Security Cyber Analyst Resume Samples

5.0 (39 votes) for Security Cyber Analyst Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the security cyber analyst job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume by selecting wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

CHOOSE THE BEST TEMPLATE - Choose from 10 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
LH
L Hahn
Leonel
Hahn
87643 Darlene Valley
Boston
MA
+1 (555) 736 6023
87643 Darlene Valley
Boston
MA
Phone
p +1 (555) 736 6023
Experience Experience
03/2015 present
Los Angeles, CA
Senior Cyber Security Process Analyst
Los Angeles, CA
Senior Cyber Security Process Analyst
03/2015 present
Los Angeles, CA
Senior Cyber Security Process Analyst
03/2015 present
  • Identifies SOC operations improvement opportunities by developing refined processes, ways to better leverage existing tool sets, recommends additional capabilities that would enhance effectiveness and efficiency, and builds and manages projects plans to achieve approved initiatives
  • Works collaboratively with overall SOC staff, BlackBerry business unit engineers, and customers supported in planning, conducting, and directing the analysis of core SOC operations problems
  • Acts as a mentor and resource for CSOC operations and compliance staffs, business unit users, and customers supported relying on workflow, and/or quality tools and processes
  • Develops and provide recommendations on new solutions
  • Develops standards, policies and procedures
  • Validates that the solution (people, process) meets the business objectives
  • Conducts organizational readiness assessment to help plan and prepare for changes
05/2009 10/2014
Houston, TX
Cyber Security Application Analyst
Houston, TX
Cyber Security Application Analyst
05/2009 10/2014
Houston, TX
Cyber Security Application Analyst
05/2009 10/2014
  • Access application vulnerabilities of third party applications and manage their remediation working with the providers
  • Develop and execute a program for secure application development education
  • Interact with third party application providers to access their secure development practices
  • Coordinates application security assessments of both internal and external application developer/providers
  • Create processes and tooling to improve operational efficiency
  • Ensure solid implementation of the product by performing rigorous integration testing of the entire application
  • Provide Level 3/4 support for a unique portfolio of static scanning tooling
04/2002 12/2008
Chicago, IL
Cyber Security SOC Analyst
Chicago, IL
Cyber Security SOC Analyst
04/2002 12/2008
Chicago, IL
Cyber Security SOC Analyst
04/2002 12/2008
  • Monitors IDS, SIEM and logging environments for security events and alerts to threats, intrusions, and/or vulnerabilities
  • Escalates cyber security events as per runbooks and standard operation procedures (SOPs)
  • Acts as a participant during Cyber Hunt activities
  • Documenting event analysis and writing comprehensive reports of incident investigations
  • Proactively provide feedback on SOC operational processes and procedures
  • Maintain a professional communicative relationship with internal customers and management to provide important facts throughout the incident
  • Routinely develop and update incident response playbooks to ensure response activities align with best practices, minimize gaps in response and provide comprehensive mitigation of threats
Education Education
Bachelor’s Degree in Computer Science
Bachelor’s Degree in Computer Science
University of California, Irvine
Bachelor’s Degree in Computer Science
Skills Skills
  • Possess good knowledge of the kill-chain and how it can be used to enhance cyber security practices
  • Possess good knowledge of threat and risk modelling and cybersecurity models (predict, protect, detect, respond)
  • Demonstrate an understanding of the use of strategic, operational, tactical intelligence and its applicability to the business
  • Possess an understanding of the current vulnerabilities, response and mitigating strategies as well as tactics, techniques, procedures (TTP), indicators and observables
  • Demonstrate good verbal and written communication skills
  • Demonstrate the ability to work with different personalities and engage with a variety of internal and external stakeholders
  • Demonstrate investigative and analytical problem solving skills
  • Possess an understanding of STIX, TAXII, CyBox and OpenOIC exchange formats
  • Display a proactive approach
  • Display a passion for investigating new trends, techniques and technologies to inform leading edge products
Create a Resume in Minutes
1

Security Cyber Analyst Resume Examples & Samples

  • The individual in this position demonstrates investigative and analytical problem solving skills. They display critical thinking and contextual analysis abilities with a passion for information security and service excellence. They are proactive in their approach and conduct research on emerging trends, establishing pre-emptive and practical plans to counter potential threats. The Security Cyber Analyst demonstrates excellent verbal and written communication skills and the required interpersonal skills to engage with a variety of internal and external stakeholders
  • Execute a threat intelligence strategy to support the business to become proactive, focused and preventative and implement appropriate plans to address lower performance and ineffective cyber hunting practices
  • Produce intelligence outputs, threat and vulnerability reports, data and actionable intelligence and situational awareness to facilitate decision making
  • Research and identify potential threats and vulnerabilities and develop action plans to counter emerging cyber intelligence threats
  • Perform situational tasks such as malware analysis, reverse engineering and exploit evaluations
  • Participate in meetings and produce technical reports on intelligence threats and mechanisms depicting the value of the cyber intelligence function
  • Security certification (CISSP), CISM or related certification would be advantageous
  • SANS certification(s)
  • Experience with intelligence analysis processes, including Open Sources Intelligence (OSINT) and closed source intelligence gathering, source verification, data fusion, link analysis and threat actors
  • Experience with Threat Intelligence Platforms and Providers
  • Possess knowledge and understanding of IT industry environment and business needs
  • Demonstrate an understanding of the use of strategic, operational, tactical intelligence and its applicability to the business
  • Possess an understanding of the current vulnerabilities, response and mitigating strategies as well as tactics, techniques, procedures (TTP), indicators and observables
  • Possess good knowledge of the kill-chain and how it can be used to enhance cyber security practices
  • Possess good knowledge of threat and risk modelling and cybersecurity models (predict, protect, detect, respond)
  • Demonstrate good verbal and written communication skills
  • Demonstrate investigative and analytical problem solving skills
  • Demonstrate critical thinking and contextual analysis skills
  • Possess an understanding of STIX, TAXII, CyBox and OpenOIC exchange formats
  • Display a proactive approach
  • Display a passion for investigating new trends, techniques and technologies to inform leading edge products
  • Possess an inherent passion for information security and service excellence
  • Demonstrate the ability to work with different personalities and engage with a variety of internal and external stakeholders
2

Cyber Security Detection Analyst Resume Examples & Samples

  • 1+ years of experience with working in information systems
  • Experience with network protocols and Windows internals
  • Experience with packet capture and protocol analyzers
  • Ability to perform open-source research
  • Ability to collaborate well across multiple teams
  • Experience in shell, PowerShell, or python scripting
  • Experience with incident response, host or network forensics, or malware
  • Experience with Capture the Flag preferred
  • Knowledge of virtual environment deployments
3

Cyber Security Detection Analyst Resume Examples & Samples

  • Bachelors' Degree
  • 3+ years of IT experience with network security technologies
  • Understanding of information security
  • Knowledge of common server and client operating systems and tools, as well as knowledge of network and storage infrastructure
  • Strong interest in Security and Controls, specifically the areas of incident investigation, technical event/incident assessment, malware research; and a desire to gain competency in these areas
  • Disciplined approach utilized when completing work and adhering to procedures
  • Ability to demonstrate high level of independent initiative, drive for results, quality methods and integrity
4

Cyber Security Brand Protection Analyst Resume Examples & Samples

  • Prepare case studies for internal Under Review and Legal meetings pertaining to infringements researched
  • Act as a liaison to JPMorgan Chase Lines of Business for research and investigations
  • Support the Internet Brand Protection team with data analytics and data management from multiple sources of data
  • Act as primary liaison to core technology internal technical teams to support various strategic initiates designed to protect the firm and our customers
  • 1+ years of experience in Cyber Security, Information Security and Risk Management
  • 1+ years of experience in Domain Name System (DNS), networking topologies and protocols, and internet security concepts
  • Highly proficient in both spoken and written Chinese; other Asian languages a plus
  • Ability to multitask to effectively obtain goals in a fast paced environment
  • Excellent interpersonal communication skills (written and verbal) are a must; ability to understand complex problems while formally presenting them simplistically
  • Must be able to work quickly and effectively while maintaining a strong drive for quality
  • Demonstrate ability to work independently on projects and produce required results in a time-sensitive environment
5

Cyber Security Cert Analyst Resume Examples & Samples

  • The customer directs the cyber intelligence analysis, computer network defense and security for the organization and leads the computer security incident response activities. The CERT functions as the focal point for Information Assurance within the agency and operates in conjunction with the Enterprise Service Center (ESC). Directs computer security incident response activities for events to include, but not be limited to: viruses, worms, Trojan horses, other malicious code, system security breaches, and cyber-terrorist attacks
  • Prepare and deliver daily CERT activities brief and weekly reports such as the Domain Tipper report, fraudulent list and DAA-CISO briefing
  • Collaborate and coordinate with other agency elements of the CERT to proactively enhance the security posture of agency networks. Provide intelligence cyber fusion analysis support to the agency
  • Manages the creation of the US CYBERCOM (USCC) quarterly scorecard. Track, update and brief CS leadership on the status of the quarterly USCC score card
  • Track and report on all CTO’s, FRAGO’s and other USCC and IC-IRC requirements. Report agency compliance with USCC and IC-IRC orders and directives. Provide notifications in accordance with standing JCD and ISM processes. Provide Incident Reports (IR) and After Action Reports (AAR) for Category 1, 2, 4 and 7 computer security incidents
  • During normal business hours and after hours, notify the IA Government representative within one (1) hour of any compromise, intrusion, significant event or threat to the cusotmer security posture. An afterhours escalation process will be developed by the contractor and the Government function monitor to assess the level of threat and determine whether notification should be escalated through the Government chain of authority. During the transition period the contractor will document this after hour contact process and keep the contact list updated as part of their standing operating procedures during the life of this contract
  • Assess cyber security risks for customer systems and networks. The assessments shall include, but not be limited to: risk analysis, solutions to risk factors, and mitigation strategies
  • Maintain and populate customer CERT’s incident databases. Update incident database to ensure positive tracking is accomplished for incidents reported to or by customer CERT. Team shall pull intelligence reports and determine items of interest to customer
  • Produce event reports and share discovered malicious network activity. Indicators within the IC and DoD
  • Provide cyber threat characterization and indications and warnings of threats to the customer enterprise in the form of briefing and all source analytical products
  • Conduct all incident handling in accordance with ISM process and provide recommendation for improvement. Participate in enterprise exercises, table tops and cyber exercise in accordance with ISM process
  • All positions require a current TS/SCI and the ability to pass a polygraph within 60 days of hire
  • BS in Engineering, Computer Science or related Science degree
  • Minimum of 5 years incident responsive/investigative/CI experience
  • 5 years experience in computer science or software engineering
  • 5 years experience in information security fundamental/principles
  • 3 to 5 years Technical experience in client/server
  • Maintain technical expertise level by keeping abreast of evolving IS technologies and how they will impact the security of cusotmer ISs
  • In-depth knowledge of DCID 6/3, knowledge of ICD 503 and other applicable policies governing accreditation of IS operating in Protection Levels 1, 2, 3, 4 and 5
  • All contractor personnel must pass a Counterintelligence (CI) polygraph within two months of award. Backfill personnel are required to pass the polygraph within two months of arrival
  • All contractor personnel will need to possess and maintain an organization courier card and an AIS equipment media property badge
  • Contractor will execute the contract in accordance with all applicable legislation including Presidential, Congressional, Department of Defense (DoD), Office of the Director of National Intelligence (ODNI), and customer legislation, policy, and directives
6

Cyber Security Intrusion Analyst Resume Examples & Samples

  • Experience with conducting network intrusions analysis
  • Experience with the identification and tracking of advanced persistent threats (APT) and threat operations
  • DoD 8570.01-M complaint IAT II Certification
  • Experience with C or Python programming or scripting
  • Experience with STIX
  • One or more of the following certifications preferred: GIAC Exploit Researcher and Advanced Penetration Tester (GXPN), GIAC Reverse Engineering Malware (GREM), GIAC Certified Forensic Analyst (GCFA), GIAC Web Application Penetration Tester (GWAPT), GIAC Certified Penetration Tester (GPEN), GIAC Certified Intrusion Analyst (GCIA), or GIAC Certified Incident Handler (GCIH)
7

Senior Cyber Security Forensic Analyst Resume Examples & Samples

  • Prior experience conducting collection and preservation of electronic evidence in a corporate environment a plus
  • Ability to assess scope and conduct preliminary technical investigations including evidence collection and writing clear and concise investigative reports
  • Experience conducting digital forensics examinations on Windows operating systems a plus
  • Experience with Open source Intelligence (OSINT)
  • Ability to conduct evidence collection using network and physical collection protocols in a forensically sound manner while maintaining chain of custody throughout the collection and preservation process a plus
  • Formal digital forensics training a plus
  • Knowledge of computer forensic best practices and industry standard methodologies for acquiring and handling of digital evidence
  • Able to work either independently or in a team to conduct forensic examinations
  • The ability to coordinate, work with, and gain the trust of business stakeholders to achieve a desired objective
  • Knowledge of current international best practices in the technical investigation and forensics arena
  • Excellent written and verbal communication skills are required
8

Senior Cyber Security Process Analyst Resume Examples & Samples

  • Identifies SOC operations improvement opportunities by developing refined processes, ways to better leverage existing tool sets, recommends additional capabilities that would enhance effectiveness and efficiency, and builds and manages projects plans to achieve approved initiatives
  • Works collaboratively with overall SOC staff, BlackBerry business unit engineers, and customers supported in planning, conducting, and directing the analysis of core SOC operations problems
  • Leads activities and serves as a liaison to business managers and end users/subject matter experts to help identify, evaluate, and develop processes and procedures that are cost effective and meet business requirements
  • Works closely with business partners in translating conceptual ideas into business needs, business requirements and value-added solutions to achieve process optimization
  • Conducts the required fact gathering and intensive quantitative and qualitative data analysis to document, quantify, and specify process re-engineering efforts
  • Analyzes business processes and business problems
  • Develops and provide recommendations on new solutions
  • Validates that the solution (people, process) meets the business objectives
  • Develops standards, policies and procedures
  • Develops job aids and requirements for tools in order to support the processes
  • Conducts organizational readiness assessment to help plan and prepare for changes
  • Acts as a mentor and resource for CSOC operations and compliance staffs, business unit users, and customers supported relying on workflow, and/or quality tools and processes
  • Works with user groups to provide training, resolve questions, assess user needs, and recommend changes
  • Experienced in managing and implementing process improvement and design efforts
  • Understanding of information assurance and cyber security operations is desired
  • Experienced in integrating processes across the organization
  • Strong technical and analytical skill; experienced in KPIs and metrics
  • Driven with a sense of urgency to achieve results
  • Strong ability to influence without authority
  • Excellent presentation abilities
  • Ability to work with a high level of independence with strong collaboration and relationship management skills
  • Passionate about Continuous Improvement and ability to make others successful
  • Demonstrate proven team leadership skills and the ability to influence others
  • At all levels of an organization
  • #LI-DA1
9

Cyber Security Intrusion Analyst Resume Examples & Samples

  • Strong Intrusion Analysis background. Resource must be able to identify and interpret logs from various servers and services such as web, sql, and applications
  • Must have expert knowledge of web applications and HTTP protocol
  • Strong knowledge common network protocols
  • Splunk skill set. The security analyst will leverage Splunk to analyze logs and other security events to find targeted attacks against network based bank assets
  • Must understand modern web hosting environments including local and global load balancing as well as CDN's
  • Understanding of Stateful Firewalls
10

Cyber Security Application Analyst Resume Examples & Samples

  • Provide Level 3/4 support for a unique portfolio of static scanning tooling
  • Work with Line of Business AD teams to trouble shoot their scanning issues
  • Schedule and roll out product upgrades
  • Perform controlled resolution of incidents and problems including prioritization and escalation when appropriate
  • Work with vendors in problem isolation and resolution
  • Conduct routine hardware and software audits to ensure compliance with established standards, policies, and configuration guidelines
  • Monitor capacity
  • Assist with infrastructure requirements such as provisioning new servers, DBs, NAS
11

Cyber Security Information Analyst Resume Examples & Samples

  • Must currently possess CompTIA Security+ CE or an equivalent DoD 8570 IAT II baseline certification
  • Solid understanding of Microsoft operating systems and architecture
  • Solid understanding of Microsoft Domain Name System (DNS), Active Directory Domain Services (ADDS) and Group Policy Objects (GPO)
  • Final DoD Secret clearance with reinvestigation in the last 5 years
  • Experience in IT security, including A&A (Formally C&A) and/or IT security risk analysis, preferably in support of the Federal Government
  • Knowledge of Federal Government A&A practices and policies, particularly FISMA, NIST SP 800-53, and DHS 4300
  • DISA’s HBSS 201 Admin ePO5.1 course
  • CCNA
  • Microsoft technology specific training
  • 1-3 years experience risk management framework
12

Cyber Security Detection Analyst Resume Examples & Samples

  • Deliver documentation to capture, respond, and mitigate events
  • Research events using correlation of various data sources
  • Position is part of a team focused on ensuring the security and integrity of critical information
  • Review various alerts and risk ratings for Critical Information and Security Sensitive or High-Risk Events Positions
  • Respond by partnering with appropriate teams (e.g. Forensics)
13

Cyber Security Watch Analyst Resume Examples & Samples

  • Maintain the body of documentation that describes Computer Network Defense (CND) Watch Support and Incident Response tactics, techniques and procedures
  • Receive and analyze network alerts and reports from multiple sources and determine possible causes of such alerts
  • Analyze log files from a variety of sources to characterize anomalous activity
  • Perform event correlation using information gathered from multiple sources to gain situational awareness and determine the impact of a network attack
  • Notify managers and appropriate parties of critical network incidents articulating the event’s history, status, and potential impact
  • Support post-mortem analysis of the magnetic and optical media collected from compromised systems
  • A bachelor's degree in computer science or related discipline; or 3 years of related experience. This may be an entry level position
  • Familiar with TCP/IP network protocols
  • Mature, self-motivated, adaptable and an effective team player
  • IAT II & CNDSP-IR DoD 8570 compliant by obtaining/maintaining required certifications such as; Security+ CE and CEH
  • Experience analyzing network traffic with McAfee Nitro and/or ArcSight
  • Experience with Wireshark
  • Basic knowledge of network troubleshooting
  • The ability to multi-task
  • Provide quality customer service and problem solving skills
14

Cyber Security Contract Analyst Resume Examples & Samples

  • Prior work experience in a contract management role, such as purchasing or contracting
  • Experience in applying organizational standards when developing requests for proposals, negotiating terms and drafting contracts
  • Strong verbal and written skills, and ability to convey complex information in a way that others can readily follow
  • Ability to systematically analyze complex problems, draw relevant conclusions and implement appropriate solutions
  • Familiarity with industry frameworks and standards such as NIST, HIPAA, HITRUST, SSAE16, PCI, and ISO 27001/27002
  • Familiarity with information Security Federal Acquisition Regulation’s (FAR)
  • Cyber Security (Security +) certification preferred
  • Ability to travel up to 10% of time
15

Cyber Security D Development Research Analyst Resume Examples & Samples

  • BS degree in computer science or a related field
  • AS degree in applied 3D animation or a related field
  • 2+ years experience working in Maya, Blender, or equivalent 3D programs
  • 2+ years experience working with 3D modeling, texturing, physics engines, finite state machines, and compositing
  • 2+ years developing in Unity 3D
  • Advanced experience utilizing Photoshop, Illustrator, After Effects, and Premiere
  • Demonstrable experience programming; such as C++, C#, Java, Javascript, and Python
  • Excellent written and verbal communication and confidence to interact with other developers
  • Possess computer skills including Microsoft Word and Excel, Web browser, email, and databases
  • Excellent organizational skills with a commitment to achieving project goals
  • Ability to work both independently and within a team setting
  • BS degree in applied 3D animation or a related field
  • 3+ years experience working in Maya, Blender, or equivalent 3D programs
  • 3+ years experience working with 3D modeling, texturing, physics engines, finite state machines, and compositing
  • 3+ years developing in Unity 3D
  • Experience in effectively communicating complex technical concepts and information to a wide range of individuals
  • Experience in computer and network security, especially penetration testing and security evaluation
  • Experience with SQL databases (such as MySQL or MSSQL)
  • Solid understanding of computer networking, OSI, TCP/UDP
  • Experience making presentations to technical and other audiences
  • Experience in working in a fast-paced research and development environment
  • Includes responsibility for work outcomes and results
16

Cyber Security Triage Analyst Resume Examples & Samples

  • Monitors SIEM and logging environments for security events and alerts to threats, intrusions, and/or compromises
  • Proactively provide feedback on SOC operational processes and procedures
  • Participate in after hours on-call rotation when required
  • 3+ Experience working in a corporate SOC environment
  • Thorough understanding of fundamental security and network concepts (Operating systems, intrusion/detection, TCP/IP, ports, etc.)
  • Experience with enterprise SIEM (Splunk) or Incident Management systems
17

Cyber Defence Security Analyst, Consultant Resume Examples & Samples

  • Delivers hunting capabilities that identify existing compromises before they propagate into damaging events
  • Offers advice and practical assistance on information security challenges throughout the organisation
  • Support front line defence of networks, protecting information from unauthorised access and violations
  • Carry out tests on systems to expose weaknesses in security
  • Manages project delivery and provides thought leadership to our clients
  • Experience in identifying active threats and working with real-time detection of external and insider threats and compromised user accounts
18

Cyber Security Audit Analyst Resume Examples & Samples

  • Perform internal audits against selected HBT projects to demonstrate compliance with appropriate
  • Bachelor’s degree in computer science or software engineering, electrical engineering or other
  • Demonstrates strong interpersonal skills, including the ability to effectively listen and communicate with
19

Cyber Security Program & Policy Analyst Resume Examples & Samples

  • Experience working in the early stages of developing and documenting a cyber governance, risk, and compliance program
  • Ability to effectively interface with foreign militaries and governments allied with the United States
  • BS degree and 5 years of Cyber Security experience specifically in the area of governance, risk, and compliance programs or 7 years if no BS degree
  • Substantial technical auditing and cyber systems security engineering work, ideally in an EMEA (or other non-U.S.) environment
  • Ability to obtain and maintain a U.S. government “Secret” clearance and passport when hired
  • Previous experience working technical engagements with EMEA customers and cultures and basic Arabic language skills are desired, but not required
  • Willing to travel overseas to potentially hazardous locations including countries in South America, Europe, and the Middle East. Most travel will last seven (7) days or less, but could last up to thirty (30) days
  • ISC2 Certified Information System Security Professional (CISSP) (or equiv) preferred
  • ISACA Certified Information Systems Auditor (CISA) (or equiv) preferred
20

Cyber Security Application Analyst Resume Examples & Samples

  • Manage and administer applicaion vulnerability assessment tool
  • Interpret results of assessment report from the tool
  • Interface with application developers to discuss results and remediation
  • Interact with third party application providers to access their secure development practices
  • Access application vulnerabilities of third party applications and manage their remediation working with the providers
  • Maintain a regiment of application vulnerability assessment and management of critical applications
  • Providing assessment / audit support
  • Identifying, analyzing, monitoring and minimizing areas of risk that pertain to application security
  • Analyzes business impact and exposure based on emerging security threats, vulnerabilities and risks
  • Develop and execute a program for secure application development education
  • Provides assurance that quality and risks are effectively addressed in relation to applications
  • Coordinates application security assessments of both internal and external application developer/providers
  • Bachelors degree in computer science or related field is highly desired
  • Bachelors Degree in related field or equivalent work experience
  • 2 - 4 years experience in related field preferred
  • Application and infrastructure audit experience
  • Must be detailed oriented who has been involved in design and implementation of security tools
  • Should have experience in complex technical solutions especially in geograhic distributed and growing corporation
  • Implementation for HITRUST in Cyber Security is highly desired
21

Cyber Security SOC Analyst Resume Examples & Samples

  • Monitors IDS, SIEM and logging environments for security events and alerts to threats, intrusions, and/or vulnerabilities
  • Ability to perform basic packet analysis
  • Ability to analyze and parse intel reports for relevant Tools, Techniques, Procedures (TTP’s), Indicators of Compromise (IOC’s) and Indicators of Attack (IOA’s)
  • Responsible for understanding the global threat landscape by utilizing cyber threat intelligence
  • Escalates cyber security events as per runbooks and standard operation procedures (SOPs)
  • Acts as a participant during Cyber Hunt activities
  • Maintain a professional communicative relationship with internal customers and management to provide important facts throughout the incident
  • Provide first and second level technical resolution for security alerts and SOC service requests
  • Log and record all alerts with integrated ticketing
  • Identify weaknesses within enterprise infrastructure and suggest improvements
  • Technical and analytical skills to handle security incidents and threats
  • Resolve or escalate incidents
  • 5+ years of overall IT professional experience
  • 2+ Experience working in a corporate SOC environment
  • Thorough understanding of fundamental security and network concepts (Operating systems, intrusion/detection, TCP/IP, ports, firewalls, logging, etc.)
  • Experience with network monitoring in a SOC environment
  • Hands-on troubleshooting, analysis, and technical expertise to resolve incidents and service requests; previous experience in troubleshooting day-to-day operational processes such as security monitoring, data correlation, security operations etc
  • Security certifications (e.g. Security+, Network+, GCIA, GCIH, CISSP, CEH, etc.)
22

Cyber Security Logistics Analyst, Mid Resume Examples & Samples

  • 5 years of experience with In-Service Engineering Agent (ISEA) support requirements for computer systems, including maintaining Cybersecurity documentation and operational Assessment and Authorization (A&A) documentation
  • Ability to perform configuration management tasks and work with databases, object-oriented programming languages, client-server applications development, multimedia, and Internet technology
  • AA or AS degree in Technology
  • Experience with Submarine Operations and Submarine Non-Propulsion Electronics Systems (NPES)
  • Knowledge of submarine computer systems and the Submarine Warfare Federated Tactical System (SWFTS) and Cyber Security Planned Maintenance System (PMS)
  • CompTIA Security+ and Professional certifications required to maintain NUWCDIVNPT Cyber Security Workforce status as defined by DoDI 8570.01
23

Cyber Security Policy & Standards Document Mgmt Senior Analyst Resume Examples & Samples

  • Develop, edit and review written documentation produced by the GRC team including Policy, Standards, andawareness materials
  • Understanding of alignment of policies and standards with the NIST Cybersecurity Framework
  • Understanding of standard document management practices
  • Understanding of the Policy Management module within the eGRC tool, RSA Archer or similar tool
  • Bachelor's degree in IT related topics
  • Ability to standardize content across media
  • Work with more technical staff to take content and transform written materials for broad audience
  • Familiarity with RSA Archer eGRC Policy Management or similar tool
  • Experience with policy lifecycle
  • Experience developing policy and standards aligned to the NIST Cybersecurity Framework
  • Excellent written communication skills, including proofreading and application of a style guide
  • Organized, prompt and detail oriented
  • Ability to understand and remember large amounts of written content and apply knowledge to ad-hoc consultations
  • Willing/"can do" attitude and consensus builder
24

IT Cyber Security Vulnerability Management Analyst Resume Examples & Samples

  • This role will be focused on operating and improving Ford's Enterprise Vulnerability Management (EVM) efforts
  • Drive IT vulnerability identification and assessment/rating, remediation requirements and secure computing practices
  • Decision-making capability involving knowledge of software used in the Ford environment (in various active states), familiarity with exploitable traits and personal judgment in order to provide effective patch and mitigation evaluation
  • 3+ years of experience in IT security field
  • General understanding and awareness of IT industry challenges, incidents, and common exploit methods pertaining to security
  • Professional security or auditing certifications a plus: CISSP, CISA, CRISC, GIAC, SSCP, CIPP, CIA
  • General understanding of emerging technology areas (cloud, social media, mobility, big data, connected vehicle) and their implications in regard to security
  • General awareness and understanding of global regulatory compliance requirements (S-Ox, HIPAA, PCI, etc.)
  • Understanding of the role information security plays within a global organization
  • Ability to work independently, follow a disciplined approach, have an analytical mindset with desire to learn and work bi-modal
  • Ability to work well in a small team and be flexible enough to work on any aspect of the team’s needs
25

Cyber Security Control Analyst Resume Examples & Samples

  • At least 1 years experience in security or technical compliance programs (e.g. CSA, IRAP, FISC, NIST)
  • Extensive experience with Microsoft Office Suite (Excel, Visio, and PowerPoint) required
  • Bachelor’s or Master’s Degree in IT, Audit, Business Management, or related fields
  • At least 3 years experience in the IT field
  • Experience in compliance or security programs (NIST, CSA, IRAP, FISC, ISO 27001)
  • A fast-learner that tires of repetitive work and desires a dynamic and changing focus would be successful in this role
  • A person who works well with autonomy and the ability to make decisions on their own would be successful
  • A person who has the ability to change focus and pursue multiple projects simultaneously would be successful
  • Critical thinking and independent "out of the box" thought are a necessity in this role
26

Cyber Security Principal Analyst Resume Examples & Samples

  • Secret with the ability to obtain a Top Secret Sensitive Compartmented Intelligence (TS/SCI)
  • Bachelors and nine (9) years or more of related experience; Masters and seven (7) years or more of related experience ; PhD or JD and four (4) years or more of related experience
  • In lieu of a Bachelors degree thirteen (13) years or more related experience
  • ACAS experience
  • Network Traffic Monitoring (InMon)
27

Cyber Security Intel Operations Analyst Resume Examples & Samples

  • 6+ years working in a threat intelligence function
  • Familiar with a variety of structured analytic techniques to generate and test a hypothesis, assess cause and effect, challenge analysis, and support decision making
  • Should have a working knowledge in one or more of the following areas
28

Cyber Security Intel Operations Analyst Resume Examples & Samples

  • 3+ years of experience in a consulting and/ or financial business related environment
  • Two or more years of experience with data manipulation, spreadsheet modelling
  • Experience in a global business environment and/or international communication skills. Knowledge of multiple languages is a plus
  • Governmental agency experience a plus
  • Must be a self-starter, self-motivated with the ability to work independently when needed
  • Ability to effectively communicate with all levels of senior management
  • Strong written and verbal communication and presentation skills
  • Ability to work within cross-functional teams
29

Cyber Security Forensics Senior Analyst Resume Examples & Samples

  • Conducting detailed analysis of systems where breaches of critical IT infrastructure may have occurred
  • Provide timely root cause analysis and rapid response to incidents requiring digital forensic capability
  • Develop processes and techniques for advancing existing digital forensic capability
  • Execute on investigation requests, generation of reports and best practices, information sharing and management of internal and external stakeholder relationships
  • Develop key performance indicators, propose and execute on program initiatives
  • Day to day responsibility growing and running the team
  • Developing programs to recruit and retain talent
  • 5+ years hands of experience in the field of computer forensics, cybercrime investigation and other related fields
  • Demonstrable understanding of digital forensic skills, techniques and tolls necessary for conducting live forensics on critical systems
  • Demonstrable experience with forensic techniques and the most commonly used forensic toolsets, including EnCase Enterprise and eDiscovery, Tableau Writeblockers and Imagers, and FTK suite
  • Active SANS certification in the areas of network, malware and forensic analysis (GREM, GCIA, GCFA, GCIH)
  • Experience with network security tools, including Splunk, Snort, Fidelis, Ida Pro, or Ollydbg
  • Knowledge of all versions of Windows and UNIX- and Linux-based operating systems and the Windows registry
  • Strong attention to detail in conducting forensic analysis
  • Detailed knowledge of current international best practices in the high tech investigation and forensics space
  • Ability to liaise with senior business and technology stakeholders
30

Cyber Security Metrics Analyst Resume Examples & Samples

  • Experience in IT Business operations metric reporting will be an added bonus
  • Working knowledge and understanding of Cyber Security key performance indicators (KPIs) and key risk indicators (KRIs)
  • Good knowledge of Information Security processes, procedures and controls
  • Good understanding of Information Security risk and regulatory requirements
  • Solid understanding of Information Security management reporting processes
  • Good understanding of industry practices and metric reporting fundamentals
  • The candidate is familiar with multiple standards and frameworks, including NIST Cyber Security Framework (CSF), ISO 27001 and 27002, Payment Card Industry (PCI) Data Security Standard (DSS), etc
  • 2+ years’ experience in supervising/managing and leading teams to success
  • 2+ years’ experience in managing projects and using project management skills
  • Experience in interfacing at multiple levels of client management and building relationships
  • Ability to provide subject matter expertise in designing and enhancing the IT risk/security metrics program will be a bonus
  • Experience with incident/event correlation tools such as ArcSight and Splunk
  • Experience with IR Tracking tools such as IBM Resilient, Swimlane, Archer, or Service Now
  • Self-motivated to improve knowledge and skills
  • A strong desire to understand the what as well as the why and the how of security incidents
  • A desire to lead a team and assist and mentor others
31

Cyber Security Intrusion Analyst Resume Examples & Samples

  • Strong enterprise intrusion analysis and incident response background
  • Strong Splunk skill set. Can write queries, build dashboards, and custom alerts
  • Strong knowledge of HTTP protocol
  • Working knowledge of SSL and how it functions in an enterprise environment
  • Resource must be able to identify and interpret weblogs from various webservers
  • Knowledgeable of current exploits and attack vectors
  • Working knowledge of IPv4 and familiar with IPv6
  • Strong knowledge common network protocols and common ports
  • Able to use new intelligence to update existing controls to detect new threats against the bank
  • Familiar with financial aggregators and their function in an enterprise financial institutional environment
  • Has solid technical skills to operate independently and to support others within the security team
  • Must be able to operate as a member of a frontline team in a high tempo security operations
  • Experience with enterprise SIEM tools
  • Working knowledge of enterprise Personal Financial Management tools and vendors
  • Understanding of web application firewalls
  • Experience with F5 load balancers (LTMs) and application security manager (ASM)
  • Able to interpret SQL, Apache web logs, IIS, Active Directory and other security logs
  • Full understanding of modern web site deployments and technology
  • Use tools to detect anomalous/malicious data transmissions on the network
  • Working knowledge of information obfuscation techniques
  • Use advanced analytics / security tools to detect malware on the network
32

Cyber Security Indication & Warning Analyst Resume Examples & Samples

  • Have proven written and oral communication skills
  • Have knowledge or interest in the current state of cyber international relations, adversary tactics, and trends
  • Have keen analytical skills, curiosity, agility, and adaptability
  • Knowledge of various cyber threats and commonly used tactics, techniques, and procedures
  • Experience using open and closed data sources to identify and extract indicators of compromise
  • Experience with the technical capabilities and limitations of the Internet and online technologies, including social networking sites, blogs and microblogs, Internet mapping tools
  • The ability to analyze e-mail headers, conduct PassiveDNS analysis, create Yara signatures based off of malware reports and collaboration with malware team
  • Experience with computer network protocols and conducting open-source research
  • Knowledge of general global political and security issues and regional and overseas expertise
  • At least 1 year experience with Splunk
  • Ability to write concise analytical products and assessments
  • Ability to operate in a fast-paced and demanding work environment with tight deadlines and
  • BA or BS degree in Cyber Security, Information Systems, International Security Studies, Political Science, or Business Administration with a focus on IT Administration
  • 5+ years’ Experience
  • Experience with computer programming languages, including PhP, Python, SQL, C++, Perl, Java, or other associated languages
  • Experience with targeting analysis in the intelligence community or computer network defense community
  • Experience with leading analysis and reviewing peer products
  • Knowledge of malware types, malware analysis tools and procedures and ability to report malware analysis output-Possession of excellent oral and written communication skills
  • MA or MS degree in Cyber Security, Information Systems, International Security Studies, Political Science, or Business Administration with a focus on IT Administration
  • Security+, CEH, or CISSP Certifications or penetration testing experience a plus
  • Foreign Language experience with Arabic, Chinese, Farsi, or Russian (or other Cyrillic based languages) are highly desired
33

Cyber Security & IT Support Analyst Resume Examples & Samples

  • Provide IT support to internal users
  • Good inter-personal and communications skills. Can explain technical details in layman language
  • Organized, analytical, practical – good attention to detail
  • Able to work independently
  • Fluent in Hindi and good command of English, both spoken and written
  • Experience in providing networking and end user technical support
  • Deep knowledge on Windows environment (Windows 7 and onwards) and Microsoft Office suite of products
  • Familiar with server room and cabling standards
  • Exposure on Mac/iOS/Android
  • Knowledge on Windows Server administration
  • Familiar with common network protocols, especially on TCP/IP and WAN/LAN