associate security engineer resume example with 6 years of experience

Jessica Claire
  • , , 609 Johnson Ave., 49204, Tulsa, OK 100 Montgomery St. 10th Floor
  • Home: (555) 432-1000
  • Cell:
  • :

Resourceful loss prevention officer and security management professional with over 5 years of experience maintaining secure environments while providing effective security presence and visible deterrent to crime. Personable leader to monitor rule infractions, detect suspicious activities and minimize threats. Forward-thinking emergency response specialist. Remains calm during stressful situations.

  • Regulatory Compliance and Documentation
  • Monitoring Computer Viruses
  • Friendly, Positive Attitude
  • Team Building
  • Websense Data Loss Prevention
  • People Skills
  • Work Ethic
  • Managing Security Breaches
  • Harden Network and Server Infrastructure
  • Working Collaboratively
  • Problem Resolution
  • Critical Thinking
  • Team Management
  • Computer Skills
  • Reliable and Trustworthy
  • Protecting Networks
  • Reporting and Documentation
Associate Security Engineer, 03/2019 to Current
AcquiaWashington, DC,
  • Continuous monitoring and interpretation of threats using the IDS and SIEM.
  • Investigate malicious phishing emails, domains and IPs using Open-Source tools and recommend proper blocking based on analysis.
  • Conduct log analysis using Splunk
  • Identify suspicious/malicious activities or codes.
  • Conduct log analysis using Splunk to identify suspicious/malicious activities or codes
  • Monitor and analyze security events to determine intrusion and malicious events.
  • Interact with network intrusion detection devices and other security systems via proprietary and commercial consoles, both local and remote.
  • Should possess the knowledge to identify and communicate opportunities to enhance rules, reduce false positives, and escalate to support tiers if tuning is needed.
SOC Analyst, 01/2017 to 01/2019
VerizonCorona, NY,
  • Monitoring security patch levels of the servers, workstations and network environments, and anti-virus systems
  • Acted as a key member of a hand-picked team within a SOC dedicated to solving complex and ever-changing problem sets, where I specialized in network-based solutions
  • Performed proactive network monitoring and threat analysis
  • Monitored systems, detecting, analyzing, and resolving all incidents/events reported by various SIEMs (Sourcefire, Tripping Point)
  • Monitored and investigated large sets of data on clients' portal to detect fraudulent activities
  • Reviewed provided or requested Artifacts and Plan of Action & Milestones (POAMs) to determine if controls are implemented correctly
  • Responsible for completing threat analysis using Security tools (Bluecoat, Qradar, FireEye, Symantec Endpoint Protection, LogRhythm)
  • Provided weekly status reports
  • Performed incident handling and documentation within the incident response lifecycle (detection, triage, analysis, mitigation, reporting and documentation)
  • Inventory of Authorized and Unauthorized Software
  • Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers
  • Continuous Vulnerability Assessment and Remediation
  • Malware Defenses
  • Application Software Security
Information Security Analyst, 01/2016 to 12/2017
AledadePine Bluff, AR,
  • Performed network sweeps to locate and identify rogue devices and/or undocumented changes to inventory
  • Created Standard Operating Procedures for specific team tasks and responsibilities that are still in use today
  • Responsible for creating, maintaining, and enforcing Information Security Policies and Procedures in compliance with PCI-DSS regulations and NIST cyber security best practices
  • Designs DLP Policies by evaluating network and security technologies; developing requirements for local area networks (LANs), wide area networks (WANs), cloud infrastructure, virtual private networks (VPNs), routers, firewalls, and related security and network devices as well as hardware and software; adhering to industry standards
  • Guided clients in better protecting their assets and understanding threats
  • Provided Tier-1 Support for customer threat mitigation and threat Intelligence products
  • Monitored and tracked customer issues using the ServiceNow Ticketing System
  • Utilized internal threat feeds, portals and tools to identify and mitigate cyber threat incidents
  • Provided support in account creation and password resets
  • Tracked the process of unresolved cases to ensure their successful completion and escalate to the appropriate individuals based on the established guidelines and procedures
  • Coordinated reports of phishing attacks against Dicks Sporting Goods employees
  • The detection and processing of malicious e-mail attachments Sandboxing/decomposition analysis of various payloads using LogRhythm tools and techniques
Education and Training
Bachelor of Science: Computer Science, Expected in to University of Buea - Cameroon,
Advance Diploma: Marketing, Advertising, Public Relation., Expected in to Institute of Commercial Management - Bournemouth, England,
Certificate: Cyber Security And Risk Management, Expected in to Harvard University - Cambridge, MA

By clicking Customize This Resume, you agree to our Terms of Use and Privacy Policy

Your data is safe with us

Any information uploaded, such as a resume, or input by the user is owned solely by the user, not LiveCareer. For further information, please visit our Terms of Use.

Resume Overview

School Attended

  • University of Buea
  • Institute of Commercial Management
  • Harvard University

Job Titles Held:

  • Associate Security Engineer
  • SOC Analyst
  • Information Security Analyst


  • Bachelor of Science
  • Advance Diploma
  • Certificate

By clicking Customize This Resume, you agree to our Terms of Use and Privacy Policy

*As seen in:As seen in: