LiveCareer
LiveCareer
  • Dashboard
  • Jobs
  • Resumes
  • Cover Letters
  • Resumes
    • Resumes
    • Resume Builder
    • Resume Examples
      • Resume Examples
      • Nursing
      • Education
      • Administrative
      • Medical
      • Human Resources
      • View All
    • Resume Search
    • Resume Templates
      • Resume Templates
      • Nursing
      • Education
      • Medical
      • Human Resources
      • Customer Service
      • View All
    • Resume Services
    • Resume Formats
    • Resume Review
    • How to Write a Resume
    • CV Examples
    • Resume Objectives
  • Cover Letters
    • Cover Letters
    • Cover Letter Builder
    • Cover Letter Examples
      • Cover Letter Examples
      • Education
      • Medical
      • Human Resources
      • Customer Service
      • Business Operations
      • View All
    • Cover Letter Services
    • Cover Letter Templates
    • Cover Letter Formats
    • How to Write a Cover Letter
  • Jobs
    • Mobile App
    • Job Search
    • Job Apply Tool
    • Salary Calculator
    • Business Letters
    • Job Descriptions
  • Questions
  • Resources
  • About
  • Contact
  • 0Notifications
    • Notifications

      0 New
  • jane
    • Settings
    • Help & Support
    • Sign Out
  • Sign In
Member Login
  • LiveCareer
  • Resume Search
  • IT Security Analyst
Please provide a type of job or location to search!
SEARCH

IT Security Analyst Resume Example

Resume Score: 90%

Love this resume?Build Your Own Now
IT SECURITY ANALYST
Career Overview
The ability to adapt quickly to my environment and absorb information pertaining to my field of interest in order to disseminate what security means to an organization and coordinate planning, testing, verification and risk analysis.
Qualifications
Work Experience
PROFESSIONAL EXPERINCE Washington Health Benefit ExchangeJanuary 2014 to CurrentIT Security Analyst
  • Analysis Review and analysis of new technologies to develop a business case for future implementations.
  • Diagnosis computer issues by collecting information from co-workers, users, and Google searches to resolve trouble-ticket issues.
  • Analyze and responds to security and privacy incidents.
  • Continuously monitors identified areas of the enterprise to detect potential security incidents and analyze trends.
  • Troubleshooting Uses the OSI layer model for troubleshooting network and computer issues.
  • Identify and implement solutions for computer and networking issues.
  • Strategy Development Research new developments in IT security in order to recommend, develop and implement new security tools.
  • Able to understand business needs and balance risk mitigation.
  • Works with different IT departments to develop processes, such as, vulnerability management, user auditing, configuration management, patch management to strengthen the security program's posture in the enterprise.
  • Project Management Collaborated with a team of students developing a training video for future CWU students to learn more about using their available resources for degree planning.
  • Collaborated with a team of students developing an informative website for future CWU students in the MS-ITAM program.
  • Lead a team of four to upgrade 450+ users to Windows 7 from Windows XP over a twelve-month period.
  • Participated in a printer request for proposal process by providing technical knowledge about network needs for CHPW.
  • Coordinated the IT aspects of incorporating new printers onto the network using a print server and Papercut software.
  • Coordinated connectivity project between data-centers for large multi-organization project for testing and production.
  • Disaster Recovery Collaborates with IT department to understand the functions within the department.
  • Understanding of the importance for disaster recovery and what the impacts can be without well planned disaster recovery solutions.
  • Works with IT Enterprise Security Manager to develop and implement appropriate IT security policies and procedures in accordance with the Minimum Acceptable Risk Standards for Exchanges (MARS-E).
  • Conducts vendor, project and technical/ad hoc security reviews of new technologies and compliance with implemented security policies and procedures.
  • Analyzes and responds to security and privacy incidents.
  • Communicates with various levels of the business regarding security issues while ensuring that the company's information assets are properly protected.
  • Review maintenance and IT infrastructure processes to ensure efficient and adequate security provisions.
  • Implement suitable vulnerability and threat management in order to safeguard the information assets.
  • Assist in the development, implementation, and administration of high-level security policies, practices, standards and programs.
  • Developed and executed a robust and informative security awareness programs.
  • Coordinates the assessment of computer systems security risks: investigates and develops contingency plans by undertaking risk analysis, security investigations, surveys and threat assessments.
  • Participates as a member of team providing pertinent security information and input to strategic and tactical planning; initiatives and projects planning.
Community Health Plan of WashingtonJanuary 2012 to January 2014Desktop Support Analyst
  • Configures, deploys, maintains, troubleshoots, and supports computer workstations, laptops, printers, mobile devices (Android and iPhone, Blackberry), and other computer and Avaya telecommunications equipment.
  • Performs Active Directory administration - adding, modifying, and disabling user, computer, and service accounts.
  • Prepared detail practices and procedures on technical processes.
  • Perform quarterly Active Directory audits for user network access for the Internal Auditing Team.
ABW TechnologiesJanuary 2008 to January 2012Quality Assurance Specialist
  • Maintained quality compliance by identifying quality requirements; disseminating standards, policies, and procedures; conducting audits; recommending improvement plans.
  • Performed root-cause analysis on non-compliance requests to create preventative action reports.
  • Developed, and documented formal policies and procedures on quality related functions for the organization.
  • Prepared auditing plans.
  • Organized and implemented internal audits.
Education and Training
Central Washington UniversityJune 2014IT Specialization & Cybersecurity SpecializationEllensburg, WAGPA: Phi Kappa Phi Honor Society GPA: 3.8 / Dean's ListPhi Kappa Phi Honor Society GPA: 3.8 / Dean's List
IT Specialization Central Washington UniversityAugust 2015Master of Science: Information Technology and Administrative ManagementEllensburg, WAInformation Technology and Administrative Management
Everett Community CollegeAugust 2012Everett, WA
Bachelor of Applied Science: Information Technology and Administrative ManagementInformation Technology and Administrative Management
Central Washington UniversityAssociates of Applied Science: Computer Information SystemsEllensburg, WAComputer Information Systems
Interests
Security +/CISSP Certifications in progress *Attendee, Secure World Conference November 2014 *Attendee, Secure-Seattle Conference February 2015
Additional Information
  • RECENT ACTIVITIES: *Security +/CISSP Certifications in progress *Attendee, Secure World Conference November 2014 *Attendee, Secure-Seattle Conference February 2015
Skills
Active Directory, ad, auditing, Avaya, balance, Basic, business case, Cisco, Cisco Routers, Citrix, configuration management, Diagnosis, Disaster Recovery, e-mail, Firewalls, Imaging, internal audits, Internal Auditing, laptops, Linux, MARS, Access, Exchange Server, Windows 7, Windows, Windows XP, Works, monitors, Enterprise, network, networking, Oracle, OSI, policies, printer, printers, processes, Project Management, proposal, quality, Research, risk analysis, strategic, Strategy Development, surveys, Switches, telecommunications, Troubleshooting, Unix, upgrade, video, VPN, website
Build Your Own Now

DISCLAIMER

Resumes, and other information uploaded or provided by the user, are considered User Content governed by our Terms & Conditions. As such, it is not owned by us, and it is the user who retains ownership over such content.

Resume Overview

Companies Worked For:

  • PROFESSIONAL EXPERINCE Washington Health Benefit Exchange
  • Community Health Plan of Washington
  • ABW Technologies

School Attended

  • Central Washington University
  • IT Specialization Central Washington University
  • Everett Community College

Job Titles Held:

  • IT Security Analyst
  • Desktop Support Analyst
  • Quality Assurance Specialist

Degrees

  • IT Specialization & Cybersecurity Specialization
    Master of Science : Information Technology and Administrative Management

    Bachelor of Applied Science : Information Technology and Administrative Management
    Associates of Applied Science : Computer Information Systems

Create a job alert for [job role title] at [location].

×

Advertisement

Similar Resumes

View All
Security-Analyst-resume-sample

Security Analyst

BLUE CROSS BLUE SHIELD SC

Branchville, South Carolina

Security-Analyst-resume-sample

Security Analyst

Umbrella Technologies

Kansas City, Missouri

IT-Security-Analyst-resume-sample

IT Security Analyst

Smart think Inc

Aurora, Colorado

About
  • About Us
  • Privacy Policy
  • Terms of Use
  • Sitemap
Help & Support
  • Work Here
  • Contact Us
  • FAQs
Languages
  • EN
  • UK
  • ES
  • FR
  • IT
  • DE
  • NL
  • PT
  • PL
Customer Service
customerservice@livecareer.com
800-652-8430 Mon- Fri 8am - 8pm CST
Sat 8am - 5pm CST, Sun 10am - 6pm CST
  • Stay in touch with us
Site jabber winner award

© 2021, Bold Limited. All rights reserved.