cybersecurity analyst resume example with 7 years of experience

Jessica Claire
  • , , 609 Johnson Ave., 49204, Tulsa, OK 100 Montgomery St. 10th Floor
  • Home: (555) 432-1000
  • Cell:

Information Assurance Professional with 4 years of industry experience identifying, assessing and providing recommendations for mitigating organizational risks, using NIST Special Publications 800-37, complaint with FISMA guidelines, Proficient in preparing Authorization Package- SSP, SAR and PAOM. Excellent communication skills; analytical ability. Certified Comptia Security +, Active Secret Clearance, an Army veteran, and ability to work effectively with clients, IT Management & Staff. Flexible hard worker ready to learn and contribute to team success.

  • Proficient in using Splunk to analyze, monitor and visualize network.
  • Proficient in Emass to manage risk and maintain situation awareness.
  • Expert in remedy tool to validate firewall, ports and protocols.
  • Expert in applying cybersecurity appliances and initiatives for protecting infrastructure environment and compliance.
  • Perform comprehensive assessments and write reviews of management, operational, technical security, and privacy controls for audited applications and information systems.
  • Develops and implements plans of cybersecurity architecture for organization development
  • Develop and conduct ST&E (Security Test and Evaluation) according to NIST SP 800-53A and NIST SP 800-53 Rev4.
  • Compile data to complete Residual Risk Report and to insert contents into POA&M.
  • FISMA & FedRAMP Assessment & Authorization Information Security.
  • Protecting networks.
  • Ability to multi-task, work independently and as part of a team.
  • Contingency Planning(CP)
  • Business Impact Analysis
  • Privacy Impact Assessment
  • System Security Plan
  • Risk Analysis
Cybersecurity Analyst, 10/2021 to Current
Cu*Answers, Inc.Las Vegas, NV,
  • Developed a Security Assessment Plan(SAP) for managing control groups and tools, assessment scope and strategy, schedules, Rules of Engagement (ROEs).
  • Prepare a Security Assessment Report (SAR) that details the findings of the assessment and document significant summary of threats and vulnerabilities associated with hosting information system.
  • Extensive knowledge in categorization information systems, using FIPS 199 & NIST 800-60 as a guide.
  • Create, review and update ATO package documents, SSP, SAR and POA&M.
  • Presents ATO packages to the Authorizing Officials for System Authorization to Operate (ATO).
  • Responsible for accessing the effectiveness of all implemented security controls on legacy systems and ensuring controls meet the minimum NIST requirement using NIST 800-53A.
  • Assisting with continuous monitoring using NIST SP 800-137 as a guide to make sure the assigned system is secure and can effectively perform normal operations without compromising it CIA requirements or compliance.
  • Continually monitored and maintained centralized logging server aggregating logs from network devices.
  • Perform system categorization, select, tailor security controls, implement, and test security controls.
  • Conduct assessment of security control selections on various moderate impact level system to ensure compliance with the NIST SP 800-53A.
  • Work with technical teams to mitigate security control deficiencies for assigned IT system
  • Analyzed security procedure violations and developed plans to prevent recurrence.
  • Designed, implemented and maintained security systems and controls.
  • Creating awareness on security issues among management, ensuring concepts are reflected in organization goals.
  • Develop policies and frameworks to protect unauthorized access to data, network and system.
Cargo Specialist, 05/2019 to 09/2021
Imc CompaniesCincinnati, OH,
  • Determined shipping methods and prepared bills of lading, invoices, and other shipping documents.
  • Directed and participated in cargo loading and unloading to ensure completeness of load and even distribution of weight.
  • Inspected and counted items received and checked against invoices or other documents while recording shortages and rejecting damaged goods.
  • Installed protective bracing, padding and strapping to prevent shifting and damage to items during transport.
  • Validated load plans, cargo cleanliness and transportation documentation.
  • Retrieved stored items and traced lost shipments, when necessary.
  • Attached address labels, identification codes and shipping instructions to containers.
  • Implemented strategic shipping policies to achieve long and short-term sales targets.
Cybersecurity Analyst, 01/2013 to 03/2016
Cu*Answers, Inc.Grand Rapids, MI,
  • Development and Maintenance of IT Governance, Risk and Compliance strategy and internal procedures to ensure information security.
  • Work with system owners through the Assessment and Authorization (A&A) process for legacy and new Major Application Systems.
  • Tracking of audit and self-identified POA&M and ensuring timely remediation of security gaps.
  • Develop and maintain appropriate security documentations which included SSP, SAR, Policies and Procedures.
  • Creates and process interconnection security Agreement (ISAs), Policy Waivers, Approval to Test (ATT), and other documentation for all mandated security features, procedures and tasks.
  • Provide proactive resolutions to the litigation support systems security challenges, and consulting with the business unit to accomplish day to day operational and business goal.
  • Analyzed current tenable architecture against network architecture for potential performance bottleneck and provided recommendations for increased performance.
  • Reviewed configuration of Center for Internet Security (CIS) benchmarks within tenable tool and provided recommendations on hardening configurations.
  • Reviewed tenable dashboards, scan reports, policies and plugins and provide recommendations for desired outputs and performance.
  • Analyzed security procedure violations and developed plans to prevent recurrence.
  • Defined security control types and frequency of implementation for security Testing and Evaluation (ST&E) using the System Security Plan(SSP) Audited networks and security systems to identify vulnerabilities.
  • Analyzed system risk to identify and implement appropriate security countermeasures.
  • Designed and implemented plans to secure computer files against breach, destruction or accidental modification.
  • Built firewalls and encrypted data to secure confidential information.
Education and Training
Bachelor of Science: Managerial Economics, Expected in to EKITI STATE UNIVERSITY - ADO EKITI, NIGERIA,
: Networks And Cybersecurity Fundamentals, Expected in to Victech - Ado, Nigeria,
: Cybersecurity Fundamentals, Expected in to Intellectual Point - Sterling, Virginia,
: , Expected in to Certified CompTIA Security + - ,
Additional Information
  • Active Secret Clearance

By clicking Customize This Resume, you agree to our Terms of Use and Privacy Policy

Your data is safe with us

Any information uploaded, such as a resume, or input by the user is owned solely by the user, not LiveCareer. For further information, please visit our Terms of Use.

Resume Overview

School Attended

  • Victech
  • Intellectual Point
  • Certified CompTIA Security +

Job Titles Held:

  • Cybersecurity Analyst
  • Cargo Specialist
  • Cybersecurity Analyst


  • Bachelor of Science

By clicking Customize This Resume, you agree to our Terms of Use and Privacy Policy

*As seen in:As seen in: