LiveCareer-Resume

cyber security analyst resume example with 5+ years of experience

Jessica Claire
  • Montgomery Street, San Francisco, CA 94105 609 Johnson Ave., 49204, Tulsa, OK
  • H: (555) 432-1000
  • C:
  • resumesample@example.com
  • Date of Birth:
  • India:
  • :
  • single:
  • :
PROFESSIONAL SUMMARY
  • Over 5+ years of experience as a Cyber Security Analyst assessing and mitigating Risk Management framework and system development life cycle and vulnerability management using, HIPPA and NIST standards.
  • Experience in STIG process and creating server baselines to secure an enterprise server and determine the IT security requirements.
  • Knowledge of several computer environments such as server 2008/2008r2/2012r2/2016,2019 ,2022, Linux, Windows 10 and MacOS operating systems.
  • Experience with VMware products, with good knowledge of ESX/vSphere and VCenter Including experience with server deployment and configuration to include capacity and optimization.
  • Experience in conducting network security monitoring on services including SIEM, IDS/IPS, Firewall, and data loss prevention. Experience with TCP/UDP traffic, firewall traffic and incident response tools such as FTK access data, Snort and Wireshark.
  • Expert in vulnerability assessment using Qualys and Nessus tools to evaluate attack vectors, identify system vulnerabilities and develop remediation plan and security procedures.
  • Experience in documenting, escalating and closure of tickets via ServiceNow and Jira.
  • Good knowledge of IT/Network concepts (DNS, TCP/IP, HTTP/HTTPS) and supporting productivity applications (Outlook, Microsoft office).
  • Experience in assisting installation of hardware, technical troubleshooting within an enterprise environment, including store system crashes, slow-downs, and network issues.
  • Basic knowledge of relational database concepts, Linux, SNMP standard and SQL query.
  • Excellent analytical and the ability to learn new skills fast and be able to adapt to changes fast, driving advantage from new tools and processes. Self-motivated, able to handle multiple priorities, and excellent time management skills.
Skills
  • TECHNOLOGY SKILLS:
  • Scripting: PowerShell, Bash.
  • Networking and Network Security: Firewalls, TCP/IP, DNS, DHCP, LAN/WAN Intrusion Detection/Prevention Systems (IDS/IPS).
  • Vulnerability Assessment and Penetration Testing (VAPT): Nessus/Tenable, NMAP, Metasploit, Burp Suite, Kali Linux.
  • SIME tools: Splunk, ArcSight, Logz.io, IBM QRadar, LogRhythm.
  • Incident Response and Forensics: EnCase, Volatility, Wireshark.
  • Cloud Security: AWS, Azure, Google Cloud Platform (GCP).
  • Software Technology: Microsoft Office, Microsoft SharePoint, Remote Desk
  • Operating Systems: Windows Server (2012, 2016, 2019 R2), Linux (CentOS, Fedora, Ubuntu), Mac.
  • Compliance and Framework: NIST Cyber Security Framework, ISO 27001/27002, PCI DSS, HIPAA, GDPR
  • Communication Technology: Outlook, Slack, Microsoft Teams, Zoom
  • Ticketing System: Jira, ServiceNow
WORK EXPERIENCE
Cyber Security Analyst, 09/2021 - Current
Asrc Federal Holding Company Fort Huachuca, AZ,
  • Experience with security tools from various vendors to include Iron port, McAfee (Trellix), Symantec FireEye, BitLocker.
  • Utilize Security Information and Event Management (SIEM), Intrusion detection and prevention (IDS/IPS), data leakage prevention (DLP) and Malware Analysis tools.
  • Deploy and support information security systems and solutions such as key management, IPS/IDS, SIEM, MDM and endpoint management for remote users.
  • Use Wireshark as a protocol analyzer to capture packets/network traffic to detect unusual levels of network traffic, unusual packet characteristics, and identify packet source or their destination.
  • Experience with packet flow, TCP/UDP traffic, firewall technologies, IDS technologies (e.g Snort) proxy technologies and antivirus, spam, and spyware solutions.
  • Used Splunk to monitor system in real-time to capture, index, analyze and investigate, generate reports, enhance application management, and enforce compliance on corporate security policies.
  • Determine problems, implement solutions for reported network access issues, ensure network (LAN/WAN) security access and protect against unauthorized access, modification, or destruction.
  • Develop and implement best practices for risk reduction across enterprise applications, systems, networks, and interfaces.
  • Participated in the development and delivery of security training programs and awareness materials for employees to prevent and mitigate user risk.
  • Stay up to date with the latest Cybersecurity trends and technologies, and research new security solutions to enhance the organization’s security.
  • Executed critical risk and business impact assessments, continuity and recovery management plans while addressing security and business continuity concerns in a professional manner.
  • Perform information system controls assessment on various platforms and devices to include Windows, Linux, database, and network devices).
Jr Information Security Analyst, 06/2020 - 09/2021
Goodrx Holdings, Inc. Charleston, SC,
  • Cross check malicious IPs and domains on virus total, ipvoid to determine if they have been blacklisted and keep daily logs for future analysis.
  • Continuous monitoring and interpretation of threats through use of intrusion detection systems, firewalls, and any security incident management products deployed.
  • Worked with SOC analyst in an intrusion detection and prevention systems (IDS/IPS) such as Snort to analyze and detect worms.
  • Ensure that the information system security department’s policies, procedures, and practices as well as other system user groups are following NIST and general company standards.
  • Identify trends and root cause of system failure or vulnerabilities using NESSUS vulnerability scanner, NMAP to scan ports, weak configuration, and missing patches.
  • Ensure the integrity and protection of networks, system, and applications by enforcing organization’s security policies.
  • Perform network traffic analysis, network flow, intrusion detection system (IDS) and intrusion prevention system (IPS) to monitor and detect unusual activities.
  • Utilize security information and Event Management (SIEM), Intrusion detection and prevention (IDS/IPS), data leakage prevention (DLP) and Malware Analysis tools.
  • Monitor security management console for security operation center (SOC) to ensure confidentiality, integrity, and availability of information system.
  • Identify vulnerabilities, research best practices, and recommend steps for strengthening the IT security posture of the organization.
  • Remediate and apply lessons learned to security incidents through root cause analysis triage action in a time sensitive environment.
  • Performed vulnerability assessment and penetration test on internal system and external network with the use of popular penetration testing tools (Nessus, Nmap, Wireshark).
Jr Security Analyst, 04/2018 - 05/2020
Seneca Resources City, STATE,
  • Works with a team to build security baseline for a server in accordance with DOD and scan the server using SCAP scan to check system for vulnerabilities and misconfigurations.
  • Created SCCM server baselines to secure all enterprise servers to remedy findings in security audit.
  • Analyze security technical implementation guides (STIGs), security content automation protocol (SCAP) and assured compliance assessment solution of scanning results.
  • Used Nessus vulnerability scanner and Nmap to scan ports, weak configuration, and missing patches.
  • Identify the critical, high, medium, low vulnerabilities in application based on OWASP Top 10 and SANS 25 prioritizing them based on the criticality
  • Perform risk assessment, updates and review system security plan using NIST guidelines, plan of action and milestone (POA& M), security control assessments and configuration.
  • Experienced in using NIST 800-37 Risk Management Framework (RMF) as a guide to implement security assessment and continuous monitoring.
  • Configure and administer Active Directory, group policies, and integrate with DNS.
  • Design, configure, implement, and troubleshoots firewall, encryption, IPS/IDS, VPN such as Remote Access VPN.
  • Work with windows operating system for the building, configuring, and troubleshooting of windows server 2012r2/2016 /2019 and Windows 10.
  • Good knowledge of installing and implementing VMware ESX server, VMware Virtual center, Setting up V-Motion, DRS, and related VMware products such as VM Workstation, VMware converter, VM backup products and other virtualization products.
  • Working knowledge of wide range of datacenter technologies including LAN, WAN, Linux, Microsoft server, Firewall, VPN network protocols such as TCP/IP, DHCP, DNS, FTP and HTTP.
IT Helpdesk, 09/2017 - 03/2018
Africgo City, STATE,
  • Configured hardware devices and software to set-up workstation for employees, devised solutions to operations issues related to Windows, analyzing, and troubleshooting to identify the issues.
  • Setup new computers and laptops, software installation, software upgrades, changing backup tapes and setup email accounts.
  • Transfer user profiles to new PCs, record service tag numbers upon request, and set up domain users in Active Directory.
  • Patched software and installed new versions to eliminate security problems, to protect data, and to strength outstanding platform services.
  • Unlocked user accounts, reset passwords, track all the company’s incoming and outgoing calls log to evaluate customers satisfaction.
  • Performed basic network TCP/IP troubleshooting, repair PCs, laptop, print machine, processed over 40 support requests weekly for technical assistance on wide range of issues related to Windows Operating System.
  • Installed, modified, repaired software and hardware to resolve technical issues, and monitored systems in operation and input commands to troubleshoot check network status.
  • Identified and resolved service or network connectivity and/or provisioning issues arising during or after installation, including remote assistance to technicians at customer site.
  • Maintained up to date knowledge of all company products, services, procedure, and offerings to properly assist clients.
Education and Training
Bachelor of Applied Science: Cybersecurity, Expected in
-
George Mason University - ,
GPA:
Status -
Coursework – Network Security, Computer Forensics, Cyber Security, Information Defense technology, IT project management, AWS cloud management: , Expected in
-
- ,
GPA:
Status -
Associate of Applied Science: Cybersecurity, Expected in
-
Northern Virginia Community College - ,
GPA:
Status -
Relevant coursework- Linux system administrator, Network security layers: , Expected in
-
- ,
GPA:
Status -
Accomplishments
  • Network Administrator

By clicking Customize This Resume, you agree to our Terms of Use and Privacy Policy

Your data is safe with us

Any information uploaded, such as a resume, or input by the user is owned solely by the user, not LiveCareer. For further information, please visit our Terms of Use.

Resume Overview

School Attended

  • George Mason University
  • Northern Virginia Community College

Job Titles Held:

  • Cyber Security Analyst
  • Jr Information Security Analyst
  • Jr Security Analyst
  • IT Helpdesk

Degrees

  • Bachelor of Applied Science
  • Coursework – Network Security, Computer Forensics, Cyber Security, Information Defense technology, IT project management, AWS cloud management
  • Associate of Applied Science
  • Relevant coursework- Linux system administrator, Network security layers

By clicking Customize This Resume, you agree to our Terms of Use and Privacy Policy

*As seen in:As seen in: