close
  • Dashboard
  • Resumes
  • Cover Letters
  • Resumes
    • Resumes
    • Resume Builder
    • Resume Examples
      • Resume Examples
      • Nursing
      • Customer Service
      • Education
      • Sales
      • Manager
      • View All
    • Resume Search
    • Resume Templates
      • Resume Templates
      • Microsoft Word
      • Professional
      • Modern
      • Traditional
      • Creative
      • View All
    • Resume Services
    • Resume Formats
      • Resume Formats
      • Chronological
      • Functional
      • Combination
    • Resume Review
    • How to Write a Resume
      • How to Write a Resume
      • Summary
      • Experience
      • Education
      • Skills
        • Skills
        • Hard Skills
        • Soft Skills
    • Resume Objectives
  • CV
    • CV
    • CV Examples
    • CV Formats
    • CV Templates
    • How to Write a CV
  • Cover Letters
    • Cover Letters
    • Cover Letter Builder
    • Cover Letter Examples
      • Cover Letter Examples
      • Customer Service
      • Marketing
      • Sales
      • Education
      • Accounting
      • View All
    • Cover Letter Services
    • Cover Letter Templates
    • Cover Letter Formats
    • How to Write a Cover Letter
  • Questions
  • Resources
  • About
    • About
    • Reviews
  • Contact
  • jane
    • Settings
    • Help & Support
    • Sign Out
  • Sign In
Member Login
  • LiveCareer
  • Resume Search
  • IT Security Analyst
Please provide a type of job or location to search!
SEARCH

IT Security Analyst Resume Example

Love this resume?Build Your Own Now
IT SECURITY ANALYST
Career Overview
The ability to adapt quickly to my environment and absorb information pertaining to my field of interest in order to disseminate what security means to an organization and coordinate planning, testing, verification and risk analysis.
Qualifications
Work Experience
Advisors ExcelJanuary 2014 to CurrentIT Security Analyst
  • Analysis Review and analysis of new technologies to develop a business case for future implementations.
  • Diagnosis computer issues by collecting information from co-workers, users, and Google searches to resolve trouble-ticket issues.
  • Analyze and responds to security and privacy incidents.
  • Continuously monitors identified areas of the enterprise to detect potential security incidents and analyze trends.
  • Troubleshooting Uses the OSI layer model for troubleshooting network and computer issues.
  • Identify and implement solutions for computer and networking issues.
  • Strategy Development Research new developments in IT security in order to recommend, develop and implement new security tools.
  • Able to understand business needs and balance risk mitigation.
  • Works with different IT departments to develop processes, such as, vulnerability management, user auditing, configuration management, patch management to strengthen the security program's posture in the enterprise.
  • Project Management Collaborated with a team of students developing a training video for future CWU students to learn more about using their available resources for degree planning.
  • Collaborated with a team of students developing an informative website for future CWU students in the MS-ITAM program.
  • Lead a team of four to upgrade 450+ users to Windows 7 from Windows XP over a twelve-month period.
  • Participated in a printer request for proposal process by providing technical knowledge about network needs for CHPW.
  • Coordinated the IT aspects of incorporating new printers onto the network using a print server and Papercut software.
  • Coordinated connectivity project between data-centers for large multi-organization project for testing and production.
  • Disaster Recovery Collaborates with IT department to understand the functions within the department.
  • Understanding of the importance for disaster recovery and what the impacts can be without well planned disaster recovery solutions.
  • Works with IT Enterprise Security Manager to develop and implement appropriate IT security policies and procedures in accordance with the Minimum Acceptable Risk Standards for Exchanges (MARS-E).
  • Conducts vendor, project and technical/ad hoc security reviews of new technologies and compliance with implemented security policies and procedures.
  • Analyzes and responds to security and privacy incidents.
  • Communicates with various levels of the business regarding security issues while ensuring that the company's information assets are properly protected.
  • Review maintenance and IT infrastructure processes to ensure efficient and adequate security provisions.
  • Implement suitable vulnerability and threat management in order to safeguard the information assets.
  • Assist in the development, implementation, and administration of high-level security policies, practices, standards and programs.
  • Developed and executed a robust and informative security awareness programs.
  • Coordinates the assessment of computer systems security risks: investigates and develops contingency plans by undertaking risk analysis, security investigations, surveys and threat assessments.
  • Participates as a member of team providing pertinent security information and input to strategic and tactical planning; initiatives and projects planning.
Computer AidJanuary 2012 to January 2014Desktop Support Analyst
  • Configures, deploys, maintains, troubleshoots, and supports computer workstations, laptops, printers, mobile devices (Android and iPhone, Blackberry), and other computer and Avaya telecommunications equipment.
  • Performs Active Directory administration - adding, modifying, and disabling user, computer, and service accounts.
  • Prepared detail practices and procedures on technical processes.
  • Perform quarterly Active Directory audits for user network access for the Internal Auditing Team.
AmentumJanuary 2008 to January 2012Quality Assurance Specialist
  • Maintained quality compliance by identifying quality requirements; disseminating standards, policies, and procedures; conducting audits; recommending improvementplans.
  • Performed root-cause analysis on non-compliance requests to create preventative action reports.
  • Developed, and documented formal policies and procedures on quality related functions for the organization.
  • Prepared auditing plans.
  • Organized and implemented internal audits.
Education and Training
Central Washington UniversityJune 2014IT Specialization & Cybersecurity SpecializationCity, StateGPA: Phi Kappa Phi Honor Society GPA: 3.8 / Dean's ListPhi Kappa Phi Honor Society GPA: 3.8 / Dean's List
IT Specialization Central Washington UniversityAugust 2015Master of Science: Information Technology and Administrative ManagementCity, StateInformation Technology and Administrative Management
Everett Community CollegeAugust 2012City, State
Bachelor of Applied Science: Information Technology and Administrative ManagementInformation Technology and Administrative Management
Central Washington UniversityAssociates of Applied Science: Computer Information SystemsCity, StateComputer Information Systems
Interests
Security +/CISSP Certifications in progress *Attendee, Secure World Conference November 2014 *Attendee, Secure-Seattle Conference February 2015
Additional Information
  • RECENT ACTIVITIES: *Security +/CISSP Certifications in progress *Attendee, Secure World Conference November 2014 *Attendee, Secure-Seattle Conference February 2015
Skills
Active Directory, ad, auditing, Avaya, balance, Basic, business case, Cisco, Cisco Routers, Citrix, configuration management, Diagnosis, Disaster Recovery, e-mail, Firewalls, Imaging, internal audits, Internal Auditing, laptops, Linux, MARS, Access, Exchange Server, Windows 7, Windows, Windows XP, Works, monitors, Enterprise, network, networking, Oracle, OSI, policies, printer, printers, processes, Project Management, proposal, quality, Research, risk analysis, strategic, Strategy Development, surveys, Switches, telecommunications, Troubleshooting, Unix, upgrade, video, VPN, website
Build Your Own Now

DISCLAIMER

Resumes, and other information uploaded or provided by the user, are considered User Content governed by our Terms & Conditions. As such, it is not owned by us, and it is the user who retains ownership over such content.

How this resume score could be improved?

Many factors go into creating a strong resume. Here are a few tweaks that could improve the score of this resume:

61Fair
Resume Strength
  • Completeness
  • Formatting
  • Word choice
  • Length
  • Measurable results
  • Strong summary

Resume Overview

School Attended

  • Central Washington University
  • IT Specialization Central Washington University
  • Everett Community College

Job Titles Held:

  • IT Security Analyst
  • Desktop Support Analyst
  • Quality Assurance Specialist

Degrees

  • IT Specialization & Cybersecurity Specialization
    Master of Science : Information Technology and Administrative Management

    Bachelor of Applied Science : Information Technology and Administrative Management
    Associates of Applied Science : Computer Information Systems

Create a job alert for [job role title] at [location].

×

Advertisement

Similar Resumes

View All
Cyber-Security-Analyst-Intern-resume-sample

Cyber Security Analyst Intern

Iex Group

New York , NY

Security-Analyst-resume-sample

Security Analyst

Ceridian Corporation

Charlotte , NC

Information-Security-Analyst-resume-sample

Information Security Analyst

Pearson

Troy , MI

  • About Us
  • Privacy Policy
  • Terms of Use
  • Sitemap
  • Work Here
  • Contact Us
  • FAQs
  • Accessibility
  • EN
  • UK
  • ES
  • FR
  • IT
  • DE
  • NL
  • PT
  • PL
customerservice@livecareer.com
800-652-8430 Mon- Fri 8am - 8pm CST
Sat 8am - 5pm CST, Sun 10am - 6pm CST
  • Stay in touch with us
Site jabber winner award

© 2022, Bold Limited. All rights reserved.