LiveCareer-Resume

Malware Analyst resume example with 3+ years of experience

Jessica Claire
, , 609 Johnson Ave., 49204, Tulsa, OK 100 Montgomery St. 10th Floor
Home: (555) 432-1000 - Cell: - resumesample@example.com - -
Professional Summary

Information Security Specialist with passion for aligning security architecture plans and processes with security standards and business goals. Extensive experience developing and testing security framework for cloud-based software. Versed in robust network defense strategies.

Skills

    C#,C++,Python

    Network Automation

    Splunk

    Wireshark

Work History
03/2020 to Current
Malware Analyst Iboss Sc, SC,
  • Perform in-depth static analysis and reverse engineering of malware samples to extract all relevant indicators, behaviors, and capabilities.
  • Perform dynamic analysis and triage on suspected malicious samples for the purpose of confirming malicious behavior and to extract relevant indicators of compromise and other findings.
  • Assist intelligence analysts with investigating raw telemetry, potential malicious activity, and confirmed threat detections for the purpose of identifying threats, providing context, and informing decisions about detection and response.
  • Perform open and closed source research to associate malware samples and/or malicious activity to known threats.
  • Assess code similarity among known malware families as well as patterns in identified malware and detections. Assist intelligence analysts in identifying new activity clusters.
  • Perform proactive research and hunting to identify similar malware samples from open and closed source data sets.
  • Work with intelligence analysts to communicate malware analysis findings, identify overlaps and patterns between different malware samples and families, and recommend detection and response actions.
  • Supplement Intelligence Profile documents with detailed, technical context.
  • Partner with detection engineers to help contextualize and implement robust detector logic.
  • Write reports and communicate actionable insights based on analysis, both internally and externally to customers.
  • Service requests from incident handlers to provide more details about malware indicators and capabilities discovered within customer environments. Communicate directly with customers as requested.
  • Serve as a mentor and coach for other malware analysts.
03/2019 to 02/2020
Threat Researcher Vmware, Inc. Long Beach, CA,
  • Identify, monitor, assess, and counter the cyber threats posed by cybercriminals in support of a security operations center
  • Author finished intelligence products (malware analysis reports, incident reports, JIRA reports etc)
  • Verify threat-detection coverage for the entire lifecycle of a threat
  • Analysis of the Malwares/False positives reported from the customers
  • Remain up to date on current information security trends and research techniques in the industry.
  • Finding new malware, phishes, scams, and compromised web sites to proactively block and analyze
  • Identifying trends and novel tactics observed in the threat landscape
  • Assisting threat operations team in identifying and pursuing high value targets
  • Identifying research gaps on the threat operations team and proactively obtaining
  • appropriate threat intelligence
04/2018 to 03/2019
Security Analyst Cisco Systems, Inc. West Des Moines, IA,
  • Monitor computer networks for security issues and take corrective action as necessary.
  • Investigate security breaches and other cyber security incidents.
  • Install security measures and operate software to protect systems and information infrastructure,
  • Including firewalls and data encryption programs.
  • Document security breaches and assess the damage they cause.
  • Work with security team to perform tests and uncover network vulnerabilities.
  • Fix detected vulnerabilities to maintain a high-security standard.
  • Stay current on IT security trends and news.
  • Develop company-wide best practices for IT security.
  • Help colleagues install security software and understand information security management.
  • Research security enhancements and make recommendations to management.
  • Stay up-to-date on information technology trends and security standards.
  • Ability to identify and mitigate network vulnerabilities and explain how to avoid them.
  • Understanding of patch management
09/2017 to 03/2018
Junior Network Administrator Custom Computer Specialists, Inc. East Islip, NY,
  • Installs, maintains, audits and supports a secure MS Windows network environment and limited web/data application service
  • Maintains internet applications and protocols IP,TCP,HTTP, HTTPS, FTP, & SSL
  • Maintains file servers, Firewalls, network access, Security Monitoring Systems and system documentation as required
  • Interfaces with local customers and provides IT related support to quickly resolve problems
  • Analyzes and troubleshoots system anomalies to ensure optimum equipment performance
  • Performs periodic maintenance, hardware upgrades and replacement, firmware updates and system configuration changes
  • Performs scheduled tape backups on systems as required
  • Manages data backup library to include storage of tapes, disks and other magnetic media
  • Attends planning and requirements meetings with IT staff, Program Managers and customers as required
  • Prepares system for operational use and supports operational tests
  • Provides technical guidance
Education
Expected in
Master of Science: Computer And Information Systems Security
Campbellsville University - Campbellsville, KY
GPA:

By clicking Customize This Resume, you agree to our Terms of Use and Privacy Policy

Your data is safe with us

Any information uploaded, such as a resume, or input by the user is owned solely by the user, not LiveCareer. For further information, please visit our Terms of Use.

Resume Overview

School Attended

  • Campbellsville University

Job Titles Held:

  • Malware Analyst
  • Threat Researcher
  • Security Analyst
  • Junior Network Administrator

Degrees

  • Master of Science

By clicking Customize This Resume, you agree to our Terms of Use and Privacy Policy

*As seen in:As seen in: