Security Technical Analyst Resume Samples

4.8 (81 votes) for Security Technical Analyst Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the security technical analyst job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
LL
L Luettgen
Lavina
Luettgen
64108 Pagac Isle
New York
NY
+1 (555) 483 8377
64108 Pagac Isle
New York
NY
Phone
p +1 (555) 483 8377
Experience Experience
Houston, TX
Security Liaison Technical Analyst
Houston, TX
Stark, Treutel and Collins
Houston, TX
Security Liaison Technical Analyst
  • Obtaining and providing business information to Law Enforcement Agencies, to assist with criminal investigations, within the recommended SLA's
  • Document new and existing products, providing solutions for team training
  • Attend internal workshops to understand the impact of new products/services
  • Work effectively with wider technical teams to resolve issues
  • Provide support to Data Retention automated system
  • Essential all data is retrieved and confirmed accurately, and records kept accordingly
  • Resolve faults and queries related to voice and broadband technologies
Philadelphia, PA
Technical IAM Security Analyst Temp
Philadelphia, PA
Fahey LLC
Philadelphia, PA
Technical IAM Security Analyst Temp
  • Identify process and workflow improvements around Technical IAM
  • Perform security analysis for policy exceptions
  • Perform onboarding of technical accounts into CyberArk solution
  • Create, update, and maintain documentation (including process documents and procedures)
  • Support daily Technical IAM BAU process and requests from Infrastructure and APS teams
  • Task oriented and well organized
  • Coordinate the onboarding of resources and entitlements into Sailpoint
present
Houston, TX
Information Security Technical Senior Analyst
Houston, TX
Cole Group
present
Houston, TX
Information Security Technical Senior Analyst
present
  • Lead initiative to develop/improve scripts and other programs for system monitoring and maintenance
  • Defines and maintains key metrics reporting to SIEM Program Manager
  • Provide technical mentoring
  • Support routine compliance activities/audits, as well as BAU maker-checker, and peer review activities
  • Provide technical application support leadership for the Security Infrastructure and Applications
  • Meets periodically with SIEM Program Manager to share and update SIEM product goals of that business area
  • Metrics creation and presentation
Education Education
Bachelor’s Degree in Computer Science
Bachelor’s Degree in Computer Science
Boston University
Bachelor’s Degree in Computer Science
Skills Skills
  • Excellent knowledge of core network services (DNS, SMTP, NTP, syslog, HTTP)
  • Proven ability to manage and set client expectations
  • Ability to work in a fast-­paced, rapidly growing environment while balancing multiple, sometimes competing priorities successfully
  • Ability to interact with clients at all levels, from the C-Level to IT individual contributor
  • In-Depth Working Knowledge and understanding of at least 1 of the following routing protocols: BGP, OSPF, EIGRP, ISIS, MPLS
  • Ability to manage client escalations and negotiate resolution
  • Excellent understanding of common network technologies, including TCP/IP, IPSec, VRRP, HSRP, SNMP, NAT, Multicast, Sub-netting, Ethernet, Access-lists
  • Knowledge of Market Data delivery networks using both TCP and UDP multicast
  • In-Depth Working Knowledge configuring and troubleshooting full suite of Cisco switches and routers - IOS, NX-OS, IOS-XR
  • Experience configuring and troubleshooting full suite of Cisco switches and routers - IOS, NX-OS, IOS-XR
Create a Resume in Minutes

10 Security Technical Analyst resume templates

1

Senior Technical Systems Analyst Mobile Messaging Security Resume Examples & Samples

  • Customize, evaluate and test vendor software
  • Integration testing with vendor application products
  • Develop test plans and use cases
  • Provide 3rd level support for all Mobile Device Management infrastructure at RBC including BES, GOOD, Active Sync, smart phones and tablets (24/7 pager support rotation)
  • Interface with vendors for problem resolution and future product enhancements
  • Maintain problems and resolution logs
  • Maintain updated documentation including technical specifications, operational procedures and Problem Resolution Procedures (PRPs)
  • Test software updates and enhancements
  • Develop operational and support procedures
  • Package server and client code where required
  • Interface with service partners including Telecom, NI&S, ESD, End User Engineering, 2nd Level support
  • Strong knowledge of Mobile Security , in particular familiarity with
  • Client Impact: Delivers Client Service (Level 2)
  • Collaboration: Works Collaboratively (Level 2)
  • Execution Excellence: Delivers Personal and Team Performance (Level 2)
2

Information Security Technical Senior Analyst Resume Examples & Samples

  • Incident and problem management responsibilities: support of the PSO/STI supported devices including Checkpoint and Juniper Firewalls, Palo Alto Networks, Bluecoat Proxies and CISCO/Juniper remote access devices which requires demonstrable security operation experience; problem management includes responsibilities from routine BAU issues to high critical failures; PSO colleague follow the pre-defined actions to handle BAU and High severity issues including escalating to other support groups; execute daily adhoc tasks or lead small projects as needed
  • Change management responsibilities: implementing the day to day changes to the production environments based on customer requirements; administering and handling the business request and translating the business requirements into technical configurations; working with Global and Regional Change management teams and business representatives as well as attending on CITI Change board meetings; handling the BAU, Business critical and/or Break FIX change requests
  • Information security analysis of customer requirements to ensure all standards, policies and guidelines are upheld
  • Support routine compliance activities/audits, as well as BAU maker-checker, and peer review activities
  • Hardware and software upgrades, hot fixes and replacements
3

Information Security Technical Senior Analyst Resume Examples & Samples

  • Conducting vulnerability assessments and penetration testing (application and/or infrastructure) and articulating security issues to technical and non-technical audience
  • Identifying, researching, validating and exploiting various different known and unknown security vulnerabilities on server and client side
  • Vulnerability assessment tools, e.g. Nessus, Qualys, etc
  • Exploitation frameworks, e.g. Metasploit, CANVAS and Core Impact
  • Social engineering campaigns, e.g. email phishing, phone calls and SET
  • Deep understanding of OSI model
  • Security devices, e.g. Firewalls, VPN and AAA systems
  • Understanding of common protocols, e.g. LDAP, SMTP, DNS and Routing Protocols
  • Web application infrastructure, e.g. Application Servers, Web Servers and Databases
  • Web development and programming languages, i.e. Python, Perl, Ruby, Java, and/or .Net
  • Reporting information security vulnerabilities to businesses
  • Industry accredited security certifications will be required (the candidate must have or be willing to obtain all of the following certifications – GIAC GXPN, GPEN, OSCP and CISSP)
4

Information Security Technical Senior Analyst Resume Examples & Samples

  • Must be an Information Security enthusiast
  • Knowledge of tools and processes used to expose common vulnerabilities and implement countermeasures is expected
  • Clear technical documentation skills
  • Work in a high pressure environment and ability to work in a team environment
  • Ability to think analytically and "go beyond" approach
5

Information Security Technical Senior Analyst Resume Examples & Samples

  • Support the development of this cross-functional team to deliver clear and succinct documentation on processes and procedures to include RACI matrices
  • Ensures that controls are embedded in day-to-day operations and that remediation of non-compliance is addressed
  • Develops corrective action language for all IS related gaps and ensures the closure meets Citi requirements or industry best practices
  • Contributes to the development of support systems to assist a cross functional team in keeping Citi ahead of technology challenges
  • Facilitates the implementation of approved tools and identifies innovative and enhanced security solutions/emerging technologies
  • Develops good business relationships appropriate to the level of communication required
  • Analyzes and reports performance metrics, trends and performance improvement options to senior management and business leaders; accountable for line of business security strategies and client needs assessment and delivery
  • Defines secure configurations leveraging advanced technical knowledge and problem solving skills in the network, database, server and desktop technology areas
  • Provides general IS consulting services including interpretation and/or clarification
  • Participates in the IS community on committees and cross-business/functional opportunities
  • Provides sound understanding of information security concepts and principles and a basic knowledge of concepts and principles in other technology areas
  • Ensures essential procedures are followed and helps to define operating standards and processes
  • Communicates and interacts regularly with program teams or business management on IS related programs, policies and standards
  • Applies comprehensive understanding of how multiple areas collectively integrate within information security to contribute towards achieving business objectives
  • 3-5 years of experience in Information Security sector to include risk management activities
  • 3-5 years of development experience in SIEM solutions, preferably with HP ArcSight
  • Demonstrable development experience in Smart/Flex Connectors
  • Solid business and technology experience, preferably in a controls type role
  • Prior experience with and knowledge of information security processes and procedures, technologies, data protection laws/regulations, policies, risk assessment, compliance best practices and management practices
  • People and project management skills are essential for this integral role; minimum of one certification is strongly encouraged (CISSP, CISM, or CISA) BS/BA degree or equivalent combination of education/experience
6

Information Security Technical Senior Analyst Resume Examples & Samples

  • Infrastructure Support Operations
  • Use Case Lifecycle methodology to include Requirements Gathering, High Level Use Cases and Technical Use Cases, Change Control, Expedited Development and Normal Development processes
  • Defines and maintains key metrics reporting to SIEM Program Manager
  • Meets periodically with SIEM Program Manager to share and update SIEM product goals of that business area
  • Captures and presents business area requirements for use of the SIEM system to Content Creation team
  • Defines and documents roles or procedures for using the SIEM system in the business area
  • Bachelor’s degree or equivalent
  • 3-7 years of relevant experience
  • Good understanding of ITIL practices
  • Strong communication and meeting facilitation skills
7

Information Security Technical Senior Analyst Resume Examples & Samples

  • Social engineering campaigns, e.g. email phishing, phone calls, SET
  • Security devices, e.g. Firewalls, VPN, AAA systems
  • Understanding of common protocols, e.g. LDAP, SMTP, DNS, Routing Protocols
  • Web application infrastructure, e.g. Application Servers, Web Servers, Databases
  • Industry accredited security certifications will be required (the candidate must have or be willing to obtain all of the following certifications – GIAC GXPN, GPEN, GCIH, CISSP and CEH)
8

Information Security Technical Senior Analyst Resume Examples & Samples

  • Provide technical application support leadership for the Security Infrastructure and Applications
  • Production and UAT environment troubleshooting expertise
  • Capacity, performance and stability reporting and management
  • Lead initiative to develop/improve scripts and other programs for system monitoring and maintenance
  • Provide technical mentoring
  • Lead Operations related projects and Security assessment for the infrastructure associated with the applications in scope
  • Leadership skills to document and do knowledge transfer to other team members
  • Work closely with the infrastructure team to ensure the operational requirements are met during application integrations
  • Continuously keep the Knowledge Share repository up-to-date
  • Ability to work across all levels of the organization
  • Proven ability to work with demanding global partners within aggressive timelines; solid problem solving, analytical and technical abilities
  • Certifications (CISSP, ITIL, CCNA/CCNP, CEH, Redhat, Solaris, MCSE)
  • Hands-on experience with Unix scripting, SQL and ability to write complex queries
  • HSM (Hardware Security Module) knowledge, experience in ATTLA, Safenet (LUNA, PSE) and THALES; working knowledge in key and certificate encryption, lifecycle and end-to-end communication
9

Security Technical Analyst Resume Examples & Samples

  • Advanced Network Support for Events and Incidents across the BoA network
  • Proactive monitoring of the BoA network and the creation/validation of healthcheck and status updates
  • Guides troubleshooting to provide effective and rapid response, triaging and restoration
  • Provides hands-on troubleshooting to assist our vendor partners
  • Review and support of Change Requests and Restoral actions
  • Oversight of vendor partners including enforcement compliance with supplier
  • Post-incident root cause analysis and service improvement activities
  • Must be able to work effectively independently as well as in a team environment
  • Ability to work in a fast-­paced, rapidly growing environment while balancing multiple, sometimes competing priorities successfully
  • Proven ability to manage and set client expectations
  • Ability to manage client escalations and negotiate resolution
  • Firm understanding of IT Service Management processes
  • Knowledge of Market Data delivery networks using both TCP and UDP multicast
  • Experience in network analytics through packet capture analysis and end system diagnostics (Netscout)
  • Experience configuring and troubleshooting Cisco WAAS Products
  • Experience configuring and troubleshooting full suite of Cisco switches and routers - IOS, NX-OS, IOS-XR
  • Understanding of common network technologies, including TCP/IP, IPSec, VRRP, HSRP, SNMP, NAT, Multicast, Sub-netting, Ethernet, Access-lists
  • Understanding of at least 1 of the following routing protocols: BGP, OSPF, EIGRP, ISIS, MPLS
  • ITILv3 Foundation Certified
  • Previous experience with the Bank in an IT capacity considered a plus
10

Security Technical Analyst Assoc Resume Examples & Samples

  • Effectively communicates and makes decisions with input from team members regarding performance of the security platform and specific impact to clients, as well as ensuring the platform is configured and performing according to Fiserv standards and client specified needs
  • Performs analysis, recommends changes and implements changes when appropriate in a timely and accurate manner
  • Resolves moderately complex issues on behalf of clients; compares alternative actions and decides on appropriate approach
  • Responds to inquiries from internal and external clients regarding service configuration and performance, system processing and functionality
  • Performs maintenance using various software applications.Researching, monitoring and resolving operational and client issues (75%) Review and manage request queue; conduct analysis and process requests within SLA timeframes. (20%) Maintain availability and respond to incoming client inquiries. Research/ticketing (5%) Research client and/or system issues and document results/findings. Performs other duties as required
  • 1 year of financial services or relevant similar experience
  • Working knowledge of TCP/IP networking, Internetworking, N-Tier systems architecture
  • Must possess a high level of computer skills (to effectively utilize multiple back-office technical systems as well as common productivity tools such as Excel, Word and PowerPoint)
  • Previous work with Online fraud analysis or prevention tools and systems
  • Desired: Previous experience working in a technical computer security or forensics role
11

Security Analyst / Technical Support Resume Examples & Samples

  • Provide support for ongoing process improvement for security administration
  • Assist in ongoing design and build of process, reports, scripts and procedures required for security administration of all PeopleSoft applications
  • Coordinate user id access through Unix and Oracle
  • Build profiles to control user and developer access on all databases
  • Monitor security data integrity as it relates to the PeopleSoft applications
  • Provide leadership/mentorship to more junior team members
  • SME for internal/external audits
  • Providing environment support (e.g. client-specific software) to a team of 50 individuals – each running a Linux O/S with Windows 7 KVM or Windows 7 only
  • Eexcellent communication (written and verbal),
  • Relationship management (ability to deal with multiple levels of an organization),
  • Organizational (ability to deal with competing priorities),
  • Best practices as they relate to Security Administration for PeopleSoft,
  • Knowledge of internal/external audit requirements, and an intermediate knowledge of SQL, desktop support skills for Linux and Windows 7
  • Financials (v9), HR/Pay (v9), EPM (v9), HR Portal (v8.9)
  • PeopleTools – Security Administration/Query/Tree Manager/Object
  • Desktop support skills for Windows 7 and Linux operating systems
12

Service Delivery & Operations Security Technical Analyst Resume Examples & Samples

  • Advanced Technical Support for Event and Incident Management
  • Global troubleshooting to provide event and incident response and restoration
  • Maintains System access to participate in troubleshooting efforts
  • Review and support Break/Fix changes to and from vendor
  • Post incident follow up actions
  • Ensuring global consistency through the use of repeatable NSIM processes, procedures and roles
  • Maintaining stability in the network as changes are introduced and executed
  • Follows documented Network Center standards and procedures
  • Develop and/or maintain necessary incident management communication
  • Answers incoming problem calls from customers and internal sites and engages necessary resources to resolve associated tickets
  • Follow and enhance existing process and procedures
  • Expected to quickly become familiar with existing infrastructure and be able to rapidly respond to service impacting outages
  • Contribute on Network Services projects, specific to Operations, under the direction of the Technical Analyst Manager
  • Experience in NOC or relevant customer service skills
  • Experience with ITSM Remedy
  • 2 – 3 years working experience working with F5 Networks – GTM, 3DNS, LTM and BIGIP Load balancers
  • 1 – 2 years experience working with Radware/FireEye
  • 1 – 3 years experience working with Proxies (Bluecoat, NetAPP and Sun and proxy infrastructure)
  • 1 – 3 years experience working knowledge of DNS, DHCP,QIP, BIND, HTTP, and TCP/IP
  • Experience working with Linux
  • 1- 2 years of in-depth hands on troubleshooting experience within the Security Core Technologies, including low level design and engineering
  • Knowledge of troubleshooting using Sniffers, TCP Dump, Splunk and Wireshark
  • Functional understanding of networked applications requiring application traffic management solutions, including HTTP, HTTPS, SSH, FTP, DNS, NTP, ANYCAST services, and others
  • Must have expertise in application switching and traffic management, deep knowledge of application requirements (such as persistence), understand SSL offload and implementation of SSL certificate and Key, and web acceleration and TCP optimization
  • B.S. degree in Computer Science, Engineering, Business, or equivalent preferred
  • CCNA is preferred
  • Excellent oral and written communication. – Must be able to communicate at all organizational levels
  • Strong analytical skills. – Must be able to think outside the box
  • Leadership skills during technical troubleshooting triages
13

Security Liaison Technical Analyst Resume Examples & Samples

  • Obtaining and providing business information to Law Enforcement Agencies, to assist with criminal investigations, within the recommended SLA's
  • Day to day operations and relationships with UK authorities and agencies for Communications related disclosures
  • Support and administer Data Retention system
  • Resolve faults and queries related to voice and broadband technologies
  • Resolve Communications related issues raised by the UK authorities
  • Essential all data is retrieved and confirmed accurately, and records kept accordingly
  • Deal with classified information remaining completely confidential
  • Out of hours support - On call rota operated (under review)
  • Ensure all requests are completed in accordance to Grade urgency
  • Compliance to UK and EU Regulations and Directives
  • Provide support to Data Retention automated system
  • To attend and represent the company at industry forums
  • Learn new technologies
  • Document new and existing products, providing solutions for team training
  • Plan and deliver team training on technologies and products
  • Work effectively with wider technical teams to resolve issues
  • Central point of contact for certain technical queries within the team
  • Attend internal workshops to understand the impact of new products/services
14

Security Technical Analyst Resume Examples & Samples

  • Ensures stability of the post restoration environment in coordination with the LOB
  • Develop and/or maintain necessary incident management and communication reports
  • Cisco Routing/Switching - CCNP+ Level or equivalent experience
  • 10+ years' experience in a Network Operations role
  • In-Depth Working Knowledge configuring and troubleshooting full suite of Cisco switches and routers - IOS, NX-OS, IOS-XR
  • Excellent understanding of common network technologies, including TCP/IP, IPSec, VRRP, HSRP, SNMP, NAT, Multicast, Sub-netting, Ethernet, Access-lists
  • In-Depth Working Knowledge and understanding of at least 1 of the following routing protocols: BGP, OSPF, EIGRP, ISIS, MPLS
  • Excellent knowledge of core network services (DNS, SMTP, NTP, syslog, HTTP)
15

Cyber Security Technical Assistance Center Technical Analyst Resume Examples & Samples

  • Previous experience in IT (Information Technology) and an interest in IT Security are required
  • Completion or in the process of completing a post-secondary educational program in IT Security or Computer related field from a recognized community college or university is considered an asset
  • Ability to speak and write in both official languages is not necessary but considered asset
16

Technical IAM Security Analyst Temp Resume Examples & Samples

  • Review and validate extended rights requests
  • Perform security analysis for policy exceptions
  • Create, update, and maintain documentation (including process documents and procedures)
  • Identify process and workflow improvements around Technical IAM
  • Support daily Technical IAM BAU process and requests from Infrastructure and APS teams
  • Perform onboarding of technical accounts into CyberArk solution
  • Coordinate the onboarding of resources and entitlements into Sailpoint
  • CISSP, CISA, or other industry certification desired
17

Technical Analyst It-load Balancer / Security Resume Examples & Samples

  • Provide technical expertise and/or engineering support for maintaining performance and reliability of key IT solutions. Contribute to project technical architecture design and development
  • Assist IT Architecture and Engineering community in planning the introduction of new technologies and/or identifying the most appropriate technology choices to accomplish goals by utilizing Exelons standard governance process as outlined in the Management Model. Ensure appropriate implementation of technology both within the production and the development environments take place
  • Build and maintain knowledge of new technologies or technology opportunities and assists in development of analysis of their use for business and/or IT clients
  • Identify and provide Business and IT data on IT trends and issues. Participate in IT architecture review and standards setting. Assist in the development of white papers, conducting presentations as needed to explain why a technology is being recommended by IT
  • Maintain and enhance engagement with business and IT partners
  • Provide performance evaluations, career development feedback, and recognition as required
  • Maintains deep knowledge of technology and its application across Exelon
  • Promotes knowledge via seminars, presentations and publications within IT and Exelon
  • Participates in technological innovation to drive new business opportunities and solve complex business problems
18

Senior Cyber Security Technical Analyst Resume Examples & Samples

  • Candidate must possess 14 years of engineering, analyst or software experience
  • TS SCI Required
  • At least five (5) years of the candidate’s work experience must be in one of the following areas: IA system security analysis and implementation; system engineering; electrical design, design assurance or testing for IA products and systems; software engineering; program design and implementation; configuration management; or maintenance, integration or testing of IA products and systems. Common features of Cross Domain Solution security and functionality experience includes fixed format transfers, Dirty Word checking, classification verification, file type checking, malicious code screening, message integrity, auditing functionality, role separation, etc. One year concurrent experience working in this area is required
19

Mid Level Cyber Security Technical Analyst Resume Examples & Samples

  • TS SCI CI Poly Clearance Required
  • Candidate must possess 12 years of engineering, analyst or software experience
  • At least five (2) years of the candidate’s work experience must be in one of the following areas: IA system security analysis and implementation; system engineering; electrical design, design assurance or testing for IA products and systems; software engineering; program design and implementation; configuration management; or maintenance, integration or testing of IA products and systems. Common features of Cross Domain Solution security and functionality experience includes fixed format transfers, Dirty Word checking, classification verification, file type checking, malicious code screening, message integrity, auditing functionality, role separation, etc. One year concurrent experience working in this area is required
20

Citi Fusion Center Cyber Security Technical Analyst Resume Examples & Samples

  • Aid Cyber Security Fusion teams in developing and implementing advanced threat actor hunt methodologies and detection mechanisms
  • Coordinate analytic and investigative efforts amongst technical and intelligence teams during a critical cyber event or crisis
  • Detailed knowledge of HTTP, IP, TCP/UDP, BGP, MPLS, and OSPF protocols
  • Ability to review information to determine its significance, validate its accuracy and assess its reliability to technical and non-technical audiences