LiveCareer-Resume

cyber security consultant resume example with 5+ years of experience

Jessica Claire
  • , , 609 Johnson Ave., 49204, Tulsa, OK 100 Montgomery St. 10th Floor
  • Home: (555) 432-1000
  • Cell:
  • resumesample@example.com
  • :
Summary

Determination is my forte. I enjoy working in groups and adopt an open mind when trying to solve problems. I believe in perfection with quality. In the light of challenges, I strive and contribute to make the vision, mission and objective of the organization fruitful. I see myself as a positive addition to the company’s workforce that I am associated with. To be associated with an organization that gives me the scope to apply my knowledge on cyber-security skills to the fullest and involve myself as a part of the team and lead a team that dynamically works towards the growth of the organization. To be able to explore new domains and sectors and being more knowledgeable.

Skills
  • Technical Skills
  • Microsoft office, Cyber Security, Risk and Compliance Analyst, Anitspam, phishing, Quality audit, Team Management.
  • Threat intelligence.
  • Security operations center (SOC) operations
  • Vulnerability management
  • Incident response
  • Experience working with Microsoft 365 Defender
  • Microsoft Intune
  • Azure Conditional Access
  • Microsoft Defender Antivirus, Windows Defender Firewall, Microsoft Defender Threat Intelligence.
  • Windows Defender Application Control
  • Microsoft Defender for Endpoints
  • Microsoft Certified Identity and Access Administrator
  • Microsoft 365 Certified Security Administrator
  • SIEM Solutions
  • Tools:
  • Virus total, whois.com, burp suite, urlscan.io, alien vault, OSINT, Microsoft Defender Console, Azure AD, Microsoft Intune, Power shell, Postman.
  • Languages known:
  • English, Hindi, Telugu.
  • Strengths
  • Good Team Member
  • Logical Analyzing.
  • Positive Thinking.
  • Capable Leader.
  • Communication and presentation skills.
Experience
Cyber Security Consultant, 03/2022 to 09/2022
AheadPhoenix, AZ,
  • Domain: Cyber security-Malware Analysis, Anti phishing, Real-time Threat intelligence
  • Operational Experience:
  • Knowledge on dealing with security threats from both internal and open-source intelligence gathering
  • In-depth knowledge of Microsoft Defender for Endpoints, including its features and functionality
  • Detailed understanding of cybercrime and related analytical models such as Cyber kill chain and MITRE ATT&CK framework
  • Experience on threat detection, incidence response and hunting.
  • Experience with security tools such as firewalls, intrusion detection systems, and vulnerability scanners
  • Experience on writing Regex patterns for the phishing URL’s email campaigns and blocking of spoofing domains
  • Knowledge on detecting the open-source codes with necessary identification of keywords
  • Creating signatures on Malware bytes with respect to predetermined attributes
  • Knowledge on reverse IP look up and reverse binary engineering on malware analysis
  • Determination of SHA values for malware file downloads and scripted .JSS and .CSS files
  • Determination and analysis of IP’s whether they are Malicious or clean and IP ranges
  • Keeping up-to-date with the latest security threats and trends, and provide recommendations for improving the organization's security posture
  • Research on phishing campaigns and malware campaigns with real time ongoing trends
  • Configuring and managing malware detection policies for the domain with different TLD’s
  • Working Knowledge on security vulnerabilities, in particular those exploitable in ransomware attacks
  • Working Knowledge on the risk controls framework eg: NIST 800-30, NIST CSF
  • Knowledge and understanding of Risk Management Framework (RMF) cybersecurity requirements , policies and best practices.
Transaction Risk Investigator, 10/2020 to 01/2022
EmedMiami, FL,
  • Configuring Malware detection policies for inbound and outbound emails
  • Managing SPAM detection policies for inbound emails
  • Adhering to customized policies across the organization depending on various groups
  • Grading the permitted and blocked URLs
  • Being stringent in custom rules to block specified malicious URLS
  • Managing and configuring with the policies to match Unsafe attachments those that don’t match known signatures to be sent to a sandboxed virtual environment
  • Strong understanding of cyber security threats and countermeasures, including malware, phishing, and social engineering attacks
  • Blocking suspicious and quarantined mail with malicious content with the behavior of the URL
  • Blocking of domains, subject and from headers with the help of regular expressions
  • Experience with security incident response procedures and best practices
  • Working Knowledge on security vulnerabilities, in particular those exploitable in ransomware attacks
  • Excellent analytical and problem-solving skills, with the ability to think creatively and outside the box
  • Strong communication and interpersonal skills, with the ability to work collaboratively with other members of the IT team
  • Experience with scripting languages such as Power Shell
  • Experience with Attack Surface Reduction rules.
Senior SOC Analyst, 03/2018 to 10/2020
Check Point Software TechnologiesLouisville, KY,
  • Auditing Blocked URL and Blocked Domain Queues
  • Sampling the work done by analyst to reassure that they flagged Spam and Phishing emails into correct queues
  • Taking training for new batches regarding quality parameters and motivating the team to understand the importance of it
  • Conducted evaluations to identify weak areas and identify problematic issues while promoting corrective methods
  • Reviewing status reports from team managers and taking appropriate actions accordingly
  • Strong communication and interpersonal skills, with the ability to work collaboratively with other members of the IT team
  • Conducting regular security assessments to identify potential vulnerabilities in the organization's IT infrastructure and provide recommendations for remediation
  • Determined campaign Management policies, procedures, and regulations
  • Worked on Online Advertising Accounts, conducted manual review to catch Online Fraudsters
  • Conducting regular security assessments to identify potential vulnerabilities in the organization's IT infrastructure and provide recommendations for remediation
  • Worked on SSL, TCP, HTTP/HTTPS control protocols to ensure connection is reliable between endpoints over the network.
SOC Analyst, 09/2016 to 02/2018
Accenture Pvt. LimitedCity, STATE,
  • Investigated and responded to security incidents, working closely with incident response teams to contain and mitigate threats
  • Monitored and analyzed security events from multiple sources, including SIEM tools and endpoint detection and response (EDR) solutions
  • Analyzed security event logs and alerts to identify potential security incidents and respond accordingly
  • Conducted security assessments and audits of IT systems and networks to identify vulnerabilities and recommend security improvements
  • Managed and maintained security tools such as firewalls, intrusion prevention systems, and antivirus solutions
  • Extensive knowledge of security information and event management (SIEM) technologies, including Splunk, QRadar, and LogRhythm
Education and Training
Bachelor of Science: Computer Science, Expected in 04/2016 to Keshav Memorial Institute of Technology - ,
GPA:
Certifications
Certified Security operation associate from Microsoft corporation, in related to mitigate threats on Microsoft 365 defender, Azure Defender, Azure Sentinel platforms.,
Additional Information
  • Achievements: , Awarded and recognized as best team member for Q’2 of 2022 in process improvement and Automations for LTI Mindtree Awarded best Senior Risk Analyst FY'20.

By clicking Customize This Resume, you agree to our Terms of Use and Privacy Policy

Your data is safe with us

Any information uploaded, such as a resume, or input by the user is owned solely by the user, not LiveCareer. For further information, please visit our Terms of Use.

Resume Overview

School Attended

  • Keshav Memorial Institute of Technology

Job Titles Held:

  • Cyber Security Consultant
  • Transaction Risk Investigator
  • Senior SOC Analyst
  • SOC Analyst

Degrees

  • Bachelor of Science

By clicking Customize This Resume, you agree to our Terms of Use and Privacy Policy

*As seen in:As seen in: