Update testing sponsors on result holds daily, and keep extensive records of results, including any test sponsor decisions on status of individual candidate results
  • For EMEA based clients, timely report any instances of misconduct and review evidence available to recommend revocation or resit of candidate tests
  • Pro-actively monitor the EMEA testing channels to ensure test security, by utilising the reports available in BI portal, VSS reporting section and examining the reports forwarded to us via the MI team, or create new reports to examine new security trends uncovered
  • Develop, maintain and communicate efficient security processes to relevant parties
  • Experience in a related function, involving management of security / fraud investigations and resolution
  • Excellent communication skills, both verbally and written, aiding in influencing and persuading external parties
  • Evidence of problem solving and analytical skills, both in line with established processes and procedures, and also using creativity to develop innovative new policies
  • The ability to exercise discretion in the conduct of sensitive investigations into security breaches
  • Sound working knowledge of the Microsoft office suite and associated packages including Word, Excel, Powerpoint, Access and Internet Packages
  • Prior investigation work and experience of collating evidence to legal standards
  • Experience and understanding of the testing industry preferred
192

Security Analyst Resume Examples & Samples

  • Investigate cyber security incidents and threats
  • Improve the detection, escalation, containment and resolution of incidents
  • Enhance existing incident response methods, tools, and processes
  • Maintain knowledge of technologies and the threat landscape
  • Responsible for incident analysis, response and extraction of IOC’s
  • Responsible for analysis based on L2/3 issue identification
  • Correlate and analyse relevant events from host and network device log files
  • Determine the extent of the compromise, attributes of any malware and possible data exfiltrated
  • Basic malware analysis for triage purposes
  • Able to develop analytic’s in Splunk or Spark/Hadoop
  • Scripting skills (Python)
  • Experience with security products and technologies, especially related to event and incident handling (e.g., SIEM, HIDS/NIDS, AV)
  • Subject matter expert in one or multiple areas such as Windows, Unix, firewalls, intrusion detection, or computer forensics
  • Understand the totality of a threat across multiple technologies and think like an adversary
  • Detailed technical understanding of security incidents and alerts
  • Excellent writing and presentation skills are required in order to communicate findings and recommendations and provide status on ongoing investigations
  • Experience of tearing apart a piece of malware to understand attack vector and purpose
  • Ability to build mitigations to defend against network based threats
  • Response workflow development and automation
  • Industry certifications: GCIH, GREM or other related SANS certifications
  • Penetration testing and/or forensics experience
  • Experience of incident handling
193

Security Analyst Resume Examples & Samples

  • 80% - Technical Leadership of Systems
  • Provides day-to-day monitoring of security and compliance systems
  • Identify and respond to security related events and incidents
  • Support and maintain security and compliance systems
  • 10% - Support and maintain systems and processes related to security and compliance functions
  • Educate Assurant management and staff regarding risks and controls pertaining to security-related concepts, compliance and audit requirements
  • Test and plan implementation of new or improved controls to keep Assurant current with industry standards and compliance requirements
  • Collaboration with other Assurant (i.e. RAS, Privacy, IT Legal) and industry groups on IT infrastructure-related issues and concerns
  • Monitor, analyze and communicate metrics on a timely basis to Manager concerning Security threat events, Policies & Standards, PCI, GLBA, HIPAA, License contract/obligations, etc
  • Participate in cost benefit analysis, product proof of concepts and development of project charters as requested
  • 5%-10% travel for incident response and offsite meetings
  • 3 years of experience working with IT or Information Security, legal, audit, compliance, fraud
  • Professional certification(s) (CISA, Security+, MCSE, CNA/CNE, CISSP) an asset
  • Experience in Security Operations, Desktop Administration, Server Administration, or Network Administration role
  • In-depth knowledge of statutory and regulatory requirements relating to privacy, data security and related topics for the financial services and health industries
  • Commitment to excellence in customer service and the ability to work both independently and as part of the IT Security and Compliance team is essential
  • Ability to analyze business and IT processes and effectively communicate the risks to the company
  • Experience building and maintaining relationships and keeping informed regarding relevant changes throughout Assurant
  • Ability to analyze new vulnerabilities and threats as they relate Assurant and present the overall risk to the company
  • Experience contributing to projects and multi-tasking with diverse groups and locations
  • Strong knowledge of IT systems, application, infrastructure, network components and processes
  • Ability to participate as part of a virtual team
194

Security Analyst Resume Examples & Samples

  • Hands-on implementation and maintenance of various SIEM technologies
  • Build and maintain next generation firewalls, IPS systems, and content filtering solutions
  • Analyze, monitor and tune of various SIEM technologies
  • Develop, test, and implement signatures to optimize the SIEM correlation engine
  • Actively work with the Operations and Engineering teams to ensure GSIRT’s security requirements are being met
  • Work closely with users, other IT teams and vendors to diagnose and resolve configuration, system and performance issues
  • Provide engineering support and oversight of various technologies including but not limited to; content filters, firewalls, proxies, endpoint protection, DLP
  • Develop comprehensive plans, goals and objectives that cover the entire cyber security life cycle of a project and integrates with the GSIRT’s mission
  • Minimum 5 years’ experience in Information Technology
  • Minimum 3 years’ working with Security Information Event Management (SIEM) technologies (Splunk/Nitro/ArcSight/Qradar)
  • Minimum 5 years’ experience with Unix/Linux system administration
  • Minimum 5 years’ experience managing enterprise firewalls, IDS/IPS and content filtering devices
  • Solid understanding of a variety of types of security technologies including but not limited to; packet capture devices, proxies, EDR, malware appliances
  • Expertise in the design, configuration, tuning and customization of various IPS technologies required
  • Expert level knowledge of enterprise logging, with a focus on security event logging
  • Experience with programming and/or scripting a plus (Python/Perl/bash)
  • Experience with Cloud technologies as plus (Amazon AWS, Azure, IBM)
  • Experience migrating security controls from a traditional data center to cloud technologies like Amazon, Azure, IBM a plus
  • Experience writing complex regular expressions a must
195

Security Analyst Resume Examples & Samples

  • Designs, tests, and implements state-of-the-art secure operating systems, networks, and database products
  • Creates and maintains Plan Of Action and Milestones (POAM) or Risk Acceptance / Acknowledgement Letters (RALS)
  • Ensures that all users have the requisite security clearances, authorization, and need-to-know, and are aware of their security responsibilities before granting access
  • Ensures configuration management (CM) for security-relevant IS software, hardware, and firmware is maintained and documented
  • Maintains records, outlining required patches/system upgrades that have been accomplished throughout the information system's life cycle
  • Ensures records are maintained for workstations, servers, routers, firewalls, intelligent hubs, network switches, telephony equipment, etc
  • Active member of security team
  • Directs and monitors program system administrators on security matters
  • 5 years of related experience with a Bachelors Degree; 3 years with a Master's Degree; 0 years with a PhD. An additional 4 years of related experience may be substituted in lieu of degree
  • 3 years Computer Security Experience
  • SIEM (Security Information and Event Management) products
  • Able to lift 40 lbs
  • Active DoD Secret security clearance
  • Splunk, UNIX, and/or Solaris Experience
  • Experience in SCIF/SAPF environments
  • ICD 503, JSIG and JFAN knowledgeable
  • Red/Black Cleared
196

Security Analyst Resume Examples & Samples

  • Interact with stakeholders and leadership teams as part of the response efforts -
  • 2+ years experience with security products and technologies, especially related to event and incident handling (e.g., SIEM, HIDS/NIDS, AV)
  • 2+ years experience of an operational environment such as a SOC or CSIRT
  • 2+ years experience of incident handling
197

Security Analyst Resume Examples & Samples

  • 3+ years experience analyzing logs and picking out abnormal behavior
  • Incident Response in an enterprise SOC environment
  • 3+ years experience conducting investigations on end-points. The knowledge of knowing where to look when doing an investigation
  • McAfee products
  • Monitors and analyzes network traffic and IDS/IPS alerts, investigating intrusion attempts and performing in-depth
  • Participates in incident reporting for high priority events, from initial response to triage, to determining remediation
  • Performs firewall rule changes based on submitted requests
198

Security Analyst Resume Examples & Samples

  • Actively engaged in industry, domain, process, or technology trends
  • Acts as a coordination and facilitation point for organizing work efforts
  • Sets up or follows established procedures to ensure high quality of work
  • Understands dependency identification processes in technology work, verifies information and carefully reviews and checks the accuracy of own work
  • Establishes or follows prioritization process to drive work, and has a sense of urgency about getting work completed
  • Looks for and seizes opportunities to do more or to do things better
  • At least 2 years of work experience as an Analyst or equivalent position required
  • At least 5 years of experience in risk assessing, information security, or information management and technology preferably in the airline industry required
  • Extensive knowledge of SOX, PCI, HIPAA, and other business regulatory requirements experience as an Analyst required
  • At least 2 years of experience in developing, engineering and improving processes required
  • At least 2 years of Creation of Dashboards and associated analytics required
  • May be asked on occasions to lift and/or pull weights loads of approx. 20 lbs. on a periodic basis
  • May require extended work hours per Leaders' request
  • May be asked to climb, bend, kneel, crawl, and stoop on a periodic basis
  • Proficient knowledge of business analysis, process modeling and redesign
  • Proficient knowledge of technical environments
  • Proficient knowledge of software development methodologies
  • Proficient partnering, communication, and negotiation skills in working with various Teams and/or external partners
  • Able to analyze medium to large Business or technical problems, articulating the problem or root cause, and translating the analysis into viable solution recommendations
  • Able to work effectively in a strong Customer service / team oriented environment
  • Able to research, create, and document requirements, processes, and technical specifications
  • Able to manage and prioritize multiple and widely varied work streams / tasks
  • Able to take on multiple assignments, whether administrative or project related, while maintaining a successful level of completion in all responsible work. Able to mentor others to do the same
  • Able to prioritize effectively
  • Able to develop, present and effectively communicate ideas and strategies to a variety of audiences
  • Able to teach and mentor others concerning technical and business subjects.   
  • Limited travel with potential for increased/decreased travel based upon Technology Department needs. 
199

Security Analyst Resume Examples & Samples

  • Controlling physical access entry points and providing appropriate entry access to employees and visitors
  • Receiving and analyzing security reports and tracking for deficiencies
  • Tracking facility risk assessment reports for deficiencies and any resulting repairs, upgrades, or corrections
  • Communicating with vendors and tracking security equipment installation and repairs
  • Coordinating with the Facilities Department personnel on purchase, pricing, and installation of equipment
  • Monitoring alarm systems and programming alarms PIN’s
  • Maintaining an inventory of all security equipment and monitoring for usage and viability
  • Proficiency in the use of personal computers
  • General knowledge of banking laws and regulations with a working knowledge of those laws and regulations related to bankprotection
  • 1 or more years of experience in bank security
  • Ability to travel occasionally on company business
200

Security Analyst Resume Examples & Samples

  • Lead and Assist Risk Assessment exercises designed to highlight and clearly articulate IT Security risk to the business in terms they understand
  • Drive and lead where appropriate a variety of IT Security activities and other related activities which together aid in ensuring that the organisation’s assets and IT systems are appropriately protected against unauthorised activities including deliberate or accidental loss
  • Understanding of the security mechanisms associated with Windows or Unix operating systems, switched networks, web based applications and databases
  • Understands core development methodologies and their associated technologies.]
  • Can describe deliverables associated with the requirements analysis and definition Able to identify security requirements for business applications and data
  • Experience in evaluating the design effectiveness of IT security controls
201

Security Analyst Resume Examples & Samples

  • 1 year of corporate IT experience
  • Basic understanding of security principles and concepts
  • Associate’s or Bachelor’s Degree in Computer Science, Information Technology
202

Security Analyst Resume Examples & Samples

  • Passionate about technology, security and software development
  • Critical thinker and positive mindset
  • Maker. Proactive, eager to learn, don't be afraid to make and break things
  • Understanding of security of systems and networking
  • Knowledge on ethical hacking and pentesting, software code analysis from a security point of view, building exploits
  • Knowledge on secure communication solutions (SSL/TLS, IPSec, VPN, SSH), certificates and PKI and network devices (routers, firewalls, load balancers, etc.)
  • Information Security certifications (CISSP, CISA, etc) and knowledge of security methodologies (OSSTMM/OWASP) will be considered
  • Experience in automating testing procedures using programming languages such as Python, etc. will be a plus
  • Team worker
  • Multidisciplinary profile
  • Perform security analysis of our products, including architecture review, penetration testing, privacy and data protection analysis
  • Support to product teams regarding security issues
  • Automating security procedures
  • Based on its experience and capabilities the possibility to lead the team with a hands-on approach
203

Security Analyst Resume Examples & Samples

  • Assist in maintaining security at the Centre including undertaking security audits, to ensure that contractual requirements are met and that security policies and procedures are carried out at all times and appropriate procedures developed as required
  • Assist in the delivery of the security strategy for the Centre including innovation, contingency improvements and security audits, to ensure that contractual requirements are met and that security policies and procedures are followed at all times and appropriate procedures developed as required
  • Produce security intelligence reports to ensure security within the Centre
  • Review and maintain procedures for the examination of young people’s mail and monitor internal and external perimeter checks to maximise the security of the Centre
  • Assist the SSM and SM to review and update contingency plans in conjunction with the Youth Justice Board so that the Centre and its staff are prepared for incidents
  • Liaise with Police, Youth Justice Board and Courts to gather and impart security information and ensure the necessary documentation is completed
  • Using intelligence gathered by the security team update the initial security risk assessment of a young person and advise on appropriate security levels/measures to ensure security and welfare of the young person, staff and where appropriate the general public or set guidance for the security administrator to support in this task
  • Prepare and maintain current data on young people to aid police in their identification when necessary
  • Advise and support staff in relation to security and security intelligence to maintain a safe and secure environment
  • Prepare monthly security analyst reports to support the SSM and SM in delivering dynamic security across the STC
  • Identify potential risk or threats to the centre or its staff from intelligence gathered through the SIR system and assist security managers in managing the identified risk
  • Experience of working within a secure environment within a Secure Training Centre or secure facility
  • Security analyst training
  • Willing to undertake security training at minimum level 3
  • Security Officer/B561/80448/2
204

Security Analyst Resume Examples & Samples

  • Leads efforts to install and implement system patches, service packs and version upgrades as assigned; leads process improvement efforts; familiar with industry best practices; develops and maintains a roadmap for future system improvements; ushers through simple to complex system environment changes
  • Assist with implementing aspects of the Information Security Risk Management Program related to identification, measurement, monitoring and reporting on security related risks. Examples include: data classification, security metrics, system risk assessments, third party system risk assessments, etc
  • Conducts security vulnerability scans of operating systems and applications, produce reports, and make recommendations for vulnerability remediation
  • Training staff on network and information security procedures
  • Supports security awareness by providing orientation, educational programs, and on-going communication
  • Plan and recommend security measures to protect an organization's computer networks and systems
  • Monitor OCLC's networks for security incidents and assist in the investigation of violations when one occurs
  • Prepare reports that document security incidents and the extent of the damage caused by the security incidents
  • Assist in security audits to determine if controls have been implemented and are effective
  • Research the latest information technology (IT) security trends and prepare security alerts and summary reports of issues that affect security
  • Help plan and carry out an organization’s way of handling security
  • Assist in developing security standards and best practices for OCLC
  • Serves as mentor and support as needed for less experienced Security Analysts
  • 3-5 years experience in an information technology role with knowledge of IT security; Bachelor’s degree in business administration, computer security, or a technology related field (Preferred) or 6+ years professional level related Technical experience
  • Attention to detail, ability to organize work, and follow-up skills are critical to the successful performance of position responsibilities
  • Excellent written and verbal communication skills, interpersonal and collaborative skills, and the ability to communicate security and risk-related concepts to technical and non-technical audiences
  • Ability to prioritize and address multiple projects and meet deadlines is critical
  • Strong troubleshooting and organizational skills
  • Self-reliant, resourceful but able to know when to ask for help
  • Understanding of Security frameworks, such as ISO/IEC 27001 or NIST 800-53
  • Knowledge of Information Security Policies, Informing Others, Microsoft and Linux System Administration, Network Security, Firewall Administration, Problem Solving, Process Improvement, Project Management, On-Call, Network Protocols, Routers, Hubs, and Switches
  • Certifications (Preferred): COMPTIA Security+, Network+, CCNA, or other security certifications
205

Security Analyst Resume Examples & Samples

  • Perform all procedures necessary to ensure the safety of information systems and assets to protect them from unauthorized access
  • Work collaboratively with a team of security professionals and other IT specialist across McKesson’s IT organization on matters of security production, development and technology strategy
  • Support and maintain key production systems, ensuring 7/24 availability
  • Respond to incidents, investigate, escalate and resolve security incidents. Support security incident investigations
  • Develop subject matter expertise on assigned security technologies enabling effective and efficient delivery of security services
  • Upgrade technology systems according to vendor product roadmaps and patching requirements
  • Lead security initiatives in IT and Business projects by providing security input on technologies and operational best practices. Assist in the development of secure technical solutions by engaging collaboratively in team-based, agile initiatives
  • Gather, analyze and publish security metric on a monthly basis
  • May lead a work group or project team consisting of support staff and technical staff
  • Ensure that requirements to internal and external customers are met in a timely and cost-effective manner; solicit feedback from customers to identify opportunities to improve products and/or services
  • Respect and adhere to company Standards, Policies and Procedures
  • Five years or more of experience in information security and security operations
  • Highly motivated individual capable of operating independently with minimal supervision to resolve complex enterprise level security issue
  • Possess strong technical security skills capable of quickly adapting to new technologies
  • Good problem solving skills. Take ownership of complex situations and work collaboratively within a team environment to resolve issues effectively
  • Work well under pressure and apply critical decision making skills when needed
  • Excellent communication skills with both oral and written experience with presentation and reports
206

Security Analyst Resume Examples & Samples

  • Support various security initiatives in IT and Business projects by providing security input on technologies and operational best practices. Assist in the development of secure technical solutions by engaging collaboratively in team-based, agile initiatives
  • Seek to provide candid and timely feedback to improve performance; share information in an open manner
  • Foster teamwork and innovation by involving team members in problem solving, decision-making and creative thinking
  • Ensures that the user community understands and adheres to necessary procedures to maintain security
  • Two years or more of experience in information security and security operations
  • CISA, CISSP or other similar professional designations will be viewed favorably
207

Security Analyst Resume Examples & Samples

  • Maintain an understanding and awareness of the overall threat landscape (cyber, malware, botnets, DDoS, geo-political, etc)
  • Engage with stakeholders to identify intelligence and information requirements
  • Identify new open source intelligence (OSINT) products and sources
  • Monitor and leverage the deep web to gather intelligence about threat methods and actors to enhance intelligence products
  • Review threats and provide analysis on how they relate to Morgan Stanley’s Business Units
  • Monitor open source, social media, deep web, and other sources daily and report findings through various alerts
  • Work with the Threat Intelligence Unit to create an intelligence product portfolio consisting of alerts, reports, and briefings
  • Attend regular and weekly team meetings
  • Support Morgan Stanley intelligence collection objectives, develop and refine intelligence requirements, product alerts, briefings, and reports on a daily basis
  • Responsible for analysis based on L1 escalations for the purposes of closure and response
  • Provide immediate analysis in the event of the identification of a compromise or a credible alert from a security appliance
  • Correlate and analyze relevant events from host and network device log files
  • Professional experience, preferably within an analytical role in a relevant sector
  • Strong analytical, and data analysis skills
  • Ability to translate technical and complex information into business terms for management
  • Knowledge of the current threat environment from a cyber, threat actor, cyber weapons & tools, and geo-political perspective
  • Understanding of key intelligence analysis concepts, including the intelligence cycle
  • Excellent writing and presentation skills are required to communicate findings and recommendations
  • Experience with Open Source Intelligence Products (OSINT) and sources
  • Bachelor Degree in International Studies, Information Technology, or Criminal Justice / Intelligence field
  • International experience or experience working for a global organization
  • Willingness to learn about the technology and cyber threat environment
  • General understanding of the Tactics, Techniques, and Procedures of cyber threat actors
  • Active memberships with associations across the security and intelligence community
  • Experience using intelligence analysis tools and platforms
208

Security Analyst Resume Examples & Samples

  • Regulation Awareness & Familiarity - To be successful one needs to understand HIPPA and how the government expects us to safeguard electronic healthcare information. The same situation applies to credit card information via the Payment Card Industry Data Security Standard (PCI DSS)
  • Governance – To be successful one will have to be able to work with Internal and External auditors. This includes the written policies, as well as the gathering of technical evidence that prove we are following the applicable Laws and Regulations
  • Risk Assessments – To be successful one will have to be able to perform comprehensive risk analysis and author assessments. This includes penetration testing on on-premise assets, and working with Cloud and Software as a Service Providers to test their safeguards
  • Threat Awareness – To be successful one will have to stay up-to-date on OS, application vulnerabilities, and other risks so that the Risk Assessments are timely and accurate
  • Access Control,
  • Application Development Security,
  • Information Security Governance and Risk Management
  • Legal regulations, investigations, and compliance, and
  • Prior work in Healthcare
  • Experience with PCI, SOX, HIPAA, and NIST regulatory standards
  • Certification: ISACA or ISC², GPEN, GCWN, GCED or ECSA a plus
  • Proficient in recognized IT control frameworks and standards (e.g., COBIT, ITIL, and ISO 27000)
209

Security Analyst Resume Examples & Samples

  • Experience in technical programming or security administration in a medium sized (~50) installation of UNIX and/or Windows workstations or larger. In-depth knowledge in the concepts, software utilities (i.e. compilers and debuggers), principles, codes, operating system internals and utilities, standards, techniques and procedures in system and networking administration
  • Experience installing and maintaining firewalls, Virtual Private Networks (VPN), and Intrusion Detection Systems (IDS)
  • Knowledge of Java, TCL/Expect, Javascript, and the Windows programming environment. Knowledge of Windows operating system internals and utilities
  • BS degree in a technical or scientific discipline such as math or computer information systems or a combination of education and technical engineering or technical programming experience. Specialized education or training in computer security a plus
  • Knowledge of computer hardware, software and network security issues and approaches
210

Security Analyst Resume Examples & Samples

  • 4+ years of experience in Cybersecurity engineering and compliance
  • Knowledge of Cybersecurity design and architecture principles
  • Knowledge of FISMA, FIPS, and NIST 800 series Special Publications
  • Ability to independently conduct complex technical and non–technical Cybersecurity audits and compliance reviews
  • Ability to perform system and network analysis tasks, vulnerability assessments, and firewall rule, Cloud computing, and system configuration analyses
  • Security+ or equivalent Certification
  • Experience with designing secure systems and networks and implementing secure architecture principles across large complex networks
  • Secret clearance or higher a plus
  • CISSP, CISM, or CISA Certification a plus
211

Security Analyst Resume Examples & Samples

  • Two years of relevant work experience, such as threat hunting, incident response, forensics, security analysis or security engineering within a security operations center
  • Programming experience in one or more modern language such as Python, Ruby, Perl, PowerShell, C, C++, C#, or Java
  • Experience in writing complex SQL statements, working with NoSQL databases and text processing in Bash or PowerShell
  • In-depth understanding of common Internet protocols
  • Strong understanding of Linux, Windows, or Mac system internals and security controls
  • Excellent leadership, teamwork and collaborations skills
  • BS or MS in Computer Science, Statistics or related field or equivalent work experience
  • Familiarity with system logs, network logs and intrusion detection systems
  • Familiarity with Splunk, ArcSight or other SEIMs
  • Familiarity with Big Data tools, such as Hadoop, and their operation
  • Experience correlating unstructured data across a wide variety of log types and event feeds
  • Experience with malware analysis techniques such as binary reverse engineering/static analysis and behavioral/dynamic analysis, using industry standard tools
  • Familiarity with Amazon Web Services (AWS) products and security controls
  • Experience with automating analysis techniques or other repetitive tasks
  • Knowledge of both common and advanced adversary TTPs, as well as relevant detection techniques
  • Experience in process automation in a security environment
212

Security Analyst Resume Examples & Samples

  • Conducts advanced in-depth data analysis using publicly available information in social media platforms, open sources, and commercial databases to support national security objectives
  • Provides rapid assessments of potentially imminent security situations, sensitive developments, and complex threat issues
  • Provides research, analysis, coordination, publishing and briefs on security threats, non-technical risks and geo-political issues in diverse geographical areas
  • In foreign countries or domestic operations that have the potential of affecting the organization’s businesses and employees
  • Creates reports detailing security procedures and plans
  • Serves as primary liaison to global travel department to assist with tracking and assisting with employees facing security risks
  • At least 3-5 years’ previous work experience relating to research and analysis
  • Demonstrated ability to synthesize data and create and present intelligence briefing reports
  • Previous work in the Cyber Arena preferred but not required
  • Experience with mapping software preferred
213

Security Analyst Resume Examples & Samples

  • Bachelor's degree in computer science or a related field from an accredited college or university, or related experience
  • This position requires heavy tactical execution, strategic thinking, as well as metrics and reporting experience
  • A very strong information security and technology foundation is a must
  • 8+ years of progressive infrastructure and application security experience; preferably within a large organization
  • Experience designing and implementing secure architecture and reference architectures
214

Security Analyst Resume Examples & Samples

  • Maintaining the security of the front desk/lobby area
  • Managing regulartory Patrols
  • Maintaining an infractions free working environment
  • Assisting in employee badging process (checking in and out)
  • Security Policies & Procedures (TELUS International Team Shared Responsibilities)
  • Previous experience working in the physical security industry
  • Ability to be observant and diligent whenever on shift
  • Open work availability and able to adjust working schedule according to business needs
  • Possess Customer Service skills
  • Ability to interact with team members and visitors in a manner that displays a friendly,positive attitude
  • Ability to productively work in a team work environment, providing leadership and guidance when needed
  • Ability to multitask, prioritize and maintain organization in order to successfully complete assigned tasks/projects
  • Possess analytical and decision making/problem solving skills
  • Able to come up with innovative and creative solutions to existing/potential problems
  • Working Knowledge of Electronic Security Systems (CCTV, Access Control, Alarm Systems), administration and implementation
215

Security Analyst Resume Examples & Samples

  • Customer requests typically come from Legal and Sales, but can come from other internal groups as well
  • The most common requests involve RFPs / RFIs, security questionnaires, contract reviews, and customer audits of security practices
  • Potential areas include, but are not limited to, information security policies, asset management, access control, cryptography, physical security, supply chain security, security audits, business continuity management, and compliance to standards, government regulations, and contract terms (Global, ISO 27K, SSAE 16, EU DPA, HIPAA, etc.)
  • The position will also include collaborating with subject matter experts to verify answers for new questions in the growing area of trust and compliance
  • Respond to customer requests related to security and trust, with focus on timeliness and accuracy
  • Basic understanding of information security concepts and information assurance controls
  • Strong program management and time management skills
  • Strong research, investigation, interview and writing skills
  • Understanding of information security compliance, audit, and risk management principles and standards as related to information technology, security and resiliency (ISO, EU DPA, etc.) – and their legal implications
  • Understanding of customer careabouts related to Cloud Security and Data Protection & Privacy is preferred
  • Previous experience answering security / risk compliance questionnaires, ideally at a large technology company, strongly preferred
  • Bachelor’s degree in relevant area and at least 3 years experience in Information Security or related field
216

Security Analyst Resume Examples & Samples

  • Work with business partners and assist them in the interpretation of security policies, standards and associated guideline
  • Ability to develop effective cross-functional relationships
  • Results oriented and operations focused
  • Understanding of IT infrastructure
  • Assist end users in navigating the Policy Exception process
  • Process Policy Exceptions, assess risk, identify and document association mitigating controls, required remediation and risk ranking
  • Work cross functionally with infrastructure teams to identify and assess technical risk and associated remediation requirements
  • Engage BISO’s / TISA’s as needed for risk escalations, reviews and documented approvals
  • Define and consult on remediation solutions
  • Understanding of Security Access Controls
  • Background in Desktop Security Management, Audit, Remediation
  • Ability to work in a fast paced, matrixes environment
  • Knowledge of regulatory requirements and industry standards (ISO 27001, HIPAA, SOX, PCI, GLBA, NIST, HITRUST)
  • Ability to translate security risks into business terms
  • Familiar with security best practices
217

Security Analyst Resume Examples & Samples

  • Routinely review security incidents and other customer deliverable for adherence to the established procedures and guidelines
  • Document, rectify and provide feedback to Analysts as necessary
  • Fluency in Japanese and business level English
  • Extensive IT or information security experience, with previous track record in an information security position
218

Security Analyst Resume Examples & Samples

  • Bachelor's degree in information assurance, computer science, information systems, or equivalent work experience
  • Minimum 8-10 years of experience with IT, Information Security or Information Risk
  • Application support experience a plus
  • Certifications from one of the following; CISSP, CISA, GIAC, and/or ITIL
  • Hands-on experience with security technologies including firewalls, IPS, data loss prevention tools, antivirus/antimalware solutions
219

Security Analyst Resume Examples & Samples

  • Experience in information security
  • Experience creating, testing and implementing business continuity and disaster recovery plans
  • Experience performing risk assessments and testing of data processing systems
  • Experience installing firewalls, data encryption and other security measures
  • Experience recommending security enhancements and purchases
  • Experience training staff on network and information security procedures
  • Experience developing reports about the efficiency of security policies and recommending changes
  • Experience organize and conduct training for all employees regarding company security and information safeguarding
  • Certification Security +
220

Security Analyst Resume Examples & Samples

  • Operate and utilize various toolsets to investigate and triage security events, provide reporting and analysis, and ensure all systems are reporting into the monitoring platform appropriately
  • Responsible for the configuration, implementation, and maintenance of security monitoring technologies, including vulnerability management systems as well as other disparate security solutions throughout the enterprise
  • Stay current with the latest threat intelligence and exploit methodologies in order to anticipate security breaches proactively
  • Perform complex data analytics to continuously improve event monitoring and vulnerability management systems
  • Identify risks, evaluate deficiencies, and provide recommendations on remediation efforts
  • Strong computer software sills
  • Dealing with complexity
  • Managing processes
  • Quality Management/Control
  • Attitude & aptitude in response to the required responsibilities
  • 3 years of IT security work experience
  • Highly motivated and a passionate about security
221

Security Analyst Resume Examples & Samples

  • High proficiency in with SQL queries
  • Highly proficient in Excel
  • High school diploma or GED (education verified)J
  • Under supervision, grants user access (e.g. access initiation, access transitions as a result of job/role transfers, access disablement, etc.) according to policies and procedures
  • Participates in the auditing and review process for all applicable systems. Assists in documenting audit results according to policies and procedures
  • Complies with IS security related policies and procedures. Escalates issues in a timely manner
  • Assists in training of peers, end-users, and other IS team members
  • Solves common and moderately complex issues, incidents, problems according to agreed upon service levels and according to IS Standards. Works with peers and internal and external stakeholders
  • Consistently delivers an extraordinary customer experience when interacting with peers, end-users and others
222

Security Analyst Resume Examples & Samples

  • Analyze a variety of network and host-based security appliance logs (Firewalls, NIDS, HIDS, Sys Logs, etc.) to determine the correct remediation actions and escalation paths
  • Perform alert triage
  • Document all activities in relation to an incident and assist Incident Response teams with status updates during the life cycle of the incident
  • 1 to 3 years of experience in information security event monitoring and detection
  • Experience with IPS/IDS, SIEMs and other CND security tools
  • Ability to read and write Snort IDS signatures
  • Candidate must be able to react quickly, decisively, and deliberately in high stress situations
  • Industry recognized professional certification such as CISSP, GCIH, GCIA, Security+
  • Scripting skills (e.g., Python, Ruby, bash)
223

Security Analyst Resume Examples & Samples

  • Bachelor degree in a scientific discipline, applied science, or other technical related discipline, or the equivalent combination of education, training and related experience in security disciplines
  • Significant experience writing and reviewing technical and/or regulatory documents
  • Advanced verbal, written and interpersonal communication skills necessary to interact with and provide advice and guidance to a broad spectrum of personnel, including senior management (e.g., LLNL and DOE), while exercising a high degree of discretion, mature judgment, and tact in handling sensitive and/or classified information
  • Demonstrated aptitude for systematic statistical analysis and problem-solving skills to develop creative solutions to complex problems
  • Ability to interpret new requirements, to assess impacts on near- and long-term organization objectives and goals, and to develop solutions, corrective actions, policies, and procedures for a variety of security disciplines
  • Professional certification in a specialized security discipline
  • Demonstrated general knowledge of DOE Order 470.4B, Safeguards and Security Program, and DOE Order 473.3, Protection Program Operations
  • Demonstrated ability to represent the SO as a member of a DOE/NNSA working group providing input on technical issues for specific projects
224

Security Analyst Resume Examples & Samples

  • Support monitoring of all Information Assurance Devices (IADs) to identify and document all intrusions and attempted intrusions
  • Document of evidence of system security compromise, generate of trend reports, and collect evidence of malicious or anomalous activity
  • Report security incidents and/or network intrusions to Incident Handlers for dissemination to appropriate DOT points of contacts
  • Contribute to content creation, prioritize, rank and escalated incidents
  • Provide support in the detection, response, mitigation, and reporting of cyber threats affecting client networks
  • Assist in producing status reports and briefs to senior leadership; provide analysis for correlated information sources
  • Analyze and report cyber threats as well as assist in deterring, identifying, monitoring, investigating and analyzing computer network intrusions
  • Associate Monitoring Analysts must provide recommendations based on best practice and experience to develop processes that will enhance efficiencies needed to perform the above
  • Minimum six (6) years IT experience
  • Experience with intrusion detection sensors
  • Experience with Security Information Management Tools (ArcSight)
225

Security Analyst Resume Examples & Samples

  • Develops and implements security policies and procedures (e.g., user log-on and authentication rules, security breach escalation procedures, security auditing procedures, and use of database and encryption routines)
  • Prepares status reports on security matters to develop security risk analysis scenarios and response procedures
  • Represents the security needs of the organization by providing expertise and assistance in all IT projects with regard to security issues
  • Knowledge of and experience with industry standard database monitoring applications
  • Ability to communicate well both verbally and in writing to technical and non-technical audiences of various levels within the organization or outside the organization (executives, regulators, clients, etc.)
226

Security Analyst Resume Examples & Samples

  • Vulnerability Assessment and Intrusion Prevention / Detection
  • Access Control and Authorization
  • Policy Enforcement
  • Recognize potential, successful, and unsuccessful intrusion attempts and compromises thorough reviews and analyses of relevant event detail and summary information
  • Monitors and proactively mitigates information security risks
  • React to customers escalations
  • Identify, analyze, and document actions taken by malicious actors
  • Examine media and malware analysis reports and operational reporting from incidents to correlate similar events, tradecraft, and TTPs of malicious activity
  • Conduct log and system analysis for various system, and network and security devices capabilities to including NexGen Firewalls, and Database monitoring solutions
  • Experience working within a wide range of environments to include Linux, UNIX,Windows in addition to a strong understanding of networking, the OSI model, and TCP/IP protocols
227

Security Analyst Resume Examples & Samples

  • Monitor SIEM alerts from a variety of application and infrastructure platforms and leverage additional security tools for executing triage and incident escalation processes
  • Research security trends and recommend improvements
  • Validate the effectiveness of security tools through rigorous testing, tuning and continuous improvement
  • As needed, administer security changes such as add/change/delete user accounts or group profiles and maintain user access lists
  • Maintain confidentiality on all sensitive security matters
  • Know and enforce all information security policies
  • Identification of security system status or security changes that are not within governance for SOC Tools
  • Provide alert monitoring, investigation and analysis across all SOC security tools
  • Document security alerts according to SOC procedures
  • Record and produce metrics as assigned
  • Monitor SOC mailboxes and respond within service level agreements
  • Monitor SOC Help Desk ticket queue and provide resolution within service level agreements
  • Must be able to adjust to a flexible work schedule when necessary
  • Experience with system administration tasks across multiple operating systems deployed in both physical and virtual environments
  • Experience with authentication, authorization and auditing technologies and how they are implemented in different environments
  • Familiar with vulnerability assessments processes, penetration testing techniques and audit procedures
  • Ability to multi-task, troubleshoot and resolve problems
  • Platform-specific and platform independent scripting skills are a strong plus
  • 0-2 year’s relevant experience
  • Security certifications are a strong plus
228

Security Analyst Resume Examples & Samples

  • Review Daily Reports and Alerts
  • Metrics Gathering from reports
  • Validate reported phishing emails
  • Vet through websites for malicious intent
  • Responding to alerts as they are received
  • FTP/File Sharing Provisioning
  • Legal record redactions
  • Risk Assessments and Audits
  • Document and procedural build-out
229

Security Analyst Resume Examples & Samples

  • Integrate or improve current integration of applications to security devops tool sets
  • Tune security devops tools to improve accuracy and reduce false positives
  • Support the maintenance of the necessary infrastructure to run security devops tools
  • Evaluate new tools, and their potential cost vs benefit to Ultimate Software
  • Automate integrations between security devops tools and the development and QA team tool sets
  • Document necessary processes around activities
  • Experience to implement, architect, and maintain secure static code analysis solutions
  • Experience integrating security automations in software pipelines
230

Security Analyst Resume Examples & Samples

  • Basic experience with analytical tools (i.e. spreadsheet, word processing, database)
  • Prolonged use of a computer
  • Ability to work overtime and irregular hours when needed
  • Ability to clearly communicate information through an appropriate method, reads and interprets complex information; talks with clients and listens well
  • Follows detailed procedures and ensures accuracy in documentation and data
  • Bachelor's Degree in a related field or equivalent work experience
  • Basic understanding of cyber security best practices
231

Security Analyst Resume Examples & Samples

  • Hunt for malware and identify indicators of compromise
  • Continuously improve processes through automation and tools creation
  • Stay current with Security technologies and make recommendations for use based on business value
232

Security Analyst Resume Examples & Samples

  • Performance in multiple areas of information security including computer network defense (CND), continuous monitoring and analysis, enterprise audit, security compliance, security event monitoring and analysis, data management, analytic rule development/adjustment, incident response and investigative support
  • Deliver technical security expertise in the operation of an enterprise class CND system, dealing with events caused by internal and external factors and the related mitigation recommendations for issues caused by process, threat and technology changes over time
  • Act as a trusted advisor to senior leadership with extensive evidence of ability to provide strategic and tactical direction in leading activities in support of team and enterprise objectives
  • Provide professional knowledge and experience of CND analytics and operations
  • Bachelor’s degree in IA, Cyber Security, or a technical field
  • 8+ years experience in hands-on CND operational and/or security analysis position
  • DoD 8570-M compliant certification
  • Incident Response experience
  • SOC and/or CIRT operational experience
  • Enterprise-level cyber security experience
  • Experience working on and supporting classified networks in the IC
  • Experience working in a team environment on similar tasks
  • Experience in cyber security tactics, techniques, and procedures
  • Enterprise audit aggregation, logging, and analysis experience
  • Network scanning experience (ACAS)
  • Knowledge of NIST 800-53 and ICD 502
  • Network LAN experience
  • Virtual host experience
  • IDS/IPS and firewall experience (McAfee NGFW and/or MEG)
  • Experience in threat/risk mitigation
  • Bachelor’s degree in IA, Computer Networks, or Cyber Security
  • IT certifications--managerial or technical certifications such as Cloud Security, PMP, CISSP, MCSE, RHCE, CCIE, SANS, etc
233

Security Analyst Resume Examples & Samples

  • IDS/IPS Administration
  • Security Event Management software
  • Understanding of security elements of MS Windows, Linux, Cisco, IOS, TCP/IP, VoIP
  • Familiarity with a Change Management product (Harvest, Remedy, Peregrine, etc.)
  • Possess solid understanding of computer systems and the standards and technologies governing agencies
  • Ability to work with all levels of internal team members
  • Good customer service and interpersonal skills
  • Aptitude to understand technical issues
  • 3 to 5 years of working experience within IT security and/or change management
  • At least 2 years experience with working with IT security, audit, and compliance
234

Security Analyst Resume Examples & Samples

  • Identifies and investigates risks to the organization using a variety of applications and processes (primarily COBIT, and ISO 27002)
  • Identify risks and system needs, define solutions and appropriate standards, enforce security policies and establish security procedures
  • Stays up to date on new software/hardware reaching the market and how security policies apply
  • Participate on project teams to address security concerns and provides recommendations to ensure that new hardware/software are developed with appropriate internal and external security controls. Analysis and Support to Engineers, HD, Project Managers
  • Fully understand, support, document, communicate and improve the service in terms of IT security and change management
  • Deliver on all SLA and SOW commitments
  • Analyze, test, document, and implement security system enhancements, product interfaces and conduct maintenance tasks
  • Continue to increase efficiencies with security administration through the use of scripts and tools
  • Monitoring and evaluating new security vulnerability alerts. Perform vulnerability assessments on networks and systems; make recommendations for improving security, and implementing the approved recommendations
  • Monitor compliance to existing change management process; ensure correct approval process is followed for both regular and emergency changes
  • Evaluates and recommends methods and tools for streamlining and improving the changes process; ensure set-up and proper configuration of change management tools
  • Updates and ensures the on-going data integrity of the change management database; processes and maintains change process documentation
  • Coordinates, convenes, and facilitates change review meetings; records decisions made during change review meetings; maintains a schedule of approved and tentative system changes
  • Acts as primary contact for questions, problems, suggestions, and complaints about the change management system; Assembles and maintains change and problem history records; prepares statistics and trend reports for use in review of the change management process
  • Resolves change management scheduling conflicts and deviations according to established practices, and obtains advice when precedents are unclear or unavailable
  • Adherence to all compliance controls, mandates and objectives. This includes any additional processes or updating of prior processes to conform to all compliance regulations relating to Zale
235

Security Analyst Resume Examples & Samples

  • Bachelors Degree (IT or related field)
  • 4 years of relevant IT Exp with at least 2 years Risk or Information security system exp
  • LogRythm, ServiceNow, ProofPoint, Okta, Endpoint Protection Solutions
  • Patch Management, Firewall rules risk assessment, intrusion detection, application scans, LAN/WAN design and risk assessment, penetration tests third party security reviews, and disaster recovery/ business continuity planning and coordination
236

Security Analyst Resume Examples & Samples

  • Receiving and managing escalations from Tier 1 or 2 Analysts, customers, and other internal groups, as well as managing the full incident handling lifecycle with customers
  • The SOC Analyst is expected to contribute to internal documentation and adherence to SLA targets and requirements
  • The role includes forensic log root cause analysis, and interfacing with clients and associates as needed to resolve complex cases
  • This SOC Analyst spots are expected to participate in, and contribute to planning and implementation of strategic and operational projects in efforts to achieve overall MSS goals
  • You are expected to be able to troubleshoot complex problems with little oversight, take ownership and work independently as needed to resolve customer issues
237

Security Analyst Resume Examples & Samples

  • Establish and implement practices for the monitoring of information systems’ logical and physical security to minimise the risk of equipment and data loss, theft or tampering
  • Develop, implement and maintain the organisation’s security architecture to provide an effective platform to protect the organisations assets
  • Undertake investigations and report on security breaches and incidents to guide the refinement of practices and processes and reduce the likelihood and impact of security related incidents
  • Perform regular security reviews and compliance testing to ensure adherence to adopted security standards
  • Develop and maintain security compliance based on standards, regulations and/or legislation
  • Ascertain information/cyber security threats and risks impact on information assets
  • The role is responsible for the protection of data, information security engineering and the implementation and monitoring of compliance with information security policies and procedures. Please provide an example that demonstrates your capacity to undertake these activities
  • One of the key challenges in the role is to maintain an active culture of security awareness within the Office of State Revenue NSW. What would be your approach? Provide an example that demonstrates your expertise in this area
  • Ensuring that policy and standards for security are fit for purpose and correctly implemented can be challenging in changing environments. Provide an example that demonstrates your proven approach to effective policy and standards
238

Security Analyst Resume Examples & Samples

  • Providing enterprise security solutions for business, regulatory, and legal requirements, and assuring the confidentiality, integrity, and availability of information assets
  • Conducting third party assessments to validate security controls
  • Assisting in the design and build of the new GRC (Governance, Risk Management, & Compliance) platform
  • Assisting in the development of executive level metrics to highlight the state of vendor risk within the organization
  • Running business process improvement projects
  • Process and quality improvement
  • Working knowledge and understanding of industry-accepted data processing controls and concepts as applied to hardware, software, data, network communications, and people
  • Security Certifications: CISSP preferred or other technical security certifications (e.g. Systems Security Certified Practitioner, Certification and Accreditation Professional)
  • 3) Business Continuity and Disaster Recovery Planning,
  • 4) Cryptography,
  • 5) Information Security and Risk Management
  • 6) Legal, Regulations,
  • 7) Compliance and Investigations,
  • 8) Operations Security,
  • 9) Physical (Environmental) Security,
  • 10) Security Architecture and Design,
  • 11) Telecommunications and Network Security
  • Must be capable of engaging with vendors, negotiating controls/terms, and working closely with teammates in a team environment
  • Work experience in Healthcare or banking/finance industries preferred
  • Holds the following certifications (plus others)
239

Security Analyst Resume Examples & Samples

  • Monitors SIEM alerts from a variety of application and infrastructure platforms and leverages additional security tools for executing triage and incident escalation processes
  • Audits system security in a variety of environments, writes security reports and updates procedures to ensure compliance with security standards, regulations and privacy laws
  • Researches security trends and recommends improvements
  • Engages engineering staff and management for approval and assists in implementation
  • Validates the effectiveness of security tools through rigorous testing, tuning and continuous improvement
  • Administers security changes such as add/change/delete user accounts or group profiles and maintain user access lists
  • Maintains confidentiality on all sensitive security matters
  • Enforces and knowledgeable on all information security policies
  • Ensures SOC Security tools are working within tolerance levels
  • Provides alert monitoring, investigation and analysis across all SOC security tools
  • Documents security alerts according to SOC procedures
  • Records and produces metrics as assigned
  • Provides SME support for lower level analysts
  • Reviews and determines escalation of events to the Incident Response Team
  • Works with and provides support to the Incident Response Team
  • Drives security tool tuning and continuous improvement initiates
  • Reviews and provides input on SOC documentation
  • Provides reports as directed by leadership
  • Manages, participates and directly works on any additional projects, assignments, or initiatives assigned by management
  • Platform-specific and platform independent scripting skills are preferred
  • 2+ year’s relevant experience required
  • Security certifications preferred
240

Security Analyst Resume Examples & Samples

  • SOC Analyst experience
  • Experience with Unix and Windows in an administrative capacity
  • Experience with one or more of the following: TCP/IP networking / Various Intrusion Detection Systems / Various firewall systems / Various scanning systems / Strong knowledge of Information Security concepts
241

Security Analyst Resume Examples & Samples

  • Threat Monitoring
  • Compliance & Audit
  • Risk Evaluation and Assessments
  • Collaboratively develop and implement policies, standards and guidelines related to college information security, including the ongoing review and update of existing documentation
  • Perform information security technology planning by determining the suitability of new technologies related to security, and organizing the planned implementation of applications and systems to deliver them to ensure the college's ability to provide cost effective yet industry standard best practice IT/IS security services
  • Coordinate and oversee regular internal security testing and annual external security testing
  • Contribute to the continuous monitoring for threats and protection of information systems, including the execution of procedures such as periodic recertification of information systems
  • Serve as a focal point for security incident response planning, execution, and reaction
  • Evaluate and respond to security related questions presented in contracts and agreements
  • Initiate and direct appropriate security projects based on institutional goals
  • Promote regular communication and awareness activities with faculty, staff and students regarding information security. Provide community education in matters of information security
  • In partnership with a workgroup, operate systems including firewalls, IDS/IPS, SEIM,
  • Routers with ACL’s
  • Share collective responsibility for compliance initiatives important to Calvin College including but not limited to FERPA, HIPAA, PCI, and DMCA
  • Minimum of a Bachelor’s Degree with either a computer science / security/ assurance / systems focus or alternatively a comparable Bachelors Degree with a statistics or analysis focus
  • Minimum of two years of relevant work experience or equivalent with preference given to experience in a higher education or other not-for-profit environments
  • Security Certification desired, such as CISSP, CISA, GIAC certs, or other
  • Acclimation toward network-based security and an ability to ‘roll up the sleeves&#8217
  • And be hands-on with projects
  • Awareness of and experience in vulnerability and penetration testing
  • Understanding and proficiency in Linux and Windows operating systems
  • Knowledge and practice in network management and NGFW security platforms
  • Genuine interest / passion in the area of information security, as well as a business- based approach - i.e. a recognition that security policies must have demonstrable business benefit
  • Demonstrable understanding of NIST and ISO 27000 security standards
  • Ability to build consensus while remaining focused on achieving results
242

Security Analyst Resume Examples & Samples

  • Able to administer and monitor security solutions
  • Able to contribute to security projects and participate on cross functional project teams
  • Able to support security policies, procedures and execute incident response strategies
  • Completes tasks designed to ensure security of Hackensack Meridian's systems and information assets
  • Protects against unauthorized access, modification, or destruction of Hackensack Meridian's information assets
  • Security certification desired (e.g., Security+, CISSP)
  • At least 2-5 years of IT experience with at least 1 year of system/network security experience
  • Experience and technical knowledge in
243

Security Analyst Resume Examples & Samples

  • Knowledge in malware analysis tool, tactics and procedures
  • Knowledge of cyber security intelligence tools, tactics and procedures
  • In-depth knowledge of web systems, databases, operating systems, networking
  • Strong initiative, commitment, ownership and perseverance
  • In-depth knowledge of Python coding and shell scripting
244

Security Analyst Resume Examples & Samples

  • As the Security Analyst you will work as specialist in data security and systems analysis techniques, plans and conduct analysis of unique or unyielding problems in a broad, mission critical system
  • You will work closely with government security teams to insure that security processes and procedures are in place and being followed
  • Conduct system security verification and validation and process improvement (70%)
  • Analyze system security problems. (20%)
  • Documenting security analysis processes and procedures (10%)
  • Work is located in Boise, Idaho
  • 3 Yrs experience in the following
  • Familiarity with data center environments
  • Familiarity with software testing
245

Security Analyst Resume Examples & Samples

  • Experience with security policy creation and writing, training publications and risk assessment
  • Experience with Governance, Risk, and Compliance and creating security and compliance assessments (Open to NIST, FISMA, or ISO)
  • Experience developing and writing polices and standards and procedures(Technical writing skills needed) **Writing Examples will be required*** If someone cannot provide a writing sample, they will have to complete a writing assessment for the customer
246

Security Analyst Resume Examples & Samples

  • 3-5 years in RBAC, User Provisioning, AD Security
  • Ability to do manual provisioning and testing of access controls
  • Experience with Aveska, ITIM, or ServiceNow
  • Develop and manage Role Based Access Controls, including role management, role mining, role remediation, and role re-certifications
  • Plan, manage, and oversee user, application, and business role access audits and recertification's
  • Validate and test access controls are functioning as designed, ensure control audits are completed and evidence for each control is properly documented and available upon request
  • Produce operational security metrics as required (daily, weekly, and monthly) and coordinates the monthly metrics review with information security leadership team, enhances and improves metrics reporting processes and identifies new metrics to be reported
  • Assist with client implementations by ensuring application roles are setup, tested and available within implementation timelines
  • Perform manual provisioning of applications as needed
247

Security Analyst Resume Examples & Samples

  • Cerner or Epic experience
  • Healthcare IT experience
  • Experience with software configuration or development
  • Gathering technical requirements and configuring Cerner systems
  • Creating tables and validating data using Excel and SQL
248

Security Analyst Resume Examples & Samples

  • Associates Degree or Undergraduate degree related to computer science or information security recommended
  • Minimum 2 year IT security experience required if no formal education has been attained
  • Network traffic analysis and techniques
  • IDS/IPS technologies
  • Forensic analysis tools and techniques
  • Windows Event log analysis
  • SIEM log analysis
  • Malware reverse engineering techniques
  • Python, .Net, Ruby, or other languages
  • Security analysts will review and correlate information from enterprise security reporting systems to provide detection and remediation capabilities for security incidents related to the HealthSouth enterprise. Common tasks and activities include
  • Investigation of security alerts and events generated by HealthSouth information security systems
  • Through investigation of security related events using standard network and host forensic tools and processes to fully understand the impact of an event or incident
  • Process and document events during the entire ticket lifecycle from detection to remediation
  • Act as member of incident response team with particular focus on security related failures or incidents
  • Coordinate the distribution and implementation of IT-Security policies, IT Security standards and guidelines
  • Document processes for IT security operations
  • Search the HealthSouth enterprise for security threats that are not detected by current security controls
  • Implement change control tasks within HealthSouth information security infrastructure
  • Work with other teams in the enterprise to investigate appropriate solutions for security issues
  • Work with developers in assuring new applications adhere to approved security policies
  • Security analysts should have the following skills
  • Unix system administration
  • Knowledge of TCP/IP and network protocols
  • Passion for Information Security
  • Scripting or Software Development / Programming
  • Familiarity with offensive tools, techniques and practices
249

Security Analyst Resume Examples & Samples

  • Advanced hands on experience working with Windows infrastructure
  • Basic working knowledge of SQL
  • Intermediate hands on experience with configuring Windows or Linux system logging
  • Understanding of Windows or Linux logging / auditing capabilities
  • Basic experience with configuration and troubleshooting of network switches, routers, and firewalls
  • Basic understanding of networking including TCP/IP
  • Basic understanding of routing
  • Basic understanding of a cloud environment and infrastructure
  • Advanced understanding of the Top 20 Critical Security Controls for Effective Cyber Defense
  • Advanced understanding of the OWASP Top 10
  • Advanced experience with vulnerability scanning and reconnaissance methods
  • Intermediate knowledge of threat vectors against the Windows or Linux platform
  • Intermediate hands-on experience with network security or equivalent study
  • Strong time management skills with the ability to multitask
  • Detail oriented individuals that work well in a team environment and have a hunger to learn
  • Demonstrable verbal and written communication experience
  • Experience with ticketing systems, to include understanding work flow, ticket routing and resolution documentation
  • Experience working in a customer service oriented organization
  • Basic experience using Microsoft Word, Excel and PowerPoint
  • Basic experience with maintaining HIPAA and/or SOX compliance
  • Experience working as an analyst in a 24x7 SOC
  • Basic command of Linux systems administration and working with BASH
  • Basic experience in one of Linux, Windows or Database administration
  • Advanced understanding of HTTP, SSL/TLS, SOAP, and reverse proxies
  • Intermediate experience using an IDS eg, Snort
  • Intermediate experience using a WAF
  • Intermediate understanding of Security Information & Event Management (SIEM) concepts and functionality
  • Intermediate penetration testing experience
250

Security Analyst Resume Examples & Samples

  • Deep specialized knowledge in specific aspects of discipline
  • Enhances own knowledge through understanding business trends and objectives
  • Understands and foresees implications of decisions
  • Understands the core business process and purpose of the functional area
  • Places issues in context of organizational and functional objectives
  • Qualitative information
  • Quantitative research
  • Trend data