Security Operations Analyst Resume Samples

4.8 (89 votes) for Security Operations Analyst Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the security operations analyst job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
RH
R Hilpert
Reggie
Hilpert
2842 Schoen Parkways
Chicago
IL
+1 (555) 812 3268
2842 Schoen Parkways
Chicago
IL
Phone
p +1 (555) 812 3268
Experience Experience
New York, NY
Security Operations Analyst
New York, NY
Cassin LLC
New York, NY
Security Operations Analyst
  • Work with the Rubicon Cloud Security GRC team to develop the policies, standards and procedures related to Security Management
  • Manage security incidents, work with global teams to manage/support cyber security incidents
  • Responsible for overseeing the management of web proxy policy configuration provided by third party providers
  • Provides support on network security issues and responds in accordance with the Security Incident Management Plan. Receives guidance from senior staff
  • Develop technical documentation describing the deployment, configuration, and management of shared, networked, and multi-user information security systems
  • Create and maintain operational reports for Key Performance Indicators and weekly and Monthly Metrics
  • Provide trend analysis and risk assessment to management for vulnerabilities in the environment
Boston, MA
Cyber Security Operations Analyst
Boston, MA
Huel, Stoltenberg and Hoppe
Boston, MA
Cyber Security Operations Analyst
  • Process development/improvement
  • Liaise with the Firm’s SOC to respond to emerging incidents in a timely manner; triage details and provide support to both the SOC and Business Managers
  • Assist in performing periodic access reviews / inactivity reviews
  • Project work - Assist other members of the CS team with technology projects and larger incidents
  • Assist in management of RBAC roles
  • Provide communication and escalation throughout the incident per the operating guidelines
  • Perform analysis of log files
present
Phoenix, AZ
Information Security Operations Analyst
Phoenix, AZ
Gorczany Inc
present
Phoenix, AZ
Information Security Operations Analyst
present
  • Performs network and host DLP monitoring and logging
  • Assist outsourced vendors that provide information security functions for compliance with contracted service-level agreements
  • Performs security Incident Event Management (SIEM) console monitoring and correlation
  • Regularly check work queue for incoming assignments and complete all work daily
  • Monitors and analyzes network traffic and IDS/IPS alerts, investigating intrusion attempts and performing in-depth analysis of exploits and attacks
  • Performs other duties as assigned or apparent
  • Performs application whitelisting and file integrity monitoring
Education Education
Bachelor’s Degree in Computer Science
Bachelor’s Degree in Computer Science
Bowling Green State University
Bachelor’s Degree in Computer Science
Skills Skills
  • Knowledge and understanding of networking (TCP/IP, OSI model, LAN/WAN, cabling and data transmission types, network topologies, routing protocols, and remote access methods)
  • Knowledge and experience in at least three of the following concepts and technologies
  • Excellent verbal and written communication skills
  • Comfortable to work closely with several teams within the Information Services area as well with the business team
  • Ability to work in a fast paced environment, interact with staff, peers and customers on a technical & professional level
  • Demonstrated ability to work under pressure and deliver to meet SLA’s
  • Proactive and independent mindset as well as a willingness to share knowledge
  • Ability to manage ambiguity, risk, and changing direction of projects and strategies
  • Exceptional written and oral communication skills, including the ability to communicate technical information to a non-technical audience and with executive levels. Relationship management skills
  • Plan, coordinate and execute vulnerability assessments across the environment
Create a Resume in Minutes

15 Security Operations Analyst resume templates

1

Security Operations Analyst Resume Examples & Samples

  • Monitor and manage security technologies to prevent, detect, and respond to threats
  • Examine security event data to identify patterns and trends, then normalize and integrate into existing automation tools to correlate the resulting data
  • Identify, assess and recommend remediation steps for security events
  • Assist in development of custom scripts for increased automation and analysis
  • Assist with the resolution of security-related infrastructure (e.g. firewall) changes
  • Participate in security incident response through in-depth, technical (log, forensic, malware, packet, etc.) analysis
  • Participate in vulnerability, penetration and application testing
  • Collect security metrics and data to enable reporting to senior management
  • Research trends in emerging security threats and technologies
  • Hands-on experience deploying and operating security technologies including devices, networks and systems that prevent, detect and respond to security threats
  • Working knowledge of a wide range of current network security technologies such as firewalls, proxies, network and host-based intrusion prevention, DLP, vulnerability assessment tools, security information/event management, endpoint security, anti-virus/anti-malware, etc
  • Familiarity with security intelligence and research methods
  • Demonstrable development/scripting experience: Python and/or PowerShell is a plus
  • B.S. in Computer Science or Engineering or similar technical program
  • 3-5 years in a hands-on technical role in information security
2

Security Operations Analyst Resume Examples & Samples

  • Ensure security of doors, windows and property in order to protect Amplify and its employees against fire, theft, vandalism and any illegal or suspicious activity
  • Communicate with police or fire departments in cases of emergency, such as fire or presence of unauthorized persons
  • Write reports of daily activities and irregularities, such as equipment or property damage, theft, presence of unauthorized persons, or unusual occurrences
  • 2 years security experience
  • NYS Security License
  • Security/ID badge system experience
  • MS Office (Outlook, Excel, Word)
  • Ability to communicate clearly with internal and external contacts
  • 1-2 years customer service experience
3

Security Operations Analyst Endpoint & Iam Resume Examples & Samples

  • Primary support and central point of contact for IAM and user end-point security applications
  • Responsible for up-time, reliability, stability and policy maintenance of supported systems
  • Produces and maintains documentation
  • Strong System Administration background, ideally in a SSO and end user device technologies
  • Understanding of networking, virtualization in Windows or Linux operating systems and the ability to troubleshoot issues and identify root cause
4

Security Operations Analyst Resume Examples & Samples

  • Ensure play-testing guests are officially signed in and appropriately escorted to their location
  • Promptly answer questions or refer to the appropriate employee or department
  • Communicate with Facilities management in cases of emergency, such as fire, power outages, flooding or presence of unauthorized persons
  • Valid NY State Security Guard License
  • 1-2 years relevant experience
5

Associate Security Operations Analyst Resume Examples & Samples

  • 24/7 recurring security operations tasks, checking malware signature versions and downloads, checking security infrastructure consoles for device health etc
  • 24/7 monitoring and support of IDS, IPS, SIEM/SELM and Antivirus infrastructure across IBM Security Services customers
  • Enforcement of customer security policies regarding the use and configuration of company assets
  • Analysis of security event data and providing recommendations for policy modifications/tuning
  • Participate in review of SOC processes and procedures as required
  • Some experience with networking (TCP/IP, OSI model, LAN/WAN, cabling and data transmission types, network topologies, routing protocols, and remote access methods)
  • Hands on experience in at least three of the following concepts and technologies
  • Experience with Incident, Problem and Change management processes
6

Information Security Operations Analyst Resume Examples & Samples

  • Perform day-to-day security information event monitoring (SIEM), correlation and investigation of security events
  • Assist in the awareness and enforcement of company information security policies
  • Provide consistent operational intelligence to the department through the use of industry information (web sites, RSS feeds, blogs, etc.), internal metrics, log reviews, and any other means deemed necessary
  • Develop the processes and methodology for incident handling in conjunction with the other Information Security Groups, as well as provide training and yearly exercises for incident response
  • Research, evaluate, and recommend new or improved information security software or devices
  • Maintain up-to-date knowledge of the IT security industry, including awareness of new or revised security solutions, best practices, and the development of new attacks and threat vectors
  • Knowledge and understanding of reviewing raw log files, data correlation of events, and analysis
  • Knowledge and understanding of business needs, with the ability to establish and maintain a high level of customer trust and confidence in the team and individual
  • Demonstrates ability to communicate effectively with peers, management and customers
  • Knowledge and understanding of automated security analysis, incident handling, remediation procedures, workflows and tasks
  • Firm understanding of various attacks, such as email phishing, SQLi, XSS, buffer overflow and data leakage
  • Understanding of packet analysis tools (tcpdump, Wireshark, Ngrep)
  • Perform threat research, conduct forensic investigations and triage security incidents
7

CIB Information Security Operations Analyst Resume Examples & Samples

  • Analyse events from a response perspective: apply skill and judgment to determine if escalations are warranted
  • Gather data for monthly activity reporting; maintain historical records and prepare monthly metrics and reporting for Senior Management review
  • Apply “Big Data” analytical techniques to the raw data feeds, undertaking pattern analysis, cross-reference checks. Have the ability to spot trends or abnormalities in the data. Investigate potential deviations to determine the root cause. Where appropriate, work with business/operations Teams to help them adjust their procedures to eliminate exceptional security events
  • Excellent written and verbal communication skills, working with all levels of Management, to leverage the resources of a very large multinational quickly and effectively
8

CIB Security Operations Analyst Resume Examples & Samples

  • Follow-up of potential security events in coordination with firm’s security operations centers
  • Work with either HR and/or the Firm’s Fraud Investigations Teams, providing additional details for escalated cases, as appropriate
  • Perform data analysis, reviews and reporting to support business aligned risk management. Investigate potential deviations to determine the root cause. Where appropriate, work with business/operations Teams to help them adjust their procedures to eliminate exceptional security events
  • Maintain a solid “currency awareness” of the emerging threats and issues for this activity sector; be aware of developments associated with malware, phishing, external attacks and associated threats to the Firm’s Information Assets
  • Experience working in Information Security, Compliance, Data Loss Prevention, Technology Operations and/or Data Protection
9

Security Operations Analyst Resume Examples & Samples

  • 24/7 monitoring and support of IDS, IPS, SIEM/SELM and Antivirus infrastructure across SO Delivery customers
  • Initial detection, analysis, and investigation of security events to determine likelihood of compromise and respond according to processes
  • Work closely with other security teams and perform groups as required to achieve desired outcome for clients
  • Single point of contact for newly observed threats and events of interest
  • Respond to security requests and action accordingly
  • Monitor security infrastructure health and escalate per process to level 2 support teams
  • Adhere to audit compliance strategies to ensure security and business processes are part of BAU activities
  • Stay abreast of current and upcoming security threats
  • Train and/or mentor other team members
  • Knowledge and understanding of networking (TCP/IP, OSI model, LAN/WAN, cabling and data transmission types, network topologies, routing protocols, and remote access methods)
  • Knowledge and experience in at least three of the following concepts and technologies
  • Experience with Incident, Problem and Change management processes in enterprise environments
  • Ability to work in a fast paced environment, interact with staff, peers and customers on a technical & professional level
  • Demonstrated ability to work under pressure and deliver to meet SLA’s
  • Proactive and independent mindset as well as a willingness to share knowledge
  • Non-Degree Program
10

Cyber Security Operations Analyst Resume Examples & Samples

  • Current, relevant experience of working in a large Technology and/or Security Operations function
  • Able to work in a global, federated environment and drive change
  • Solid focus on accuracy, productivity, teamwork and excellent customer service
  • Perform monitoring, investigation and follow-up of potential security events detected by monitoring technologies such as Symantec DLP, Guardium and Palantir
  • Liaise with the Firm’s SOC to respond to emerging incidents in a timely manner; triage details and provide support to both the SOC and Business Managers
  • Other duties as deemed commensurate with the grade and scope of the post
  • “Big Four” and/or experience with a major Financial Services provider
  • At least 1-2 years working in Information Security, Compliance, Data Loss Prevention, Technology Operations and/or Data Protection
  • Experience of the following technologies an advantage:-
  • Platform security and data activity monitoring toolsets, such as Guardium
  • SIEM frameworks, such as HP ArcSight
  • Professional Qualification such as CEH, CISSP, CISA, CISM an advantage but not essential
11

Security Operations Analyst Resume Examples & Samples

  • Experience using SIEM (Security information and event management) systems
  • Experience gathering threat intelligence, and using this information to access the environment for IOCs (indicators of compromise)
  • Ability to write detailed reports for management on cyber security threats as they pertain to our environment
12

Security Operations Analyst Resume Examples & Samples

  • Hands-on experience deploying & operating security technologies including devices, networks and systems that prevent, detect & respond to security threats
  • Strong understanding of security operations concepts such as perimeter defense, BYOD management, data loss protection, insider threat, kill-chain analysis, risk assessment and security metrics
  • Strong understanding of network protocols
  • Development/scripting experience: Python and/or PowerShell are a plus
  • Working knowledge of Information Security best practices
  • Thinks both tactically and strategically
  • Enables creative solutions by stimulating ideas through discussion and collaboration
  • At least one active security certification: CEH, OSCP, CPTE, CISM, CISSP or related
13

Security Operations Analyst Resume Examples & Samples

  • Development and maintenance of Infosec metrics and reporting
  • SIEM tuning and maintenance
  • Key member of the incident response team
  • Monitoring and investigation of security events
  • Provide technical mentorship to junior security team members
  • Stay current on the latest threats and vulnerabilities to ensure operational tools and processes are up to date
  • Manage deployments, upgrades and changes
  • 3+ years of experience with SIEM tools, LogRhythym preferred
  • 1+ year of experience in a SOC/NOC environment
  • BA/BS in related field or an equivalent in education and experience
  • Possession of industry certifications preferred (CISSP, GIAC, etc)
  • Ability to develop and track key performance indicators (KPIs) and metrics for operational success
14

Security Operations Analyst Resume Examples & Samples

  • Threat-Centric Security, Knowledge of NSM
  • Advanced Splunk and Splunk ES
  • TCP/IP protocols
  • Common application layer protocols
  • Linux architecture and operating systems
  • Basic data parsing (Python, BASH, grep, SED, AWK, etc.)
  • IDS types, similarities, and uses (signature-based, anomaly based)
  • Understanding of IOC types
  • Sensor and signature tuning (IDS, netflows, etc.)
  • Basic analytic diagnostic methods
  • Basic malware analysis
15

Security Operations Analyst Resume Examples & Samples

  • 2-5 Years of Information Security expertise in the following domains – Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), Web Application Firewalls (WAF), Firewall logs, systems logs, web logs, application logs and Security Information and Event Management (SIEM) systems
  • Experience mitigating and addressing threat vectors including Advanced Persistent Threat (ADT), Distributed Denial of Service (DDoS), Phishing, Malicious Payloads, Malware, etc Must have experience on a Computer Incident Response Team (CIRT)
  • Familiarity with industry standard frameworks (NIST, PCI, Safe Harbor, ISO)
  • Industry certifications such as CSSLP, CRISC, CISA, CISM, CGEIT, CEH, GIAC, CISSP
16

Security Operations Analyst Resume Examples & Samples

  • Proven history of successfully performing level 1 and 2 IT security threat assessment and incident response in a SOC role or similar security role
  • Experience/knowledge of SIEM vendor products – HP ArcSight and IBM Qradar
  • Experience/knowledge of IDPS vendors and products – IBM Proventia Network Protection / SiteProtector, Juniper IDP, Checkpoint IPS, Sourcefire, tipping Point etc
  • Experience/knowledge of Anti-Virus vendors and products – McAfee ePO, Trend Micro and Symantec
  • Knowledge of HTML, JAVA, regular expressions, SQL queries
  • Operating Systems skills and experience (Windows, LINUX etc.)
  • AV Management
  • Firewall
  • Proxies
  • Content Filtering
  • Web Security
17

Perimeter Security Operations Analyst Resume Examples & Samples

  • Perform change management utilizing documented procedures on the Firewall/Proxy/RAS infrastructure
  • Document problem resolutions and publish knowledgebase
  • Participate in fail over testing, disaster recovery testing and other readiness efforts
  • Support business and work with system administrators, developers and analysts with troubleshooting issues related to Firewall/Proxy/RAS
  • Years of Related Experience: 2-3
  • Strong experience on networking concepts such as TCP/IP (IP, subnetting, NAT, IPSEC) and good understanding of protocols such as SNMP, DNS, DHCP, FTP
  • Education Level Required: Bachelor’s Degree
  • CCNA/CCNP/JNCIA/JNCIS certification desirable
18

Senior Security Operations Analyst Resume Examples & Samples

  • SSL Decryption
  • Case Management System
  • 5+ years of experience in a security operations center (SOC) environment required
  • 5+ years of experience with reviewing raw log files, data correlation, and analysis (ie. System logs, netflow, firewall, IDS) required
19

Security Operations Analyst Resume Examples & Samples

  • May function as team lead, providing technical leadership to the team
  • Monitors application, including setting alerts to maintain the stability of the environment and application, monitoring error logs, and automating administration tasks wherever possible
  • Maintains current description and documentation of policy configuration, including tracking and documenting any changes to policies
  • Minimum of a B.S. in Computer Science, MIS or related degree and three (3) years of related experience or a combination of education, training and experience
20

Security Operations Analyst Resume Examples & Samples

  • Primary support and central point of contact for vulnerability monitoring and metrics reporting tools
  • Automating tasks to create more reliable monitoring
  • Strong Metrics/Reporting background
  • Scripting experience required - prefer experience with SQL or PowerShell
  • Understanding of SIEM, networking, virtualization, and Linux or Windows operating systems and the ability to troubleshoot issues and identify root cause
21

Perimeter Security Operations Analyst Resume Examples & Samples

  • Competence in Cisco ASA and Juniper SSL VPN appliance
  • Competence in proxy technologies (particularly Bluecoat)
  • Experience with networking and TCP/IP, DNS, load-balancing, network routing with BGP
  • Advance written and verbal communication skills in English
22

Security Operations Analyst Resume Examples & Samples

  • Be able to remain calm under pressure and when faced with adversity
  • Understanding of security principles and general requirements in a corporate environment
  • Microsoft Windows Server
  • Enterprise Security Station (Control-SA)
  • Remote Support Tools (RDP, Remote Assistance)
  • Remedy
23

Security Operations Analyst Resume Examples & Samples

  • Monitoring and support of IDS, IPS, SIEM/SELM and Antivirus infrastructure across IBM customers
  • Experience/knowledge of IDPS vendors and products – IBM Proventia Network Protection (GX and XGS series), Juniper IDP, Checkpoint IPS, Sourcefire, tipping Point etc
  • Operating Systems skills and experience highly regarded (Windows, LINUX etc.)
  • 3+ years supporting a multi-customer environment
  • Meet at least two of the following
  • At least 2 years of experience in Network Troubleshooting
  • At least 2 years of experience in Firewall/VPN
  • At least 2 years of experience in SIEM
  • At least 3 years of experience in Customer Service
24

Information Security Operations Analyst Resume Examples & Samples

  • 4+ years of experience with McAfee Products especially managing VirusScan Enterprise (VSE) and McAfee Agent (MA) via ePO console
  • Strong knowledge of all aspects of Workstations Administration within a complex and distributed technical environment
  • 4+ years of experience of working in a large scale distributed environment, ideally within the banking sector
  • IT academic qualifications
  • High caliber individual
  • Knowledge of McAfee suite of anti-malware products
  • Problem solving skills and attention to detail
  • Knowledge of SQL, VBA and Excel programming will be a strong advantage
  • Knowledge of client and office automation technologies
  • Strong data analysis and data manipulation skills
  • Knowledge of Citi’s in-house processes and technologies will need to be acquired
25

Security Operations Analyst Resume Examples & Samples

  • Act as a lead for a designated shift
  • Communicate with management on incident updates
  • Ability to complete the incident lifecycle without higher level supervision
  • Possess solid understanding of enterprise grade technologies including operating systems, databases and web applications and applicable monitoring tools
  • (e.g. SIEM, DLP, Internet filtering/blocking, IDS/IPS, firewalls, Anti-Virus, encryption technologies)
  • Maintain strict confidentiality of all security issues
  • Ability to multi-task and work on more than one initiative at a time
26

Security Operations Analyst Resume Examples & Samples

  • Respond to fraud alerts according to department service level agreements. Position is fast paced with same day/same hour discovery and resolution expectations
  • Customer contact is required to handle inquiries and calls from customers relating to security, fraud, abuse or legal matters pertaining to copyright action, cloned modems, botnets, high usage (Internet and Phone) and will act as an escalation point for Engineering, Residential, PAC, Business Operations and support groups on security policy matters and be able to advise customers and other TWC groups on security and other policies as needed
  • Collect over limit/high usage payments according to company policy and adhere to FDPCA and collections regulations as applicable
  • Interface and communicate with other departments such as local Security, Engineering, PAC, Collections, IS Billing and IT teams across the TWC enterprise to audit and ensure fraud alerts are handled appropriately and produce incident reports and audit findings to impacted departments. Compile and analyze statistical data from RMS
  • Continually grow new product knowledge to further develop fraud prevention programs and participate in Security and Fraud Management organization conferences and webinars
  • Keep up with changes in CSG, ICOMS, Salesforce, ‘NetMind, and associated fraud
  • Ability to research and perform daily comparative analysis of customer usage and account details involving sensitive customer information
  • Knowledge of ICOMS or CSG billing systems including how to post payments, set up disconnects and/or block digital phone services
  • Must be able to work under pressure to analyze data, assess action required and make decisions based upon best practices, escalating issues when required
  • Analytical skills needed to support case management and provide summary conclusions from fraud alerts, investigations and operations reports. Ensure proper controls are in place minimize losses due to fraud
  • Must have initiative, be a self-starter, able to work in a fast paced and changing environment and handle multiple priorities and deadlines
  • Willing to work and respond to fraud alerts daily including using remote access to RMS from home when necessary
  • Proven professional business communication skills required to work with TWC customers throughout the fraud investigation process
  • Previous experience using ticketing systems, billing systems and Web-based tools
  • Understanding of HFC and CPE networked devices used in Cable helpful
  • Understanding of Internet Security threats and vulnerabilities, HSD and Networking helpful
  • Learn Collections FDPCA, Red Flags, and all applicable rules and regulations related to this position
  • Supports management in the operational risk assessment of new businesses, products, points of sale to develop risk mitigation strategies and operational processes
  • Collaborates with Management to develop operational and departmental policies, procedures, and metrics which support the fraud prevention and client service goals
  • Consistently achieve Security Department goals. Align productivity to meet these goals. Follow department policies and procedures at all times. Attend and participate in regularly scheduled regional/national Security and Fraud update calls/web demonstrations
  • Proven track record of working in fast paced environment like a call center, help desk, alert response group or in an on call environment is needed
  • Associate’s degree (A.A.) or equivalent from two-year College or technical school; or three months to one year related experience and/or training; or equivalent combination of education and experience
  • Experience with telephone, provisioning, fraud management and/or internet abuse or security preferred
  • Knowledge of investigations, investigative techniques or in depth analytical skills desired
  • Certifications: CSSP, (Certified Communications Security Professional) CFE, (Certified Fraud Examiner), AISC (Advanced Information Security Certificate) TFA (Telco Fraud Analyst) useful
27

Security Operations Analyst Resume Examples & Samples

  • BE/B.Tech in Computer Science Engineering
  • Experience supporting large-scale SaaS based applications and databases
  • Familiarity with Secure Software Product Lifecycle
  • Familiarity with agile software development processes including software builds and source code control
28

Security Operations Analyst Resume Examples & Samples

  • Survey and detect for signs of intrusion and ensure security of doors, windows, and property (protecting against fire, theft, vandalism, and any illegal or suspicious activity)
  • Answer alarms and investigate disturbances as they occur and communicate with police and fire departments in case of emergency or the presence of unauthorized persons
  • Create detailed reports of daily activities and irregularities
  • High school diploma or GED Equivalent
  • 2+ years of security experience
  • Possess a NY State Security Guard License
  • Display good organizational and communication skills
  • Ability to work a 12 hour shift
29

Information Security Operations Analyst Resume Examples & Samples

  • Respond in a timely manner to people who report security issues
  • Advise on forensic guidelines and practices
  • Third Level qualification in Information Technology, Information Security or Engineering
  • CISSP, CCSP, CISA, CISM, GCIH, GIAC (SANS)
  • Some experience of Microsoft & Linux operating system, with a good understanding of networking concepts (to CCNA level or equivalent)
30

Information Security Operations Analyst Resume Examples & Samples

  • 3-5 years of experience in a dedicated information security role
  • Extensive knowledge of virus and malware identification and removal
  • Additionally, significant experience with Linux and Windows operating systems, knowledge of virtual environments, malware analysis and APT Methodologies
  • Candidate should have broad technical knowledge on a number of security technologies and a solid understanding of information and networking security
  • Advanced PC literacy
  • Extensive knowledge of networking terminology and methodologies, including internet protocols and associated risks
31

Information Security Operations Analyst Resume Examples & Samples

  • Act as the initial point of contact for the SOC, reviewing incoming e-mails and receiving phone calls and performing triage and/or escalating as required
  • Regularly check work queue for incoming assignments and complete all work daily
  • Respond to work queue items utilizing pre-defined operational procedures
  • Execute daily pre-defined monitoring tasks
  • Utilize ticketing system to document all work steps taken
  • Categorize malicious activity into appropriate predefined categories
  • Periodically analyze trends and patterns for work assigned
  • Triage with other SOC Level 1 Analysts and SOC Level 1 Supervisor to discuss operational issues, trends, and patterns
  • Work with SOC Level 2 Analysts, or other members of Security, to respond to and/or hand off tickets
  • Escalate to SOC Level 1 Supervisor when ticket exceeds defined time to respond or when SOC Level 1 Analyst believes a risk needs further attention or oversight
32

Cyber Security Operations Analyst Resume Examples & Samples

  • Gain knowledge of existing policies, standards, procedures, and guidelines to prevent the unauthorized use, release, modification, or destruction of data
  • Gain an understanding of security risks and controls
  • Communicate directly with data asset owners
  • Escalating issues when necessary
  • Maintain knowledge of industry trends and current security practices
  • Must have a minimum 1 year of operations experience
  • Detailed knowledge of at least one operating system and corresponding security system
  • Knowledge of basic banking concepts and theories
33

Cyber Defense Security Operations Analyst Resume Examples & Samples

  • Verify Service Restoration
  • Supporting the development of new sources as necessary
  • Mentoring and developing less experienced team members
  • Supporting relationships with multiple vendors
  • Conducting briefings as needed
  • 2 or more years IT security work experience
  • Prior experience with processes, procedures, and methods to research, analyze, and disseminate open source intelligence information
  • Willingness and ability to obtain a US Government Top Secret Security Clearance
  • Experience using proprietary and/or open source tools to gather and analyze intelligence
34

Attack Analyst / Security Operations Analyst Resume Examples & Samples

  • 5 years of experience working in a Security Operations Center functioning in a Security Analysis, Incident Response, Attack Analysis, or Computer Network Defense (CND) capacity in a in a large, mission-critical environment
  • TCP/IP, IPv6, UNIX, Windows, HTTP and related network tools is required
  • The ideal candidate will have a technical background with significant previous experience in a large enterprise environment with the following
35

Information Security Operations Analyst Resume Examples & Samples

  • Reviews, validates, classifies, and responds to security events
  • Conducts proactive threat and vulnerability research
  • Demonstrated attention to detail
36

Security Operations Analyst Resume Examples & Samples

  • Works rotating shifts to cover 24x7x365 operations
  • Adheres to strict security and authentication protocols associated when dealing with all levels of client requests
  • Understanding of PCI, ISO 27001, ITIL, and/or other compliance frameworks would be an asset
  • Security designation such as CISSP would be an asset
  • A SECRET Security Clearance is required (or the ability to obtain)
37

Information Security Operations Analyst Resume Examples & Samples

  • Obtaining an understanding of the network, security appliances, security tools, as well as procedures within Equifax
  • Obtaining a working knowledge of core security principles
  • Perform procedure validation by walking through existing procedures and identifying mistakes, needed clarification, and additional improvements
  • Performing technical writing by editing or creating documentation
  • Assisting with the monitoring, maintenance, and deployment of security tools and appliances
  • Participating in technology reviews
  • Personal Interest in Information Security
  • Degree in Computer Science, IT Security, Software Engineering or other similar technical degree program
  • IT experience such as end user support, networking, or system administration
  • Ability to write technical documentation
  • Passionate to learn new technologies, best practices and contribute to the broader global infrastructure and security teams
  • Technical Writing Experience
38

Cyber Security Operations Analyst Resume Examples & Samples

  • Monitoring – Use the available tools and processes to recognize, triage, and initiate the mitigation of threats based on behavioral analysis and signature-based detection technologies to enable rapid detection and response to malicious activities
  • Incident Handling - Responsible for responding to various types of potentially malicious activity, including network security incidents, malware, unauthorized access, security policy violations, intellectual property leaks, and responsible disclosures
  • Project work - Assist other members of the CS team with technology projects and larger incidents
  • SOC Operations Analysts will be expected to work in shifts, including after-hours and during the weekend
  • Familiarity with industry leading security applications
  • Excellent understanding of networking principles including TCP/IP, WANs, LANs, and commonly used Internet protocols such as SMTP, HTTP, FTP, POP, LDAP, etc
  • Knowledge of multiple operating systems and applicable system administration skills (Windows, iOS, Linux)
  • Understanding of systems administration, intrusion detection and vulnerability analysis
  • Experience with network troubleshooting tools like network sniffers, TCPDUMP or IPTRACE utilities
  • Familiar with the tools and techniques used by ethical hackers including vulnerability scanners and network mapping tools
  • Knowledge of client-server applications, multi-tier web applications, relational databases, firewalls, VPNs, Exchange, Outlook, enterprise Anti-Virus products
  • Excellent communication skills to be able to work with individuals at all levels of the organization and with third party vendors
  • Experience with security testing tools, development of threat assessments and security testing methodologies would be an asset
  • Security certifications such as CISSP or SANS GIAC certificates are a strong asset
39

IT Security Operations Analyst Resume Examples & Samples

  • Troubleshooting functional and performance issues, and document root cause and remediation steps
  • Checking and documenting daily health status
  • Diagnosing and fixing production issues and engaging other teams as required
  • Escalation to vendor and/or application SMEs when necessary
  • Participating in design reviews
  • MUST HAVE UNIX/Linux administration experience preferably in the security space
  • The ideal person will have an understanding of compliance and governance and how it relates to audit
  • The incumbent should also have an understanding of enterprise-level access control solutions on a variety of platforms
  • Scripting or programming skills would be an asset
  • Strong knowledge of cryptography and cryptography tools
  • Secure email transmission
  • Excellent understanding of cloud base security
  • Excellent understanding of network technology
  • Excellent problem solving and troubleshooting skills
  • Experience with client based security tools
  • Programming skills and scripting experience an asset
  • Excellent analytical skills required to troubleshoot and diagnose issues
  • 3+ years of experience with Symantec Endpoint Protection or similar products would be an asset
  • 3+ years of experience with MacAfee DLP or similar products would be an asset
  • Guardian Database Product Suite is a significant asset
  • Ability to multi-task and work under pressure
  • Participate in DR and BCM planning and testing
  • Self-motivated and ability to take initiative
  • Knowledge of IT Security principles, SOX and PCI regulations
  • Provide on-call 24x7x365 support as needed
  • CISSP or CISM designation would be an asset
40

Security Operations Analyst Resume Examples & Samples

  • Bachelors degree or equivalent experience in Information Technology or related IT field
  • Must have excellent verbal and written communication skills. This includes the ability to explain technical terminology to non-technical end users
  • Must be highly self motivated and directed
  • Must possess a keen attention to detail
  • Must have extensive knowledge in Microsoft Windows and Linux Operating Systems. Specific knowledge in Microsoft Office Products and client applications required
  • Familiarity with TCP/IP protocol required
  • Must have knowledge of computer hardware, including IBM, HP and Dell
  • Hands-on hardware and software troubleshooting experience required
  • Scripting skills (e.g., Perl, Ruby, Python, Shell scripting)
  • 1-3 years of Security Analyst or Security Operations experience
  • Knowledge of the Linux operating system and good understanding of networking concepts (to CCNA level or equivalent)
  • Occasional local travel and on-call escalation support required
  • Bias for action, natural curiosity and eagerness to learn and grow in a dynamic technical environment
  • Experience with vulnerability management solutions, vulnerability analysis, and risk analysis
  • Ability to write advanced SQL queries against Oracle and MySQL back-ends
  • Experience driving development team(s) to deliver commercial software or software-based services (development, QA testing, or security role)
  • Compliance experience: PCI, GLBA helpful
  • CISSP, CISA, CISM, Security+ and/or other security certifications
41

Security Operations Analyst Resume Examples & Samples

  • Provide Level 1 support for Information Security requests to Virtustream's Rubicon division: Review security policy clarifications and exception requests; assist in Rubicon Security projects under the direction of a Sr. Security Engineer or a Principal Security Engineer; triage general security questions from other internal teams
  • Analyze network and host-based security logs to determine and identify potential security threats
  • Participate in an on call rotation including after hours and weekends to support critical security issues
  • Work with the Rubicon Cloud Security GRC team to develop the policies, standards and procedures related to Security Management
42

Security Operations Analyst Resume Examples & Samples

  • Ensuring the integrity and quality of our incident response processes and assisting in the execution of these processes as required. These processes support the handling malicious activity, including network security incidents, malware, unauthorized access, security policy violations, intellectual property leaks, and responsible disclosures
  • Identify opportunities to improve existing process, procedures, reporting and tasks
  • Analyze server and network logs to detect violations of security controls, collect data required for forensic analysis
  • Develop use cases and supports the continuous improvement of the monitoring and detection capabilities
  • Assisting with the support, administration, and evolution of BlackBerry’s client and enterprise security applications
  • Provide 2nd/3rd level problem solving expertise to resolve complex issues and identify root cause
  • Build and maintain partnerships across the business and IT partners to excel and focus security initiatives by building mutual trust and respect
  • Assist in monitoring security alerts for potential events/incidents as well as trending and historical analysis and ensuring all incident reports are complete and written within standard operations Conduct research to maintain and expand knowledge on the latest cybersecurity technologies and standards, as well as the threat landscape
  • Plan and implement security measures to protect networks and data
  • The ideal candidate will have 5+ years of experience as a Security Analyst or Security Operations Specialist
  • College degree in Computer Information Systems or Computer Science
  • Practical experience and extensive knowledge of HPE ArcSight, incl. developing queries, filters, data models, and dashboards is required
  • Knowledge of security practices and essential security technologies (AV, FIM, HIPS, NIPS, SIEM, WAF/DAM, DLP, IDS/IPS)
  • Experience in Linux/UNIX and Windows based devices at the System Administrator level Understanding of systems administration, intrusion detection and vulnerability analysis
  • Experience with methods for ethical security hacking/penetration testing
  • Detail oriented with strong analytical and organizational skills
  • Some experience as a front line security analyst or similar security role
  • Legally eligible to work in the United States
  • Security certifications such as CISSP, CEH, GCIH, CISM and SIEM certificates are a strong asset
  • Understanding of FedRAMP controls and Federal agency security requirements and processes considered a plus
43

Cyber Security Operations Analyst, Junior Resume Examples & Samples

  • Experience with defensive measures and information collected from a variety of sources to identify, analyze, and report events to protect information, information systems, and networks from threats
  • Experience with NIST SP 800 Series, including NIST SP 800-53
  • Experience with Cybersecurity automated tools, including McAfee ePO, IBM Big Fix, RSA Archer, Nessus, or AppDetect
  • Ability to work in a dynamic, fast-paced team environment to meet deadlines
  • Possession of excellent oral and written communication skills to communicate at technical and management levels
  • DoD 8570 Compliant Certifications, including CEH, GCIA, SSCP, CSIH, or GCIH preferred
44

IT Endpoint Security Operations Analyst Resume Examples & Samples

  • Manage day-to-day interactions with customers and provide 24x7 support
  • Interact with cross-organizational teams to align deployment of security agent and maintain policy and infrastructure
  • Assist with packaging of the security MIR agent
  • Assist with developing operations guides for SIEM and MIR
  • Continuous improvement of the Security Operations deliverables
  • 5+ years of experience in security field and managing projects
  • 2+ years of experience in IT Operations and production support
  • Has a strong understanding of networking technologies
  • Strengths in working in a team environment
  • Excellent communications skills – written and oral
  • Ability to mentor and teach others
  • Has strong skills in developing processes to support new product deployment
  • Has proven project management and implementation skills
  • New product development processes experience(SDM)
  • The distance between imagination and … creation. It can be measured in years of innovation, or in moments of brilliance. When you join the Ford team discover all the benefits, rewards and development opportunities you’d expect from a diverse global leader. You’ll become part of a team that is already leading the way, with ingenious solutions and attainable products – and it is always ready to go further
45

Security Operations Analyst With English Resume Examples & Samples

  • Be part of a larger cyber operations team jointly working on protecting and defending the organization’s assets
  • Analyze potential cyber security incidents to determine if incident qualifies as a legitimate security threat
  • Perform network incident investigations, determining the cause of the security incident and preserving evidence for potential legal action
  • Initiate escalation procedure to counteract potential threats and vulnerabilities
  • Shift work and limited travel possible
  • Interest in Security, Network and Server Monitoring technologies
  • Willingness to learn and improve
  • Experience with Security Information and Event Management (SIEM) tools like ArcSight, QRadar, Splunk, etc
46

Security Operations Analyst Resume Examples & Samples

  • O Analyze potential infrastructure security incidents to determine if incident qualifies as a legitimate security breach
  • Basic knowledge of IT technologies, ideally related to Security
  • Basic knowledge of Windows server and Unix/Linux operating systems
  • Proficiency in written and spoken English
  • Knowledge of Security principles, techniques and technologies
  • Programming and scripting skills
47

Security Operations Analyst Level Resume Examples & Samples

  • Event Detection - Following an established, documented process for event detection including but not limited to: Receipt of Security Alerts, (and Operational Health Alerts from Security Devices) from monitored devices and associated technology
  • Acknowledgement of receipt of the event
  • Opening new service desk tickets, or update existing tickets in order to track event handling through its lifecycle to resolution and closure
  • Assignment of the event ticket to the appropriate owner
  • Event Filtering - Follow established process for identification of events that require filtering. Documenting and assigning requests for event filtering in the service desk ticket
  • Event Investigation - Follow an established process for the purposes or collecting relevant data and performing the necessary level of analysis on that data
  • Event Escalation - Follow an established process for transmitting event investigation data to the appropriate point of contact, whether that point of contact is an external client, or an internal resource. Report on recurring problems and issues discovered during the course of your duties
  • Event closure - Follow established process to ensure that resolution criteria are met before closing tickets
  • Candidate will need to become familiar with, adhere to and ensure implementation
  • Of all Thales security policies and standards and the change control
  • Environment
  • Support client facing / end user helpdesk and other IT Support Team's
  • Ensuring support tickets are fully updated with the most current data. Provide
  • Proper escalations and hand overs to management and support staff
  • A technical degree or equivalent experience
  • Knowledge of operating systems, from the latest to legacy Windows and Unix
  • Understanding of network environments
  • Understanding of the current and future threats across the cyber landscape
  • Willingness to keep skills up to date, supported by training and mentoring
  • 0-3 year experience in Cyber Security
48

Technical Security Operations Analyst Resume Examples & Samples

  • Evaluate and continuously improve technical operations across the team
  • Identify and recommend new product features for internal policy, risk, compliance, and access tooling
  • Develop, evaluate, and maintain standard operational processes both for the immediate team and across the company
  • Monitor for deviation from operational commitments
  • Create and communicate operational reporting and achievements
  • Lead, drive, and track projects across the team
  • BA/BS in Computer Science or equivalent, Information Systems or equivalent work experience
  • Experience analyzing data into meaningful information
  • Experience evaluating, prioritizing, and fulfilling operational requests
  • Ability to manage competing priorities and simultaneous projects in a fast-paced environment
  • Communication, presentation skills, and interpersonal skills
49

Security Operations Analyst Resume Examples & Samples

  • Help demonstrate Facebook’s commitment to security within the company
  • Understand, execute, and seek to improve Standard Operational Procedures (SOPs)
  • Understand technical implementation details necessary to manage access to internal and external tools
  • Understand the security policies and needs to effectively uphold access management commitments
  • Evaluate access requests and provision access to internal and external tools
  • Help identify, organize, and remedy excessive permissions
  • Assist with daily activities and functions of the team to maintain policy, compliance, and risk management commitments
  • 3+ years of working experience in information security, technical operations, or similar capacities
  • Experience with user provisioning and access management processes
  • Demonstrated ability to work independently and effectively with individuals across various levels
  • Adaptable to dynamic situations and proactive work ethic
50

IT Cybersecurity Infrastructure Security Operations Analyst Resume Examples & Samples

  • Collaborates with director, managers, project managers, architects, and other individuals to ensure continuity and communication across teams
  • Promotes continued integration of technological advances to further enhance security and reduce risks
  • 2 or more years of experience with firewalls - implementing rules, analyzing policy, troubleshooting
  • 2 or more years of experience in IT Security for medium to large corporation
  • 2 or more years network experience
  • 2 or more years of Microsoft Office experience
  • HS Diploma/GED
  • Ability to obtain and keep required (government and other) security clearances
51

Information Security Operations Analyst Resume Examples & Samples

  • Information Security Monitoring – Follow and maintain the corporate Information Security Monitoring related policies and procedures
  • Assist outsourced vendors that provide information security functions for compliance with contracted service-level agreements
  • Vulnerability Management – monitor technical assets for vulnerabilities for reporting to management
  • Incident Monitoring, Detection and Response – Monitor and report operational components of incident management, including detection, response and reporting; includes but is not limited to antimalware, configuration management, Security Information Event Management (SIEM), Data Leakage Prevention (DLP), and Intrusion Prevention/Detection as well as Internet, email and file activity monitoring
  • Threat Intelligence & Monitoring - Assist with the maintenance of a knowledgebase comprising a technical reference library, security advisories and alerts, information on security trends and practices, and laws and regulations
  • Privileged Account Management – Monitoring and reporting privileged account access to the environment
  • Strong knowledge of information management concepts and practices; especially as they relate to financial institutions
  • 08
52

Senior Security Operations Analyst Resume Examples & Samples

  • Manage security operational incidents and requests
  • Manage DLP incident process
  • Support the endpoint protection
  • Analyze trends for continual improvements
  • Develop process flow diagrams, reports and presentations as needed to report on the status of security
  • Security operations and incident management required
  • Data loss prevention experience preferred
  • Experience with cyber kill chains strongly preferred
  • Ability to work well under pressure, while maintaining confidentiality, and a professional image
  • Experience with security in emerging cloud, mobile and IoT desired
  • Secret Clearance preferred
53

Security Operations Analyst Resume Examples & Samples

  • Perform routine actions of analyzing correlated event logs to help identify normal versus malicious activity in the network/domain using a SIEM solution
  • Triage security events, raise incidents and support the Incident Management process
  • Maintain records of security monitoring and incident response activities, utilizing case management and ticketing technologies
  • Propose changes / improvements to the processes and procedures that will improve operational efficiency, provide better service, decrease incident response time, etc
  • Serve as the SOC’s initial point of contact for all users
  • Formally assign and escalate incidents to and within the SOC
  • Perform ongoing reviews of all security activities and reports providing technical security oversight to detect meaningful data versus non-threatening anomalies
  • Remain up to date with current attack methods and characteristics
  • Must have strong written and oral communication skills
  • Coordinate and collaborate with Help Desk, Network and other IT teams to remediate identified risks and vulnerabilities
  • Perform risk and security assessments
  • Penetration testing to confirm remediation of known exploits
  • Audit system access and reports to ensure security policy enforcement
  • Ability to read system data, including, but not limited to, security and network event logs, sys logs, and firewall logs
  • Experience analyzing IIS, SQL, firewall, IPS/IDS, Windows, SEP, Web, and mail filtering logged events
  • Solid working knowledge and understanding of multiple operating systems and commands, as well as an understanding of IT security and network best practices and software/hardware solutions
  • Currently possess or willing to obtain certifications from EC-Council, GIAC, (ISC)² [CISSP, C|EH, GCIA, GCIH]
  • The SOC Analyst will develop, maintain and follow procedures for security event alerting, monitoring of IDS and other alerting tools, and participate in security investigations
  • The SOC Analyst will perform tasks including monitoring, research, classification and analysis of security events that occur on the network or endpoints
  • The SOC Analyst should have familiarity with the principals of network and endpoint security, current threat and attack trends, and have a working knowledge of security principals such as defense in depth and the techniques and tools used to secure enterprise networks
  • The SOC Analyst must be competent to work at a high technical level and be capable of identifying threats and threat vectors that cause security events
  • Equipment Used in Job Performance/Working Environment
  • Cybersecurity computing resources
  • Basic Office Equipment
  • One (1) year experience in Information Technology, Information Security or related field
54

Security Operations Analyst Resume Examples & Samples

  • At least 4 years of relevant work experience
  • Bachelor's degree in IT or any related course
  • Knowledge and experience using Microsoft Active Directory Services, Power Shell, and/or other scripting tools highly desirable
  • Experience with troubleshooting AD incidents
  • Experience with Active Directory design and configuration including OU's, Group Policies, AD Schema, AD DNS, Trusts, AD Certificate Services, AD Site Topology
  • Experience in performing access administration for UNIX platform, Oracle, SQL and Sybase databases
  • Experience managing access and folder permissions of File Services
  • Excellent written and verbal English communication skills
  • Ability to work as part of a regional team across multiple countries, cultures and time-zone
  • Strong working experience with the following tools
55

Security Operations Analyst Resume Examples & Samples

  • Analyze potential infrastructure security incidents to determine if incident qualifies as a legitimate security breach
  • Shift work
  • Limited travel is possible
56

Information Security Operations Analyst Resume Examples & Samples

  • Bachelor's (or advanced) degree in information technology, information security, computer science, mathematics or a related field or commensurate experience
  • Minimum of 5 years of experience in Information Security with an advanced security-related industry certification
  • Exposure and understanding of information risk management principles and security operations
  • Technical proficiency in security-related hardware and software and other security systems and tools
  • Ability to contribute to technical teams and project teams across multiple business functions in multiple regions
  • Fluent in English; Proficiency in German would be considered an advantage
57

Intern Security Operations Analyst Resume Examples & Samples

  • Strong written skills to assist with documentation
  • Strong Microsoft Office skills such as Microsoft Excel and PowerPoint
  • A passion for Cyber Security
  • Strong desire to learn new technologies
58

Security Operations Analyst Resume Examples & Samples

  • Provide hands-on information security technical operational services to monitor and/or manage security products and tools that support security IDS/IPS, Proxy, Email Security, SIEM, Malware, Wireless Security, Privilege Access Tools, etc
  • Assist with fine-tuning and calibrating security tools used in the Hilton Grand Vacations’ environment
  • Monitor, identify, and respond to any suspicious behavior, intrusions, and policy violations that threatens the organization
  • Document security monitoring and incident response activities using case management and ticketing systems
  • Assist with writing technical standards and guidelines for security, user, and computer access control while working closely with the Infrastructure teams to ensure standards are being met
  • Participate in Hilton Grand Vacations compliance efforts to ensure compliance with regulations and requirements
  • Assist with creating and maintaining technical procedure documentation on performing day to day security tasks
  • Document all changes and actions performed in daily security operational tasks while recording and maintaining records of variations and exceptions
  • Provide support on information security incident investigations, threat analysis and forensic analysis
  • Enforce information security policies, standards, and other requirements as they relate to a specific internal information system, and assists with the implementation of these and other information security requirements
  • Monitor and secure internal information handling processes so that information is appropriately protected from a wide variety of problems including unauthorized disclosure, unauthorized use, inappropriate modification, premature deletion, and unavailability
  • Partner with third-party managed security service providers
  • Serve as an active member of the Computer Emergency Response Team (CERT) and participate in security incident response efforts by, among other things, having an in-depth knowledge of common security exploits, vulnerabilities and countermeasures
  • Develop technical documentation describing the deployment, configuration, and management of shared, networked, and multi-user information security systems
  • Facilitate patching program for user end points
  • 3 or more years of experience in Security Operations
  • Experience implementing, monitoring, maintaining and tuning security tools such as IDS/IPS, SEIM, FIM, Malware Prevention, Email Security, Privilege Access Tools, etc
  • Exposure to compliance as it relates to SOX and PCI
  • Strong communication and interpersonal skills with all levels of the organization and vendor relationships
  • Any Certification from (ISC)2 or GIAC
  • ITIL background and/or certification
59

Security Operations Analyst Resume Examples & Samples

  • Responsibilities will include the day-to-day direct observation of various security solutions such as SIEMs, firewall appliances, intrusion prevention systems, data loss prevention systems, analysis tools, and various log aggregation tools
  • Actively monitor and report on security related issues and assist in the initial investigation of the event
  • Mentor newer employees and train as needed
60

Senior Cyber Security Operations Analyst Resume Examples & Samples

  • Accountable for intrusion detection and analysis, and technical investigations for security incidents
  • Responsible for leading investigations for complex, high severity or high sensitivity security threats or incidents
  • Developing and refining Security Information & Event Management correlation rules and source system events/alerts
  • Serving as a technical escalation resource for other analysts
  • Thought leader in enhancing security detection, monitoring, investigation and response processes
  • Creating and presenting operational and executive reports
  • Preparing and presenting Threat Research reports regarding new threats and the risk they may pose to the organization
  • Collecting and preparing security information and event metrics
  • Contributing to global risk and security metrics and key performance indicators to assess the effectiveness of security services, and identify improvement opportunities
  • Advanced event analysis skills leveraging SIEM tools (QRadar preferred)
  • Advanced incident response and investigation skills
  • Advanced log parsing and analysis skill set
  • Advanced knowledge of current threat landscape
  • Intermediate to advanced knowledge of penetration techniques
  • Strong understanding of security vulnerability types as well as attack and remediation methods
  • Provide thought leadership in information security concepts
  • Excellent communication skills both written and verbal
  • Ability to participate in on-call rotation and provide off-hours support
  • Experience working both independently and as part of a team
  • Knowledge and experience with various IT governance and control frameworks (NIST, COBIT, ISO, ITIL, etc.)
61

IT Security Operations Analyst Resume Examples & Samples

  • Implement and operationalize global security systems which may include data loss prevention, encryption, and secure file transfer services
  • Develop solution enhancements on behalf of key stakeholders
  • Works with matrixed security engineer to review significant changes
  • Support break/fix activities regarding operational stability of security technologies
  • Zurich Insurance Certified Apprentice including an Associate Degree with 2 or more years of experience in the IT Security or the IT Operations area OR
  • High School Diploma or Equivalent with 4 or more years of experience in the IT Security or IT Operations area
  • Experience with Microsoft Office or Linux
  • Experience with analyzing network traffic and network troubleshooting
62

Cyber Security Operations Analyst Resume Examples & Samples

  • Access provisioning and de-provisioning for centralized applications/systems
  • Minimum 2 years of experience as an information security analyst / security administrator or related field required
  • Ability to encourage and promote cooperation, understanding, trust and credibility required
  • Organizational skills are required with the ability to be involved in multiple projects and priorities required
63

Security Operations Analyst Resume Examples & Samples

  • Assisting with the support, administration, and evolution of BlackBerry product FedRAMP environment and security tools used
  • Build and maintain partnerships across the SOC team, Compliance team, subscribing Federal customer cyber security offices, and the BlackBerry Global SOC in Waterloo, Canada
  • Assist in monitoring security alerts for potential events/incidents as well as trending and historical analysis and ensuring all incident reports are complete and written within standard operations. Conduct research to maintain and expand knowledge on the latest cybersecurity technologies and standards, as well as the threat landscape
64

Senior Security Operations Analyst Resume Examples & Samples

  • Perform risk assessments, vulnerability scanning and identification, penetration testing, vulnerability mitigation, patch management and wireless vulnerability assessments
  • Ensure that security solutions are maintained to be up-to-date and provide maximum preventative and detective value. This includes development of Splunk dashboards to meet needs as required
  • Interacts with other IT resources to coordinate security tasks associated with malware detection, asset management, configuration management, network management, license management, information management, software assurance and license compliance
  • Researching, analyzing, and formulating effective plans or remediation and redress of security issues
  • Ensure compliance with applicable federal, state and local laws and regulations. Complete all required compliance training. Maintain knowledge of and adhere to Flagstar's internal compliance policies and procedures. Take responsibility to keep up to date with changing regulations and policies
65

Junior Information Security Operations Analyst Resume Examples & Samples

  • Performing tier 1 analysis of security alerts and events
  • Following incident response procedures in response to security alerts, ensuring the timely and accurate communication of incidents to relevant teams
  • Supporting tier 2 analysts in the investigation and follow-up of security incidents
  • Handling requests for security configuration changes, including Anti-Virus and device control exceptions
  • Tuning preventative and detective security systems in response to emerging threats
  • Reviewing systems for compliance with the information security policy
  • Scheduling vulnerability scans, interpreting results, and disseminating relevant information
  • Developing day-to-day Information Security procedures
  • Making recommendations to improve operational effectiveness
  • Strong analytical skills and an eye for detail
  • An understanding of key information security principles
  • Awareness of security incident response concepts
  • Experience working with one or more of the following technologies
  • Relevant information security industry certification or qualification, or desire to pursue qualifications
  • A good understanding of information security incident response processes
  • Experience working with Security Information & Event Management (SIEM) solutions
  • Previous experience of working within a Security Operations Centre (SOC)
66

Security Operations Analyst Resume Examples & Samples

  • Effectively monitor the Security Information and Event Management (SIEM) system, the Intrusion Detection System (IDS), and other security tools for cyber security events
  • Evaluate and manage the events to eliminate or mitigate risk to the company
  • Respond to real time security incidents and support activities for response, containment and event forensics
  • Review potential phishing attacks for threats
  • Review workstation security patching failures and remediate
  • Assist in reviewing assessments from the vulnerability scanning tools and take action to remediate or further investigate those considered to be a risk
  • Provide trend analysis and risk assessment to management for vulnerabilities in the environment
  • Review workstation security patching failures and assist with remediation
  • Support and maintain the Security Information and Event Management (SIEM) system, Intrusion Detection Systems (IDS) and other monitoring tools as needed
  • Determine and build alerts based on new threats and security data, regulatory requirements, Center for Internet Security critical security controls best practices and ISO 27001 certification requirements
  • Assist in the development and maintenance of incident response procedures for security events that require the mobilization of IT resources to respond to network or system intrusions or malicious code
  • Maintain cyber security operations monitoring standard operating procedures to effectively manage and mitigate cyber security events
  • Maintain strong understanding of network infrastructure, computer operating systems, software used for cyber security and other technologies to ensure adequate defense in depth design across the IT enterprise
  • Participate on the CIRT team as dictated by the cyber-security incident management plan
  • Assist in forensic and investigation activities where technical security skills are required
  • Participate on IT project teams across all technology disciplines to provide input on security requirements in accordance to security policies and standards
  • Participate in on-call rotation to support front line security operations analysts
  • Performs any additional responsibilities as requested or assigned
  • Communications/Contacts Internal - Information technology management and staff, human resources and legal
  • External - Suppliers of information protection products and services, auditors and professional security groups
  • Provides timely and accurate monitoring, assessment and remediation of cyber security alerts and workstation security patch failures
  • Involves peers and other IT staff to assist in assessment and remediation as appropriate
  • Ensure alerts and other notifications are configured timely and accurately in the SIEM or other monitoring or assessment tools
  • Keeps current on new and emerging threats and the technologies to thwart them
  • Monitor what is happening in the cyber security industry via news feeds, electronic alerts and networking regarding security threats and countermeasures
  • Assist with the development, testing and implementation of new cyber-security processes and procedures; ensure existing processes and procedures are kept accurate and current with rapidly changing methodologies and technologies
  • Provides input to incident response plans and assists in response to actual events as required
  • Actively participates on the CIRT when in progress. Results driven and self-starter
  • Performs responsibilities within determined time frames and with a high degree of accuracy; establishes and maintains effective work relationships within the department and the company; and maintains the professional competence, knowledge and skills necessary for the satisfactory completion of responsibilities
  • Maintains sensitive and confidential information regarding company information
  • Attends work as required and supports the company employee policies and procedures, including workplace safety rules
67

IS Security Operations Analyst Resume Examples & Samples

  • Required - 2 years IT experience with Master's degree OR 4 years IT experience with Bachelor's degree OR 6 years IT experience with Associate's degree OR 8 years of IT experience
  • Analytical skills and logical thought processes in order to formulate solutions to problems
  • Ability to work under stressful situations so that communications with users, IS staff, and vendors continue to be objective and professional at all times
  • Move through the hospital and off campus sites
  • Ability for occasional out of town travel
  • Flexible scheduling such as working nights, weekends, extended shifts, etc
  • Some travel to other Ochsner facilities will be required
68

Associate Security Operations Analyst Resume Examples & Samples

  • Network and system security/administration
  • Basic understanding of security threats and attacks
  • Understanding context and events from system and security logs
  • Tuning SIEM/security monitoring rules/alerts/reports
  • Support live response and forensics capabilities
  • Project support and implementation within the security team
  • General understanding of network protocols
  • General understanding of server operating systems, common appliances and virtualized infrastructure
  • Operating knowledge of cloud security concepts, solutions and automation
  • Experience in working with IDS/IPS/HIDS, Firewalls and SIM/SIEM systems
  • Troubleshooting skills and mindset
  • 2 years in a systems administration role or 2 years of networking experience preferred
  • Technical expertise in security event analysis
  • Experience in working across multiple teams
  • Experience with desktop operating systems (windows, mac os, linux)
  • Familiar with latest malicious code trends, exploits
  • Industry certifications such as SANS GCIA, GCIH, CCNA, CISSP
  • Working knowledge of Splunk and searching/reporting capabilities
  • Candidate must demonstrate experience in supporting high pressure work environments and be willing to work off-hours on a rotational basis
69

Cyber Security Operations Analyst Resume Examples & Samples

  • Manage Tickets: Track down and resolve security incidents. Open incident tracking tickets, and remediate pending tickets, ensuring they are expeditiously addressed and resolved. Create processes to prevent or resolve incidents rapidly. Work closely with stakeholders and our managed security services vendor to close issues. Involved in event triage, incident response and other reactive daily activities
  • Threat Monitoring: Monitor the campus computing environment for current and emerging security threats, identifying trends and deciding which threats require further investigation. Prioritize focus and response based on risk, statistics and root cause
  • Documentation: Document procedures used in a repeatable format, analyze current operational procedures and continually make procedure improvements
  • Cyber Security Tools: Support, implement and research security-related technologies, such as two-factor authentication and vulnerability scanning
  • Information Security Program: Provide strategic input and support to the Information Security Program through ongoing participation in related working groups, and contributing to the campus’ efforts to comply with information security policies, regulations and industry frameworks
  • Evidence Collection: Assemble digital information in support of legal discovery efforts. Make forensics quality backups of disk drives, email and other digital media. Visit University business locations to copy or obtain computers, phones and other media in a timely and diligent manner
  • Other duties or projects as assigned as appropriate to rank and department mission
70

Security Operations Analyst, Command Center Resume Examples & Samples

  • Communicate gathered video intelligence to leaders within the organization and to specifically identified stakeholders and assist other Rock Ventures Analysts with ongoing investigations and incidents pertaining to the Family of Companies and areas surrounding them
  • Work on special projects as given by the Team Captains or the Team Leader
  • Gather information from multiple open source intelligence locations, such as the internet, the media (social and traditional), cable television, government agencies and purchased services
  • Operate the Security Operations Command Center and assist in providing threat assessment and risk analysis for Rock Ventures and its asset portfolio
  • Document and route management-related calls and/or provide general assistance using prescribed protocols
  • Research and gather records on situations that have the potential to threaten Rock Ventures’ personnel, physical assets, image or reputation or that of other stakeholders
  • Perform record input utilizing Microsoft Office products
  • Perform Web-based research using browsers such as Microsoft Explorer, Google Chrome, Mozilla Firefox and Safari
71

Security Operations Analyst Resume Examples & Samples

  • Process reports relaying key information to events
  • Monitor and assess nationwide events for relativity to the company and assess impact
  • Develop easily understandable information products and disseminate
  • Cultivate information relationships for operational application
  • Develop and maintain communications network map
  • Ensure proper information flow to internal and external entities as they relate to events
  • Provide clear and concise facts thru communication means to include email, phone, and in person
  • Ability to research, analyze, interpret and produce informational products
  • Provide predictive analysis and identify potential threats
  • Identify information gaps and information requirements
  • Provide administrative and operational guidance to operations employees
  • Provide data & operational effectiveness metrics
  • Review processes, identify gaps and recommend methods for improvement
  • Must possess a high school diploma or equivalent
  • Bachelor’s degree in communication, information technology, criminal justice, or related field
  • Three (3) or more years of experience in the military, police, emergency operations, professional security
72

Security Operations Analyst Resume Examples & Samples

  • 3-5 years of experience with a SIEM tool
  • 3-5 years of experience with incident response and remediation
  • 3-5 years of experience with malware analysis
73

Senior Cyber Security Operations Analyst Resume Examples & Samples

  • Apply strategic, operational, and tactical cyber intelligence to improve security operations
  • Lead and/or support efforts to prepare for, monitor, detect, analyze/confirm, contain, remediate, and recover from security incidents
  • Conduct deep analysis and hunting operations
  • Perform investigation of network traffic and hosts/endpoints for potential security incidents, to include
  • Credentials
  • Experience and effective participation in hunt, computer network defense, real-time analysis and incident response activities, to include ability to reconstruct events from network, endpoint, and log data
  • Experience and understanding of host-based/endpoint protection systems
  • Cyber intelligence experience
  • Intelligence community experience
  • Server administration experience
  • Enterprise forensic tool(s) experience
  • Federal contract experience
74

Security Operations Analyst Resume Examples & Samples

  • Working with business requirement holders to ascertain necessary information is available to make necessary changes on the security infrastructure to safely deliver business needs
  • Serves as the Subject Matter Expert (SME) for the engineering, architecting, and provisioning of Perimeter Security, Intrusion Prevention and Detection, Webb Access Security Gateways, Advanced Threat Protection systems and services.Transforms business requirements into system specifications, document implementation designs / configurations and manage systems accordingly
  • Provides analysis and consulting on
  • 5+ years’ hands-on knowledge and experience installing, configuring and supporting Firewalls, especially CheckPoint, Juniper and Cisco ASA
  • ISO 27000/NIST/SANS Cyber Security Controls background
  • Strong, hands-on on FW implementation, configuration, management and support, especially on CheckPoint, Juniper, MacAfee, IBM, FireEye and BlueCoat, ZScaler systems
  • Working knowledge on network security systems, e.g. web access security, url filtering, anti-malware / advance threat protection, proxies, DLP etc
  • Good understanding of OSI Model, TCP/IP protocol suite, network IP subnetting, switching and routing
  • Complete familiarity with ITIL processes – Incident, Problem, Change etc. – experience on ServiceNow tool beneficial
  • Ability to work with team members located remotely and to leverage multiple service and / or outsourcing providers
  • Comfortable to work closely with several teams within the Information Services area as well with the business teams
  • Demonstrated ability to learn quickly, take initiative, manage time and complete tasks with minimal supervision
  • Ability to work off-hours, as required
  • Some business travel may be required
75

Global Security Operations Analyst Resume Examples & Samples

  • Use internal and external systems (internet, news-feeds, and other data sources), to monitor risks that could have an adverse impact to organizational assets, facilities, and personnel
  • Develop and manage communications to key stakeholders throughout an incident life-cycle
  • Collect, analyze, and share intelligence to support corporate investigations
  • Utilize closed circuit television for situational awareness, threat management, and investigative purposes
  • Demonstrated proficiency using mapping software (Google Maps, Google Earth, Bing Maps) and carious CCTV platforms
  • Custody Officer (Irvine, CA)
76

Senior Cyber Security Operations Analyst Resume Examples & Samples

  • Handle day to day operations of BBH’s Cyber Intelligence Monitoring and Threat analysis
  • Respond and Perform in-depth technical analysis and risk assessment of all security events and incidents
  • Collaborate with application and operation system teams to remediate any security vulnerability findings
  • Support 3rd party testing of the firm’s cyber security posture
  • Recommend, and apply best practices for addressing ongoing threats
  • 5 or more years of relevant experience in two or more of the following areas
77

Information Security Operations Analyst Resume Examples & Samples

  • Ability to work analytically to solve both tactical and strategic problems
  • Experience with McAfee endpoint protection or similar tools
  • Knowledgeable with multi factor authentication and authentication processes and protocols. TACACS+, Radius, LDAP, AD, authentication services, as well as PKI and token/certificate based authentication
  • Ability to review network diagrams and device configurations to ensure security standards are in place
  • In-depth knowledge of Active Directory structure
  • In-depth knowledge of TACAC+, Radius and equivalent technologies
  • Works with Compliance, Internal Audit, and Business teams to identify and analyze risks
  • Identifies, develops, and implements mechanisms to detect security incidents in order to enhance compliance with and support of security standards and procedures in place
  • Responds to discovered security incidents by informing appropriate custodians, determining root cause, and identifying and executing remedial actions (if necessary) required to re-establish respective information system security
  • Works with Incident Response team to discovered security incidents by informing appropriate custodians, determining root cause, and actions (if necessary) required to re-establish respective information system security
  • Understands compliance requirements that may impact security and work with business areas and project teams to develop security solutions that address these requirements
  • Assumes leadership role in advocating internally and externally for compliance to security measures to protect cloud-based applications and environments
  • Works with information systems owners and administrators to understand their security needs and assist with implementing practices and procedures consistent with Costco’s security policies
  • Coordinates activities or engagements with Loss Prevention, Legal and law enforcement as required
  • Builds and maintains vendor partnerships to further Costco’s mission and goals
  • Maintains current knowledge of industry trends and standards
  • Minimum of 3 years’ of experience and/or equivalent education in networking or system support and implementation in a multi-protocol environment
  • Experience with endpoint protection tools
  • Thorough experience with both Windows and Linux environments
  • Thorough understanding of the OSI model, as well as IPv4/IPv6 protocol suite
  • Working knowledge of information systems security standards/practices (e.g., access control and system hardening, system audit and log file monitoring, security policies, and incident handling)
  • Demonstrate a logical and structured approach to time management and task prioritization
  • Demonstrate a high level of communication skills, verbal and written
  • Participate in team activities and team planning in regards to improving team skills, awareness and quality of work
  • Willingness to work outside of regular business hours, as required
  • Extensive knowledge of information systems security standards/practices (e.g., access control and system hardening, system audit and log file monitoring, security policies, and incident handling)
  • Experience with one or more scripting languages
  • One or more professional audit or security certifications such as CISA, GSEC or CISSP (or equivalent experience)
  • General knowledge of enterprise-level applications including ERP
  • General networking knowledge
  • Experience with tools such as NMAp, NetCat and Enum, DNS, NTP and Citrix, TACACS, IDS, IPS and various SIEMS
  • Working knowledge of protocols and technologies such as TCP, UDP, SSL, FTP, SMTP, NetBIOS, DHCP, HTML, CSS, JavaScript and WML
  • Experience with performing vulnerability scans and assessments, as well as computer forensics
78

Security Operations Analyst Resume Examples & Samples

  • Responds to computer security incidents per the computer security incident response policy
  • Identify security threats and perform analysis of reported anomalies on Informa networks and systems
  • Initiate escalation procedures as required
  • Monitor information security alerts using Managed SIEM/SOC to escalate issues as needed
  • Operationalize actionable intelligence reports from available internal and external sources
  • Collaborate with operations support staff to ensure they are actively engaged in potential security threats and concerns
  • Provides guidance to first responders for handling information security incidents
  • Coordinates efforts among multiple business units during response efforts
  • Provides timely and relevant updates to appropriate stakeholders and decision makers
  • Provides investigation findings to relevant business units to help improve information security posture
  • Validates and maintains incident response plans and processes to address potential threats
  • Monitors information security related websites to stay up to date on current attacks and trends
  • Analyzes potential impact of new threats and communicates risks to relevant business units
  • Actively seeks to uncover indicators of compromise for which monitoring capabilities do not yet exist
  • Collects and aggregates information from a wide variety of sources and formats them for relevance to the organization’s environment
  • Creates hypothesis for analytics and testing of threat data
  • Maintains and enhances the documentation standard for discoveries and reporting of malicious tactics, techniques and procedures
  • CompTIA Security +
  • OSCP (Preferred)
  • Full understanding of TCP/IP
  • Full understanding of DNS
  • Full understanding of DHCP
  • Experience with IDS/IPS, Splunk, ELK Stack, Amazon Elasticsearch
  • General knowledge of Active Directory Architecture
  • 3 years of experience in information security, especially in an incident response role
  • 3 years of experience with regulatory compliance and information security management frameworks (e.g., IS027000, COBIT, NIST 800, etc.)
  • 3 years of experience in an Enterprise working environment
  • Knowledge of ITIL principles
  • 3 years of experience with vulnerability management and penetration testing tools (Nessus Pro, Open Vas, Kali Linux, Hackertarget, Burp Suite)
  • Deep understanding of attack vectors
  • Optional: RHCE
  • Highest level of technical expertise in information security, including deep familiarity with relevant penetration and vulnerability scanning techniques and tools for the discovery of attack vectors
  • Excellent investigative skills, insatiable curiosity and innate drive to win
  • Instinctive and creative with the ability to think like the enemy
  • Strong problem solving and troubleshooting skills
  • Deep knowledge of hacker culture
  • An ability to work extremely well under pressure while maintaining a professional image and approach
  • An ability to perform independent analysis of complex problems and distill relevant findings and root causes
  • Ability to work alone/not directly supervised and prioritize workload effectively
79

Security Operations Analyst Resume Examples & Samples

  • 1+ years of experience with security assessments and operations, including information security processes and methodologies
  • Experience with using and analyzing events from numerous security tools and technologies, including McAfee Nitro SIEM, McAfee IDS and IPS, Imperva Web application firewalls, McAfee Enterprise Antivirus, BlueCoat, Symantec DLP, Mandiant and Fireeye, Guardian MDB Protect, Cisco firewalls, QualysGuard, or AppScan
  • Knowledge of policies, procedures, and protocols of a government Security Operations Center for performing analysis, audits, and reporting
  • BA or BS degree
80

Senior Security Operations Analyst Resume Examples & Samples

  • Provide oversight of technology deployment within the Security Operations team, starting with Security Information and Event Monitoring (SIEM) system
  • Develop Security Operations Center (SOC) procedures and protocols that will provide appropriate situational awareness and clear remedial action plans
  • Monitor the alerts raised by the SIEM and execute on the SOC procedures and protocols as designed
  • Train and educate Security staff, other Technology Group, and external business partners on SOC management and procedures
  • Perform risk analysis related to HMH technologies and business partners and make recommendations for risk remediation
  • Assist in various compliance efforts as needed, including SOX, SSAE 16, PCI, FERPA, and HIPAA
  • Provide support to other members of the Security Operations team in managing technologies such as vulnerability assessment tools, web content filtering, and two factor authentication solutions
81

Security Operations Analyst Resume Examples & Samples

  • Responsible for maintaining security certificate management requirements / functions and operationally renewing and revoking certificates as required
  • Responsible for operating and maintaining data leakage prevention toolsets and overseeing associated procedures
  • Responsible for managing the governance of the firewall rule bases and associated change management process
  • Responsible for the review of web and user access requests ensuring there is valid business justification and no impact to DLG’s security posture
  • Responsible providing security input and for maintaining relationships with the Service Management function in relation to change management, problem management and incident management
  • Responsible for overseeing the management of web proxy policy configuration provided by third party providers
  • Responsible for monitoring the operational security team mailbox and responding appropriately to queries/requests from the business
  • Responsible for monitoring and responding to emerging threat patterns, vulnerabilities and anomalies and provide escalations of any unknown threats to the Security Operations Lead
  • Responsible for reporting metrics on the status of technical information security controls across the DLG estate, highlighting risk areas and working to develop remediation plans as required
  • Responsible for collaborating with the Security Engineering team to report appropriate operational issues that may be resolved at an architecture level
  • Knowledge and operational experience in: firewalls, intrusion detection and prevention systems, anti-virus and content filtering, URL filtering, authentication solutions, switches, routers, Voice over IP (VoIP), firewall zoning
  • Experience of working in high performing teams and understanding the dynamics of teamwork in an operational security environment
  • Knowledge and experience of enterprise grade technologies including operating systems, databases and web applications
  • Ability to identify and understand key issues and areas for improvement in the Information Security realm
  • C#, Java, Python or PHP programming language knowledge
  • Experience with any of the following technologies: Data Loss Prevention, Intrusion Prevention/Detection Systems, Firewalls, SIEM
  • Security certifications such as CISM, CISSP, M.Inst.ISP, CISA by a recognised professional body are desired
  • Security certifications such as GIAC Certified Incident Handler (GCIH), EC-Council Certified Incident Handler (ECIH) by a recognised professional body are strongly preferred
  • Technical certifications by a recognised professional body in network or systems engineering are desired
82

Security Operations Analyst Resume Examples & Samples

  • Collect and aggregate information from a wide variety of sources and format them for relevance to our environment while leveraging SIEM or other tools
  • Create hypotheses for analytics and testing of threat data and test methodically to prove or disprove the hypothesis
  • Share lessons learned, initial indicators of detection, and opportunities for strengthening detection capabilities
  • Maintain and enhance the documentation standard for discoveries and reporting of malicious tactics, techniques, and procedures
  • 7+ years of experience in application security or similar
  • 1+ year of experience in Security Operations or an equivalent function with incident response as a core job function for 25% or more of the role
  • Professional certifications are preferred for this role and candidates are expected to have clearly demonstrated technical acumen through attaining multiple technical certifications in addition to work experience and any published work. Certifications which include a hands-on practicum are weighted more heavily in consideration than those without. Some examples would be a variety of combinations of the following
83

IT Security Operations Analyst Resume Examples & Samples

  • Bachelor’s Degree and 4 or more years of experience in the Data Security area OR
  • High School Diploma or Equivalent and 6 or more years of experience in the Data Security area
  • Insurance Industry Experience
  • Intermediate to expert security technology administration experience
  • Intermediate to expert understanding of security technologies
  • Understanding of audit processes
  • Intermediate to expert network security skills
  • Security technology administration knowledge and experience
  • Experience with Windows and/or Linux server environments
84

Security Operations Analyst Resume Examples & Samples

  • Reviews the performance, availability, and capacity of internally and externally hosted services and service components against service SLAs and OLAs
  • Works with technology teams to ensure that systems and services are configured for monitoring, alerting and reporting appropriately
  • Triages incidents and escalates quickly to the correct group
  • Documents standard practices and step-by-step procedures
  • Interfaces professionally and accurately with stakeholders when incidents occur
  • Facilitates communications across technical, stakeholder and management groups during incidents
  • Provides support on network security issues and responds in accordance with the Security Incident Management Plan. Receives guidance from senior staff
  • Reports, investigates as appropriate, and recommends corrective actions for data security incidents. Monitoring and analyzing network traffic, Intrusion Detection Systems (IDS), security events and logs
  • Prioritizing and differentiating between potential intrusion attempts and false alarms
  • Creating and tracking security investigations to resolution
  • Composing security alert notifications and other communications
  • Advising incident responders in the steps to take to investigate and resolve computer security incidents
  • Staying up to date with current vulnerabilities, attacks, and countermeasures
  • This position requires the ability to work a shift schedule
85

Security Operations Analyst Resume Examples & Samples

  • Basic knowledge and understanding of threat and vulnerability management
  • Basic knowledge and understanding of database, network, server, and remote connectivity security
  • Demonstrated information technology and security experience with a basic exposure to application development, infrastructure/network, and multiplatform environments
  • Monitors intrusion attempts. Differentiates false positives from true attempts
  • Monitors digital channels for security threats. Keeps up to date on potential threats and source of threats
  • Provides support for escalated issues as needed
86

Lead IT Security Operations Analyst Resume Examples & Samples

  • Contributing to a proactive-reactive response to critical operational and security events affecting the organization
  • Contributing to the review of new trends and proposing changes that will enhance the Kellogg security posture
  • Participating in security planning activities
  • Upholding the highest level of confidentiality
  • Recent experience working in a security event monitoring/incident management role
  • Intermediate knowledge of current threat landscape
  • Intermediate to advanced knowledge of Intrusion Detection Systems /Intrusion Prevention Systems, Web Application Firewalls, Windows, Unix/ Linux, Firewall and Proxy technology
  • Experience responding to and defending against software and hardware vulnerabilities
  • Provide leadership in information security concepts
  • Ability to work with minimal guidance or supervision
  • Flexibility to quickly adapt to changing business needs and processes
87

Security Operations Analyst Resume Examples & Samples

  • Current Internal Penn Medicine Information Services division employees may be considered with proof of active and continued enrollment in an approved bachelor degree program
  • At least three (3) years of experience in information technologies, such as server or endpoint administration, first or second level support, network support or engineering, or application administration required
  • At least two (2) years of experience in information security, such as security operations and incident response, regulatory compliance or audit, vulnerability management, security engineering or similar experience required
88

Lead Security Operations Analyst Resume Examples & Samples

  • Work with Information Security leadership to develop a formal SOC program
  • Develop, test, refine and document incident response processes and procedures
  • Own incident response efforts/escalations during shift
  • Train and support NOC staff on tier1/2 SOC responsibilities
  • Build a program to proactively hunt cyber security threats to Shutterfly’s environment
  • Work with Security Engineering team to refine and improve dashboards/alerts/reports in all security platforms as IR processes mature
  • Monitor and interpret data from a number of security monitoring platforms (e.g. IPS/IDS, Next-Gen Firewall, Anti-Virus, Vulnerability Scanner, etc.)
  • Research and analyze security event data to identify potential security incidents using SIEM technology
  • Monitor public security advisories and alerts for information related to
  • Maintain knowledge of current security trends and be able to clearly communicate them to the team
  • Support information security engineering/architecture team
  • 8-10 years working within Information Technology and 6-8 years specifically in a security operations or threat/vulnerability management role
  • Must have experience building and refining Security Operations programs
  • Must have expert level understanding of various logging methods and security event terminology
  • CISSP, GSEC, GCIH, GCED, GCFA, GCFE, GMON certifications
  • Experience with process automation using python, powershell, etc…
  • Strong experience administering both windows and linux systems
  • Understanding of database technologies including Oracle, SQL and NoSQL
  • Experience with application security standards such as OWASP
  • Expert understanding of information security concepts, protocols, "industry best practices"
  • Strong understanding of malware analysis, packet analysis and forensic investigation techniques
  • Hands-on experience with security technologies from the following preferred vendors: IBM Qradar SIEM, Palo Alto Networks Firewalls, Proofpoint mail gateway, Bit9/Carbon Black, Splunk
89

Security Operations Analyst Resume Examples & Samples

  • Multiple Computer-based Languages and Programs Competence: Be familiar and proficient with different types of computer languages, formats and programs. Be able to operate two (2) completely different types of computer systems/programs and integrating the data between the two into a readable/usable information tool
  • Data Base Analysis: Utilize a database of varied information, both current and historical, in order as to predict short-term future events. Use the available information and deduce problem areas in operations and practice
  • Location Analysis: Read and use all types of maps (computer and hard copy) on the local PC and the Internet. Conduct searches and "Back (Reverse) Analysis". Utilize the computer based mapping program to find/follow target locations across the entire United States, as well as in cities and small towns
  • Event Analysis: Review a series of completed events and deduce: what has happened; when this incident happened; in what order and who was involved. Work with (at times) very limited information and still come up with an answer
  • Communications Analysis: Review exchanged messages and develop an event pattern. Fill in missing information using Location and Event Analysis findings. Understand the language patterns and abbreviations used in the different messages
  • Skills: Decision Making Sills: Make a decision based off of the information as a result of the analysis done. Be familiar enough with the system to make the best decisions resulting in what is best for the company. Decide when it is best to seek additional help and when to refer to those above to make the final decision, as required. Timely sound decisions are very essential
  • Education: High School diploma or GED required
  • Experience Required: Previous law enforcement or security experience preferred
90

Security Operations Analyst Resume Examples & Samples

  • Manage & maintain Inventory records and databases containing information of all physical end user devices at organization level
  • Remotely remediate devices which are non-compliant and do not appear on network
  • Create incidents for devices which are not appearing on DB network and follow the investigation process
  • Ensure timely closure of incidents and proactive reply to queries raised by device owners on investigation process
  • Create weekly reports of incidents closed, onhold and in-progress incidents
  • Creation of Monthly report for management reporting
  • Ensure that the asset records are accurate and up to date
  • Coordinate & work collaboratively with Project Manager towards the alignment of project, develop integrated project plans, implementation schedules as per business requirement
  • Security governance and risk function and ensure controls are put in place for audit closure
  • Experience and understanding of ITIL processes (CMDB, Service Request system, Change Management)
  • Experience with any ITIL tools such as dbsymphony, ServiceNow or any such tools
  • Knowledge or experience in network discovery tools such as BigFix, Tanium, Configuration Management
91

Security Operations Analyst Resume Examples & Samples

  • 6-10 years working experience in Information Security in financial institution handling security incidents, compliance ,providing support and dealing with business users on support or requirement gathering
  • Exceptional written and oral communication skills, including the ability to communicate technical information to a non-technical audience and with executive levels. Relationship management skills
  • Experience working with virtual and global teams / Intercultural awareness
  • Broad ITIL / best practice service context within a real time distributed environment (ITIL v3 foundation desired)
  • Ability to manage ambiguity, risk, and changing direction of projects and strategies
  • Investment Banking Experience is preferable
  • Experience of supporting complex application and infrastructure domains
  • IITIL / best practice service context
  • Ability to work in virtual teams and in matrix structures
92

Security Operations Analyst Resume Examples & Samples

  • Creating new inventory records in system, modifying the CI records, managing and allocating the devices to the respective owners
  • Conduct recertification process of all end user devices, which are in production in order to track and maintain the ownership of device
  • Assist with framing policies and procedures
  • Pulling global asset reports for inventory tracking purpose & comparing with other data sources
  • Conduct weekly meetings with the Project Manager towards the alignment of new project, ADOC changes in the ongoing process
  • Coordinate with different support team in case of any discrepancies and technical error in order to maintain the quality of inventory database
  • Prepare and submit inventory reports to management as required by them
  • Adding devices in Global inventory tool based on service request and inputs coming from data sources
  • Updating and modifying the Device entries in CMDB for any correction
93

Associate Security Operations Analyst Resume Examples & Samples

  • Monitoring security incident and event management systems, along with responding to alerts and notifications as appropriate
  • Initiate escalation procedures to counteract potential threats and/or vulnerabilities
  • Investigation of suspicious network and endpoint activity
  • Support end-user security issues; including phishing, encryption, infected computer systems and more
  • Partners with information security engineers to implement and maintain security technologies
  • Collaborates with information assurance advisors to address network and endpoint security risks
  • Participates in vulnerability management, including scanning and remediation
  • Prepare system security reports by collecting, analyzing and summarizing data trends
  • Performs duties in accordance with Penn Medicine and entity values, polices, and procedures
  • Other duties as assigned to support the unit, department, entity, and health system organization
  • At least two (2) years of experience in Information technologies, such as server or endpoint administration, first or second level support, network support or engineering, or application administration, security operations and incident response or similar experience required
  • At least one (1) year of professional experience in healthcare and academia preferred
  • At least one (1) year of experience working with security standards and frameworks such as: HIPAA, PCI DSS, HITRUST, NIST, ISO, etc. preferred
  • At least one (1) year of experience working with remote support tools, such as Remote Desktop Connections, TeamViewer, etc., preferred
  • At least one (1) year of experience working with penetration testing tools, such as Kali Linux, Responder, NMAP, Wireshark, Aircrack-ng, Maltego, Nikto, etc., preferred
94

Security Operations Analyst Resume Examples & Samples

  • 5+ years of experience in information security operations and/or related IT operational functions
  • Expert level understanding of malware kill chain, pervasive threat attack methods and remediation
  • Ability to multi-task, prioritize, coordinate and work well under pressure to meet deadlines
  • Experience with Splunk, Wireshark or other analytics tools a plus
  • Experience with Symantec Endpoint Protection, Palo Alto, Panorama a plus
95

Security Operations Analyst Resume Examples & Samples

  • Experience evaluating, prioritising, and fulfilling operational requests
  • Passion for Information Security and have global mindset
  • 1+ years of working experience in an analyst role
96

Security Operations Analyst Resume Examples & Samples

  • Experience participating in long-term, triple-constrained projects with teams that span the organization
  • Experience writing threat and vulnerability advisories, integrating cyber threat intelligence feeds into security controls, and implementing and managing vulnerability scanning tools
  • 3+ years of information security experience
97

Security Operations Analyst Resume Examples & Samples

  • Dispatch appropriate authorities such as police, fire and/or medical to store and corporate locations when procedures dictate
  • Perform routine testing and voice downs (store tours), in addition to utilizing system health monitoring software, to ensure store level equipment is functioning properly. Contact service providers to initiate repair work on defective equipment
  • Cooperate and coordinate with LIT, Law Enforcement and corporate management in on-going investigations of store level and corporate activities, by providing video and other requested data
  • Provide guidance and assistance to service providers and internal technicians upon alarm system installation or completion of repair work to ensure system integrity; includes the initial configuration and setup of new store security systems
  • Manage Access Control at all corporate buildings by monitoring and responding adequately to physical access alarms, systematically defining access levels and issuing identification badges
  • 2 years related experience
98

Security Operations Analyst Resume Examples & Samples

  • Accountable for prevention of security threats and vulnerabilities within the bank’s Windows desktop and server environments. Services within Security & Risk Management include
  • Global Anti-Virus compliance and management for Windows Desktops and Windows Servers
  • Full disk encryption for end points
  • Cyber-Security Incident Management
  • Audit Issue tracking and closure
99

Security Operations Analyst Resume Examples & Samples

  • Security Event Monitoring & Response
  • Experience with monitoring and response activities
  • Knowledge of information security risks, at least technical aspects including working knowledge around remediation
  • Strong written and oral communication skills. The ability to communicate effectively (clear, concise and professionally) with all levels within Ascensus
  • Highly organized and able to process and manage inventories of controls and findings
  • Excellent analytical and problem resolution skills
  • Self-starter and able to work independently
  • Persistence and strength to champion initiatives
  • Expert level proficiency in MS Office software applications, specifically Word, Excel and Power Point
  • 2-3 years of experience
  • Strong SIEM and DLP experience
  • Fraud detection
100

Security Operations Analyst Resume Examples & Samples

  • Serves as the Subject Matter Expert (SME) for the engineering, architecting, and provisioning of Perimeter Security, Intrusion Prevention and Detection, Web Access Security Gateways,
  • Advanced Threat Protection systems and services
  • Transforms business requirements into system specifications, document implementation designs / configurations and manage systems accordingly
  • Comfortable to work closely with several teams within the Information Services area as well with the business team
101

Lead IT Security Operations Analyst Resume Examples & Samples

  • Assisting with the management, maintenance and configuration of all network and endpoint security systems globally
  • Contributing to the creation and maintenance of security technical standards
  • Participating in the remediation of security vulnerabilities
  • Collaborating with business users and Information Technology teams to ensure business requirements are properly aligned with security requirements
  • Contributing to global risk metrics and key performance indicators to assess the effectiveness of security services and identify improvement opportunities
  • Contributing to the review of new trends and proposing changes that will enhance the overall security posture; including the definition of new tool requirements
  • Intermediate to advanced knowledge of networking fundamentals and protocol analysis
  • Intermediate to advanced knowledge of firewall, load balancer, proxy, and reverse proxy technologies
  • Strong practical Linux and Windows-based systems administration skills
  • In-depth understanding of security vulnerability types as well as attack and remediation methods
  • Demonstrated ability to identify, analyze, communicate and resolve issues
  • Self-starter. A well-developed interpersonal style with emphasis on collaboration, influencing and building strong long-term relationships; particularly across the Information Technology organization