System Security Analyst Resume Samples

4.8 (94 votes) for System Security Analyst Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the system security analyst job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
NM
N McDermott
Nestor
McDermott
3383 Block Groves
New York
NY
+1 (555) 102 2296
3383 Block Groves
New York
NY
Phone
p +1 (555) 102 2296
Experience Experience
San Francisco, CA
Computer System Security Analyst
San Francisco, CA
Klein-Lemke
San Francisco, CA
Computer System Security Analyst
  • Leading the IA awareness training and IA workforce improvement programs and maintaining associated training and certification records
  • Develop and provide user training
  • Perform process improvement, analysis of security operations, methods, procedures, and practices
  • Provide technical support, i.e. log parser, security templates, and networking
  • Manage user accounts on standalone systems
  • Operational knowledge of JSIG, ICD-503, and RMF Framework
  • Serving as the primary program point of contact for IA-related issues for external customers, project management, and other teammates
Dallas, TX
Cyber Information System Security Analyst
Dallas, TX
Hamill, Jenkins and Smith
Dallas, TX
Cyber Information System Security Analyst
  • Provide Certification and Accreditation support for Information Systems
  • Perform wide ranging computer, network security, maintenance, or technical support called for by the government
  • Maintain approved baseline network topology
  • Conduct IA reviews for equipment entering or leaving the facility
  • Perform media scans
  • Perform file transfer between systems with various security classification levels
  • Investigate and report on any network security incidents
present
Phoenix, AZ
Senior Information System Security Analyst
Phoenix, AZ
Barrows Group
present
Phoenix, AZ
Senior Information System Security Analyst
present
  • Perform procedural tasks found within other security processes, such as information management, classification and protection; policy management
  • Assists in the development of the eMASS process flow documents
  • Provide IA and risk analysis support; provide level of effort Technical Support on-site
  • Participate in the engineering process for design, build and management of systems
  • Evaluate cybersecurity policy and provide recommendations to leadership
  • Install, configure, troubleshoot and support servers, load balancers, storage arrays, NAS, network equipment and related peripherals
  • Provide hardware and software support for systems within CNIC N6C Cyber Operations
Education Education
Bachelor’s Degree in Security
Bachelor’s Degree in Security
University of Southern California
Bachelor’s Degree in Security
Skills Skills
  • Provide Certification and Accreditation support for Information Systems
  • Maintain approved baseline network topology
  • Conduct IA reviews for equipment entering or leaving the facility
  • Perform media scans
  • Perform file transfer between systems with various security classification levels
  • Investigate and report on any network security incidents
  • Perform wide ranging computer, network security, maintenance, or technical support called for by the government
  • Provide activity reports
  • Meet with and make presentations to senior company and government customer leadership teams
  • Technical writing to support the development of security plans and procedures, functional operating procedures, status reports, and other necessary reporting
Create a Resume in Minutes

7 System Security Analyst resume templates

1

Applications System Security Analyst Resume Examples & Samples

  • Promote awareness of current policies and standards, as well as revisions and developments; provide consistent interpretation of policy to IT
  • Application Security risk assessment experience required
  • Good understanding of the Information control areas including Authentication, Authorization, Access Control, auditing, cryptography for applications and application architectures and technology (including web applications, mobile technology, web 2.0 technology, identity and access management)
  • Strong problem solving/analytical skills
  • Application development is a plus
2

Junior System Security Analyst Resume Examples & Samples

  • Provides assistance to system users relative to system security matters
  • Monitors and reports on policy and system vulnerabilities and non-compliance; makes recommendations for mitigation
  • Support and evaluate security tools, anti-virus software, and patch management systems
  • Performs other job related duties or special projects as assigned
  • An understanding of information security practices, systems, and standards
  • Technical and troubleshooting skills with broad knowledge of Microsoft Office, Windows operating systems, networking, server administration, basic scripting and programming (SQL), and VMWare
  • Strong attention to detail, analytical skills, and concern for data accuracy
  • Proven ability to prioritize workload and multitask in a high-pressure environment
  • Verbal communication and technical writing skills with an ability to effectively interact with and convey information to people who possess varying levels of understanding on applicable topics
  • Strategic and problem solving mindset with developed analytical abilities and organizational skills
  • 0-3 years Information Technology support experience
3

System Security Analyst Resume Examples & Samples

  • At least 2 years experience in Cyber Security
  • At least 2 years experience in Risk repository
  • At least 2 years experience in the security of computers, networks, and software applications
  • 5 years of experience in Cyber Security
4

Senior Information System Security Analyst Resume Examples & Samples

  • Provide hardware and software support for systems within CNIC N6C Cyber Operations
  • Install, configure, troubleshoot and support servers, load balancers, storage arrays, NAS, network equipment and related peripherals
  • Experience with OCSP, RSA and agent servers development & sustainment
  • Provision virtual machines as necessary, allocate resources, perform capacity planning, and monitor both network and systems usage
  • Develop and deploy monitoring solutions
  • Participate in the engineering process for design, build and management of systems
  • Implement security systems and best practices to protect systems from external and internal compromise
  • Accurately document procedures, configurations, trouble descriptions and problem resolution
  • Participate in incident management and problem resolutions in a timely fashion, escalate issues as needed
  • Maintain systems up-time of 99.99%
  • Knowledge of performance testing and capacity planning strategies
  • Experience with best practices for change management
  • Some exposure to continuous integration and related technologies beneficial
  • Possession of excellent oral and written communication skills
5

Information System Security Analyst Resume Examples & Samples

  • Familiarity with the DCID 6/3 Certification and Accreditation Process, ICD 503 Certification and Accreditation, RMF, Change Management Procedures, INFOCON Requirements for IC Community, Familiar with SCAP 4.0, WASP, ACAS, Retina, HBSS, as well as Active Directory, Management and Updating/Configuration of Windows Server and Workstation OS, Linux, and Networking Cisco HP
  • Background including System Administration experience with Windows Server 2012R2, Windows 10, Windows 8.1, and Windows 7; creating and maintaining virtual machines with Hyper-V; maintaining hardened images, and configuring servers and workstations or ability to configure administer and secure Linux and Unix workstations and servers preferred
  • Must comply with DOD 8750.01m Information Assurance Work Force Improvement for Information Assurance Level 1 Certification by obtaining a Security+, GISF, or GSLC Certification within 6 months
6

Info System Security Analyst, Experienced Resume Examples & Samples

  • You will travel to commands/sites and train personnel on technical functions such as running scans, review command documentation/policies, upload results into VMS, and any other tasks necessary to complete a cyber-inspection/assessment/audit
  • You will train personnel on and/or perform or review vulnerability scans, conduct risk assessments, and implementing or overseeing of the implementation of vulnerability assessments
  • You will analyze customer's requirements regarding applicable security disciplines (physical, personnel, information, communications, and computer)
  • You will evaluate customer's security policy and provide recommendations
  • You will provide guidance on Information Assurance matters during configuration design and modification of information systems; review system designs for IA directive compliance; recommend changes, mitigations and remediation
  • You will monitor and review periodic vulnerability and IA compliance testing
  • You will verify that applicable security measures identified by the IA Vulnerability Management (IAVM) program are applied
  • You will monitor mitigation and remediation progress; draft and update Plans of Action and Milestones (POA&Ms)
  • You will provide IA and risk analysis support; provide level of effort Technical Support on-site
7

Information System Security Analyst Resume Examples & Samples

  • Travel to commands/sites and train personnel on technical functions such as running scans, review command documentation/policies, upload results into VRAM, and any other tasks necessary to complete a cyber-inspection/assessment/audit
  • Analyze customer's requirements regarding applicable security disciplines (physical, personnel, information, communications, and computer)
  • Provide guidance on Information Assurance matters during configuration design and modification of information systems; review system designs for IA directive compliance; recommend changes, mitigations and remediation
  • Monitor mitigation and remediation progress; draft and update Plans of Action and Milestones (POA&Ms)
  • Provide IA and risk analysis support; provide level of effort Technical Support on-site
  • Performing IA controls analysis, risk assessment, contingency planning, Security Test and Evaluation (ST&E) and risk mitigation analysis
  • IA background in requirements analysis, design, development and implementation
  • IA concepts and requirements development and analysis
  • IA planning and management
  • Supervision of IT Workforce
  • Experience with HBSS
  • Experience with Database (SQL preferred)
  • Windows OS experience
8

Senior Info System Security Analyst Resume Examples & Samples

  • BA/BS in Information Systems Management, Computer Science or related discipline plus 6 years of experience. In lieu of formal education, at least 12 years of related experience. Specific contract requirements regarding education and experience will prevail
  • Candidates must have at least an active Secret clearance
  • Experience with DIACAP and RMF in NAVY a plus
9

Cyber Information System Security Analyst Resume Examples & Samples

  • Provide Certification and Accreditation support for Information Systems
  • Provide Network Security, Technical, Configuration, and Architecture support to Government IA Representatives as required
  • Perform wide ranging computer, network security, maintenance, or technical support called for by the government
  • Perform required security patches, updates, and scans for computer security vulnerability
  • Maintain appropriate Network ATOs, IATOs, IATT, or other required approvals
  • Ensure TEMPEST requirements are maintained
  • Maintain approved baseline network topology
  • Conduct IA reviews for equipment entering or leaving the facility
  • Perform media scans
  • Perform file transfer between systems with various security classification levels
  • Investigate and report on any network security incidents
  • Provide activity reports
  • Meet with and make presentations to senior company and government customer leadership teams
  • Must have working knowledge and experience with Microsoft Office applications including Microsoft Project, Microsoft Visio, Word, Excel, and Power Point
  • Technical writing to support the development of security plans and procedures, functional operating procedures, status reports, and other necessary reporting
  • Must possess an active TS/SCI Security Clearance and must be willing to take a CI Polygraph
  • Education: BA/BS in Information Systems Management, Computer Science or related discipline. In lieu of formal education, at least 13 years of related experience
  • Experience: Must have at least six (6) years’ experience, to include applicable security discipline principles, practices, and procedures. Be familiarized with a variety of the field’s concepts, practices, and procedures. Relies on extensive experience and judgment to plan and accomplish goals performing a variety of tasks
  • Specific Experience: Must have experience in relevant Information Assurance job skills and complete knowledge of DOD Information Assurance Certification and Accreditation process (DIACAP) including but not limited to Certification and Accreditation, Certification Test and Evaluation, and Security Test and Evaluation
  • Applicable Discipline Certification in accordance with the DoD Information Assurance Workforce Improvement Program (DoD 8570.01-M) IAT-I. IAT-II with CISSP certification is strongly desired
  • A background including System Administration experience with Windows Server 2012R2, Windows 10, Windows 8.1, and Windows 7; creating and maintaining virtual machines with Hyper-V; maintaining hardened images, and configuring servers and workstations or ability to configure administer and secure linux and unix workstations and servers preferred
10

Senior Computer System Security Analyst Resume Examples & Samples

  • Maintain the security documentation for information systems under their purview, to include System Security Plans (SSP), Plans of Action & Milestones (POA&M), hardware and software baselines, and written procedures for specialized processes such as Assured File Transfer/Trusted Download or Periods Processing
  • Perform Information System (IS) scanning based on vulnerabilities and threats or regulatory compliance; maintaining a consistent security posture
  • Conduct risk assessment testing procedures for verification of Certification & Accreditation (C&A)/A&A/RMF safeguards to meet various regulatory requirements based upon NISPOM, RMF for DoD IT, ICD 503, JSIG & NIST 800-series guidelines
  • Schedule, perform and maintain records of required Information Security auditing, maintenance logs, software/hardware changes, and anti-virus updates
  • Develop and conduct test procedures for verification of Certification & Accreditation (C&A), Authorization and Accreditation (A&A), Risk Management Framework (RMF) safeguards to meet customer requirements based upon NISPOM, NISPOM Overprint, DCID 6/3, JAFAN 6/3, JSIG, ICD 503, CNSSI 1253 and related NIST Special Publications 800 series
  • Coordinate with Facility Security Officer (FSO), Contractor Program Security Officers (CPSO), and Information System Security Manager (ISSM) to define, implement and maintain information security policies, strategies, and procedures
  • 5+ years as an industrial security professional working in a defense contractor environment
  • 4+ years direct experience as an Information System Security Officer (ISSO) or Information System Security Manager (ISSM), as defined in either chapter 8 of the NISPOM, or as defined in chapter 2 of JAFAN 6/3
  • Experience with the following Information Assurance compliancy tools: Nessus, SCC, HBSS, ACAS, VMS, CIS Tool, RAT, eMASS and XACTA
  • Experience implementing security regulations stemming from sources such as Intelligence Community Directives (ICDs) as well as the National Institute of Standards & Technology (NIST) 800-series
  • Ability to implement system security controls on multiple Operating Systems (OS), UNIX, Linux, and Windows
  • Excellent people skills to include collaborating in a multi-disciplinary, diverse, and dynamic team environment
  • Excellent communication skills (written, verbal, & presentation)
  • CISSP certification within 6 months of hire
  • DoD 8570 compliant: Security+, CASP and/or other equivalent security certification (desired) required within 6 months of hire; Cisco, MCSE, MCSA or LINUX certifications a plus
  • Knowledge in UNIX, Linux, and Windows operating systems
11

Principal Information System Security Analyst Resume Examples & Samples

  • Technology Assessment
  • Systems Engineering
  • Software Development and Prototyping
  • Capabilities Development and Transition
  • Cyber Operational and Technical Support
12

Senior Information System Security Analyst Resume Examples & Samples

  • Security Engineering for cybersecurity
  • Requirements Analysis
  • Hardware Development and Prototyping
  • Exercise and Experimentation Support
  • Training Support
  • Certified Information Systems Security Professional (CISSP)) certification
  • Network vendor certifications (e.g.: Cisco and Juniper)
  • MS in related field
  • Familiarity with Federal Government networks and technical requirements
  • Familiarity with Naval systems and processes
  • Knowledge / experience with SCADA technologies
  • SCRUM certification
  • TS SCI with poly highly desired
  • ITIL v.3
13

Senior Info System Security Analyst Resume Examples & Samples

  • Active SECRET or above security clearance
  • CSWF IAM LVL III certification (CISP, CASP, CISM, GSLC)
  • 5 years experience, including 4 years of related IA and INFOSEC technical experience: Provides technical analysis for IA support and integration efforts, Performs analysis of RMF documentation for DoD operational systems, networks and applications
  • Minimum 4 years experience in IA / C&A / RMF analysis support in IA controls analysis, conducting risk assessments, risk mitigation analysis and developing contingency plans
  • Demonstrated experience in the following areas
14

Computer System Security Analyst Resume Examples & Samples

  • DoD 8570 IAM III certification
  • Experience implementing JSIG requirements and RMF
  • Bachelor or Masters degree with a technical emphasis (e.g. Information Systems, Information Technology, Computer Science, EE)
15

Cyber Information System Security Analyst Resume Examples & Samples

  • Conduct IA review for equipment entering or leaving the facility, investigation support for any security incidents, media scans, file transfers between systems with various security classification levels, and other IA activities
  • BA/BS in Information Systems Management, Computer Science or related discipline. In lieu of formal education, at least 13 years of related experience
  • Must have at least six (6) years’ experience, to include applicable security discipline principles, practices, and procedures
  • Must have experience in relevant Information Assurance skills and have knowledge of Navy Information Assurance Certification and Accreditation processes including Certification Test and Evaluation, and Security Test and Evaluation
  • RMF and eMASS experience
  • CISSP certification is strongly desired
  • System Administration experience with Windows Server 2012R2, Windows 10, Windows 8.1, and Windows 7; creating and maintaining virtual machines with Hyper-V
  • Ability to configure administer and secure Linux and Unix workstations and servers is preferred
16

Information System Security Analyst Manama Resume Examples & Samples

  • Evaluates highly complex security systems according to industry best practices to safeguard internal information systems and databases
  • Generate, evaluate, update, and maintain certification packages for supported systems and networks
  • Performs network related duties and functions at the direction of the ONE-NET Operations Manager and/or Functional Supervisor
  • Knowledge and experience working with the DoD DIACAP process and procedures and DoD Instruction 8500 series
  • Skilled in time, priority and task management
  • Experience living and working in an OCONUS location
  • Flexibility in adapting to and functioning in demanding and fluid environments or situations
  • DoD 8570 IAT Level III Baseline CertificationDoD 8570 IAT Level III Baseline Certification
  • Assured Compliance Assessment Solution ACAS
17

Computer System Security Analyst Resume Examples & Samples

  • Establish a SAP level security program IA W DoD 5205.07 Volumes 1-4, the Director of Central Intelligence Directives (DCID) 6/9 (rescinded). The applicable Joint Special Access Program (SAP) Implementation Guide (JSIG) and other DoD level security directives will apply as outlined in the contract Defense Department (DD) Form 254
  • Perform Information Assurance (IA) certification activities IAW Intelligence Community Directive (ICD) 503 and National Institute of Standards and Technology (NIST) 800-53
  • Perform Information Assurance (IA) certification activities aligned with the DOD RMF standards
  • Coordinate with government agencies to obtain rulings interpretations, and acceptable deviations for compliance with DoD and Intelligence Community regulations
  • Perform process improvement, analysis of security operations, methods, procedures, and practices
  • Investigate security incidents and prepare reports specifying preventative actions taken
  • Conduct annual security awareness, SCI and Program indoctrinations in accordance with Special Access Program Nomination Process requirements
  • Prepare manuals outlining regulations, and established procedures for handling, storing, keeping records, and for granting personnel and visitors access to restricted records and material
  • Conduct candidate prescreen interviews and serve as an integral participant in the recruiting process
  • Responsible for SCIF build-out, operations, and respond to after-hours alarms and anomalies
  • Maintain COMSEC material and COMSEC account
  • Maintain classified document control program to include document and media accountability and be the focal point for classification guidance and marking
  • Perform duties as Information Assurance Officer; conduct periodic computer audits, chair configuration control board, and perform Microsoft system administration duties as required
  • Responsible for administering all security aspects for the program supported to include physical, program, facility, and information security requirements to ensure compliance
  • General system administrator knowledge, will be tasked to patch system and keep virus definition up to date
  • Bachelor's Degree (will consider equivalent combination of education/work experience)
  • Minimum of 5 years of security experience
  • DoD 8570 IAT II/IAM I (Minimum Security +) required
  • Microsoft certification on Windows 10 and Server 2008
  • Strong experience maintaining compartmentalized classified programs and facilities
  • Operational knowledge of JSIG, ICD-503, and RMF Framework
  • Skill in conducting process improvement assessments and self-reviews
  • Must possess strong written communication skills and have the ability to write and communicate complex concepts to government customers and technical staff
  • SECURITY CLEARANCE: TS/SCI/SAP
18

Summer Analyst System Security Analyst Resume Examples & Samples

  • Develop an understanding of Data Loss Prevention (DLP), Database Security (DBS) and Master Data Management (MDM) system components and various risk mitigation practices
  • Provide assistance to the DLP & DBS team in support of streamlining various internal user facing processes and workflows to promote efficiency and effectiveness
  • Provide assistance to the DLP & DBS team in support of creating and documenting various user oriented mitigation process
  • Interview various internal departments to collect and categorize various internal used forms / documents into various information and document groups
  • Interview various enterprise data management staff to identify and categorize various internal used reports into various classes
  • Identify opportunity for sensitive data element identification automation by decomposing reports into source data streams , sensitive database & columns, and source feeds for downstream DLP programs
  • The ideal candidate is a currently enrolled college student (rising senior or graduate student)
  • Generally a GPA of 3.0 or higher and will complete degree requirements in December 2017 or May/June 2018
  • Preferred majors: Computer Information Systems, Information Assurance
  • Excellent computer skills specifically with Microsoft Office (Excel, Word, and PowerPoint)
  • Excellent organization and time management skills with attention to detail
  • Ability to work equally well on self-managed or team-oriented projects
19

Senior Information System Security Analyst Resume Examples & Samples

  • Leads activities to embed defined security strategy and roadmap initiatives in support of Global and Business strategies, and within Transamerica risk tolerances
  • Leads the research, development and implementation of complex and broad information security initiatives, including review of policy, program, process, procedural and technology improvements and solutions to ensure they are current and meet business needs
  • Gather research covering latest security threats and vulnerabilities. Identifies weaknesses and exposures. Recommends and presents protection and mitigation strategies for review, input and feedback. Champions key stakeholder approval
  • Leads and manages BCM activities as defined within the Business Continuity Program, such as BCM tests and exercises; ensure the completion of Business Impact Analysis and supporting plans; Explains and champions implications of technology or organizational changes, and leads improvements plans; oversees BCP coordinators; provides subject mater expertise during a crisis as requested by Crisis Management Team
  • Leads activities found within cyber threat management processes, such as reviewing and analyzing threat intelligence. Oversees vulnerability data and actions to completion. Reviewing and analyzing consolidated data from security monitoring technologies; designs, implements and maintains countermeasure plans
  • Leads activities found within event and incident response processes, such as identifies and analyzes issues, recommends and oversees actions to completion, reviews, analyzes and determines exposures and risks from artifacts and evidence, oversees coordination of tasks to completion
  • Lead activities found within control self-assessments and security exception/waiver processes, such as reviewing, analyzing and challenging critical assets, associated ratings and security exception/waivers with asset owner; recommending, working with and supervising business department completion of action plans
  • Tracks current and impeding laws, regulations and industry requirements and best practices, such as data protection, data privacy, cyber security and information security. Translates requirements into practical solutions. Defines and implements improvement plans
  • Analyzes, reviews and adjusts reports, including department, project, key indicators and dashboards. Develops requirements and improvement plans
  • Exhibits leadership qualities to other members of the team and key stakeholders; ability to create and articulate strategic ambitions that are practical, add value and in line with defined risk tolerances
  • Ability to quickly develop excellent working relationships with peers and key stakeholders, such as business partners, legal, internal audit, risk, and technology specialists
20

Computer System Security Analyst Resume Examples & Samples

  • Previous ISSO experience
  • Ability to quickly adapt to new situations and prioritize multiple assignments
  • Active or current Secret Clearance is required
  • Security+ or Network+ certification
  • Experience with RMF
21

Computer System Security Analyst Resume Examples & Samples

  • Implement Risk Management Framework (RMF), through the required government policy (i.e., NISPOM, JSIG, ICD etc.), make recommendations on process tailoring, participate in and document process activities
  • Perform assessments of systems and networks within the networking environment or enclave and identify where those systems and networks deviate from acceptable configurations, enclave policy, or local policy. This is achieved through passive evaluations such as compliance audits and active evaluations such as vulnerability assessments
  • Periodically conduct a complete review of each system's audits and monitor corrective actions until all actions are closed
  • Bachelor's degree and 5 years of experience of relevant work experience; 3 years of relevant work experience with a master's degree
  • DoD 8570 IAM 1 Compliant Certification (i.e. Security+ CE)
22

Computer System Security Analyst Resume Examples & Samples

  • Update virus definitions on standalone systems
  • Manage user accounts on standalone systems
  • Prepare security documents per the JAFAN, JSIG, NISPOM and ICD’s
  • Perform continuous monitoring on systems per JSIG
  • Proficiency in MS Office Suite programs
  • Proficiency in MS Windows 7, MS Server 2008R2, some experience in Linux, i.e. Red Hat
  • Must obtain CompTia Security + certification within six months
  • Must be able to obtain a Top Secret clearance
  • Proficiency in MS WIndows 10
  • Good understanding of DISA STIGS and Tools
23

Computer System Security Analyst Resume Examples & Samples

  • CISSP or other IAM level II/III certification required (CASP-CE, CAP, GSLC, CISM, GSLC, CISM, CISSP)
  • Knowledgeable of ICD 503/ DoD RMF/JSIG (previously JAFAN 6/3) and NIST
  • Experience with security architectures, firewalls, network access, and, conducting system audits
24

Computer System Security Analyst Resume Examples & Samples

  • Bachelor's degree with 9 years of relevant experience; 7 years of relevant experience with a master's degree
  • Experience with JAFAN, DCID, JSIG, DSS compliance requirements
  • Knowledge of Cross Domain Systems
  • Experience implementing and assessing information systems security controls
  • Experience w/ security hardening and assessment tools (SCAP, ACAS, HBSS, XACTA etc.)
  • Experience with security architectures, firewalls and network security controls
25

System Security Analyst Resume Examples & Samples

  • Monitors information systems operations, activities, and functions within area of expertise and makes recommendations for improvements in overall planning, efficiency and quality in these areas
  • Manage monitoring, auditing, and events management tools
  • Monitors service level agreements and/or metrics to ensure that customer expectations are being met
  • Conduct research on new technical solutions and their implementation feasibility
  • Coordinate the compilation of technical specifications for new requirements
  • Review with the System Integration Vendor necessary technical documents
  • Coordinate systems update projects (Security Patches and Product Upgrades)
  • Provide expert advice and contribute to various strategic IT internal processes including (but not limited to) Systems Configuration Management, Change Management, Disaster Recovery and Business Continuity, Risk Management, Business Impact Analysis, and Security Impact Analysis
  • Graduation from an accredited college or university with a bachelor's degree and five or more years of experience in any of the following
26

Senior Information System Security Analyst Resume Examples & Samples

  • Conducts in-depth analysis of Independent Validation and Verification (IV&V), Certification and Accreditation (C&A), and functional/operational test results for accuracy, compliance, and adherence to DoD and Federal IA technical and operational security requirements
  • Documents residual risks by conducting a thorough review of all the vulnerabilities, architecture and defense in depth and provide the Information Assurance (IA) risk analysis and mitigation determination results for the Test Report
  • Assists the Certification Authority and Validator with producing the risk assessment artifacts describing residual risks identified during certification testing
  • Schedules and conducts eMASS training for DHA and Program Office personnel
  • Assists in the development of the eMASS process flow documents
  • Develops/maintains agency level cybersecurity policy and processes that implements DoD Cyber Security program
  • Has an expert knowledge of NIST publications and is able to work strategically on transition of DIACAP to RMF
  • Has knowledge of DISA STIGs/FDCC requirements, defense-in-depth, and other information security and assurance principles and associated supporting technologies
  • Communicates the security posture of systems up the chain of command via CSTAR and eMASS so that accreditation decisions can be made based on a thorough understanding of the risks associated with the particular configuration of systems and networks
  • Identifies strategies for improving the accreditation processes and procedures to meet increasingly tight timelines and budgets
27

Senior Information System Security Analyst Resume Examples & Samples

  • Act as primary liaison with SPAWAR and DHA senior leadership in all RMF A&A matters
  • Analyze requirements regarding applicable cybersecurity disciplines
  • Evaluate cybersecurity policy and provide recommendations to leadership
  • Lead independent and objective evaluations and audits of the cybersecurity policy implementation
  • Review controls over data integrity, identify risks, evaluate safeguards, ascertain compliance with cybersecurity policies, evaluate efficiency and cost effectiveness of the program, recommend corrective actions, monitor implementation of approved recommendations
  • Assess policy, program, and project feasibility
  • Formulate short-and-long term goals and objectives and integrate them into a strategic plan
  • Structure and organize work and set priorities
  • Anticipate, identify, diagnose, and consult on potential or actual problem areas relating to program implementation and goal achievement
  • Establish procedures and processes to monitor progress toward organizational objectives
  • Perform other related duties as required
28

Computer System Security Analyst Resume Examples & Samples

  • Bachelor's degree and 2 years of relevant experience; 0 years of relevant experience with a master's degree
  • Current active Top Secret/SSBI clearance
  • Experience with JSIG
  • Experience with DISA Security Technical Implementation Guides (STIGS)
29

Senior Information System Security Analyst Resume Examples & Samples

  • Travel to commands/sites and perform technical functions such as running scans, review command documentation/policies, upload results into VMS, and any other tasks necessary to complete a cyber inspection/assessment/audit
  • Provide full-time subject matter expert (SME) support to Department of the Defense (DoD) customers, such as the Navy, Air Force, and Army, in regard to certification and accreditation (C&A)
  • Perform vulnerability scans, conduct risk assessments, and implementing or overseeing of the implementation of vulnerability assessments
  • Responsible for the full range of Information Assurance (IA) activities, specializing in C&A matters
  • Evaluate customer's security policy and provide recommendations
  • Submit and track DIACAP accreditation packages, to include annual reviews of accredited networks/systems
  • Monitor and review periodic vulnerability and IA compliance testing
  • Verify that applicable security measures identified by the IA Vulnerability Management (IAVM) program are applied
  • Participate in certification and accreditation collaboration meeting
  • Provide augmentation support to observe and support Certification Test and Evaluation (CT&E), Security Test and Evaluation (ST&E) and Independent Verification and Validation (IV&V) testing of new and existing systems at multiple locations across the United States
  • Generate DIACAP artifacts to include; DIACAP Implementation Plan (DIP), System Identification Profile (SIP), DIACAP Scorecard, Draft DIACAP POA&M, Test Plan, Test Report, Vulnerability Report, Residual Risk Assessment, Contingency Plan, COOP, and other documents as required
  • 5 years of experience, including 4 years of related IA and INFOSEC technical experience
  • Minimum of 4 years’ experience in IA/C&A analysis support in IA controls analysis, conducting risk assessments, risk mitigation analysis, developing contingency plans
  • Certifications: CASP, CISSP, CISM or GSLC is required
  • Clearance: Must possess an active Secret clearance
  • Demonstrated knowledge of IA/INFOSEC concepts and requirements
  • Knowledge of the DOD C&A process and standards
  • System/network vulnerability analysis
  • Risk assessment and risk mitigation analysis
  • Security Test and Evaluation (ST&E)
  • Contingency planning
  • Firewall Policy
  • Ports & Protocols
30

Computer System Security Analyst Resume Examples & Samples

  • Review weekly information systems security audits
  • Security configuration management
  • Security account administration
  • Continuous security monitoring
  • Ability to obtain a DoD 8570 IAM 1 Compliant Certification (i.e. Security+ CE) within the first 6 months
31

Computer System Security Analyst Resume Examples & Samples

  • Leading the overall IA program, being responsive to both the customer and Northrop Grumman program management
  • Serving as the primary program point of contact for IA-related issues for external customers, project management, and other teammates
  • Directing the day-to-day activities of assigned IA staff
  • Developing/maintaining security plans and supporting standard operating procedures as required to maintain the security posture and ensure compliance with required DoD IA controls
  • Actively supporting the system development lifecycle through participation in requirement, design, and other lifecycle milestone reviews to ensure security and IA interests are appropriately addressed and through active participation in change control processes
  • Assessing the security impact/risk of proposed changes to the system, software, or architecture to ensure the security posture is maintained as the system continues to evolve
  • Supporting certification and accreditation activities in accordance with the DoD Risk Management Framework (RMF), including conducting ongoing monitoring of compliance with required IA controls and annual artifact updates
  • Supporting security incident analysis, reporting, and response activities as well as conducting training and exercises related to incident response
  • Leading the IA awareness training and IA workforce improvement programs and maintaining associated training and certification records
  • Maintaining and implementing access control procedures, including approving account requests, performing periodic audits of existing accounts, and authorizing and monitoring access to data center facilities
  • Supporting ad hoc reporting and investigative inquiry processes, ensuring that personally identifiable information (PII) is appropriately protected in accordance with DoD guidance
  • Monitoring DoD and vendor security advisories, and working with the Operations team to ensure necessary patches/upgrades are applied in a timely fashion
  • Directing and/or facilitating vulnerability scans of system components using DoD-approved vulnerability scanning tools such as the Assured Compliance Assessment Solution (ACAS), WebInspect, and the Defense Information Systems Agency (DISA) Security Content Automation Protocol (SCAP) Compliance Checker
  • Assisting in the identification of corrective actions for identified vulnerabilities; developing plans of actions and milestones (POA&Ms) and/or risk assessments for identified vulnerabilities, and working with the Operations team to track the execution of corrective actions and POA&M items to completion
  • Directing the implementation, maintenance, and monitoring of security/IA tools in coordination with the Computer Network Defense Service Provider (CNDSP), including intrusion detection systems and DoD’s Host Based Security System (HBSS)
  • Supporting general IA activities including meeting participation, managing staff assignments, and status reporting
  • Bachelor's degree with 14 years of Information Assurance/Information Security experience (or Master’s degree with 12 years experience, 9 years with a PhD) OR 18 years of Information Assurance/Information Security experience
  • Must be a US citizen
  • Must have an active Top Secret clearance to start
  • Must hold and maintain a qualifying IA certification for an Information Assurance Management (IAM) Level II position as defined in DoD 8570.01-M (CAP, GSLC, CISM, CASP, or CISSP)
  • Understanding of DoD and/or Federal IA requirements as well as commercial best practice
  • Excellent customer interaction skills
  • Experience leading and directing teams
  • Travel domain / travel industry experience preferred
  • Familiarity with DISA Security Technical Implementation Guidelines (STIGs), the DoD Information Assurance Certification & Accreditation Process (DIACAP), DoDI 8500.2 IA controls, NIST RMF, and related DoD/Federal IA requirements and guidance
  • Experience conducting risk assessments and performing certification and accreditation activities in accordance with the DIACAP and RMF
  • Experience with the DoD Enterprise Mission Assurance Support Service (eMASS)
  • Understanding of UNIX, Windows, network, database (Oracle) and web application security vulnerabilities and best practices
  • Experience with security and application vulnerability assessment/testing tools and analysis of results
  • Experience with DoD’s Host Based Security System (HBSS)
  • Experience with intrusion detection/prevention systems and investigation of IDS/IPS alerts
  • Experience with Tripwire or similar compliance/baseline monitoring tools
32

Computer System Security Analyst Resume Examples & Samples

  • Support the formal Security Test and Evaluation (ST&E) required by each government accrediting authority through pre-test preparations, participation in the tests, analysis of the results and preparation of required reports
  • Bachelor's degree with 5 years of relevant experience, 3 years of relevant experience with a master's degree
  • Current active Secret clearance
  • Bachelors or master's degree with a technical emphasis (e.g. Information Systems, Information Technology, Computer Science, EE)
33

Mgr Computer System Security Analyst Resume Examples & Samples

  • Bachelor's degree with 10 years of Information Systems Security experience with at least 5 years in the SCI environment
  • CISSP, CISM, or GSLC
  • Final top secret clearance with a current SSBI
  • Master's degree and experience working in the NISP and SAP environments in addition to the SCI environments
34

Senior Information System Security Analyst Resume Examples & Samples

  • Must have CompTIA Security + to start work
  • OS Certification
  • Travel Requirement 25%
  • 5+ years of experience with Microsoft Operating systems and related technologies including, IIS, SQL, Active Directory, Office products and patching technologies
  • 5+ years’ experience with VMware and virtualization technologies
  • 3+ years’ experience with storage technologies, NAS & SAN
35

Information System Security Analyst Resume Examples & Samples

  • Acting as the central point of contact for triage and initial coordination for all IT Security issues and questions
  • Managing client IT Security requests, interfacing with clients at all levels and completing associated tracking and documentation
  • Providing evaluation, advice, guidance and consultation on technical security of information, information systems, applications and related infrastructure to users
  • Performing IT Security evaluation of proposed technologies to determine security controls required and maintain appropriate documentation and tracking
  • Promoting the IT Security Program and delivering training sessions to employees and contractors
  • Providing small-scale IT Security related solutions though planning, analysis and review, testing, and recommendations
  • Assisting the IT Security Program through research, development, testing, evaluation, and support of medium and large scale IT systems
  • Staying abreast of the latest developments in Information Technology, Information Technology Security and Information Technology Security Risk Management
36

System Security Analyst Resume Examples & Samples

  • Drive the design and implementation of centralized user access control administration to internal and external software applications
  • Serve as a subject matter expert for user access controls and application security plans
  • Drive strategic user access control solutions through research and audit activities
  • Prepares status reports on application and user security matters for audit
  • Maintain accurate and up-to-date records that reflect user information, current user privileges and management authorization for these same user privileges within software applications
  • Provide consultation to IT staff to ensure that all current and future business applications include adequate user access controls
  • Initialize and maintain role-based security for all applications in-scope of this position
  • Bachelor’s Degree in Computer Science, Information Systems, or other related field or equivalent work experience
  • Eight to ten years of combined IT and security work experience with a broad exposure to infrastructure/network, client/server mainframe and audit/discovery relationships
37

Open System Security Analyst Resume Examples & Samples

  • Provide Microsoft Server Security functions such as folder creation, share, and rights
  • Trouble shooting Application and software security issues
  • Desktop lockdown and Network Access Control, provide level 3 support to user provisioning
  • Represent System security in CAB and on Situation Management calls
  • Support and install and maintain client's security tools including Secret Server, Voltage, Proof Point, Sourcefire, Web Sense, Symantec, Carbon Black, Dark Trace, Splunk and Secure Works
  • Perform Forensics using the above tools
  • 5 years Systems Administrator-Scripting Languages
  • 3+ years Systems Administrator-Active Directory Infrastructure